Transcript
Page 1: Welcome to EECS 354 Network Penetration and Security

Welcome to EECS 354Network Penetration and

Security

Page 2: Welcome to EECS 354 Network Penetration and Security

Why Computer Security• The past decade has seen an explosion in the

concern for the security of information

– Malicious codes (viruses, worms, etc.) caused over $28 billion in economic losses in 2003, and will grow to over $75 billion by 2007

• Jobs and salaries for technology professionals have lessened in recent years. BUT …

• Security specialists markets are expanding !

– “ Full-time information security professionals will rise almost 14% per year around the world, going past 2.1 million in 2008” (IDC report)

Page 3: Welcome to EECS 354 Network Penetration and Security

Why Computer Security (cont’d)

• Internet attacks are increasing in frequency, severity and sophistication

• Denial of service (DoS) attacks

– Cost $1.2 billion in 2000

– 1999 CSI/FBI survey 32% of respondents detected DoS attacks directed to their systems

– Thousands of attacks per week in 2001

– Yahoo, Amazon, eBay, Microsoft, White House, etc., attacked

Page 4: Welcome to EECS 354 Network Penetration and Security

Why Computer Security (cont’d)• Virus and worms faster and powerful

– Melissa, Nimda, Code Red, Code Red II, Slammer …

– Cause over $28 billion in economic losses in 2003, growing to over $75 billion in economic losses by 2007.

– Code Red (2001): 13 hours infected >360K machines - $2.4 billion loss

– Slammer (2003): 10 minutes infected > 75K machines - $1 billion loss

• Spams, phishing …

• New Internet security landscape emerging: BOTNETS !

Page 5: Welcome to EECS 354 Network Penetration and Security

The Spread of Sapphire/Slammer Worms

Page 6: Welcome to EECS 354 Network Penetration and Security

Logistics• Instructors

Sam Mc

Yan Chen ([email protected]),

• TA

TBD

Page 7: Welcome to EECS 354 Network Penetration and Security

Why Learn to Hack• If you can break into computer systems,

then you can defend computer systems.

– The fundamental idea is to learn how to think as an attacker.

– Defense then becomes second-nature.

• “The devil is in the details.”

– Only by understanding low-level details of vulnerabilities and attacks is it possible to avoid the introduction of similar flaws and to design effective protection mechanisms.

Page 8: Welcome to EECS 354 Network Penetration and Security

Logistics• Instructors

Sam McIngvale (CS alumni)

Jim Spadaro (undergrad)

Whitney Young (to be CS alumni)

Yan Chen

• TA

TBD

Page 9: Welcome to EECS 354 Network Penetration and Security

• This course will emphasize the practical security techniques rather than the theory

– Complementary to EECS 350 “Intro to Computer Security” and EECS 450 “Internet Security” research course

• Satisfy the project course requirement for undergrads

• Security has become one of the depth areas for CS major requirements

• Satisfy the breadth requirement for system Ph.D. students

Course Overview

Page 10: Welcome to EECS 354 Network Penetration and Security

Course Objective• Be able to identify basic vulnerabilities in

software systems and design corresponding protection mechanisms

• Be able to use some important and popular security tools for network/system vulnerability discovery and risk assessment

• Be able to use configure a computer/network with current security software, e.g., firewalls, intrusion detection systems (IDS)

• Compete in the international Capture the Flag competition

Page 11: Welcome to EECS 354 Network Penetration and Security

• Shellcode

• Buffer Overflows, Heap Overflows

• Format Strings

• Web Attacks

– SQL injection and Shell attacks

– Cross Site Scripting (XXS)

• Using Metasploit for Penetration

• Firewalls and IDSs

• Wireshark and Finding Illegal Users

– Looking at tcpdump data with Wireshark

Course Contents

Page 12: Welcome to EECS 354 Network Penetration and Security

Course Contents (cont’d)• Reverse Engineering

– Reverse engineering compiled code

– Reverse engineering byetcode

• Windows Hacking

– Differences between Windows and Linux

– Example Windows vulnerabilities

Page 13: Welcome to EECS 354 Network Penetration and Security

Prerequisites and Course Materials

• Required: EECS 213 or (ECE 205 and 231) or any equivalent operating systems introductory courses

• Highly Recommended: networking (EECS 340) and OS (EECS 343) or having some familiarity with Unix systems programming

• No textbooks – all readings will come from handouts

Page 14: Welcome to EECS 354 Network Penetration and Security

Grading• No exams for this class.

• Participation in CTF and Practice Competitions is mandatory

– Date: December

• Participation 25%

– RTFM classes are very interactive. Students should come to class prepared and ready to participate.

• Homework 30%

– Students will be expected to complete weekly hacking assignments.

• Competition 20%

• Group Project 25%

Page 15: Welcome to EECS 354 Network Penetration and Security

Communication

• Slides will be made online prior to each class

• Web page:

http://cal.cs.northwestern.edu/nuctf

• Newsgroup on Google Groups: Network Penetration and Security