#acl SecurityClass2010Group:read,write,admin All:read


== The Quest for Root ==

   *In 1969 Ken Thompson, and Denis Ritchie hacked up MULTICS (Multiplexed Information and computing System) and created UNIX
   *Early UNIX environments were located in Bell Labs or in a university 
 
== Vulnerability Mapping ==
   
   *Is the process of mapping specific security attributes of a system to an associated vulnerability or potential vulnerability
  
=== Methods of Vulnerability Mapping ===
      
      *Manually map specific system attributes against publicity available sources of vulnerability information
      *Use public exploit code posted to various security mailing lists and any number of websites, or develop own code
      *Use automated vulnerability scanning tools, such as Nessus to identify true vulnerabilities

== Remote Access ==
   
   *Defined as gaining access via the network or other communication channel.
 
== Local Access ==
   
   *Defined as having an actual command shell or login to the system
   *Also referred to a privilege escalation attacks

== Remote Access ==

   *4 methods to exploit UNIX
      *Exploiting a listening service
      *Routing through a UNIX system that is providing security between two or more networks
      *UI remote access execution attacks
      *Exploiting a process or program that has placed the network interface card into promiscuous mode 

= ATTACKS and Countermeasures =

== Brute-force Attacks ==
   *Most basic form of attack
   *Most Common types of services attacked
      *telnet
      *FTP
      *Secure Shell
      *POP and IMAP

== Brute-force Countermeasures ==
  
   *Using a operating system that offers a service that strengthens passwords like Solaris 10
      *PASSLENGTH
      *MINWEEK
      *MAXWEEK
      *WARNWEEK
      *ETC
== Buffer Overflow Attacks ==

   *Buffer overflow condition
   *Occurs when a user or attempts to place more data into a buffer than previously allocated
   *Echo “vrfy ‘perl –e ‘print “a” x 1000’ ’ ” 

= Quiz =

1. In what year was Unix project started? '''1969 '''

2. What is the name of the parent system that Unix came out of? ''' MULTICS '''

3. List 2 of the 4 Remote access categories.

   *Exploiting a listening service
   *Routing through a UNIX system that is providing security between two or more networks
   *UI remote access execution attacks
   *Exploiting a process or program that has placed the network interface card into promiscuous mode 

4. What is the best Countermeasure for a brute force attacks? ''' Strong Passwords '''

5. Other than disabling unused services to mitigate buffer overflow attacks, what else should you disable? ''' Dangerous services '''

[[attachment:Security Pres]]



Back to Cptr427Winter2010