19
-Ajay Babu .D y5cs022.

-Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

Embed Size (px)

Citation preview

Page 1: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

-Ajay Babu .Dy5cs022.

Page 2: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

ContentsWho is hacker?History of hackingTypes of hackingDo You Know?What do hackers do? - Some Examples on Web application

hacking.How can protect the system?What should do after hacked?

Page 3: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

Who is hacker?

HackExamine something very minutely

HackerThe person who hacks

CrackerSystem intruder/destroyer

Page 4: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

History of hacking

Telephone hackingUse telephone freelyIt’s called phreaking

Computer virusDestroy many computers

Network hackingHack the important server remotely and

destroy/modify/disclose the information

Page 5: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

Types of hackingNormal

data transfer

Interruption Interception

Modification Fabrication

Page 6: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

Do you know?

75% of attacks today happen at the Application (Gartner). Desktop augmented by Network and then Web Application Security.

Many “easy hacking recipes” published on web.

3 out of 4 vendor apps that are tested had serious SQL Injection bugs!

“The cost of correcting code in production increases up to 100 times as compared to in development...”

Page 7: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

What do Hackers do?A few examples of Web application hacks

SQL Injection Cross-site Scripting (# 1 threat today!)

Page 8: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

SQL Injection Attacks

Web App

Hacker

Uses SQL scriptinjection to

access data

“SQL injection is a security vulnerability that occurs in the database layer of an application. Its source is the incorrect escaping of dynamically-generated string literals embedded in SQL statements. “ (Wikipedia)

Page 9: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

SQL Injection AttacksExample of attack:

SQL Query in Web application code: “SELECT * FROM users WHERE login = ‘” + username + “’ and password= ‘” + password + “’;”

Hacker logs in as: ‘ or ‘’ = ‘’; -- SELECT * FROM users WHERE login = ‘’ or ‘’ = ‘’; --'; and password=‘’;

Hacker deletes the users table with: ‘ or ‘’ = ‘’; DROP TABLE users; -- SELECT * FROM users WHERE login = ‘’ or ‘’=‘’; DROP TABLE users; --'; and password=‘’;

SQL Injection examples are outlined in: http://www.spidynamics.com/papers/SQLInjectionWhitePaper.pdf http://www.unixwiz.net/techtips/sql-injection.html

Page 10: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

SQL Injection Attacks Demo

Page 11: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

SQL Injection Attacks Demo

Page 12: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

SQL Injection Attacks Demo

Page 13: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

Cross-Site Scripting (XSS) Attacks

Web App

Hacker

Injects scriptinto web site

CompromisedWeb App

Retrieves compromisedpage content

Unknowinglyexecutes script

End User

Page 14: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

XSS: Script Injection Demo

Page 15: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

XSS: Script Injection Demo

Page 16: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

Preventing SQL injection and XSSSCRUB Error handling

Error messages divulge information that can be used by hacker…

VALIDATE all user entered parametersCHECK data types and lengthsDISALLOW unwanted data (e.g. HTML tags,

JavaScript)

Page 17: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

How can protect the system?

Encrypt important data Ex) .pgp, .ssh

Do not run unused information Remove unused programs Setup firewall

Ex) IP chain Check unintentional change Backup the system often

Page 18: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

What should do after hacked?Shutdown the system

Or turn off the systemSeparate the system from networkRestore the system with the backup

Or reinstall all programsIt can be good to report the police

Page 19: -Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application

Thank you

-Ajay Babu .DY5cs022.