Fixing the average internet user s IoT Vulnerabilities Calvin Hendriks University of Twente P.O. Box 217, 7500AE Enschede The Netherlands

Size: px
Start display at page:

Download "Fixing the average internet user s IoT Vulnerabilities Calvin Hendriks University of Twente P.O. Box 217, 7500AE Enschede The Netherlands"

Transcription

1 Fixing the average internet user s IoT Vulnerabilities Calvin Hendriks University of Twente P.O. Box 217, 7500AE Enschede The Netherlands c.hendriks@student.utwente.nl ABSTRACT For the last couple of years, the Internet of Things (IoT) has grown rapidly. Often, the objects connected to the IoT contain security vulnerabilities, which can be exploited to perform Distributed Denial of Service (DDoS) attacks. The problem is that most of these devices are owned by non-technical skilled users which do not know their devices are comprised and, if known, do not know how to act in order to protect them. This paper aims to raise the awareness of the average Internet user on the misusage of their IoT devices to perform DDoS Attacks. We propose an easy to use methodology that enables non-technical users to discover the vulnerabilities in their IoT devices and protect themselves against them. Keywords Internet of Things, DDOS attacks. 1. INTRODUCTION The Internet of Things (IoT) is a concept in which everyday objects, especially ones not considered computers (e.g., smart thermostat, health monitor, IP-camera) generate and exchange data through the Internet. It has been estimated that a total of 20.8 billion devices will be connected by By that time, consumers and enterprises combined will have spent 3,010 billion Dollars on connected 'things' [7]. Although very beneficial for the economy, this growth also brings some problems. Studies and events have proven that IoT devices were not essentially designed to provide secure communication. A study by a large IT company, Hewlett- Packard, showed that 70 percent of the world s most commonly used IoT devices contain serious vulnerabilities [9]; 10 of the most commonly used IoT devices were tested and on average, they contain 25 vulnerabilities. Among the tested devices were smart thermostats, sprinkler controllers and door locks. DDoS attack is an attack against an online service by overloading it with requests, attempting to make the service unavailable to users. The last couple of years, we have already seen an increase in the number and size of DDOS attacks using IoT devices. The attack on Domain Name Service (DNS) provider Dyn in 2016, for example, was the largest DDoS attack on record. [16] This made online services and platforms such as BBC, Netflix, PayPal and Twitter unavailable for hours. The New Jersey Cybersecurity and Communications Cell (NJCCIC) released a document stating botnets formed by compromised IoT devices almost certainly will lead to more frequent, more disruptive DDoS attacks, many of which will initially lack a clear motive behind the selection of targets. In this document, they also give some recommendations on how to prevent IoT devices from being compromised. They include actions like changing default s, updating IoT devices with security patches and disabling Universal Plug and Play (UPnP) on routers. [15] The recommendations from NJCCIC in the previous sections have proven to be difficult for the average internet user however. A survey by security technology vendor Bullguard shows that 72 percent of the 6000 respondents does not know how to configure a router to keep their home network secure, even though 63 percent described their computer skills as intermediate or advanced [3]. While the market for smart devices is growing, people are mostly only aware of these dangers in older devices like laptops, tablets and mobile phones. As shown in Figure 1, only 20 percent of consumers is aware that these risks also come with drones, as opposed to 76 percent for laptops. [10] The fact that these devices are so poorly secured has led to some alarming situations. The FBI has already put out an alert [5] stating that the IoT increases the target space for malicious cyber actors. One of the biggest uses of IoT devices to cyber threat actors is their ability to participate in a DDoS attack. A Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. 27 th Twente Student Conference on IT, July 7 th, 2017, Enschede, The Netherlands Copyright 2017, University of Twente, Faculty of Electrical Engineering, Mathematics and Computer Science. 1 Figure 1 Consumer awareness regarding vulnerabilities [10]. Even though a quick google search like protect IoT devices gives about results, most people are unaware of these vulnerabilities to begin with or they are not able to follow the

2 instructions or install the program. This paper aims at making the average internet user aware of the vulnerabilities in their IoT devices by proposing an easy to use script which, once given consent, scans a network for common vulnerabilities and automatically tries to patch theses exploits when possible. The user can volunteer to have this script scan their network by registering on a website. However, it must be certain that unintended users who falsify the identity of volunteers cannot exploit this website. In order to achieve the goals stated in the previous section, the following research questions (RQ) will be addressed: RQ 1. What vulnerabilities in IoT devices are commonly exploited in DDoS Attacks? RQ 2. How can computer novices discover these vulnerabilities and protect themselves. RQ 3. How can the identity of an online user be guaranteed? 2. RELATED WORK Veerendra G.G [23] gives examples of how dangerous vulnerabilities in IoT devices can be and finishes with steps that vendors and customers could take to improve their IoT device security. However, as mentioned before, these steps have proven to be difficult to follow for the average internet user. Tianlong Yu et al [25] list known vulnerabilities in IoT devices and deliver a concept, which uses micro middleboxes to protect IoT devices. Although we support this idea, it requires an extra piece of hardware, which difficults their deployment. Furthermore, the average internet user will not have the skills to configure these micro middleboxes and therefore many devices will be left unprotected. Multiple companies in the field of IT-security have already released scanners that check networks for vulnerabilities in IoT devices [20]. Although these scanners are often not for all platforms, and difficult to use and/or understand for the average internet user, we can use them to compare results with our own script. This paper contributes to the field of IoT device protection by delivering a service that is easy to use for all internet users, and aimed especially at those with no computer skills. 3. BACKGROUND 3.1 Internet Protocol Suite The internet protocol suite, also called TCP/IP (The original protocols in the suite), is a set of communication protocols used on computer networks such as the internet. It consists of four layers [14]. Application layer Transport layer Internet layer Link layer Application layer The application layer consists of Application protocols such as the Hypertext Transfer Protocol (HTTP), the File Transfer Protocol (FTP) and the Simple Mail Transfer Protocol (SMTP). The Application layer is responsible for communication between a program and the transport layer. Communication between the Application layer and transport layer goes through a port. Standard application protocols always use the same port (i.e., HTTP uses port 80 and SMTP uses port 25) Transport Layer When a user is sending data, the transport layer receives data from the Application data and divides this data into several data packets. Data is added to these packets in the form of a header and send to the Internet Layer. This header contains important control information, such as source and target port numbers. When receiving data, the transport layer receives data from the Internet layer. Before sending the data to the Application layer, the transport protocol reads the header to know which port it needs to send the data. The most common protocol in this layer is the Transport Control Protocol (TCP). This protocol also checks if the received packets are intact and puts them in the correct order when necessary. Before any data can be transmitted, a connection must be established through a three-way handshake Internet layer When sending data, The Internet layer receives the packets from the transport layer and divides them into datagrams. Like the transport layer, the internet layer ads a header to the datagrams. The most important information in these headers are source IP address and target IP address Link layer The link layer is responsible for sending the data over a physical medium to another system. A commonly used protocol in this layer is the Address Resolution Protocol (ARP). ARP is responsible for translating an internet layer address (e.g. an IP address) to a physical address like a media access control (MAC) address. 3.2 Router An IPv4 address consists of 32 bits and this makes a total of 2 32 addresses possible, which is only around 4.2 billion. As mentioned before, it has been estimated that in 2020 around 20.8 billion devices will be connected to the internet, so there are insufficient addresses the give each device connected to the internet a unique IP address. To solve the limited amount of IP addresses, Internet Service Providers (ISP s) provide most households only one public IP address and a router in the household utilizes a method called Network Address Translation (NAT) to forward packets received on the public address to the correct device in the network. This device (and the others connected to the router) has its own private IP address assigned by the router. All the devices served by the router form a Local Area Network (LAN). Therefore, a private IP address is also called a LAN IP address. When one of these devices wants to connect to something on the internet, i.e. a website, it sends a request to the router. The router reads the IP and TCP headers and changes value of the source IP address to the public IP address of the router and changes the source port value to a random chosen port number. It then sends the datagrams to the destination IP address defined in the IP header. The webserver sends its response to the routers public IP address and port that the router chose. The router recognizes the port number in the datagrams (the one it randomly chose) and sends the datagrams to the correct LAN IP address. If a router receives datagrams that are not requested by any of its connected devices, it does not know where to send it to, so it 2

3 can only discard it. In this case, the routers acts as a kind of firewall Port forwarding If a device in the local network does want to receive data from outside the network, port forwarding should be set up on the router. Port forwarding redirects a request from one address and port combination to another. For example, a router with public IP address has a connected web server with private IP address listening on port In order to receive HTTP request on the webserver, the owner of the router would have to make forwarding rules that tell the router to send all incoming datagrams with destination port 80 and destination IP Address to port 8080 of the device with IP address IP spoofing IP spoofing is the act of changing IP source addresses in the IP datagrams sent to a target [24] and is a potential problem for our website. The script we propose uses the IP address in the IP datagrams received from the client to determine which network it scans. If an attacker is able to communicate with our website using a spoofed IP address, he/she could scan a network that is not theirs. However, due to the way TCP establishes a connection, this is almost impossible TCP three-way handshake As mentioned before, before any data is transmitted through a TCP connection, a three-way handshake is required between the client and the server. The TCP header attached to every packet the protocol sends contains a source port number, target port number, sequence number, acknowledge number and a code bit. (It actually contains more, but this is not relevant for the scope of explaining the handshake). The code bit is 6 bits long and. each bit acts as a flag that indicates the nature of the header. The three-way handshake typically looks like this: 1. When a clients wants to establish a TCP connection, it sends a SYN packet (a packet with the SYN bit value set to 1) to the server with a random initial sequence number (ISN) and a acknowledge number of 0. The ISN in figure 2 is If the server is listening, it responds with an SYN/ACK packet (SYN and ACK bits set to 1) that has the servers own ISN and an acknowledge number of the clients ISN plus one. 3. The last step in the three-way handshake is a packet send by the client with an sequence number of the received acknowledged number and an acknowledge number of the received ISN plus one [1]. Figure 2 The TCP three-way handshake [1] An attacker that spoofed the source IP address will not receive the ISN created at the server side because the server will send the packets to this spoofed address. In order to complete the handshake, the attacker has to guess the ISN. The feasibility of such a prediction depends on the mechanism that is used to generate the ISN. In the past, these mechanisms were quiet simple and predicting the ISN was possible. Therefore, completing the handshake with a spoofed IP address was possible. However, newer operating systems use a pseudorandom number generation algorithm to generate the ISN and predicting the ISN created by this algorithm is extremely difficult [8]. As a result, it is nearly impossible to complete the three-way handshake with a spoofed IP address. 4. IOT VULNERABILITY ANALYSIS In order to identify the vulnerabilities in IoT devices, we analyze the way Mirai exploited vulnerabilities in the devices it used to orchestrate a DDoS attack on DNS provider Dyn in October Furthermore, The Open Web Application Security Project (OWASP) Foundation has created a Top 10 of the most common vulnerabilities in IoT devices [17] and we match, when possible, the vulnerabilities used by Mirai to the ones identified by OWASP Insecure Web interface Number one on the OWASP list are insecure web interfaces. Even though Mirai did not interact with any web interfaces directly, it did exploit a vulnerability that OWASP places in this category; lack of account lockout. This means hackers can try one username with different s an unlimited number of times (brute forcing) since the username is not locked out. When account lockout is implemented, authentication attempts are simply blocked after a number of failed attempts. Mirai performed a dictionary attack on its targets using a list of 60 known default credentials [22]. The list of credentials can be found in Appendix A. If account lockout was implemented on the targets it acquired, the attack could have been blocked if the first couple of hits were not a match Insufficient Authentication/Authorization The biggest vulnerability that users can solve themselves is insufficient authentication. The main problem that causes insufficient authentication is the use of weak s like 1234 or and the use of default s as this makes it very easy to guess s. This can be prevented in a number of ways. The easiest is of course to use stronger s that include symbols, numbers and a combination of lower and upper case letters. Although the default username and can be changed in the device s web interface most of the time, this does not always change the credentials used for SSH and Telnet connections. Sometimes there is no way for a user to change the SSH/Telnet login credentials [11]. This is a very serious issue and can only be fixed through a software update. As stated before, Mirai uses a list of 60 known default credentials to gain access to IoT devices. If users had simply changed the default to a more complex the malware would not have been able to compromise so many devices since brute forcing a strong will take up more time and is often less successful then a dictionary attack Insecure Network Services Often, IoT devices have services listening to one or multiple of their ports.these ports include; port 22(SSH), port 23(Telnet), port 80 (HTTP) and port 443(HTTPS). At first, this does not seem like a problem, since most consumers connect their IoT device to a router which gives the device a Network Address Translation (NAT) address. This address cannot be directly reached from the internet. 3

4 However, IoT devices come shipped with Universal Plug and Play (UPnP) enabled by default. This protocol enables the device to ask a router (which also supports UPnP) to automatically forward a port. This means that this device can receive any package that is sent from to internet to this port [11]. This feature is turned on by default because users may want to access their device from outside of their network. E.g. to check their IP cameras when they are on a holiday. When a user does not wish to access the device remotely, UPnP should be turned off. Mirai scans the internet for devices that are reachable through port 23, the port used for the Telnet protocol. 5. SYSTEM DESCRIPTION To protect the average internet user against malware like Mirai, we propose a script that, once a user has given consent, scans a user s network for open ports and if they are found, tries to establish an authenticated connection using a file of default credentials. When a connection can be made, it then tries to change the current that it found into a much stronger. To make this script accessible to even the least computer skilled user, we make it available on a webpage with just a click of a button. In this section we will discuss the components that are used in order to make this possible. 5.1 XAMPP XAMPP is a cross-platform Apache distribution containing MariaDB, PHP and Pearl [19]. We use the Apache webserver to host our website and MariaDB to store our website s user login credentials. If users find any default credentials on their devices and decide to let our website change them, they are also stored in the database. 5.2 phpsecurelogin In order to link the results from the script, such as changed s, to the correct user we need a login system. phpsecurelogin is a open source PHP project that provides login functionality [2]. When users register on the registration page, their s are hashed with a random salt and stored in the MariaDB. Furthermore, it also provides an antibrute force feature as it blocks users from logging in for 2 hours after 5 failed login attempts. Using this code, it is possible to display different elements on a webpage depending on the login status of a user. I.e., if users are not logged in, they cannot use scan their network because a login button is displayed rather than the scan button. For an example, see Appendix B. 5.3 Nmap In order to detect open ports on the network of a client, we use a program called Nmap [12]. Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. It was designed to rapidly scan large networks, but works fine against single hosts [16]. When a registered user is logged in and clicks on the scan button on the home page, a PHP script on the server is executed. This script gets the IP address of the client and gives it as an argument to Nmap. The results of Nmap are then displayed on the website. If the results contain the numbers 22 or 23 (ports associated with SSH and telnet protocols) and/or the words telnet or SSH, a button is displayed on the website. This button leads to another page where the client can run a script that scans for default s. See Appendix B for more details. 5.4 PHP Telnet. PHPTelnet is a freeware script that is able to create telnet connections from PHP scripts [18]. In order to safe time, we used an already existing class to make a telnet connection to the previously acquired IP address and try to login using a set of default credentials. When a correct set of credentials is found, the script performs the passwd command, which lets the authenticated user change the. We set the to a random generated string which is encrypted and stored in the MariaDB database. For encryption and decryption of the s, we use the MariaDB AES_ENCRYPT() and AES_DECRTPY() functions. 5.5 PHP Secure Communications Library PHP Secure Communications Library is an open source PHP library that contains classes that enable SSH connections through a PHP script [4]. We perform the same actions as described above only this time through a SSH connection. 5.6 PHPMailer When users want to retrieve their devices new, they can do so on the request page. This page has a button that links to the open source PHPMailer script [13]. This script gets the user id from the current session and gets the address stored in the database. If there is a device stored there, it will be mailed to the corresponding address. 6. SETUP AND EXPERIMENT To test the website and the script a number of experiments where performed on different IP addresses and different operating systems. Three volunteers were contacted and asked if we could connect a laptop to their network to test the performance of our script. This laptop could dual boot Kali Linux and Windows 10 Operating systems. On Both OS s was a Telnet, SSH and Webserver installed. Most hacked IoT devices have UPnP turned on and are therefore reachable from the internet. To mimic this behavior the volunteers were asked to forward ports to our laptop in their router. Furthermore, a test user account was created on the both operating systems with a chosen from the list that our script checks. 6.1 Port Scan results After the laptop was connected and the servers were up and running, our website and two other vulnerability scanners on the internet were visited to see which ports where discovered by the different websites. The websites were visited twice per network. The first time, the SSH and Telnet server were listening on their default port (22 and 23 respectively). The second time however, we instructed the Telnet server to listen to port 234 and set the SSH server to listen to port 333 to see if the scanners would also find non-default ports. The first scanner we tested was Bullguard s Internet of Things scanner. This scanner checks if any of the user s devices is on Shodan. Shodan is a search engine for the Internet of Things. It scans all the existing IPv4 addresses and reports if there is any port listening on them. Since there are around 4 billion IPv4 addresses, this takes some time and therefore a device with an open port does not show up on Shodan immediately. If Bullguard does not find the user s IP address on Shodan, the user can do a deep scan. It is not explained on the website what kind of scan this is exactly. The second scanner we 4

5 tested was the Mirai Vulnerability Scanner by Incapsula. However, due to problems explained in the next section, the results from these tests could not be measured. The results from Bullguard s deep-scan and our website can be found in Figure Figure 3 Port Scan results Bullguard Proposed Website 6.2 Password Scan results When the SSH or Telnet servers were found, we performed a scan on our website. For each combination of network, operating system and communication protocol, a scan was performed three times. The first scan had the correct at the top position in the list that the script goes through. For the second scan, the correct was placed in the middle of the list (30 th entry) and for the last scan the was placed at the end of the list. OS Table 1. Telnet scan results Network Number Time (s) For 1 st Time (s) For 30 th Table 2. SSH scan results Time (s) for last Linux Linux Linux OS Network number Time (s) to find 1 st Time (s) to find 30 th Time (s) to find last Windows Windows Windows Linux Linux Linux DISCUSSION As we can see in the results, Bullguard s scanners did not show all open ports on a user s device. It is hard to find an explanation for this, since we do not have access to the source code of Bullguard s scanner. Incapsula s Mirai Vulnerability Scanner does not show any open ports at all. Instead, it only informs the user that a device is found on the network that is vulnerable to Mirai injection attacks (Appendix C). The results also show us that our website showed all open ports, at every scan performed. Although the port scanning on our website worked flawlessly, a problem did occur when scanning for default s. As can be seen in table 1, there results for the scan through a SSH connection with a Windows machine are much faster than the results for the same scan on a Linux machine. The reason for this lies in the commands executed in the SSH command line interface. When a SSH connection can be established, the script tries to execute the passwd command, which is a Linux command that changes the user s. After the passwd command, the Linux machine asks for the old and twice for the new. This step-bystep process takes a significant amount of time because the Linux machine needs to verify if the supplied old s is indeed the old and the two new s match. However, the script does the exact same thing for the Windows machine and gets a command not found response every time because passwd is not a windows command. Therefore, the machine does not ask for the old and new s and all responses from our webserver are seen as a new command and are not recognized. As a result, the script is executed much faster when communicating with a Windows machine. Meanwhile, since the script found a default and has executed the passwd command, the script exits, and informs the user that the has been changed. Furthermore, there are no results for a scan on a Windows machine through a Telnet connection, as can be seen in table 1. This is the result of the response that the windows telnet server sends when a login attempt is made. The response consists of a very large number of special characters, which causes the PHPTelnet script to function abnormally. The PHPTelnet script returns a successful login for every login attempt and therefore it is not possible to check if default credentials are used on the device. However, over 73 percent of IoT devices runs on the Linux operating system, compared to just 9.5 percent for windows [21]. Finally, when comparing the results from s scan on a Linux system in both tables, a clear speed difference between both protocols is noticeable. While in the first column the results are much faster for the telnet connection, the telnet script takes a much longer time to complete when the is at the middle or the end of the list. As the name already implies, Secure Shell is much more secure as it encrypts all transmitted data. However, this security mechanism takes up room in the packets and therefore a lot more bandwidth is used compared to Telnet, which sends the data in plaintext. As a result, using the SSH protocol is supposed to be noticeably slower than the Telnet protocol. Yet, the results show us that the SSH script is executed much faster when the s are in the middle or at the end of the list. Furthermore, The difference between the time to find the 1 st and the time to find the last is much larger when using the Telnet protocol (+/ 425 seconds) compared to using the SSH protocol (+/ 124 seconds, ignoring the windows results). This implies that while executing the commands for changing the are executed faster, the script that uses the telnet protocol takes much more time per authentication attempt than the script that uses the SSH protocol. This could be the result of the Linux Telnet Server or the way that the PHPTelnet script handles authentications. To keep the user informed on the status of the 5

6 script, a progress bar is showed while the scan is executed (See Appendix B). 8. CONCLUSIONS When comparing the results from Bullguard s and Incapsula s IoT Scanners against our own website we can conclude that existing vulnerability scanners are not performing as expected, while our website is evidence that it is technically possible to deliver these expectations without an advanced setup. Furthermore, none of the current scanners on the market features the ability to change s. The results show that we can scan a device against a list of over 60 default credentials and change these s within a reasonable timeframe using the SSH and Telnet protocols. This answers research question 2 to a great extent. While the vulnerabilities are limited at default credentials and open ports, our script proves that it is possible for computer novices to discover vulnerabilities in their IoT devices and protect themselves against them with just the click of a button. Furthermore, research question 1 is answered in section 4 by analyzing the common vulnerabilities in IoT devices and explaining how the Mirai exploits them. Finally, research question 3 is answered in the background section where the TCP three-way handshake, which guarantees the identity of our users, is explained. To make the website more effective, the website should be able to change s on operating systems other than Linux and use more protocols than Telnet and SSH. Although changing default s will prevent most hacks that are performed on a large scale, there are a lot more vulnerabilities that hackers can exploit to gain access to devices. Therefore, more research has to be done on how to enable the average internet user to protect themselves against more specific vulnerabilities (e.g. device specific vulnerabilities). 9. REFERENCES [1] Beardsley, T. A., & Qian, J. (2010). The TCP Split Handshake: Practical Effects on Modern Network Equipment. Network Protocols and Algorithms, 2(1), [2] Bradley, P. (2013). phpsecurelogin. Retrieved June 13, 2017, From [3] BullGuard Limited (2016). Despite Fast Adoption of Internet of Things, A Shocking 72 Per Cent Of Consumers Don t Know How To Secure Their Connected Devices. Retrieved March 13, 2017, From [4] Campbell, G., Fischer, A., Monnerat, P., Petrich, H., Wigginton, T. (2011). phpseclib PHP Secure Communications Library (2017) Retrieved June 20, 2017, From [5] Federal Bureau of Investigation (2015). Internet of Things Poses Opportunities for Cyber Crime. Retrieved March 13, 2017, from [6] Gamblin, J. (2017) Mirai-Source-Code. Retrieved June 26, 2017, From Source-Code [7] Gartner Inc. (2015). Gartner Says 6.4 Billion Connected Things will be in Use in 2016, Up 30 Percent From Retrieved March 13, 2017, from [8] Harris, B., Hunt, R. (1999). TCP/IP security threats and attack methods. Computer Communications, 22(10), [9] HP Inc. (2014). HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. Retrieved March 13, 2017, from [10] Intel Corporation (2016). New McAfee Survey Reveals Only 42 Percent of Consumers Take Proper Security Measures to Protect Their New Gadgets. Retrieved June 27, 2017, From [11] Krebs, B. (2016). Who Makes the IoT Things Under Attack? Retrieved June 27, 2017, from [12] Lyon, G. (1997) Nmap Security Scanner (Version 7.50) [Software]. Retrieved May 10, 2017, From [13] Matzelle, B. (2001). PHPMailer. Retrieved June 9, 2017, From [14] Nath, P. B., & Uddin, M. (2015). TCP-IP Model in Data Communication and Networking American Journal of Engineering Research ( AJER ). American Journal of Engineering Research, (10), Retrieved from [15] New Jersey Cybersecurity and Communications Cell (2016). DDoS: Internet-of-Things Likely to Fuel More Disruptive Attacks. Retrieved March 13, 2017, From [16] Nicky Woolf (2016) DDoS attack that disrupted internet was largest of its kind in history, experts say. Retrieved April 3, 2017, From os-attack-dyn-mirai-botnet [17] Open Web Application Security Project (2016) Top IoT Vulnerabilities. Retrieved June 27, 2017, From ies. [18] Roundy, A. (2003). PHPTelnet (Version 1.1) [Software]. Available From [19] Seidler, K., Vogelgesang, K. (2002). XAMPP (Version ) [Software]. Retrieved May 8, 2017, From [20] Sheridan, K (2016) New Free Mirai Scanner Tools Spot Infected, Vulnerable IoT Devices. Retrieved March 30, 2017 From [21] Skerret, I., (2016) Profile of an IoT Developer: Results of the IoT Developer Survey. Retrieved June 26, 2017, From [22] Van der Elzen, I., Van Heugten, J. (2017). MSc System and Network Engineering Techniques for detecting 6

7 compromised IoT devices. Retrieved June 24, 2017, from [23] Veerendra G.G. (2016) Hacking Internet of Things (IoT ) A Case Study on DTH Vulnerabilities. Retrieved March 30, 2017, From IoT-A-Case-Study-on-Tata-Sky-DTH-Vulnerabilities.pdf [24] Velasco, V. (2000). Introduction to IP Spoofing This. SANS Institute InfoSec Reading Room. Retrieved June 27, 2017 from [25] Yu, T., Sekar, V., Seshan, S., Agarwal, Y., & Xu, C. (2015). Handling a trillion (unfixable) flaws on a billion devices. Proceedings of the 14th ACM Workshop on Hot Topics in Networks - HotNets-XIV,

8 APPENDIX A. MIRAI DEFAULT CREDENTIALS xc3511 vizxv xmhdipc default juantech support support (none) user user (none) pass smc klv123 Administrator service service supervisor supervisor guest guest guest guest istrator ubnt ubnt klv1234 Zte521 hi3518 jvbzd anko zlxx. 7ujMko0vizxv 7ujMko0 system ikwb dreambox user realtek ujMko pass meinsm tech tech mother fucker B. WEBSITE B.1 Website homepage when user is not logged in 8

9 B.2 Website homepage when user is logged in B.3 Port scan result 9

10 B.4 Password scan progress bar C. INCAPSULA WARNING 10

Understanding the Mirai Botnet

Understanding the Mirai Botnet Understanding the Mirai Botnet Manos Antonakakis, Tim April, Michael Bailey, Matthew Bernhard, Elie Bursztein Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi Michalis Kallitsis!, Deepak

More information

Internet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came

Internet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came Victoria Ellsworth Dr. Ping Li ICTN 4040 04/11/17 Internet of Things (IoT) Attacks The Internet of Things (IoT) is based off a larger concept; the Internet of Things came from idea of the Internet of Everything.

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information

CYBER ATTACKS EXPLAINED: PACKET SPOOFING

CYBER ATTACKS EXPLAINED: PACKET SPOOFING CYBER ATTACKS EXPLAINED: PACKET SPOOFING Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service

More information

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

18-642: Security Vulnerabilities

18-642: Security Vulnerabilities 18-642: Security Vulnerabilities 11/20/2017 Security Vulnerabilities Anti-Patterns for vulnerabilities Ignoring vulnerabilities until attacked Assuming vulnerabilities won t be exploited: Unsecure embedded

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

Ethical Hacking and Prevention

Ethical Hacking and Prevention Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive

More information

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016 Abstract The Mirai botnet struck the security industry in three massive attacks that shook traditional DDoS protection paradigms, proving that the Internet of Things (IoT) threat is real and the grounds

More information

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS 1 Introduction Your data and infrastructure are at the heart of your business. Your employees, business partners, and

More information

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE UNIT III STUDY GUIDE Course Learning Outcomes for Unit III Upon completion of this unit, students should be able to: 1. Recall the terms port scanning, network scanning, and vulnerability scanning. 2.

More information

Question No: 2 Which identifier is used to describe the application or process that submitted a log message?

Question No: 2 Which identifier is used to describe the application or process that submitted a log message? Volume: 65 Questions Question No: 1 Which definition of a fork in Linux is true? A. daemon to execute scheduled commands B. parent directory name of a file pathname C. macros for manipulating CPU sets

More information

Russian Cyber Attack Warning and Impact on AccessEnforcer UTM Firewall

Russian Cyber Attack Warning and Impact on AccessEnforcer UTM Firewall Russian Cyber Attack Warning and Impact on AccessEnforcer UTM Firewall 1 U.S. and U.K. authorities last week alerted the public to an on-going effort to exploit network infrastructure devices including

More information

Penetration testing using Kali Linux - Network Discovery

Penetration testing using Kali Linux - Network Discovery Penetration testing using Kali Linux - Network Discovery by Riazul H. Rozen Sept. 14, 2017 4 minute read Table of Contents Importance of penetration testing Kali Linux in penetration testing Network Discovery

More information

Wireless Security Algorithms

Wireless Security Algorithms (NOTE: If you are using a virtual lab to run your attacks you will need an external Wi Fi attachment. The other option is to have a direct install on your computer. Virtual labs cannot access your wireless

More information

Remote Desktop Security for the SMB

Remote Desktop Security for the SMB A BWW Media Group Brand Petri Webinar Brief October 5th, 2018 Remote Desktop Security for the SMB Presenter: Michael Otey Moderator: Brad Sams, Petri IT Knowledgebase, Executive Editor at Petri.com There

More information

Recommendations for Device Provisioning Security

Recommendations for Device Provisioning Security Internet Telephony Services Providers Association Recommendations for Device Provisioning Security Version 2 May 2017 Contact: team@itspa.org.uk Contents Summary... 3 Introduction... 3 Risks... 4 Automatic

More information

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking NETWORK MANAGEMENT II Proxy Servers Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking resources from the other

More information

AN TOÀN LỚP 4: TCP/IP ATTACKS NGUYEN HONG SON PTITHCM

AN TOÀN LỚP 4: TCP/IP ATTACKS NGUYEN HONG SON PTITHCM 1 AN TOÀN LỚP 4: TCP/IP ATTACKS NGUYEN HONG SON PTITHCM 2 Introduction (1/2) TCP provides a full duplex reliable stream connection between two end points A connection is uniquely defined by the quadruple

More information

Network Security. Thierry Sans

Network Security. Thierry Sans Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability

More information

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security HTML PHP Database Linux Operating System and Networking: LINUX NETWORKING Information Gathering:

More information

ch02 True/False Indicate whether the statement is true or false.

ch02 True/False Indicate whether the statement is true or false. ch02 True/False Indicate whether the statement is true or false. 1. No matter what medium connects computers on a network copper wires, fiber-optic cables, or a wireless setup the same protocol must be

More information

CyberP3i Course Module Series

CyberP3i Course Module Series CyberP3i Course Module Series Spring 2017 Designer: Dr. Lixin Wang, Associate Professor Firewall Configuration Firewall Configuration Learning Objectives 1. Be familiar with firewalls and types of firewalls

More information

Load Balancing Technology White Paper

Load Balancing Technology White Paper Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing

More information

PRACTICAL NETWORK DEFENSE VERSION 1

PRACTICAL NETWORK DEFENSE VERSION 1 PRACTICAL NETWORK DEFENSE VERSION 1 The world s premiere online practical network defense course elearnsecurity has been chosen by students in over 140 countries in the world and by leading organizations

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

Host Identity Sources

Host Identity Sources The following topics provide information on host identity sources: Overview: Host Data Collection, on page 1 Determining Which Host Operating Systems the System Can Detect, on page 2 Identifying Host Operating

More information

Cyber Security Guidelines for Securing Home and Small Office Routers

Cyber Security Guidelines for Securing Home and Small Office Routers Cyber Security Guidelines for Securing Home and Small Office Routers Author: CS Risk Management Section Document Published Date: March 2018 Document History: Version Description Date 1.0 Published V1.0

More information

Information System Security. Nguyen Ho Minh Duc, M.Sc

Information System Security. Nguyen Ho Minh Duc, M.Sc Information System Security Nguyen Ho Minh Duc, M.Sc Contact 2 Nguyen Ho Minh Duc Phone: 0935 662211 E-mail: duc.nhm@gmail.com Web:http://nhmduc.wordpress.com 3 Lecture 01 INTRODUCTION Topics 4 What information

More information

Drone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created

Drone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created Drone - 2 04/12/2018 Threat Model Description Threats Threat Source Risk Status Date Created Mobile Phone: Sensitive Data Leakage Smart Devices Mobile Phone: Session Hijacking Smart Devices Mobile Phone:

More information

Chapter Three test. CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it.

Chapter Three test. CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it. Chapter Three test Name: Period: CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it. 1. What protocol does IPv6 use for hardware address resolution? A. ARP

More information

Network Device Forensics. Digital Forensics NETS1032 Winter 2018

Network Device Forensics. Digital Forensics NETS1032 Winter 2018 Network Device Forensics Digital Forensics NETS1032 Winter 2018 Risks Most data created, stored, and used by users is kept in files on computers running end user oriented operating systems like Windows,

More information

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways Firewalls 1 Overview In old days, brick walls (called firewalls ) built between buildings to prevent fire spreading from building to another Today, when private network (i.e., intranet) connected to public

More information

Wireless Network Security Fundamentals and Technologies

Wireless Network Security Fundamentals and Technologies Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology

More information

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks CISNTWK-440 Intro to Network Security Chapter 4 Network Vulnerabilities and Attacks Objectives Explain the types of network vulnerabilities List categories of network attacks Define different methods of

More information

Offensive Technologies

Offensive Technologies University of Amsterdam System and Network Engineering Offensive Technologies OS3 Network Security Assessment Students: Peter van Bolhuis Kim van Erkelens June 1, 2014 Executive Summary Being a security

More information

NETWORK INTRUSION. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

NETWORK INTRUSION. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 NETWORK INTRUSION Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Learning Objectives Students should be able to: Recognize different

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network Always Remember Chapter #1: Network Device Configuration There is no 100 percent secure system, and there is nothing that is foolproof! 2 Outline Learn about the Security+ exam Learn basic terminology

More information

IRL: Live Hacking Demos!

IRL: Live Hacking Demos! SESSION ID: SBX2-R3 IRL: Live Hacking Demos! Omer Farooq Senior Software Engineer Independent Security Evaluators Rick Ramgattie Security Analyst Independent Security Evaluators What is the Internet of

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

DID WE LOSE THE BATTLE FOR A SECURE WEB?

DID WE LOSE THE BATTLE FOR A SECURE WEB? DID WE LOSE THE BATTLE FOR A SECURE WEB? Philippe De Ryck Guest lecture Capita Selecta, UCLL, December 14 th 2016 https://www.websec.be ABOUT ME PHILIPPE DE RYCK My goal is to help you build secure web

More information

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control Last time Security Policies and Models Bell La-Padula and Biba Security Models Information Flow Control Trusted Operating System Design Design Elements Security Features 10-1 This time Trusted Operating

More information

Network Insecurity with Switches

Network Insecurity with Switches Network Insecurity with Switches Aaron D. Turner aturner@pobox.com http://www.synfin.net/ December 4, 2000 Scope The goal of this paper is to discuss the common misconceptions and poorly publicized issues

More information

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems Section 1: Command Line Tools Skill 1: Employ commands using command line interface 1.1 Use command line commands to gain situational

More information

Curso: Ethical Hacking and Countermeasures

Curso: Ethical Hacking and Countermeasures Curso: Ethical Hacking and Countermeasures Module 1: Introduction to Ethical Hacking Who is a Hacker? Essential Terminologies Effects of Hacking Effects of Hacking on Business Elements of Information Security

More information

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo Exam : JK0-015 Title : CompTIA E2C Security+ (2008 Edition) Exam Version : Demo 1.Which of the following logical access control methods would a security administrator need to modify in order to control

More information

ELEC5616 COMPUTER & NETWORK SECURITY

ELEC5616 COMPUTER & NETWORK SECURITY ELEC5616 COMPUTER & NETWORK SECURITY Lecture 17: Network Protocols I IP The Internet Protocol (IP) is a stateless protocol that is used to send packets from one machine to another using 32- bit addresses

More information

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access The World s Premier Online Practical Network Defense course PND at a glance: Self-paced, online, flexible access 1500+ interactive slides (PDF, HTML5 and Flash) 5+ hours of video material 10 virtual labs

More information

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities Ethical Hacking and Countermeasures: Web Chapter 3 Web Application Vulnerabilities Objectives After completing this chapter, you should be able to: Understand the architecture of Web applications Understand

More information

Security Device Roles

Security Device Roles Kennesaw State University DigitalCommons@Kennesaw State University KSU Proceedings on Cybersecurity Education, Research and Practice 2017 KSU Conference on Cybersecurity Education, Research and Practice

More information

DENIAL OF SERVICE VIA INTERNET OF THINGS DEVICES: ATTACK METHODOLOGIES AND MITIGATION TECHNIQUES

DENIAL OF SERVICE VIA INTERNET OF THINGS DEVICES: ATTACK METHODOLOGIES AND MITIGATION TECHNIQUES DENIAL OF SERVICE VIA INTERNET OF THINGS DEVICES: ATTACK METHODOLOGIES AND MITIGATION TECHNIQUES by RICHARD ROE Advisor Dr. Joshua Eckroth A senior research proposal submitted in partial fulfillment of

More information

Studying the Security in VoIP Networks

Studying the Security in VoIP Networks Abstract Studying the Security in VoIP Networks A.Alseqyani, I.Mkwawa and L.Sun Centre for Security, Communications and Network Research, Plymouth University, Plymouth, UK e-mail: info@cscan.org Voice

More information

Securing Access to Network Devices

Securing Access to Network Devices Securing Access to Network s Data Track Technology October, 2003 A corporate information security strategy will not be effective unless IT administrative services are protected through processes that safeguard

More information

AC : IDENTIFYING VULNERABLE SECURITY PRACTICES IN SMALL SCALE COMPUTER NETWORKS

AC : IDENTIFYING VULNERABLE SECURITY PRACTICES IN SMALL SCALE COMPUTER NETWORKS AC 2007-2057: IDENTIFYING VULNERABLE SECURITY PRACTICES IN SMALL SCALE COMPUTER NETWORKS Gary Steffen, Indiana University-Purdue University-Fort Wayne Iskandar Hack, Indiana University-Purdue University-Fort

More information

VULNERABILITIES IN 2017 CODE ANALYSIS WEB APPLICATION AUTOMATED

VULNERABILITIES IN 2017 CODE ANALYSIS WEB APPLICATION AUTOMATED AUTOMATED CODE ANALYSIS WEB APPLICATION VULNERABILITIES IN 2017 CONTENTS Introduction...3 Testing methods and classification...3 1. Executive summary...4 2. How PT AI works...4 2.1. Verifying vulnerabilities...5

More information

IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense

IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense DDoS Attacks Increasing in Size, Frequency & Complexity Arbor Networks WISR XII Largest attack

More information

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4 Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 SSL/TLS Security Level 5 A Note

More information

10 FOCUS AREAS FOR BREACH PREVENTION

10 FOCUS AREAS FOR BREACH PREVENTION 10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

Endpoint Security - what-if analysis 1

Endpoint Security - what-if analysis 1 Endpoint Security - what-if analysis 1 07/23/2017 Threat Model Threats Threat Source Risk Status Date Created File Manipulation File System Medium Accessing, Modifying or Executing Executable Files File

More information

Internet Platform Management. We have covered a wide array of Intel Active Management Technology. Chapter12

Internet Platform Management. We have covered a wide array of Intel Active Management Technology. Chapter12 Chapter12 Internet Platform Management The Internet is like alcohol in some sense. It accentuates what you would do anyway. If you want to be a loner, you can be more alone. If you want to connect, it

More information

Chapter 2. Switch Concepts and Configuration. Part II

Chapter 2. Switch Concepts and Configuration. Part II Chapter 2 Switch Concepts and Configuration Part II CCNA3-1 Chapter 2-2 Switch Concepts and Configuration Configuring Switch Security MAC Address Flooding Passwords Spoofing Attacks Console Security Tools

More information

Frequently Asked Questions WPA2 Vulnerability (KRACK)

Frequently Asked Questions WPA2 Vulnerability (KRACK) Frequently Asked Questions WPA2 Vulnerability (KRACK) Release Date: October 20, 2017 Document version: 1.0 What is the issue? A research paper disclosed serious vulnerabilities in the WPA and WPA2 key

More information

Linux Network Administration

Linux Network Administration Secure Remote Connections with OpenSSH Objective At the conclusion of this module, the student will be able to: Configure the ssh daemon start, stop, and restart sshd 17 January 2005 NETW 111 - SSH 2 SSH

More information

A Study on Intrusion Detection Techniques in a TCP/IP Environment

A Study on Intrusion Detection Techniques in a TCP/IP Environment A Study on Intrusion Detection Techniques in a TCP/IP Environment C. A. Voglis and S. A. Paschos Department of Computer Science University of Ioannina GREECE Abstract: The TCP/IP protocol suite is the

More information

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet SYMANTEC ENTERPRISE SECURITY Symantec Internet Security Threat Report September 00 Power and Energy Industry Data Sheet An important note about these statistics The statistics discussed in this document

More information

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting

More information

CHCSS. Certified Hands-on Cyber Security Specialist (510)

CHCSS. Certified Hands-on Cyber Security Specialist (510) CHCSS Certified Hands-on Cyber Security Specialist () SYLLABUS 2018 Certified Hands-on Cyber Security Specialist () 2 Course Description Entry level cyber security course intended for an audience looking

More information

CIS 5373 Systems Security

CIS 5373 Systems Security CIS 5373 Systems Security Topic 1: Introduction to Systems Security Endadul Hoque 1 Why should you care? Security impacts our day-to-day life Become a security-aware user Make safe decisions Become a security-aware

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

The Internet of Things. Steven M. Bellovin November 24,

The Internet of Things. Steven M. Bellovin November 24, The Internet of Things Steven M. Bellovin November 24, 2014 1 What is the Internet of Things? Non-computing devices...... with CPUs... and connectivity (Without connectivity, it s a simple embedded system)

More information

Capability Analysis of Internet of Things (IoT) Devices in Botnets & Implications for Cyber Security Risk Assessment Processes (Part One)

Capability Analysis of Internet of Things (IoT) Devices in Botnets & Implications for Cyber Security Risk Assessment Processes (Part One) Capability Analysis of Internet of Things (IoT) Devices in Botnets & Implications for Cyber Security Risk Assessment Processes (Part One) Presented by: Andrew Schmitt Theresa Chasar Mangaya Sivagnanam

More information

Project 3: Network Security

Project 3: Network Security CIS 331 October 3, 2017 Introduction to Networks & Security Project 3: Network Security Project 3: Network Security This project is due on Tuesday, October 17 at 10 p.m.. You must work in teams of two

More information

Computer Network Vulnerabilities

Computer Network Vulnerabilities Computer Network Vulnerabilities Objectives Explain how routers are used to protect networks Describe firewall technology Describe intrusion detection systems Describe honeypots Routers Routers are like

More information

Copyright

Copyright 1 Security Test EXTRA Workshop : ANSWER THESE QUESTIONS 1. What do you consider to be the biggest security issues with mobile phones? 2. How seriously are consumers and companies taking these threats?

More information

IT-Security Challenges in the Internet of Things. Christian Graffer Product Manager Endian

IT-Security Challenges in the Internet of Things. Christian Graffer Product Manager Endian IT-Security Challenges in the Internet of Things Christian Graffer Product Manager Endian Who is Endian? Founded in 2003 at Bolzano, Italy, by a team of experienced network specialists and Linux enthusiasts

More information

Securing CS-MARS C H A P T E R

Securing CS-MARS C H A P T E R C H A P T E R 4 Securing CS-MARS A Security Information Management (SIM) system can contain a tremendous amount of sensitive information. This is because it receives event logs from security systems throughout

More information

Chapter 5: Vulnerability Analysis

Chapter 5: Vulnerability Analysis Chapter 5: Vulnerability Analysis Technology Brief Vulnerability analysis is a part of the scanning phase. In the Hacking cycle, vulnerability analysis is a major and important part. In this chapter, we

More information

Next Generation IPv6 Cyber Security Protection Through Assure6i TM Product Line

Next Generation IPv6 Cyber Security Protection Through Assure6i TM Product Line Next Generation IPv6 Cyber Security Protection Through Assure6i TM Product Line Designed to Prevent, Detect, and Block Malicious Attacks on Both IPv4 and IPv6 Networks TM Introduction With the exponential

More information

Detect & Respond to IoT Botnets AS AN ISP. Christoph Giese Telekom Security; Cyber DefenSe Center

Detect & Respond to IoT Botnets AS AN ISP. Christoph Giese Telekom Security; Cyber DefenSe Center Detect & Respond to IoT Botnets AS AN ISP Christoph Giese Telekom Security; Cyber DefenSe Center Management Summary Mirai hit us hard; IoT Botnets are on the rise and rapidly evolving We developed a three-stage

More information

Web insecurity Security strategies General security Listing of server-side risks Language specific security. Web Security.

Web insecurity Security strategies General security Listing of server-side risks Language specific security. Web Security. Web Security Web Programming Uta Priss ZELL, Ostfalia University 2013 Web Programming Web Security Slide 1/25 Outline Web insecurity Security strategies General security Listing of server-side risks Language

More information

Vulnerabilities in online banking applications

Vulnerabilities in online banking applications Vulnerabilities in online banking applications 2019 Contents Introduction... 2 Executive summary... 2 Trends... 2 Overall statistics... 3 Comparison of in-house and off-the-shelf applications... 6 Comparison

More information

Mobile Malfeasance. Exploring Dangerous Mobile Code. Jason Haddix, Director of Penetration Testing

Mobile Malfeasance. Exploring Dangerous Mobile Code. Jason Haddix, Director of Penetration Testing Mobile Malfeasance Exploring Dangerous Mobile Code Jason Haddix, Director of Penetration Testing Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to

More information

Ethical Hacker Foundation and Security Analysts Course Semester 2

Ethical Hacker Foundation and Security Analysts Course Semester 2 Brochure Software Education Ethical Hacker Foundation and Security Analysts Course Semester 2 The Security Management Course is a graduate-level foundation course in the Information Security space. Brochure

More information

interface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer

interface Question 1. a) Applications  nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer TDTS06 Computer networks, August 23, 2008 Sketched answers to the written examination, provided by Juha Takkinen, IDA, juhta@ida.liu.se. ( Sketched means that you, in addition to the below answers, need

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

Attacks Against Websites. Tom Chothia Computer Security, Lecture 11

Attacks Against Websites. Tom Chothia Computer Security, Lecture 11 Attacks Against Websites Tom Chothia Computer Security, Lecture 11 A typical web set up TLS Server HTTP GET cookie Client HTML HTTP file HTML PHP process Display PHP SQL Typical Web Setup HTTP website:

More information

Protecting Smart Buildings

Protecting Smart Buildings Protecting Smart Buildings The next frontier of critical infrastructure security Suzanne Rijnbergen - MBA visibility detection control Who am I? Global Director Professional Services @SecurityMatters (ForeScout)

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

Vulnerability Management & Vulnerability Assessment. Nessus Attack Scripting Language (NASL). CVE databases, NVD database

Vulnerability Management & Vulnerability Assessment. Nessus Attack Scripting Language (NASL). CVE databases, NVD database Case Study 2018 Solution/Service Title Vulnerability Management & Vulnerability Assessment Client Industry Cybersecurity, Vulnerability Assessment and Management, Network Security Client Overview Client

More information

5 IT security hot topics How safe are you?

5 IT security hot topics How safe are you? 5 IT security hot topics How safe are you? Why this whitepaper? We meet many people in IT, of various levels of experience and fields of work. This whitepaper is written for everybody who wants to read

More information

Advanced Network Troubleshooting Using Wireshark (Hands-on)

Advanced Network Troubleshooting Using Wireshark (Hands-on) Advanced Network Troubleshooting Using Wireshark (Hands-on) Description This course is a continuation of the "Basic Network Troubleshooting Using Wireshark" course, and comes to provide the participants

More information

Intrusion Attempt Who's Knocking Your Door

Intrusion Attempt Who's Knocking Your Door 10 Intrusion Attempt Who's Knocking Your Door By Kilausuria binti Abdullah Introduction: An intrusion attempt is a potential for a deliberate unauthorized attempt to enter either a computer, system or

More information

Man in the middle. Bởi: Hung Tran

Man in the middle. Bởi: Hung Tran Man in the middle Bởi: Hung Tran INTRODUCTION In today society people rely a lot on the Internet for studying, doing research and doing business. Internet becomes an integral part of modern life and many

More information

NETWORK SECURITY. Ch. 3: Network Attacks

NETWORK SECURITY. Ch. 3: Network Attacks NETWORK SECURITY Ch. 3: Network Attacks Contents 3.1 Network Vulnerabilities 3.1.1 Media-Based 3.1.2 Network Device 3.2 Categories of Attacks 3.3 Methods of Network Attacks 03 NETWORK ATTACKS 2 3.1 Network

More information

WEB HOSTING SERVICE OPERATING PROCEDURES AND PROCESSES UNIVERSITY COMPUTER CENTER UNIVERSITY OF THE PHILIPPINES DILIMAN

WEB HOSTING SERVICE OPERATING PROCEDURES AND PROCESSES UNIVERSITY COMPUTER CENTER UNIVERSITY OF THE PHILIPPINES DILIMAN WEB HOSTING SERVICE OPERATING PROCEDURES AND PROCESSES UNIVERSITY COMPUTER CENTER UNIVERSITY OF THE PHILIPPINES DILIMAN Document Control Document Properties Title Author Document Type Filename File location

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

PRACTICING SAFE COMPUTING AT HOME

PRACTICING SAFE COMPUTING AT HOME PRACTICING SAFE COMPUTING AT HOME WILLIAM (THE GONZ) FLINN M.S. INFORMATION SYSTEMS SECURITY MANAGEMENT; COMPTIA SECURITY+, I-NET+, NETWORK+; CERTIFIED PATCHLINK ENGINEER ENTERPRISE INFORMATION SYSTEMS

More information