Tải bản đầy đủ (.ppt) (38 trang)

Module 002 general security concepts

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (723.43 KB, 38 trang )

Engineered by Hackers. Presented by Professionals.
General Security Concepts
Module 00
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa
General Security Concepts


Advanced TCP/IP

Cryptography Basics and Methods

Confidentiality

Integrity

Authentication Methods

Non-Repudiation

Access Control Models

Security Topologies

Risk Concepts

VietNam Information Security Policies
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa
Advanced TCP/IP



The OSI Model
In the OSI model:

Each layer has a defined
networking function

Each layer communicates
with the layer above and
below it

Layer seven provides services
for programs to gain access to
the network

Layers one and two define the
network’s physical media and
related tasks
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa
Advanced TCP/IP


The TCP/IP Model
A web request moving along the TCP/IP model
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa


TCP/IP Protocol Suite

TCP/IP
OSI
TCP
TCP
UDP
UDP
ARP
ARP
IGMP
IGMP
ICMP
ICMP
IP
Ethernet
Ethernet
Frame
Relay
Frame
Relay
Token
Ring
Token
Ring
ATM
ATM
Application
Application
Transport
Transport
Link

Link
HTTP
HTTP
FTP
FTP
SMTP
SMTP
DNS
DNS
RIP
RIP
SNMP
SNMP
Application
Application
Transport
Transport
Network
Network
Data-Link
Data-Link
Presentation
Presentation
Session
Session
Physical
Physical
Internet
Internet
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ

Khoa
Advanced TCP/IP


The function of IP

Identifies every host with a unique IP address

Identifies every packet with source and destination IP
addresses

Manages routing
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa
IP Address Classes

Five classes defined:
A: Decimal 1-126 (127 reserved), first bit is 0
B: Decimal 128-191, first two bits are 10
C: Decimal 192-223, first three bits are 110
Classes A, B & C are used for addressing individual hosts
D: Decimal 224-239, first four bits are 1110
Reserved for Multicasting
E: Decimal 240-247, first five bits are 11110
Class E is experimental. For additional info on Class E
and its future implementation see RFC 1365
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa
IP Address Classes


H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa
Private IP Address Ranges

Class A: 10. 0.0.0 – 10.255.255.255
Class B: 172. 16.0.0 – 172. 31.255.255
Class C: 192.168.0.0 – 192.168.255.255
The 169.254.0.0 network is used by Microsoft for APIPA
(Automatic Private IP Addressing).
The above addresses are not route-able over the internet.
Also, the 127.0.0.0 network ID is used for diagnostics
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa
The Subnet Mask


A number that matches the length of the IP address that masks
the host bits to reveal only the network ID

The ‘AND’ing process

Default masks:

Class A: 11111111.00000000.00000000.00000000 – 255.0.0.0

Class B: 11111111.11111111.00000000.00000000 – 255.255.0.0

Class C: 11111111.11111111.11111111.00000000 –
255.255.255.0
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ

Khoa
Subnetting

A 10.0.0.0 network has a default subnet mask of
255.0.0.0
i.e.,

00001010.yyyyyyyy.yyyyyyyy.yyyyyyyy = IP address

11111111.00000000.00000000.00000000 = Subnet mask

To divide this network into 12 networks, you need to
‘borrow’ 4 bits from the host portion of the mask to
the network portion, i.e.,

11111111.11110000.00000000.00000000 = Subnet mask

Which is = 255.240.0.0
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa
Subnetting

Now that the mask is 255.240.0.0, you have 16 networks:

00001010.0000 0000.00000000.00000000 = 10. 0.0.0 (first possible network)

00001010.0001 0000.00000000.00000000 = 10. 16.0.0 (second network)

00001010.0010 0000.00000000.00000000 = 10. 32.0.0 (third network)


00001010.0011 0000.00000000.00000000 = 10. 48.0.0 (fourth network)

00001010.0100 0000.00000000.00000000 = 10. 64.0.0 (fifth network)

00001010.0101 0000.00000000.00000000 = 10. 80.0.0 (sixth network)

00001010.0110 0000.00000000.00000000 = 10. 96.0.0 (seventh network)

00001010.0111 0000.00000000.00000000 = 10.112.0.0 (eighth network)

00001010.1000 0000.00000000.00000000 = 10.128.0.0 (ninth network)

00001010.1001 0000.00000000.00000000 = 10.144.0.0 (tenth network)

00001010.1010 0000.00000000.00000000 = 10.160.0.0 (eleventh network)

00001010.1011 0000.00000000.00000000 = 10.176.0.0 (twelfth network)

00001010.1100 0000.00000000.00000000 = 10.192.0.0 (thirteenth network)

00001010.1101 0000.00000000.00000000 = 10.208.0.0 (fourteenth network)

00001010.1110 0000.00000000.00000000 = 10.224.0.0 (fifteenth network)

00001010.1111 0000.00000000.00000000 = 10.240.0.0 (sixteenth network)
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa
Routing



Communications from one network to another

Packets are sent to a default ‘Gateway’ (router)

The router ‘routes’ the packet to the appropriate interface, by
looking at the destination IP address and its routing table

The destination network may or may not be attached to that
interface. If the destination is not attached to that interface, the
packet is sent to the next router.
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa
Analyze the 3-Way handshake

Transport Layer Concepts
TCP UDP
Connection-oriented Connectionless
Slower
communications
Faster
communications
Considered reliable Considered unreliable
Transport layer Transport layer
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa


TCP Control Flags
Analyze the 3-Way handshake
SYN (S)—Represents the first part of establishing a connection. The synchronizing of

communication will generally be in the first packet of communication.
ACK (Ack)—Represents acknowledgment of receipt of data from the sending host.
This is sent during the second part of establishing a connection in response to
the sending host’s SYN request.
FIN (F)—Represents the sender’s intentions of terminating the communication in
what is known as a graceful manner.
RESET (R)—Represents the sender’s intentions to reset the communication.
URGENT (Urg)—Represents that this data should take precedence over other data
transmissions.
PUSH (P)—Used when the sending host requires data to be pushed directly to the
receiving application, and not fill in a buffer.
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa


Sequence and Acknowledgment Numbers
Analyze the 3-Way handshake

When initiating a new connection, an Initial Sequence Number (ISN) is
generated

The ISN is a 32-bit number that increments by one every 4 microseconds

Acknowledgment Numbers are also 32-bit numbers, in response to a sequence
number

Reliable delivery by TCP
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa



Ports
Analyze the 3-Way handshake

Port numbers are located in the TCP (or UDP) header, and they are 16-bit
values, ranging from 0 to 65,535.

Port numbers can be assigned to specific functions, or applications.

Ports also can be left open for dynamic use by two hosts during
communication.

There are three main categories of ports: Well Known, Registered, and
Dynamic.

www.iana.org/assignments/port-numbers.
The Well Known Ports (Reserved Ports): 1–1023
Registered Ports: 1024 – 49151
Dynamic Ports (Private Ports): 49152 – 65536
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa


Port numbers and associated services
Analyze the 3-Way handshake

Port 23 - Telnet

Port 80 - HTTP (standard Web pages)


Port 443 - Secure HTTP (secure Web pages)

Ports 20 and 21 - FTP

Port 53 - DNS

Port 25 - SMTP
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa


Trojan associated Port numbers
Analyze the 3-Way handshake

Port 12345 - NetBus

Port 1243 - Sub Seven

Port 27374 - Sub Seven 2.1

Port 31337 - Back Orifice

Port 54320 (TCP) - Back Orifice 2000

Port 54321 (UDP) - Back Orifice 2000
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa




Monitor real-time network traffic

Analyze network traffic

Filter specific protocols to capture

The default view of Network Monitor

Displaying captures

Network Monitor Filters
Network Monitor
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa



Very versatile third party tool - will run on many versions of
Unix/Linux and Windows.

Requires libpcap (Unix) or WinPcap 2.3 (Windows)

Can read data off the wire, or from files of various formats.

Can also save file to various formats.

Freely available at www.wireshark.org.

Formerly called Ethereal, name changed in 2006.
Wireshark

H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa



Three categories of cryptography: physical, mathematical, and quantum.

Understanding Physical Cryptography

Physical cryptography includes several different approaches. The more common
methods involve transposition or substitution of characters or words.

A cipher is a method used to encode characters to hide their value. Ciphering is the
process of using a cipher to encode a message. The three primary types of
cryptography or ciphering methods—substitution, transposition, and
steganography—are discussed in the following sections

Substitution Ciphers: A substitution cipher is a type of coding or ciphering
system that changes one character or symbol into another
For example, let’s say you had the following message:
You can do this easily if you put your mind to it.
And the encrypted message read
You can do qhis zasily if you puq your mind to iq.
Notice in the encrypted example that every instance of z is substituted for e, and
that every instance of q is substituted for t
Cryptography Basics and Methods
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa




Three categories of cryptography: physical, mathematical, and quantum.

Understanding Physical Cryptography

Transposition Ciphers: A transposition cipher involves transposing the letters in
a certain manner

Example: Caesar Cipher: This simple algorithm rotates every letter 13 places in
the alphabet. Thus an A becomes an N and a B becomes an O, and so forth
See if you can solve these encryptions:
1. Neg snve qrohgf urer fngheqnl.
2. Gevcyr pbhcbaf ng Xebtre!
3. Gel lbhe unaq ng chmmyrf.
The answers are
4. Art fair debuts here saturday.
5. Triple coupons at Kroger!
6. Try your hand at puzzles.
Cryptography Basics and Methods
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa



Three categories of cryptography: physical, mathematical, and quantum.

Understanding Physical Cryptography

Steganography: Steganography is the process of hiding one message in another


Consider the following message:
“Meet the mini me that ate later.”
The real message is every third word:
“Meet me later.”
Cryptography Basics and Methods
H c vi n Công Ngh Thông Tin Bách ọ ệ ệ
Khoa



Three categories of cryptography: physical, mathematical, and quantum.

Understanding Mathematical Cryptography: Mathematical
cryptography deals with using mathematical processes on characters or
messages. The most common is a function called hashing
Cryptography Basics and Methods

×