jim crowley c3 – crowley computer consulting 1. apologies this is long haired, geeky stuff. this...

122
Jim Crowley C3 – Crowley Computer Consulting 1

Upload: felix-maximilian-hodge

Post on 25-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Jim CrowleyC3 – Crowley Computer Consulting

1

Page 2: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

ApologiesThis is long haired, geeky stuff.This is long and boring.This is version 1.The analogies between safe sex and safe

computing cannot be ignored.It is getting very difficult to protect older systems.

Too slow and not enough memory for security programs.

No new patches older than Windows 2000.This is meant to scare the *#$^ out of you.

2

Page 3: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

3

Page 4: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Various services run over the InternetWorld Wide WebEmailInstant MessagingPeer to Peer sharingVoice over IP

phonesGamingGopherAudio streamingVideo streaming

The Internet was designed for enhancement.

It was not designed for this level of complexity.IE. The easiest way

to prevent spam is to authenticate the sender. Email has no method to do this.

4

Page 5: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

IE. World Wide WebHTMLXMLJavaJavaScriptFlashPerlColdFusionVBScript` .NetActiveXSHTMLAnd more!!!

5

Page 6: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

IE. Instant MessagingAOLGoogleICQMicrosoftYahooAnd more!!!

6

Page 7: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

World World Wide Wide WebWeb

EmailEmail

Instant Instant MessaginMessagin

gg

Peer to Peer to Peer Peer

SharingSharing

Video Video streaminstreamin

gg

GamingGaming

Voice Voice over IP over IP phonesphonesGopherGopher

Audio Audio streaminstreamin

gg

7

Page 8: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

…it was hard and relatively expensive to “get online.”

…it was slow. Do you remember 300Bps and 1200Bps modems?

…the web didn’t exist! Do you remember CompuServe and Prodigy and

AOL?…it was geeky!

Users were hobbyists and it was all very 60s.Exploits were confined to bugging your buddy and

showing off!

8

Page 9: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Now..Everyone is online!Over 50% of users in

the USA are on broadband.

Exploits are Dirty rotten @#*!!!Money making

schemes and ripping off grandma

Organized crime

9

Page 10: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

VirusWormsTrojan horseSpywareSpamPhishing

10

Page 11: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

All of these types of attacks are man-made and intentional.

There is no “natural” or “random” virus.All of these ride the Internet services you

invite in!

Different companies and organizations Will group attacks differently.Will name attacks differently.

11

Page 12: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Software designed to infiltrate or damage a computer system without the owner's informed consent.

Originally harmless pranks or political messages, now have evolved into profit makers.

Include viruses, worms and Trojan horses.

12

Page 13: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

a program or piece of code that is loaded onto your computer (without your knowledge and against your wishes), that (generally) replicates itself and (generally) delivers a payload.

1972

13

Page 14: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

VirusIn the days of yore…

Who: typical author is young, smart and maleWhy: looking to fight the status quo, promote

anarchy, make noise or simply show off to their peers. There is no financial gain to writing viruses.

Now…Who: professional coders or programmers using

“kits”Why: financial gain by email delivery payments,

renting of botnets, extortion…Often supported by mafia and black marketers.

14

Page 15: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Virus structureReplication: viruses must propagate

themselves Payload: the malicious activity a virus

performs when triggered.Payload trigger: the date or counter or

circumstances present when a virus payload goes off.

15

Page 16: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Payload examplesNothing - just being annoyingDisplaying messagesLaunching DDoS attackErasing files randomly, by type or usageFormatting hard driveOverwrite mainboard BIOS Sending emailExpose private information

16

Page 17: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Trigger examplesDateInternet access# emails sent

17

Page 18: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Boot sector virusinfects the first sector of a hard drive or disk.

The first sector contains the MBR or master boot record.

18

Page 19: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

File infector virusattaches itself to a file on the computer and is

executed when that application is opened.

19

Page 20: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Multipartitecombines properties of boot sector and file

infector viruses.

20

Page 21: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Macro virusvirus written using script or macro languages

such as Microsoft Office’s VBA, executes when a document containing the virus is opened.

21

Page 22: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Memory resident• virus that sits continuously in memory to do

its work, often making it more difficult to clean. Most viruses now are memory resident.

22

Page 23: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Stealth virus• a virus that actively hides from anti-virus

programs by altering it’s state or hiding copies of itself or replacing needed files.

23

Page 24: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Polymorphic virus• a virus that alters its signature or footprint,

to avoid detection.

24

Page 25: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Metamorphic virusA virus that rewrites its code each time a new

executable is created. Usually very large.

25

Page 26: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Malware: WormA self-replicating computer program that

uses networks to copy itself to other computers without user intervention.

They often lack a payload of their own but drop in backdoor programs.

1978

26

Page 27: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Malware: TrojanA destructive program that masquerades as a

benign application, it requires a user to execute it.

• A variety of payloads are possible, but often they are used to install backdoor programs.

• Generally, trojans do not replicate.• 1983

27

Page 28: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

SpywareApplication installed, usually without the

user’s knowledge, intercepting or taking partial control for the author’s personal gain

Estimates as high as 90% of Internet connected computers are infected with spyware.

Unlike a virus does not self-replicate.

28

Page 29: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Spyware: symptomsSluggish PC performance An increase in pop-up adsMysterious new toolbars you can’t delete Unexplained changes to homepage settings Puzzling search results Frequent computer crashes

29

Page 30: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Spyware: a loaded system

30

Page 31: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Spyware: rogue help Antivirus Gold Family

Adware Delete SpyAxe Antivirus Gold SpywareStrike

PS Guard Family Security Iguard Winhound PSGuard

SpywareNO! SpyDemmolisher SpySheriff SpyTrooper SpywareNO!

Raze Spyware RegFreeze WinAntiSpyware 2005 WorldAntiSpy

31

Page 32: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Spyware: rogue helpThis morning…

32

Page 33: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Spyware: AdwareAny software package which automatically

plays, displays or downloads advertising material to a computer

Not necessarily “spyware” depending on your definitions

Many “free” applications install adware, creating a source of income.

Is it spyware? http://www.symantec.com/enterprise/

security_response/threatexplorer/risks/index.jsp

33

Page 34: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Spyware: Adware

34

Page 35: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Spyware: BackdoorsBackdoor = Remote AccessA method of bypassing normal authentication

or securing remote access while remaining hidden from casual inspection.

May be an installed program (IE. Back Orifice) or a modification to an existing application (IE. Windows’ Remote Desktop).

35

Page 36: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Spyware: Browser hijackerAlters your home page and may redirect

other requested pages, often away from helpful sites.

Generally add advertising, porn, bookmarks or pay-per-surf web sites.

36

Page 37: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Spyware: DialersProgram that uses a computer’s modem to

dial out to a toll number or Internet site900 numbersPhone system flood attack

Can rack up huge phone bills! Often running to international numbers in the Caribbean.

37

Page 38: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Spyware: DownloadersApplication designed to download and

possibly install another application. Sometimes, they may receive instructions from a web site or another trigger.

Also a typical form of Trojans.

38

Page 39: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Spyware: RootkitsA type of Trojan that gives an attacker access to

the lowest level of the computer, the root level. Removing rootkits can be very difficult to

impossible. Microsoft’s recommendation to remove rootkits

from Windows Xp was to reformat the hard drive and start over! Sometimes this is the only option.

Have been used for “legitimate” purposes, Sony used for digital rights management licensing

on music CDs, system was shown to have security holes, possibly giving up root access to an attacker.

39

Page 40: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Spyware: ScrapersExtracting data from

output to the screen or printer rather than from files or databases that may be secure.

Legitimate and illegitimate applications.

Temp files are often a great source of information!

40

Page 41: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Spyware: Tracking cookiesA small amount of data

sent back to the requesting website by your browser. They may be temporary or persistent, first or third party.

Cookies are not bad and make browsing life better!

Third party cookies are used to track surfing habits and you may want to disable them.

weather.com TRUE / FALSE 1218399413 LocID 13669 41

Page 42: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

KeyloggerA software application or hardware device

that captures a user’s keystrokes for legitimate or illegitimate use.

Bad keyloggers will store information for later retrieval or spit the captured information to an email address or web page for later analysis.

42

Page 43: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Social EngineeringTricking a user into giving or giving access to

sensitive information in order to bypass protection.

43

Page 44: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Social Engineering: pretextingCreating a scenario to persuade a target to

release information done over the phone.Often use commonly available information

like social security numbers or family names to gain access to further information.

44

Page 45: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Social engineering: phishingCreating a scenario to persuade a target to

release information done via email.Often use commonly available information

like social security numbers or family names to gain access to further information.

45

Page 46: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Social engineering: moreRoad apple: using an infected floppy, CD or

USB memory key in a location where someone is bound to find and check it through simple curiosity.

Quid pro quo: targeting corporate employees as “tech support” until some actually has a problem and “allows them to help.”

46

Page 47: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

True or false?

47

Page 48: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

True or false?

48

Page 49: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

True or false?

49

Page 50: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

True or false?

50

Page 51: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

SpamJunk email. An email message can contain any of the

threats mentioned, not to mention the time wasted downloading and filtering through the messages.

You do not have to open an attachment to activate a threat.

Webmail eliminates few threats.

51

Page 52: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

SpamThreats that activate

via merely opening the email are not disabled by using the email preview!

52

Page 53: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

World World Wide Wide WebWeb

EmailEmailInstant Instant

MessaginMessagingg

Peer to Peer to Peer Peer

SharingSharing

GamingGaming

53

Page 54: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

54

Page 55: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Don’t use the InternetAre you really that isolationist?Other user profiles on your computer?Other computers connected to the InternetOther devices…

Xbox, Playstation, WiiMedia Center ExtendersDVRs

55

Page 56: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Other connectionsWireless local

networksBluetooth personal

networksRemovable storage

FloppyCDsDVDsUSB memory keyFlash memory

Other connected devicesPrintersDigital camerasVideo cameras

56

Page 57: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

The first bug causing a computer error was found by Grace Hopper's team in 1945 using Harvard University's Mark II computer.

57

Page 58: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

And the stakes get higher…Imagine the home of

the futureBroadband Internet

connection shared by…

Computers Television / DVR Phone Security / heating /

cooling Kitchen appliances Cell phone

Imagine hacker exploitsDefrost your freezerTurn off the heatTrip / disable

securityRecord “Boy Meets

World” instead of “Desparate Housewives” and “24”!

58

Page 59: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

What’s a guy or gal to do?

59

Page 60: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

A software or hardware which permits or denies data into and possibly out of a computer network depending on levels of trust and authentication.

Emerged in 1988.

60

Page 61: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Levels of protectionNetwork address translation: internal devices carry

separate addresses from Internet connection, firewall translates, masking internal devices.

Packet filters: very basic inspection of individual packets of inbound traffic for correct ports for basic services.

Stateful filters: compare packets of traffic and rules can change criteria of what is allowed.

Application layer: deep packet inspection determines whether traffic is appropriate for a specific port.

61

Page 62: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Protection: hardware firewallRecommend a router

with stateful packet inspection

Jim’s picksLinksysSonicwall

62

Page 63: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Protection: software firewallA good program will

know configure major applications correctly, but it is easy to answer a firewall incorrectly.

Software firewalls often disrupt internal networks

Jim’s “sorta” pickZoneAlarm

63

Page 64: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Protection: virusMost mature category of protection. Detection

rate should be near perfect!How do anti-virus programs work?

File fingerprintingActive scanningHeuristicsUnusual hard drive activities

Protection can be run at the Internet service providerRouterServer (if applicable)Workstation – recommended

64

Page 65: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Protection: virusMust be updated!Jim’s picks

Norton Antivirus (home)

Symantec Antivirus Corporate Edition or Small Business Edition (offices)

AVG for older systems

65

Page 66: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Protection: spywareFairly new application, running two anti-

spyware applications is often recommended, but only one should be doing “active scanning.”

Detection rates are not nearly as accurate as virus detection.

Anti-virus applications are now capable of replacing active scanning spyware applications.

Spyware and virus scanners can fight, causing system freeze ups and instability.

66

Page 67: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Protection: spywareJim’s picks

Webroot SpySweeper

Spyware DoctorSpybot *Adaware *

• Not active scanner

67

Page 68: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Protection: spamSpam filtering occurs by recognizing common

email addresses and domains for sending spam and by recognizing keywords in email and moves it automatically to a “junk” folder.

Can be done at email server or workstation. Success rates are very individual!

68

Page 69: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Protection: spamAvoid spam – once your email address is a

spam target, there is no eliminating itAvoid posting address on web pages.Use throw-away email addresses (IE. Yahoo,

Hotmail, Google) when working unknown or very public sites (IE. Ebay, MySpace…)

You have to look through your Junk email occasionally to find mis-labeled email!

The more “public” your email address, the less you can filter without false positives.

69

Page 70: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Protection: spamJim’s thoughts

Outlook 2007 not badAndrew likes new

ThunderbirdSeveral clients like Inboxer Several clients like Norton

AntiSpamSeveral clients like their

ISP’s filtering but user must check junk on web site

Dial up: ISP filtering

70

Page 71: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Protection: Operating System updatesMost updates are

security patches not functionality enhancements!

I do not recommend using driver updates through Windows Updates!

Get them only through Windows Updates!

71

Page 72: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Protection: Application updatesBrowsers, email applications, instant

messaging applications, etc. all need security patches!

72

Page 73: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Protection: Application updatesApplication Source of updates

AOL IM www.aim.com

Internet Explorer Windows Updates

Microsoft Messenger Windows Updates

Mozilla Firefox www.mozilla.com (Help)

Opera www.opera.com (?)

Outlook Express Windows Updates

Thunderbird email www.mozilla.com (Help)

Windows Mail (Vista) Windows Updates

Yahoo IM www.yahoo.com

73

Page 74: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Vulnerability: Internet

World Wide Web

74

Page 75: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Vulnerability: WWW

75

Page 76: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Vulnerability: Email

76

Page 77: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Vulnerability: Instant messaging

77

Page 78: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Vulnerability: Gaming

78

Page 79: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Vulnerability: Streaming

79

Page 80: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Vulnerability: P2P

80

Page 81: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Layers: onions, ogres & protectionBroadband Dial up

Hardware firewall Necessary n/a

Software firewall Maybe Maybe

Virus protection Necessary Necessary

Spyware protection Necessary Necessary

Spam filtering Recommended Recommended

Operating system patches

Necessary Necessary

Browser/email/IM/… patches

Necessary Necessary

81

Page 82: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Protection purchasingBest of breed applications

Security suiteBest possible protectionProbably less bloat

Probably play together better

Better pricingCommon interface

82

Page 83: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Protection purchasing: suitesJim’s picks

Norton Internet SecurityNorton 360

PC Magazine Editor’s ChoiceNorton 360ZoneAlarm Internet

Security Suite 7PC World

Norton Internet SecurityMcAfee Internet

Security Suite

83

Page 84: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Selecting protectionDo Don’tRead reviews from

professional, neutral sources

Make sure you can understand your subscription’s status

Realize you generally get what you pay for

Realize that bundled apps are often 30 or 90 day trials and often not installed

Use advertising or blogs as your main source of information

Use reviews from non-technical sources

Run two software firewalls, two anti-virus or two active anti-spyware apps

84

Page 85: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Protection: Educate your usersDo not open attachments from anyone you don’t

know.Suspicious attachments from any known email

address may be threats that spoof senders.Security measures are for their benefit, don’t

subvert them.Don’t run ActiveX or Java from untrusted or

unknown websites.Never click on suspicious ads or popups. Always

click the Windows Close X when you can.Any connection can bring in threats…

Home computers logging in for remote work.Office laptops connected in public Wi-Fi hotspots.Removable storage.

85

Page 86: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Protection: Educate your usersIt is much easier to protect yourself than to

get clean after an infection.Internet Explorer is the only web browser

that uses Microsoft’s ActiveX tools. ActiveX is a security nightmare. Avoid the problem, use a different browser.Jim’s pick: Mozilla Firefox

86

Page 87: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Protection: Educate your usersFake Windows Updates

87

Page 88: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

88

Page 89: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Procedure at C3Interview client. Possibly start system as is to

see symptoms.Remove hard drive and connect to C3 testing

systems.Prevents threats from going activeImproves accuracy of scans for stealth,

polymorphic and rootkitsVirus scan (Symantec Antivirus Corporate

Edition)Spyware scan (Webroot Spysweeper)Hard drive test (Scandisk or Norton Disk Doctor)

89

Page 90: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Procedure at C3Clean temp files

Windows\TempWindows\Temporary Internet FilesUser\TempUser\Temporary Internet FilesPossibly other locations

Research infectionsReturn hard drive to client’s system

90

Page 91: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Procedure at C3Probable: Safe mode startup and disable

Windows System RestoreManual cleaning as needed while

“disconnected”All Windows UpdatesProbable: installation of appropriate security

packageAll UpdatesFull system scan

91

Page 92: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Procedure at C3Total time: 2 to 8 hoursTotal technician time: 1 to 4 hours

92

Page 93: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

What can you do?Know that Windows cannot diagnose most

problems.Know that repairing Windows requires a

clean computer.Know when to say “Uncle!” based on your

skill level.Know when to say “Uncle!” if a computer

cannot be recovered and must be wiped.Backup, Backup, Backup.

93

Page 94: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

94

Page 95: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Non-operating WindowsBoot from the

appropriate Windows CD and attempt a repair installationMust match system

Version Home vs. Professional Upgrade vs. Retail vs.

OEM

DangerInfections may

corrupt system further.

You may get “running” until the threat kicks in again and repeats its damage.

ProsDesperation – you’re

doing something95

Page 96: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Non-starting WindowsSafe mode

Press F8 (or hold Ctrl) prior to Windows splash screen

ScanManual updates?Virus scannerSpyware scannerDocument, research,

follow necessary instructions

Limit startups

Most threats are inactive in safe mode.

You may be able to download scanner updates manually on another computer and install them.

Warning: more threats successfully hide themselves in safe mode.

96

Page 97: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Safe modeF8 during startupMost drivers and

network not runningOften, you must log

on as administrator

97

Page 98: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Manual virus definition updateHighly dependent on

application manufacturer

Expired subscription may not allow use of manual update

98

Page 99: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Limit startupsStartRunMsconfigServices and Startup

tabsTurn off anything

that you don’t recognize, especially “random” names. Google names.

Restart99

Page 100: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Operating WindowsBackupDocument!Virus scan

Update installed appOnline scannerInstall new app

Spyware scan or 2Update installed appOnline scanner Install new app

Research infectionsManual attack and

toolsFollow instructions!Take your time!

All Windows UpdatesInstall appropriate

securityAll updates Scan

Scan your backup100

Page 101: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Update virus scannerParticular to

applicationMany threats will

attempt to subvert connection

Subscription must be active.

101

Page 102: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Online scanners (virus & spyware)Symantec

www.symantec.com/home_homeoffice/security_response/index.jsp

Webroot SpySweeper www.webroot.com/shoppingcart/tryme.php?bjpc=64021&vcode=DT02A

Trend Micro housecall.trendmicro.com/

102

Page 103: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

I want a real antivirus – now!Many vendors have demo downloads. IE.

Symantec offers a 15 day Norton Antivirus trial that can be activated later by purchasing a license or package

Delete – don’t quarantine.When macro viruses were the rage, this was a

method to recover infected documents.

103

Page 104: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

My antivirus isn’t playing!Try updating.Attempt a repair installation.

If you bought your security online, via download – copy it to CD for semi-permanent archival!

Realize all security applications “get old.”Uninstall and reinstall. Need RAM?

104

Page 105: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Research infectionsSymantec Threat

Explorer www.symantec.com/home_homeoffice/security_response/threatexplorer/index.jsp

Google www.google.com

Scumware http://scumware.com/

105

Page 106: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Disable System RestoreRight+click My

ComputerPropertiesSystem Restore tabCheck “Turn off

System Restore”OK

106

Page 107: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Registry EditorStartRunRegedit OKProcedure

Backup!NavigateNuking the bad

guys

107

Page 108: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Removal toolsCWShredder www.cwshredder.net Major Geeks

www.majorgeeks.com/downloads16.html

108

Page 109: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

System cleaningEliminate temporary

filesStartAll ProgramsAccessoriesSystem ToolsDisk Cleanup

109

Page 110: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

System cleaningDefragment your

hard driveStartAll ProgramsAccessoriesSystem ToolsDisk

Defragmenter

110

Page 111: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

System cleanupInternet Explorer

automatically clearing cacheInternet ExplorerToolsInternet Options…Advanced tabSecurity sectionCheck “Empty

Temporary Internet Files when browser is closed”

111

Page 112: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Know when…You’re…

Last backup was madeSystem and application CDs areOver your headWasting your time

Your…Windows is toast

112

Page 113: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Worthwhile freebiesVirus scanners

AVG – www.grisoft.comAvast - www.avast.com

Spyware scannersSpybot Search and Destroy www.safer-

networking.org/en/index.html Discovery tools

Hijack This www.merijn.org

113

Page 114: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Web privacy

114

Page 115: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Web privacyGoogle is not the problem. Google is just one

way to find this kind of data.Blocking this data on Google will not block

other search engines. All of this is in the phone book and then I can

go to any mapping application.

115

Page 116: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Email HijackFrom: xxxxx xxxxxxxxx [email protected]: Monday, June 11, 2007 10:45 AMTo: James D. CrowleySubject: SPAM Good Morning Jim: I wanted to report a SPAM issue to you. This morning xxxxx received an email to her

xxxxxx account. The email was sent by her from an outside account. It was an email that she sent to someone 6 months ago. Also on the email were individuals CCd who should not have received that email. Basically what is occurring is someone is accessing her email account and is sending its herself and others mail that should not be going out. Is it possible that some type of hacker is doing this? She is also receiving SPAM from xxxxxxx’s email account and xxxxxx’x account. I am receiving SPAM from myself, and cannot block it because its from my account. The frequency of this is increasing. What can we be doing to prevent the SPAM and can someone access confidential information that is being sent via email and send it to people in our contact list?

 Xxxxx xxxxxAdministrative AssistantXxxxxxxxx CoordinatorXxxxxxxx xxxxxxx xxxxx xxxxxxxx, Inc.

116

Page 117: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Email HijackNot hijacked – spoofed!Realize there are four primary locations that

your email can be hijaaked or spoofed like Anita’s was.Your computer or serverYour email server The recipient’s email hostThe recipient’s computer or server

117

Page 118: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Email Spoofing applicationIt peruses my email and randomly grabs xyz’s

messageMakes a copyProbably alters the message somewhatAttaches the virus or whatever its “payload” is Reuses all original email addresses in the To, CC

and BCCMaybe adds some more addressesMaybe randomly generates more email addressesAnd starts sending itself outXYZ may get a copy of her message back…

118

Page 119: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

Urban myths

119

Page 120: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

www.av-test.org www.icsalab.com www.virusbtn.com

120

Page 121: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

www.pcmag.com http://www.pcmag.com/

category2/0,1874,4829,00.asp www.pcworld.com

http://www.pcworld.com/tc/spyware/

121

Page 122: Jim Crowley C3 – Crowley Computer Consulting 1. Apologies This is long haired, geeky stuff. This is long and boring. This is version 1. The analogies

www.geeksonwheels.comwww.pcmag.com/encyclopedia/ www.snopes.com www.sunbelt-software.comhttp://www.netvalley.com/archives/mirrors/

robert_cailliau_speech.htmwww.webroot.com www.wikipedia.org

122