Title: Real World Threats
1Real World Threats October 19, 2000
2Traditional dead horse wisdom
- Dakota (Sioux) tribal wisdom says
- "When you are riding a dead horse the best
strategy is to dismount."
3When riding a dead horse...
4When riding a dead horse...
- Appoint a committee to study the horse
5When riding a dead horse...
- Comparing the state of dead horses in todays
environment
6When riding a dead horse...
- Change the requirements declaring that "This
horse is not dead.
7When riding a dead horse...
- Harness several dead horses together for
increased speed
8When riding a dead horse...
- Hire contractors to ride the dead horse.
9Statistics of e-Commerce Growth
- The number of connected computers is currently
29,670,000 in 240 countries and territories net
wizards, 1997 - 23 percent of small-to-midsized businesses are
now networked, up from 18 percent from last year
IDC - 28 percent of all hosts on the Net are in the
.com domain net wizards, 1998 - There are only 147,000 Web storefronts but there
may be as many as 1 million by 2000 IDC
10Statistics of e-Commerce Growth
- Business-related Internet services are growing
125 percent per - year Forrester Research
- Worldwide revenue for the access market will
reach almost 1.5 billion this year and will reach
almost 15 billion by the year 2000 Forrester
Research - By 2000, U.S. companies will be spending 12.9
billion a year to secure their computer networks
Dataquest, San Jose, Calif
11Some Internet Growth Statistics (source NSI)
Domain registration has increased rapidly,
especially in .com.
12E-Commerce and Internet Losses
- 6 million internet users have experienced credit
card misuse online national consumers league - 12.5 billion in intellectual property losses in
1998 IIAP - In a survey of nearly 1,600 information
technology professionals from 50 countries, 73
percent of all companies reported some security
breach or corporate espionage during the past 12
months PWC/InformationWeek1998 Annual Information
Security Survey - The No. 1 concern, shared by 79 percent of 400
senior executives, was, "protecting information
systems from external intrusion DT Corporate
Worries in the year 2005
13Trend in Hacking Technology
Knowledge Required
Attack Sophistication
14Concerns in the brick-and-mortar world
- Liability
- Loss of property
- Regulatory violation
- Embarrassment and reputation loss
- Loss of market share
- Extortion
- Fraud and embezzlement
- Systems outage
15Concerns in thenetworked, e-commerce world
- Liability
- Loss of property
- Regulatory violation
- Embarrassment and reputation loss
- Loss of market share
- Extortion
- Fraud and embezzlement
- Systems outage
16People are also exploiting network
vulnerabilities deliberately
- The public service hacker - trying to prove a
point - Hactivists - exposing societal issues
- Script Kiddies - surfing the web spray painting
sites - Corporate enemies - doing your business harm
- Disgruntled employees - getting even
- Corporate espionage - Intellectual property
(marketing plans, RD information, manufacturing
processes)
17e-Commerce and e-Businessneed secure systems
- Maintain the trust of your customers
- Avoid damage to your image
- Control access to your intellectual property
- Protect the integrity of the information you
present - Deny competitors market advantage
18Shareholder Knowledge and Due Diligence
19Find a Company to Hack
20Oil Company Identified as Target
21Gather Data on Targets Operations
- Gather Site Data
- Look for possible
Network Links - Identify all Partner
and Alliance Companies
22Gather Data on Affiliates and Partners
23Gather Data on Affiliates Operations
24Internet Target Location Identified
25Identify Other Domains Owned by the Target
26Tools and Information Resourcesfor Hacking
Some tools were written purely to help Systems
Administrators
Some tools were written to identify and exploit
security vulnerabilities
27Search for Tools to Probe Target
A single search for hacking scanning tools
shows 2070 Hits
28Freeware Tools Gather Details About Target
Network and Systems
29Internet Address and Open Ports Verified
30Computer Platform Type Identified
31Search for Hacking Tutorials
Search for Hacking Tutorials shows 4,240 Hits
32Pick a Tutorial for Computer Type
33Research Tutorial for Computer Type
34Key Stroke Level Instructions Available
35Search for Tools for Computer Type
36Pick Tools for Computer Type
37Select Tools for this Attack
38Scan Target for Vulnerabilities
39Scanner Tools can Check for Numerous Problems
40Password Crackers Search for Weak Passwords
41Password Crackers Search forWeak Passwords
42Exploit Vulnerabilities Found
43Install Trojan For Remote Access
- Back Orifice Features
- DNS stuff, Ping, Query
- Get passwords
- Get system info
- Log keystrokes
- Send message box
- Http fileserver
- Recieve file
- Port redirection
- Choose between XOR and 3DES encryption
- Shutdown/Restart server
- Send file
- Add/List shares on Microsoft networks
44Index of Back Orifice and Some of Its Many
Optional Modules
45Back Orifice Help Files Provide Instructions for
Novices
46Back Orifice Interface to Compromised System
47Sniffers are used to StealPasswords and Data
48Free Tools Remove Attack Data From System Log
Files
49ClearEvent Modifies NT Logs
50Zap Modifies Unix Logs
51Help File for DOS Attack
52Phase 1 Scope
Determine and Verify target scope - Whois -
Nslookup - ICMP sweep - Port scans
Host1 - telnet - ftp
Host2 - ssh - smtp
Internet
Host3 - telnet - dns
53Phase 2 Vulnerability Scan
Host1 - telnet - ftp
Scan for vulnerabilities using - Commercial
network scanning tools - Freeware tools -
Custom scripts
Host2 - ssh - smtp
Internet
Host3 - ssh - dns
54Phase 3 Exploit Vulnerabilities
Exploit vulnerabilities using - Freeware tools
- Custom scripts - Network Sniffer
Host1 - telnet - ftp
Host2 - ssh - smtp
Internet
Host3 - ssh - dns
55Phase 4 Denial of Service
Host1 - telnet - ftp
Host2 - ssh - smtp
Internet
56Single Limiting Concern
57Trust Concerns
- Web Site
- Intranet
- Internet Connectivity
- Intellectual Property
- Employee Lists
- Marketing Strategy/Leads
58Trends in the Threats toe-commerce e-business
- Distributed Denial of Service Attacks
- Back Orifice and BO2K
- More Wide spread use of secondary source attacks
- Use of Insiders to facilitate the crimes
- Use of hacking information is also being used
for criminal activity
59So what do you do?
- Dont panic Dont NOT THINK ABOUT the issue
- Dont rush into a solution there is NO SILVER
BULLET SOLUTION - Develop a plan
- Decide what you need to protect
- How much protection is worth
- How much loss/compromise/denial of service will
cost
60So what do you do?
- Find experts to help make sure they are
disinterested and independent of products - Find out what your peers are doing Outside your
verticals as well as inside - Execute the plan
- Protection
- Detection
- Reaction
61So what do you do?
- Guiding principals
- Protect things of value commensurate with the
value - Detect when things are going wrong
- React appropriately and expeditiously to detected
threats - Remember its your business FIRST not a Law
Enforcement activity - Be prepared
62Small Business and Home Computer Security
Modem Connectivity
?
Identity Theft!!
63Massively Parallel Attacksaka DDOS
Attack Controller/Master Host
Attacker
ISP
Victim
64When did we loose control?
65Para-Protect
Ops Center 24 Hour Hotline -- 888-402-7272
5870 Trinity Parkway Trinity One Suite
200 Centreville, VA 20120-1967 Phone
703-266-2805 Fax 703-266-2806 Email
info_at_para-protect.com Web http//www.para-prote
ct.com