CSCE 465 Lecture 2
Jump to navigation
Jump to search
« previous | Thursday, January 17, 2013 | next »
Homework 1
Packet sniffing and spoofing
Sniffing
- Install VMware Player on Windows or Linux
- Install Ubuntu guest OS (accounts root:seedubuntu and seed:dees)
- Follow pcap tutorial to build sniffex program.
- Answer problems based on tutorial
- Find telnet password in network trace
Spoofing
Use a raw socket to send a packet with arbitrarily-set fields
Security Overview
A state of well-being and adapting of information and infrastructures in which the possibility of successful yet undetected and detected theft, tampering, and disruption of information and services is kept low or tolerable
Rests on CIA
- Confidentiality (keep data and resources hidden)
- Integrity (data and origin/authentication)
- Availability (enable access to data and resources)
Computer security ∩ Communication security = Information Security
Security is important: technology, computers, and networks are nerves and critical infrastructure of society.
…but it is hard
- If system not designed with security in mind, there will always be loopholes
- often not considered until an enterprise has been penetrated by an attacker
- historical reluctance to invest in security due to higher cost
- Most TCP/IP protocols not built with security in mind (but that's changing quickly: HTTPS, SSH)
- Software vulnerabilities (human mistakes, buffer overflow)
- increasing hardware complexity
- User ignorance (social engineering)
- attackers only need to break the weakest link, while defense applies to entire systems
Threats and Attacks
- threat
- potential violation of security
- design flaws, etc.
- attack
- an action that violates security
- can be active or passive
- all very dangerous
Attacks on Confidentiality
Eavesdropping (message interception)
- Hardware
- tcpdump with promiscuous network interface
- DNS lookups, IP packets without payloads (headers only), payload
Attacks on Integrity
- Tampering: intercepting and resending data
- Fabrication: masquerade/spoof identity of other's identity
- Man-in-the-middle
- passive tap: viewing information as it goes through
- active tap: modify data being transmitted
Attacks on Availability
- Destroy hardware (cut fiber/wire) or software
- Corrupt packets in transit
- Crash server
- Overwhelm server