350 likes | 490 Views
MBA 560 Security 101. Automated Attacks Defined Microsoft’s Approach to Vulnerabilities How to Protect Your P.C. Automated Attack Vectors. Automated Attack Vectors Viruses. A computer program file capable of attaching to disks or other files Necessary characteristics of a virus:
E N D
MBA 560 Security 101 • Automated Attacks Defined • Microsoft’s Approach to Vulnerabilities • How to Protect Your P.C.
Automated Attack VectorsViruses • A computer program file capable of attaching to disks or other files • Necessary characteristics of a virus: • It is able to replicate • It requires a host program as a carrier • It is activated by external action
Automated Attack VectorsViruses: Polymorphic viruses • Creates copies during replication that are functionally equivalent but have distinctly different byte streams • Randomly insert superfluous instructions • Interchange order of independent instructions • Use encryption schemes • This variable quality makes difficult to locate, identify, or remove
Automated Attack VectorsWorms • A self-replicating computer program, similar to a virus • A virus attaches itself to, and becomes part of, another executable program • A worm is self-contained and does not need to be part of another program to propagate itself
Automated Attack VectorsWorms • Necessary characteristics of a worm: • It is able to replicate without user intervention • It is self-contained and does not require a host • It is activated by creating process • If it is a network worm, it can replicate across communication links • Some customers like to distinguish between worms that use buffer overruns to propagate and those that use e-mail
Automated Attack VectorsWorms: Examples • SQL Slammer • Blaster • MyDoom • Sasser
Automated Attack VectorsBots • Derived from the word Robot • Program designed to search for information Internet with little human intervention • Search engines, such as Yahoo and Altavista, typically use bots to gather information for their databases
Automated Attack VectorsBots • Bots analogous to agent • Typically an exe • Bots are not exploits themselves • They are payloads delivered by worms, viruses and hackers • Installed after compromise • Infect system and maintain access for attackers to control them • Botnets – thousands of system controlled
Automated Attack VectorsBots • Thousands of highly configurable bot packages available on Internet • Some use IRC channels to communicate • Easy to use • Control thousands of systems • Obscures traffic among legitimate IRC traffic (TCP port 6667) • Obscures attacker’s identity
Automated Attack VectorsBots: uses • DDoS attacks • Information theft • keyboard logging, network monitoring, etc • Trade Bandwidth between hacker communities • Warez i.e. host illegal data • Pirated software, movies, games, etc.
Automated Attack VectorsBots: prime targets • High bandwidth (“cable bots”) • High availability systems • Low user sophistication • System located in geography providing low likelihood of law enforcement effectiveness
Automated Attack VectorsBots: examples • Agobot = Gaobot = Phatbot = Polybot • Thousands of variants • Uses MS03-001 and MS03-026/MS03-039 to propagate • TCP port 135 and TCP port 445 • Probes admin shares using hard coded list of user names and passwords
Automated Attack VectorsBots: examples • Agobot = Gaobot = Phatbot = Polybot • Steals CD keys for hard coded list of popular games • Inventories running processes • Kills processes in hard coded list • Firewalls • AV software • Other worms
Automated Attack VectorsBackdoors • Provides user access without using normal authorization or vulnerability exploitation • Typically run under system context • Once installed, allows anyone or any program that knows listening port number (and password) to remotely control host • Intruders access backdoor server using either text or graphics based client • Allows intruders to run any command or process
Automated Attack VectorsTrojans • Term borrowed from Greek history • Malicious program disguised as something benign • Screen saver, game, etc. • exe, com, vbs, bat, pif, scr, lnk, js, etc. • It seems to function as user expects
Automated Attack VectorsTrojans • May or may not appear in process list • May install a backdoor • Generally spread through e-mail and exchange of disks and files • Worms also spread Trojan horses, IRC channels, P2P applications, porn sites, etc.
Vulnerability LifecyclePresentation Content • Overview of security teams at Microsoft • Security Bulletin Development Walk-thru • Vulnerability Reported • Investigation • Bulletin release • Support
Vulnerability Reported • Is the reported problem really a vulnerability? A security vulnerability is a flaw in a product that makes it infeasible – even when using the product properly – to prevent an attacker from usurping privileges on the user's system, regulating its operation, compromising data on it, or assuming ungranted trust. http://www.microsoft.com/technet/treeview/default.asp?url=/technet/columns/security/essays/vulnrbl.asp
Vulnerability Reported • Security vulnerabilities are reported to • MSRC https://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/alertus.asp • PSS Security • Other PSS support teams • Third parties • Reporters include: • Customers • Security consulting companies • MSRC actively looks for reports
Bulletin Release • MSRC writes bulletin and associated KB article(s) • Microsoft Security Notification Service http://www.microsoft.com/technet/security/bulletin/notify.mspx
Bulletin Release • http://www.microsoft.com • http://www.microsoft.com/security • http://www.microsoft.com/office • http://www.microsoft.com/exchange • http://www.microsoft.com/sql • http://www.microsoft.com/servers • http://msdn.microsoft.com/security • http://www.microsoft.com/technet • http://www.microsoft.com/windows • http://www.microsoft.com/windows/ie • http://www.microsoft.com/windowsXP • http://www.microsoft.com/windows2000/server • http://www.microsoft.com/windows2000/professional • http://www.microsoft.com/NTServer • http://www.microsoft.com/ntserver/ProductInfo/terminal • http://www.microsoft.com/windowsMe • http://www.microsoft.com/windowsserver2003 • http://www.microsoft.com/protect
Support • After release PSS Security responsible for: • Bulletin – accuracy and corrections • Related KB articles – accuracy and corrections • Download links – accuracy and corrections • Security update installation and functionality • Consulting on patch management strategy • Windows Update issues • Software Updates Services (SUS) • MSsecure.xml issues • Hacking, worms, viruses and Trojans using vulnerability
Days between patch and exploit 331 180 151 25 SQL Slammer Nimda Blaster Welchia/ Nachi Security is our #1 PriorityThere is no silver bulletChange requires innovation SupportHelping Customers Avoid a Crisis Patches proliferating Time to exploit decreasing Exploits are more sophisticated Current approach is not sufficient
How To Protect Your PC • Three primary ways to exploit you: • Weak passwords • Unpatched vulnerabilities • Social Engineering
How To Protect Your PCUse Complex Passwords • At least eight characters long • Does not contain all or part of user's account name • Contain characters from three of following four categories: • English uppercase characters (A through Z) • English lowercase characters (a through z) • Base-10 digits (0 through 9) • Non-alphanumeric (for example, !, $, #, %) extended ASCII, symbolic, or linguistic characters
How To Protect Your PCOther Options • Use a pass phrase instead of password • Use non-English words in password • Rename accounts including Administrator account
How To Protect Your PCKeep Your PC Updated • Use Windows Update AND Office Update • Use automatic update client • XP SP2 • Run antivirus and anti-spyware software
How To Protect Your PCSocial Engineering • Do not open e-mail from people you don’t know • Do not open e-mail attachments • Do not follow URLs sent in e-mail • Do not go to web sites that you cannot trust