FirewallsFirewalls filter based on: IP Addresses, destination PortsFiltering firewall based on: Packet Headers Source addressesProxy or application level firewalls based on message content: Virus scanner Key terms? 27 Network Organization Public network firewall Demilitarized Zone (DMZ) Public or External Network Internal network firewallInternal Network 26 Network Organization Network infrastructure design using ACM Layered security measures Separation of information Fairly standard corporate network 25 User Classifications Serves same purpose as data classification Who can access what?Common classifications: Outsiders Employees Executives Owners 23 Data Classification Policy develops from information flow Who can access what?Common classifications: Public Secret Confidential Group based 22 Policy Network security Company goals lead to security policy Network infrastructure design policy Network design meets requirements 20 Select bottom APR tab and click top window7. Select hosts on bottom and press then ok6. Start sniffer and select network interface5. Replay and Man-in-the-middle When passwords cant be caught in plaintext Man-in-the-middle ARP poisoning Replay attack Session hijacking 17
#Does loic work password
Wireshark2.Filter http3.Find post method4.Follow TCP stream5.You have username and password in the clearif server isnt using https SSL or other encryption 15 Wait till someone connects to host with FTP 14 Run Wireshark on LAN in promiscuous mode2.
#Does loic work install
Install Internet Information Services (IIS) on Windows and File Transfer Protocol (FTP)3. Install virtual machine or connect to network2. LOIC MitigationAttack vector old as the HTTP protocol Best approach is to use a good rule based firewall, allow for rules on connection limits per IP per secondLegitimate uses for this tool: Performance base lines Measuring server performance 11 LOIC trail If an anonymization network (TOR) is not used traceable IP address records can be logged by its recipient Logs kept by the ISP used to identify users Many users arrested using LOIC LOIC not anonymous 9 Hive Mind The automatic mode or Hive Mind, option to voluntarily join a botnet Using mode, all parameters of attack set up remotely via IRC, including target IRC is a network protocol designed to provide real-time group chat, often (miss)used to control botnets 8 How does LOIC work?While IsFlooding is True 5 Low Orbit Ion Cannon (LOIC) Primary tool being used by the script kiddies Low Orbit Ion Cannon (LOIC) is a web app performance tool Denial of Service/testing tool DoS operation using HTTP/TCP/UDP requests DDoS voluntarily joining botnet Hive Mind 4 Outline In the NEWS (LOIS) DDoS attacks Passive Network Attacks Active Network Attacks Designing a Secure Network Web 2.0 Summary 2