recent attack technologies
play

Recent Attack Technologies Neil Long OxCert Introduction Hope - PowerPoint PPT Presentation

Recent Attack Technologies Neil Long OxCert Introduction Hope for audience participation! At least two aspects Target payloads Attack origins Future? arenas Attack Payloads Buffer overflow Format strings


  1. Recent Attack Technologies Neil Long OxCert

  2. Introduction • Hope for audience participation! • At least two aspects – Target payloads – Attack origins • Future? arenas

  3. Attack Payloads • Buffer overflow • Format strings – Any experts in the audience? • Network DoS – volume vs. content

  4. Buffer Overflow • Kernel switches, defences • stack vs heap vs libc • Options off by default

  5. Format Strings • Relatively recent - major examples – Wu-ftpd - Linux – rpc.statd - Linux – telnetd - IRIX – Local uid to root exploits

  6. Built-in Defences? • Libc modifications – Are they enough? • POSIX compliance – LibC from major vendors?? • Source code re-writes – continuous release of new exploits

  7. Bugtraq Libc Sperl Screen Imp pam_smb and Sysklogd pam_ntdom Envcheck wu-ftpd new Traceroute klogd variants Cfengine Su Ncurses rpc.statd Php Apache improved mod_rewrite

  8. Attacks • Scanning granularity • Real-time IDS • Post-event IDS • Multi-source attacks – scan host – exploit host – intrusion host(s)

  9. Tools used • Root-kits • hidden ‘extras’ • rapid evolution • IRC still major factor

  10. Counteractive Tools • LSOF • TCT – mactime – lsi & icat • Netflows • Active IDS

  11. DDoS tools • Trinoo still popular - evolving • Stacheldraht • ‘TFN3K’ very worrying • Trinity (Entitee) • Handler-agent communication differences

  12. DDoS Payloads • UDP volume • TCP SYN flood • Smurf & Fraggle amplifiers • Stream • Fragments and others? • Higher bandwidth will make them more effective

  13. IP Spoofing • All vs. partial vs. none at all • Generator efficiency • benefits to them (and us)

  14. Locating the intruder • Traceback • Mobility becoming easier - locating more difficult – e.g. Use of non-contract cell phones • Wireless networks – promiscuous mode?

  15. New targets? • Voice-over-IP? • DNS revisited • WAP

  16. What is to come? • DDoS Net of nets? How long? • Pipes get fatter - – firewalls & IDS fall behind? – Cost prohibitive? • Disks keep getting bigger

  17. Finally • Story is not changing - – Demand for fatter pipes, bigger faster machines – But security is still an after-thought • Less logging by ISPs? • Growing awareness == more incidents – increased IRT load • Liability issues on the horizon?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend