the most critical internet security...

18
1 The Most Critical Internet Security Threats

Upload: others

Post on 19-Mar-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

1

The Most Critical Internet Security Threats

Page 2: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

2

CGI - One example

• htsearch of htdig – CVE-2000-0208

Page 3: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

3

One more example – Narrow Security Scanner

Page 4: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

4

Remote Procedure Call – rpc.cmsd

Page 5: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

5

Remote Procedure Call – rpc.cmsd

CVE-1999-0696

Page 6: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

6

One more example – rpc.statd

CVE-1999-0018CVE-1999-0019

Snort output:

Page 7: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

7

One more example – rpc.statd

TCPdump:

Page 8: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

8

One more example – rpc.statdSyslog data:

Page 9: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

9

One more example – rpc.statd

RPCinfo -p

Page 10: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

10

sadmind and mountd Buffer Overflows

• sadmind:– CVE-1999-0977– Buffer overflow attack– Exploit source code available online

• mountd– CVE-1999-0002– Boundary Condition Error – Exploit source code available online

Page 11: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

11

Imapd and Pop server

• Imapd and Pop Server Buffer Overflows– CVE-1999-0005: Imapd buffer overflow in its

authenticate command– CVE-1999-0006– CVE-1999-0042– CVE-1999-0920– CVE-2000-0091

Page 12: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

12

SNMP

• Can provide attackers a lot of information about the network and host configuration

• CVE-1999-0517• CVE-1999-0516

Page 13: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

13

Default SNMP Community Name

Page 14: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

14

Default SNMP Community Name

Page 15: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

15

BIND Weakness

Page 16: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

16

BIND Weakness

Continue on the next slide

Page 17: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

17

BIND Weakness

Page 18: The Most Critical Internet Security Threatsgalaxy.cs.lamar.edu/~bsun/forensics/slides/Internet_Threats.pdf12 SNMP • Can provide attackers a lot of information about the network and

18

BIND Weakness