Hasso-Plattner-Institut
 
    • de
 

Internet Security (WS2005/06)

globe

Internet Security-Weaknesses & Targets
(Lecture for students of HPI and Univ. Potsdam or ULI-Students)
Wintersemester 2005

Lecture - Abstract

"Internet Security II - Weaknesses and Targets" is based on "Internet Security I - Internet Technology" respectively on "Technical Basics of WWW" and gives a detailed introduction into problems concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Beside others the following topics are discussed in detail: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture course concludes with a discussion about the possibilities to detect attacks and intrusions and also describes ethical issuses.

Lecturer:

Tutor of the exercise and practical course:

  • Dirk Cordel

Lecture dates: every Wednesday 8:30- 10:00 (first lecture on october 19th)

Further important dates (only for HPI and Uni Potsdam students)

Date for examination:  2006-01-10,  11 o' clock (room BE.2)

Date for oral examination: 2006-02-27

Exercise dates (alternative): every Monday: 13:30-15:00 A-1.2
                                                every Tuesday: 11:00-12:30 A-1.2
Dates for practical course: Friday: 13:30-16:45 A-1.1

Organisation of the lecture course:

The lecture starts october 19th and finishs february 8th. Every week a 90 minutes lecture (in english) is streamed over the internet. Students have to solve and submit their exercises weekly. 50 % of the maximum points (in 1st and 2nd half of semester) are needed to be able to do the oral examination at the end of the semester.

Literature:

  • WWW (Christoph Meinel, Harald Sack) for repetition of the WWW basics

        

  • IT-Crackdown (Othmar Kyas, Markus A Campo)

Tele-Task website with the recorded lectures:

www.tele-task.de/en/details.php

Information website for execise and practical course:

Exercise/practical course website

Online Lectures:

Introduction

Introduction

- Nowday's Internet
- Risks for Internet Systems
- Changing Nature of Threats
- Who are the Intruders?
- Direction of Internet Security
- Most Common Attacks
- Main Security Necessarities
- Cryptography (symmetric, asymmetric)
- Hash Procedures
- Digital Signature
- Elliptic Curve Cryptography
- Encryption in Practise
- Public Key Infrastructure
- Certificates
- Time Stamp Service
- Digital Signature and Encryption

01:32:02 hours | play >

 

Risk Analysis

- Risks for information systems
- Additional risks by internet connections
- Security risks in intranets
- Risk analysis for internet technologies
Phase 1: Fixing of analysis domain
Phase 2: Acquisition of risks
Phase 3: Evaluation of risks
Phase 4: Interpretation of the results
- Basic risks by using internet

01:33:18 hours | play >

Computer Crime: Criminals and Motives

- Potential attackers
(1) Staff of the own Enterprise
(2) Hackers from High Schools and Universities
(3) Hackers of Computer-Underground
(4) Ordinary Criminals
(5) Cyber Crime: Professional Hackers

00:18:30 hours | play >

Hacker and Viruses

- First Hackers
- Underground-Mailboxes
- From First Virus to Worms and Tojan Horses
- Small Chronology of Computer Crime
- Computer Crime and the following Costs

00:47:37 hours | play >

Human Factor and Technical Failures

- Technical Failures
- Defective Protocol-Design
- Defective Software-Design
- Lack of Knowledge and Carelessness
- Social Hacking
- Defective Organization
- Unprotected Hardware
- Most typical break-in methods

00:40:48 hours | play >

(Online) Reconnaissance

- Online/Offline Reconnaissance
- Passive Recon
- Tools nslookup, host, whois, traceroute
- Web reconnaissance
- Active Recon
- Email recon
- Website analysis

00:25:48 hours | play >

OS Fingerprinting

- Introduction
- Telnet Session Negotiation / Banners
- TCP Stack Fingerprinting
- Passive Fingerprinting
- Fuzzy Operating System Fingerprinting
- TCP/IP Timeout Detection

00:36:22 hours | play >

Attacks on Accounts and Passwords

- Introduction
- Password Guessing
- Password Cracking
- Password Sniffing
- Password Monitoring
- Password Fishing with Trojan Horses
- Protection Against Password Theft

00:46:14 hours | play >

Weeknesses of Internet Protocols (1)

- Introduction
- IP Address Spoofing
- ICMP Attacks
- Internet Routing Attacks
- ARP Attacks
- IP Fragmentation Attacks

01:16:38 hours | play >

Weeknesses of Internet Protocols (2)

- Introduction
- SYN-Flooding
- TCP - Sequence Number Attack
- Cancel/Hijack TCP-Connection
- UDP-Attacks
- DNS-Attacks
- SMTP-Attacks
- Telnet-Attacks
- FTP-Attacks
- NNTP-Attacks

01:03:43 hours | play >

Misuse of Design and Programming Errors

- Introduction
- Buffer Overflow
- Controlled Buffer Overflow
- Defective Syntax Check
- Race Condition

00:36:00 hours | play >

Weaknesses in Unix/Linux (1)

- Introduction
- Security Architecture of Unix
- Attacks at boot-time
- Password Attacks in Unix
- SUID Abuse
- Screensaver Attacks
- Breaking out of chroot jail
- Network Attacks in Unix

01:11:14 hours | play >

Weaknesses in Unix/Linux (2)

- Attacks via Unix-Applications
- Abuse of symbolic links
- Sendmail Attacks
- DNS (BIND) vulnerabilities
- Apache vulnerabilities
- Social hacking with finger and whois
- Strategies for Protecting Unix-Systems
- WWW Security (Apache, FTP, DNS (BIND),Sendmail)
- Kernel-level hardening
- Security Software for Linux
- Hostbased Firewalls
- Apache with SSL
- Security Scanner
- Examination of Passwords
- Information about Unix-Security

01:08:38 hours | play >

Weaknesses of Windows

- Introduction
- SMB Attack
- UPnP Attack
- Help Center Attack
- Remote Attacks
- Windows Server
- Kerberos Authentication Attacks
- Kerberos Authentication Review
- Cross-Domain Network Resources
- Weaknesses in Kerberos Protocol
- Defeating Buffer Overflow Prevention

01:25:35 hours | play >

Targets in the World Wide Web (1)

- Introduction
- Target Web-Browser

01:03:23 hours | play >

Targets in the World Wide Web (2)

- Introduction
- URL and CGI Attacks
- SQL-Injection
- Cross-Site-Scripting
- Secure Web: SSL and S-HTTP
- Dangerous Search machines

01:01:13 hours | play >

Viruses, Worms and Trojan Horses

- Introduction
- Distribution of malicious Software
- Types of Viruses
- Virus-Factories
- Anti-Virus-Management
- Anti-Virus Software
- Bots and Botnets
- Rootkits

01:14:15 hours | play >

Wireless Security

- Introduction
- IEEE 802.11 - WLAN
- Wlan Parameters
- Wlan Security Mechanisms
- Wlan Security Weaknesses
- Wlan Security with IEEE 802.1x
- Wlan Security in Practice
- Cellular Phone Technologies
- Authentication
- Secure Connections with WLTS
- Weaknesses of GSM Technology

01:18:38 hours | play >

Detection of Attacks and Intrusions

- Introduction
- Anomalies and Attack Signatures
- Implementation of IDS
- Reaction on Attack
- Intrusion Repsonse
- Limitation of Intrusion Detection Systems

01:21:18 hours | play >

Legal and Ethical Issues in Internet Security

- Introduction
- Legal Systems
- The German Criminal Law
- Case Study
- Responsibility of IT-Managers
- Ethical Issues
- Case Study: Use of Computer and Internet
- Code of Ethics

01:09:34 hours | play >

Download of recorded lectures (only internal):

  • Introduction
  • Risk Analysis
  • Computer Crime: Criminals and Motives
  • Hacker and Viruses
  • Human Factor and Technical Failures
  • (Online) Reconnaissance
  • OS Fingerprinting
  • Attacks on Accounts and Passwords
  • Weeknesses of Internet Protocols (1)
  • Weeknesses of Internet Protocols (2)
  • Misuse of Design and Programming Errors
  • Weaknesses in UNIX/Linux (1)
  • Weaknesses in UNIX/Linux (2)
  • Weaknesses of Windows
  • Weaknesses of WWW (1)
  • Weaknesses of WWW (2)
  • Wireless Security
  • Viruses, Worms, Trojan Horses
  • Detection of Attacks and Intrusions
  • Legal and Ethical Issues in Internet Security