Denial of service
• Force a service to fail - Overload the service
• Doesn’t have to be complicated - Turn off the powe
A “friendly” DoS
• Network DoS - Layer 2 loop without STP
• Bandwidth DoS
• Downloading multi-gigabyte
Linux distributions over a DSL line
• The water line breaks - Get a good shop vacuum
Distributed Denial of Service (DDoS)
• Launch an army of computers to bring down a
service
• Use all the bandwidth or resources - traffic spike
• This is why the bad guys have botnets
• Thousands or millions of computers at your
command
• At its peak, Zeus botnet infected over 3.6 million PCs
• Coordinated attack
• The attackers are zombies
• Many people have no idea they are
participating in a botnet
Zero-day attacks
Man-in-the-Middle
• How can a bad guy watch
without you knowing?
• Man-in-the-middle
• ARP poisoning - ARP has no security
Mitigating man-in-the-middle
Brute Force Attacks
• Brute force attacks - Online
• Keep trying the login process
• Very slow
• Most accounts will lockout after a
number of failed attempts• Brute force the hash - Offline
• Obtain the list of users and hashes
• Calculate a password hash,
compare it to a stored hash
• Large computational resource requirementDictionary attacks
• If you’re using brute force, you should start with the
easy ones
• 123456, password, ninja, football
• This will catch the low-hanging fruit
• You’ll need some smarter attacks for the smarter
people
Rainbow tables
Spoofing
• Email address spoofing
• The sending address of an email isn’t really the
sender
• Man-in-the-middle attacks
• The person in the middle of the conversation
pretends to be both endpoints
MAC spoofing
• Changing the MAC address can be legitimate
• Internet provider expects a certain MAC address
• Certain applications require a particular MAC
address
What kind of general term is used to describe the process of securing a computer system?
Hardening
Which of the following answers refers to the contents of a rainbow table entry?
Hash/Password
Removing Malware