Skip to content

Commit

Permalink
GitBook: [master] 4 pages modified
Browse files Browse the repository at this point in the history
  • Loading branch information
austinsonger authored and gitbook-bot committed May 29, 2018
1 parent 3b876b3 commit 34f952b
Show file tree
Hide file tree
Showing 4 changed files with 194 additions and 218 deletions.
8 changes: 8 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,14 @@
* Social Engineering
* Denial of Service
* Session Hijacking
* Hacking Web Servers
* Hacking Web Applications
* SQl Injection
* Hacking Wireless Networks
* Hacking Mobile Platforms
* Evading IDS, Firewalls, and Honeypots
* Cloud Computing
* Resources



Expand Down
26 changes: 12 additions & 14 deletions cloud-computing.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,22 +2,20 @@

> Objectives: Understanding cloud computing concepts, understanding cloud computing threats, understanding cloud computing attacks, understanding cloud computing security, understanding cloud computing security tools, overview of cloud pen testing

### Cloud Computing Concepts

* Cloud computing is an on-demand delivery of IT capabilities where IT infrastructure applications are provided to subscribers as a metered service
* Types of Cloud Computing Services:
* IaaS: Provides virtual machines and other abstracted hardware and OSs which may be controlled through a service API
* PaaS: Offers development tools, config management, and deployment platforms on-demand and can be used by subscribers to develop custom applications
* SaaS: Offers software to subscribers on-demand over the internet
* Cloud Deployment Models
* Private Cloud: Cloud Infrastructure operated solely for a single organization
* Community Cloud: Shared Infrastructure between several organizations from a specific communications with common concerns
* Hybrid Cloud: Composition of two or more cloud (private, community or public)
* Public Cloud: Services are rendered over a network that is open for public use


* Cloud computing is an on-demand delivery of IT capabilities where IT infrastructure applications are provided to subscribers as a metered service
* Types of Cloud Computing Services:
* IaaS: Provides virtual machines and other abstracted hardware and OSs which may be controlled through a service API
* PaaS: Offers development tools, config management, and deployment platforms on-demand and can be used by subscribers to develop custom applications
* SaaS: Offers software to subscribers on-demand over the internet
* Cloud Deployment Models
* Private Cloud: Cloud Infrastructure operated solely for a single organization
* Community Cloud: Shared Infrastructure between several organizations from a specific communications with common concerns
* Hybrid Cloud: Composition of two or more cloud \(private, community or public\)
* Public Cloud: Services are rendered over a network that is open for public use

## Cloud Computing Threats

* Data Breach/Loss, Abuse of Cloud Services, Insecure Interfaces and APIs, Insufficient due diligence, shared technology issues, unknown risk profile, Inadequate infrastructure design and planning, conflicts between client hardening procedures and cloud environment, malicious insiders, illegal access to the cloud, privilege Escalation via error

* Data Breach/Loss, Abuse of Cloud Services, Insecure Interfaces and APIs, Insufficient due diligence, shared technology issues, unknown risk profile, Inadequate infrastructure design and planning, conflicts between client hardening procedures and cloud environment, malicious insiders, illegal access to the cloud, privilege Escalation via error
153 changes: 71 additions & 82 deletions evading-ids-firewalls-and-honeypots.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,103 +2,92 @@

> Objectives: Understanding IDS, Firewall, and Honeypot Concept : IDS, Firewall and Honeypot Solutions: Understanding different techniques to bypass IDS : Understanding different techniques to bypass firewalls, IDS/Firewall Evading Tools : Understanding different techniques to detect honeypots : Overview of IDS and Firewall Penetration Testing

### IDS, Firewall, and Honeypot Concepts

* An IDS inspects all inbound and outbound network traffic for suspicious patterns that may indicate a network security breach
* Checks traffic for signatures that match known intrusion patterns
* Anomaly Detection (behavior detection)
* Protocol Anomaly Detection
* Indications of Intrusions
* System Intrusions
* Presence of new files/programs
* Changes in file permissions
* Unexplained changes in file size
* Rogue Files
* Unfamiliar file names in directories
* Missing files
* Network Intrusions
* Repeated probes of the available services on your machines
* Connections from unusual locations
* Repeated login attempts from remote hosts
* Arbitrary data in log files
* Firewall Architecture
* Bastion Host
* Computer system designed and configured to protect network resources from attack
* Screened Subnet
* Also known as the DMZ contains hosts that offer public services. DMZ zone only responds to public requests, and has no hosts accessed by the private network
* Multi-homed Firewall
* A firewall with two or more interfaces
* DeMilitarized Zone (DMZ)
* A network that serves as a buffer between the internal secure network and insecure internet
* Can be created using firewall with three or more main network interfaces
* Types of Firewall
* Packet Filters: works on the network layers of OSI. Can drop packets if needed
* Circuit Level Gateways: Works at the sessions layer. Information passed to a remote computer through a circuit-level gateway appear to have originated from the gateway. They monitor requests to create sessions, and determines if the session will be allowed. They allow or prevent data streams
* Application Level Gateways: App-level proxies can filter packets at the application later of the OSI
* Stateful Multilayer Inspection Firewalls: combines the aspects of the other three types of firewalls
* Honeypot
* Information system resource that is expressly set up to attract and trap people who attempt to penetrate an organization's network
* Honeypot can log port access attempts, monitor attacker’s keystrokes, show early signs etc
* 2 Types of Honeypots
* Low-interaction Honeypots: simulate only a limited number of services and apps. Cannot be compromised
* High-interaction Honeypots: simulates all services and apps. Can be completely compromised by attackers.
* Captures complete information about an attack vector such attack techniques
* An IDS inspects all inbound and outbound network traffic for suspicious patterns that may indicate a network security breach
* Checks traffic for signatures that match known intrusion patterns
* Anomaly Detection \(behavior detection\)
* Protocol Anomaly Detection
* Indications of Intrusions
* System Intrusions
* Presence of new files/programs
* Changes in file permissions
* Unexplained changes in file size
* Rogue Files
* Unfamiliar file names in directories
* Missing files
* Network Intrusions
* Repeated probes of the available services on your machines
* Connections from unusual locations
* Repeated login attempts from remote hosts
* Arbitrary data in log files
* Firewall Architecture
* Bastion Host
* Computer system designed and configured to protect network resources from attack
* Screened Subnet
* Also known as the DMZ contains hosts that offer public services. DMZ zone only responds to public requests, and has no hosts accessed by the private network
* Multi-homed Firewall
* A firewall with two or more interfaces
* DeMilitarized Zone \(DMZ\)
* A network that serves as a buffer between the internal secure network and insecure internet
* Can be created using firewall with three or more main network interfaces
* Types of Firewall
* Packet Filters: works on the network layers of OSI. Can drop packets if needed
* Circuit Level Gateways: Works at the sessions layer. Information passed to a remote computer through a circuit-level gateway appear to have originated from the gateway. They monitor requests to create sessions, and determines if the session will be allowed. They allow or prevent data streams
* Application Level Gateways: App-level proxies can filter packets at the application later of the OSI
* Stateful Multilayer Inspection Firewalls: combines the aspects of the other three types of firewalls
* Honeypot
* Information system resource that is expressly set up to attract and trap people who attempt to penetrate an organization's network
* Honeypot can log port access attempts, monitor attacker’s keystrokes, show early signs etc
* 2 Types of Honeypots
* Low-interaction Honeypots: simulate only a limited number of services and apps. Cannot be compromised
* High-interaction Honeypots: simulates all services and apps. Can be completely compromised by attackers.
* Captures complete information about an attack vector such attack techniques

## IDS Tools


* Snort

* Snort

## Evading IDS

* Insertion Attack: IDS blindly believes and accepts the packet
* Evasion: End system accepts a packet that an IDS rejects. Attacker is exploiting the host computer
* DoS Attack: Attackers intrusion attempts will not be logged
* Obfuscating: encoding the attack payload in a way that the target computer understands but the IDS will not (polymorphic code, etc)
* False Positive Generation: Attackers w/ knowledge of the target IDS, craft packets just to generate alerts. Causes IDS to generate large number of false positive alerts. Then use it to hide real attack traffic
* Session Splicing
* Unicode Evasion Technique: Attackers can convert attack strings to unicode characters to avoid pattern and signature matching at the IDS
* Fragmentation Attack: Attackers will keep sending fragments with 15 second delays until all attack payload is reassembled at the target system
* TTL attacks require attacker to have a prior knowledge of the topology of the victim's network
* Invalid RST Packets
* Uses a checksum to communicate with host even though the IDS thinks that communication has ended
* Urgency Flag
* A URG flag in the TCP header is used to mark the data that requires urgent processing
* Many IDS do not address the URG pointer
* Polymorphic Shellcode: Most IDSs contains signatures for commonly used strings within shellcode. This can be bypassed by using encoded shellcode containing a stub that decodes the shell code
* App Layer Attacks: IDS cannot verify signature of a compressed file

* Insertion Attack: IDS blindly believes and accepts the packet
* Evasion: End system accepts a packet that an IDS rejects. Attacker is exploiting the host computer
* DoS Attack: Attackers intrusion attempts will not be logged
* Obfuscating: encoding the attack payload in a way that the target computer understands but the IDS will not \(polymorphic code, etc\)
* False Positive Generation: Attackers w/ knowledge of the target IDS, craft packets just to generate alerts. Causes IDS to generate large number of false positive alerts. Then use it to hide real attack traffic
* Session Splicing
* Unicode Evasion Technique: Attackers can convert attack strings to unicode characters to avoid pattern and signature matching at the IDS
* Fragmentation Attack: Attackers will keep sending fragments with 15 second delays until all attack payload is reassembled at the target system
* TTL attacks require attacker to have a prior knowledge of the topology of the victim's network
* Invalid RST Packets
* Uses a checksum to communicate with host even though the IDS thinks that communication has ended
* Urgency Flag
* A URG flag in the TCP header is used to mark the data that requires urgent processing
* Many IDS do not address the URG pointer
* Polymorphic Shellcode: Most IDSs contains signatures for commonly used strings within shellcode. This can be bypassed by using encoded shellcode containing a stub that decodes the shell code
* App Layer Attacks: IDS cannot verify signature of a compressed file

## Evading Firewalls


* Port Scanning is used to identify open ports and services running on these ports
* Open ports can be further probed to identify the version of services, which helps in finding vulnerabilities in these services
* Firewalking: A technique that uses TTL values to determine gateway ACL filters
* Attacker sends a TCP or UDP packet to the targeted firewall with a TTL set to one hop greater
* Banner Grabbing: Banners are service announcements provided by services in response to connection requests, and often carry vendor version information
* IP address spoofing to a trusted machine
* Source Routing: Allows sender of a packet to partially or completely specify the route of a packet through a network, going around a firewall
* Tiny Fragments: Forcing some of the TCP packet’s header info into the next fragment
* ICMP Tunneling: Allows tunneling a backdoor shell in the data portion of ICMP echo packets
* Ack Tunneling: Allows tunneling a backdoor application with TCP packets with the ACK bit set
* HTTP Tunneling Method: allows attackers to perform various internet tasks despite restrictions imposed by firewalls. Method can be implemented if the target company has a public web server with port 80 used for HTTP traffic

* Port Scanning is used to identify open ports and services running on these ports
* Open ports can be further probed to identify the version of services, which helps in finding vulnerabilities in these services
* Firewalking: A technique that uses TTL values to determine gateway ACL filters
* Attacker sends a TCP or UDP packet to the targeted firewall with a TTL set to one hop greater
* Banner Grabbing: Banners are service announcements provided by services in response to connection requests, and often carry vendor version information
* IP address spoofing to a trusted machine
* Source Routing: Allows sender of a packet to partially or completely specify the route of a packet through a network, going around a firewall
* Tiny Fragments: Forcing some of the TCP packet’s header info into the next fragment
* ICMP Tunneling: Allows tunneling a backdoor shell in the data portion of ICMP echo packets
* Ack Tunneling: Allows tunneling a backdoor application with TCP packets with the ACK bit set
* HTTP Tunneling Method: allows attackers to perform various internet tasks despite restrictions imposed by firewalls. Method can be implemented if the target company has a public web server with port 80 used for HTTP traffic

## Detecting Honeypots


* Attackers craft malicious probe packets to scan for services such as HTTP over SSL, SMTP over SSL, and IMAP
* Ports that show a particular service running but deny a three-way handshake indicate the presence of a honeypot

* Attackers craft malicious probe packets to scan for services such as HTTP over SSL, SMTP over SSL, and IMAP
* Ports that show a particular service running but deny a three-way handshake indicate the presence of a honeypot

## Countermeasures


* Shut down switch ports associated with the known attack hosts
* Reset (RST) malicious TCP sessions


* Shut down switch ports associated with the known attack hosts
* Reset \(RST\) malicious TCP sessions

Loading

0 comments on commit 34f952b

Please sign in to comment.