<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ibrahim</id>
	<title>Soma-notes - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ibrahim"/>
	<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php/Special:Contributions/Ibrahim"/>
	<updated>2026-05-14T01:21:32Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20571</id>
		<title>SystemsSec 2016W Lecture 5</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20571"/>
		<updated>2016-01-21T19:45:06Z</updated>

		<summary type="html">&lt;p&gt;Ibrahim: /* Administrative attacker */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Class discussion: threat models and attacker goals&lt;br /&gt;
&lt;br /&gt;
==Local attacker==&lt;br /&gt;
&lt;br /&gt;
==Administrative attacker==&lt;br /&gt;
&lt;br /&gt;
=== Group 2 ===&lt;br /&gt;
==== Members ====&lt;br /&gt;
* Kyle T.&lt;br /&gt;
* Tarek K.&lt;br /&gt;
* Jakub L.&lt;br /&gt;
* Stefan C.&lt;br /&gt;
* Matt G.&lt;br /&gt;
* Remi G.&lt;br /&gt;
* Ibrahim M.&lt;br /&gt;
&lt;br /&gt;
==== Scenarios ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #1: Disgruntled Ex-Employee(s?) - Sony Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Disgruntled ex-employees with active administrative access and knowledge of internal system architecture.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Full client information specifically financial billing information. &lt;br /&gt;
*** Showcase that Sony does not take security seriously.&lt;br /&gt;
*** Denial of service for PSN users.&lt;br /&gt;
** Means: It is rumored that ex-employees with active logins managed to access the data.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #2: Current &amp;amp; Ex-Employee(s?) - Ashley Madison Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Employees with active administrative access.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Force Ashley Madison to shut down. &lt;br /&gt;
*** Expose the true ratios of male/female user base and fake accounts.&lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #3: Military and Government Secrets&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Whistleblowers (Chelsea Manning, Edward Snowden)&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Publicize and expose questionable practices and information to the general public.&lt;br /&gt;
*** Sway public opinion  &lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #4: This Wiki&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: MediaWiki CMS&lt;br /&gt;
** Attackers: Students with editor privilege on the wiki.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Modify or delete other groups&#039; entries.&lt;br /&gt;
** Means: Full access to edit the page using credentials given by the professor.&lt;br /&gt;
&lt;br /&gt;
==== Attack Strategies ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Weaknesses&#039;&#039;&#039;&lt;br /&gt;
** Employee turnover&lt;br /&gt;
** Disgruntled current and ex-employees&lt;br /&gt;
** Economically vulnerable administrators (easy to bribe)&lt;br /&gt;
** Blackmail&lt;br /&gt;
** System Administrator neglect and/or incompetence&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;How to Attack?&#039;&#039;&#039;&lt;br /&gt;
** Social Engineering&lt;br /&gt;
** If there are no safeguards in place, simply having admin access is enough to wreak havoc&lt;br /&gt;
** Installing backdoors to keep access to system&lt;br /&gt;
** Installing malicious updates and programs on users computers to siphon data and/or monitor.&lt;br /&gt;
** Remote monitoring of all users (including those with higher priviledge), using all available peripherals (webcams, microphones, keyboards, etc...)&lt;br /&gt;
** Denial of Access&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
=== Group 3 ===&lt;br /&gt;
====Members====&lt;br /&gt;
* Dania Ghazal&lt;br /&gt;
* Ankush Varshneya&lt;br /&gt;
* Olivier Hamel&lt;br /&gt;
* Michael Lutaaya&lt;br /&gt;
* Ryan Morfield&lt;br /&gt;
* Daniel Vanderveen&lt;br /&gt;
* Jess Johnson&lt;br /&gt;
&lt;br /&gt;
====Example Scenario====&lt;br /&gt;
&#039;&#039;&#039;Targeted System&#039;&#039;&#039;&lt;br /&gt;
* CIA database - find out who killed Kennedy?&lt;br /&gt;
&#039;&#039;&#039;Attackers&#039;&#039;&#039;&lt;br /&gt;
* remote authenticators&lt;br /&gt;
* contractors (non CIA)&lt;br /&gt;
&#039;&#039;&#039;Goals&#039;&#039;&#039;&lt;br /&gt;
* “exfiltrating data”&lt;br /&gt;
* exfiltrate the CIA database to find out who killed Kennedy&lt;br /&gt;
&#039;&#039;&#039;Means&#039;&#039;&#039;&lt;br /&gt;
* someone at the CIA left a node.js server running in the background :)&lt;br /&gt;
* ssh credentials&lt;br /&gt;
* use outdated emacs (implementing a root privileged mail daemon) to inject a password into etc/passwd to escalate attacker’s privileges&lt;br /&gt;
* look around the system for more vulnerable/outdated services to exploit&lt;br /&gt;
* generate a race condition to create a file that you know a root user would create, then let the root user put their “sensitive data” into attacker’s file (such as files in /temp)&lt;br /&gt;
* social engineering - submit a help ticket to someone within the CIA to gain higher privileges for a seemingly innocent reason&lt;br /&gt;
====Attack Strategies====&lt;br /&gt;
&#039;&#039;&#039;Where are the Accessible Weaknesses?&#039;&#039;&#039;&lt;br /&gt;
* outdated services&lt;br /&gt;
* any service that lets attacker execute a task as another user&lt;br /&gt;
&#039;&#039;&#039;How Do You Attack Them?&#039;&#039;&#039;&lt;br /&gt;
* user privilege escalation&lt;br /&gt;
* abusing service vulnerabilities&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, unauthenticated==&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, unauthenticated==&lt;br /&gt;
* Samuel Prashker&lt;br /&gt;
* Daniel Lehman&lt;br /&gt;
* Roman Chametka&lt;br /&gt;
* Derek Aubin&lt;br /&gt;
* Gilbert Lavergne-Shank&lt;br /&gt;
* Xiusan Zhou&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Scenarios&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;#1 - DDOS&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Web servers, or any machine connected to a network&lt;br /&gt;
*** Attackers: Angry trolls, political warriors&lt;br /&gt;
*** Goals: Denials of service, anger your target, hurt their financials, prove a point&lt;br /&gt;
*** Means: LOIC, Chinese Botnet with Bitcoin&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Exploitable communication paths (example: ping, login spam)&lt;br /&gt;
**** In the case of a router, overpowering a signal by replacing it with your own higher powered signal&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Over the network&lt;br /&gt;
**** Over the air (wireless signals)&lt;br /&gt;
* &#039;&#039;&#039;#2 - Packet Sniffing&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Phones, servers, any networked device that can be sniffed&lt;br /&gt;
*** Attackers: Exfiltrators who want getting data, corrupting data &lt;br /&gt;
*** Goals: Exfiltration of data, snooping for data over the air&lt;br /&gt;
*** Means: Packet sniffing tools, Wireshark, &lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Wireless signals would be easy to monitor&lt;br /&gt;
**** Mission security (Msec)&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Wireless: Network cards, monitoring tools for over the air analysis&lt;br /&gt;
**** Wired: Anywhere along the line to be able to hook in a middleman&lt;br /&gt;
* &#039;&#039;&#039;#3 - Remote program already running on their service/server&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: People (social engineering), known exploits (0days)&lt;br /&gt;
*** Attackers: Blackhat hackers, whitehat hackers&lt;br /&gt;
*** Goals: Exfiltrate, corrupt, deny access, destroy, ransomware, (whitehat only: protect!)&lt;br /&gt;
*** Means: Exploitable software, social engineering&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses?&lt;br /&gt;
**** Stupid people, exploitable equipment known to be accessible to 0days, leveraging bugs&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Social networks, email, phone calls, deployed payload&lt;br /&gt;
** &#039;&#039;&#039;Point is you&#039;re trying to get someone to install software for you, or exploit software to inject the payload on the targeted system&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Ibrahim</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20570</id>
		<title>SystemsSec 2016W Lecture 5</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20570"/>
		<updated>2016-01-21T19:41:23Z</updated>

		<summary type="html">&lt;p&gt;Ibrahim: /* Administrative attacker */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Class discussion: threat models and attacker goals&lt;br /&gt;
&lt;br /&gt;
==Local attacker==&lt;br /&gt;
&lt;br /&gt;
==Administrative attacker==&lt;br /&gt;
&lt;br /&gt;
=== Group 2 ===&lt;br /&gt;
==== Members ====&lt;br /&gt;
* Kyle T.&lt;br /&gt;
* Tarek K.&lt;br /&gt;
* Jakub L.&lt;br /&gt;
* Stefan C.&lt;br /&gt;
* Matt G.&lt;br /&gt;
* Remi G.&lt;br /&gt;
* Ibrahim M.&lt;br /&gt;
&lt;br /&gt;
==== Scenarios ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #1: Disgruntled Ex-Employee(s?) - Sony Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Disgruntled ex-employees with active administrative access and knowledge of internal system architecture.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Full client information specifically financial billing information. &lt;br /&gt;
*** Showcase that Sony does not take security seriously.&lt;br /&gt;
*** Denial of service for PSN users.&lt;br /&gt;
** Means: It is rumored that ex-employees with active logins managed to access the data.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #2: Current &amp;amp; Ex-Employee(s?) - Ashley Madison Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Employees with active administrative access.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Force Ashley Madison to shut down. &lt;br /&gt;
*** Expose the true ratios of male/female user base and fake accounts.&lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #3: Military and Government Secrets&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Whistleblowers (Chelsea Manning, Edward Snowden)&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Publicize and expose questionable practices and information to the general public.&lt;br /&gt;
*** Sway public opinion  &lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #4: This Wiki&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: MediaWiki CMS&lt;br /&gt;
** Attackers: Students with editor privilege on the wiki.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Modify or delete other groups&#039; entries to make them look bad.&lt;br /&gt;
** Means: Full access to edit the page using credentials given by the professor.&lt;br /&gt;
&lt;br /&gt;
==== Attack Strategies ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Weaknesses&#039;&#039;&#039;&lt;br /&gt;
** Employee turnover&lt;br /&gt;
** Disgruntled current and ex-employees&lt;br /&gt;
** Economically vulnerable administrators (easy to bribe)&lt;br /&gt;
** Blackmail&lt;br /&gt;
** System Administrator neglect and/or incompetence&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;How to Attack?&#039;&#039;&#039;&lt;br /&gt;
** Social Engineering&lt;br /&gt;
** If there are no safeguards in place, simply having admin access is enough to wreak havoc&lt;br /&gt;
** Installing backdoors to keep access to system&lt;br /&gt;
** Installing malicious updates and programs on users computers to siphon data and/or monitor.&lt;br /&gt;
** Remote monitoring of all users (including those with higher priviledge), using all available peripherals (webcams, microphones, keyboards, etc...)&lt;br /&gt;
** Denial of Access&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
=== Group 3 ===&lt;br /&gt;
====Members====&lt;br /&gt;
* Dania Ghazal&lt;br /&gt;
* Ankush Varshneya&lt;br /&gt;
* Olivier Hamel&lt;br /&gt;
* Michael Lutaaya&lt;br /&gt;
* Ryan Morfield&lt;br /&gt;
* Daniel Vanderveen&lt;br /&gt;
* Jess Johnson&lt;br /&gt;
&lt;br /&gt;
====Example Scenario====&lt;br /&gt;
&#039;&#039;&#039;Targeted System&#039;&#039;&#039;&lt;br /&gt;
* CIA database - find out who killed Kennedy?&lt;br /&gt;
&#039;&#039;&#039;Attackers&#039;&#039;&#039;&lt;br /&gt;
* remote authenticators&lt;br /&gt;
* contractors (non CIA)&lt;br /&gt;
&#039;&#039;&#039;Goals&#039;&#039;&#039;&lt;br /&gt;
* “exfiltrating data”&lt;br /&gt;
* exfiltrate the CIA database to find out who killed Kennedy&lt;br /&gt;
&#039;&#039;&#039;Means&#039;&#039;&#039;&lt;br /&gt;
* someone at the CIA left a node.js server running in the background :)&lt;br /&gt;
* ssh credentials&lt;br /&gt;
* use outdated emacs (implementing a root privileged mail daemon) to inject a password into etc/passwd to escalate attacker’s privileges&lt;br /&gt;
* look around the system for more vulnerable/outdated services to exploit&lt;br /&gt;
* generate a race condition to create a file that you know a root user would create, then let the root user put their “sensitive data” into attacker’s file (such as files in /temp)&lt;br /&gt;
* social engineering - submit a help ticket to someone within the CIA to gain higher privileges for a seemingly innocent reason&lt;br /&gt;
====Attack Strategies====&lt;br /&gt;
&#039;&#039;&#039;Where are the Accessible Weaknesses?&#039;&#039;&#039;&lt;br /&gt;
* outdated services&lt;br /&gt;
* any service that lets attacker execute a task as another user&lt;br /&gt;
&#039;&#039;&#039;How Do You Attack Them?&#039;&#039;&#039;&lt;br /&gt;
* user privilege escalation&lt;br /&gt;
* abusing service vulnerabilities&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, unauthenticated==&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, unauthenticated==&lt;br /&gt;
* Samuel Prashker&lt;br /&gt;
* Daniel Lehman&lt;br /&gt;
* Roman Chametka&lt;br /&gt;
* Derek Aubin&lt;br /&gt;
* Gilbert Lavergne-Shank&lt;br /&gt;
* Xiusan Zhou&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Scenarios&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;#1 - DDOS&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Web servers, or any machine connected to a network&lt;br /&gt;
*** Attackers: Angry trolls, political warriors&lt;br /&gt;
*** Goals: Denials of service, anger your target, hurt their financials, prove a point&lt;br /&gt;
*** Means: LOIC, Chinese Botnet with Bitcoin&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Exploitable communication paths (example: ping, login spam)&lt;br /&gt;
**** In the case of a router, overpowering a signal by replacing it with your own higher powered signal&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Over the network&lt;br /&gt;
**** Over the air (wireless signals)&lt;br /&gt;
* &#039;&#039;&#039;#2 - Packet Sniffing&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Phones, servers, any networked device that can be sniffed&lt;br /&gt;
*** Attackers: Exfiltrators who want getting data, corrupting data &lt;br /&gt;
*** Goals: Exfiltration of data, snooping for data over the air&lt;br /&gt;
*** Means: Packet sniffing tools, Wireshark, &lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Wireless signals would be easy to monitor&lt;br /&gt;
**** Mission security (Msec)&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Wireless: Network cards, monitoring tools for over the air analysis&lt;br /&gt;
**** Wired: Anywhere along the line to be able to hook in a middleman&lt;br /&gt;
* &#039;&#039;&#039;#3 - Remote program already running on their service/server&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: People (social engineering), known exploits (0days)&lt;br /&gt;
*** Attackers: Blackhat hackers, whitehat hackers&lt;br /&gt;
*** Goals: Exfiltrate, corrupt, deny access, destroy, ransomware, (whitehat only: protect!)&lt;br /&gt;
*** Means: Exploitable software, social engineering&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses?&lt;br /&gt;
**** Stupid people, exploitable equipment known to be accessible to 0days, leveraging bugs&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Social networks, email, phone calls, deployed payload&lt;br /&gt;
** &#039;&#039;&#039;Point is you&#039;re trying to get someone to install software for you, or exploit software to inject the payload on the targeted system&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Ibrahim</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20569</id>
		<title>SystemsSec 2016W Lecture 5</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20569"/>
		<updated>2016-01-21T19:41:11Z</updated>

		<summary type="html">&lt;p&gt;Ibrahim: /* Administrative attacker */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Class discussion: threat models and attacker goals&lt;br /&gt;
&lt;br /&gt;
==Local attacker==&lt;br /&gt;
&lt;br /&gt;
==Administrative attacker==&lt;br /&gt;
&lt;br /&gt;
=== Group 2 ===&lt;br /&gt;
==== Members ====&lt;br /&gt;
* Kyle T.&lt;br /&gt;
* Tarek K.&lt;br /&gt;
* Jakub L.&lt;br /&gt;
* Stefan C.&lt;br /&gt;
* Matt G.&lt;br /&gt;
* Remi G.&lt;br /&gt;
* Ibrahim M.&lt;br /&gt;
&lt;br /&gt;
==== Scenarios ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #1: Disgruntled Ex-Employee(s?) - Sony Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Disgruntled ex-employees with active administrative access and knowledge of internal system architecture.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Full client information specifically financial billing information. &lt;br /&gt;
*** Showcase that Sony does not take security seriously.&lt;br /&gt;
*** Denial of service for PSN users.&lt;br /&gt;
** Means: It is rumored that ex-employees with active logins managed to access the data.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #2: Current &amp;amp; Ex-Employee(s?) - Ashley Madison Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Employees with active administrative access.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Force Ashley Madison to shut down. &lt;br /&gt;
*** Expose the true ratios of male/female user base and fake accounts.&lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #3: Military and Government Secrets&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Whistleblowers (Chelsea Manning, Edward Snowden)&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Publicize and expose questionable practices and information to the general public.&lt;br /&gt;
*** Sway public opinion  &lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #4: This Wiki&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: MediaWiki CMS&lt;br /&gt;
** Attackers: Students with editor privilege on the wiki.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Modify or delete other groups&#039; entries to make them look bad.&lt;br /&gt;
** Means: Full access to edit the page using credentials given by the professor.&lt;br /&gt;
&lt;br /&gt;
==== Attack Strategies ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Weaknesses&#039;&#039;&#039;&lt;br /&gt;
** Employee turnover&lt;br /&gt;
** Disgruntled current and ex-employees&lt;br /&gt;
** Economically vulnerable administrators (easy to bribe)&lt;br /&gt;
** Blackmail&lt;br /&gt;
** System Administrator neglect and/or incompetence&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;How to Attack?&#039;&#039;&#039;&lt;br /&gt;
** Social Engineering&lt;br /&gt;
** If there are no safeguards in place, simply having admin access is enough to wreak havoc&lt;br /&gt;
** Installing backdoors to keep access to system&lt;br /&gt;
** Installing malicious updates and programs on users computers to siphon data and/or monitor.&lt;br /&gt;
** Remote monitoring of all users (including those with higher priviledge), using all available peripherals (webcams, microphones, keyboards, etc...)&lt;br /&gt;
** Denial of Access&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
=== Group 3 ===&lt;br /&gt;
====Members====&lt;br /&gt;
* Dania Ghazal&lt;br /&gt;
* Ankush Varshneya&lt;br /&gt;
* Olivier Hamel&lt;br /&gt;
* Michael Lutaaya&lt;br /&gt;
* Ryan Morfield&lt;br /&gt;
* Daniel Vanderveen&lt;br /&gt;
* Jess Johnson&lt;br /&gt;
&lt;br /&gt;
====Example Scenario====&lt;br /&gt;
&#039;&#039;&#039;Targeted System&#039;&#039;&#039;&lt;br /&gt;
* CIA database - find out who killed Kennedy?&lt;br /&gt;
&#039;&#039;&#039;Attackers&#039;&#039;&#039;&lt;br /&gt;
* remote authenticators&lt;br /&gt;
* contractors (non CIA)&lt;br /&gt;
&#039;&#039;&#039;Goals&#039;&#039;&#039;&lt;br /&gt;
* “exfiltrating data”&lt;br /&gt;
* exfiltrate the CIA database to find out who killed Kennedy&lt;br /&gt;
&#039;&#039;&#039;Means&#039;&#039;&#039;&lt;br /&gt;
* someone at the CIA left a node.js server running in the background :)&lt;br /&gt;
* ssh credentials&lt;br /&gt;
* use outdated emacs (implementing a root privileged mail daemon) to inject a password into etc/passwd to escalate attacker’s privileges&lt;br /&gt;
* look around the system for more vulnerable/outdated services to exploit&lt;br /&gt;
* generate a race condition to create a file that you know a root user would create, then let the root user put their “sensitive data” into attacker’s file (such as files in /temp)&lt;br /&gt;
* social engineering - submit a help ticket to someone within the CIA to gain higher privileges for a seemingly innocent reason&lt;br /&gt;
====Attack Strategies====&lt;br /&gt;
&#039;&#039;&#039;Where are the Accessible Weaknesses?&#039;&#039;&#039;&lt;br /&gt;
* outdated services&lt;br /&gt;
* any service that lets attacker execute a task as another user&lt;br /&gt;
&#039;&#039;&#039;How Do You Attack Them?&#039;&#039;&#039;&lt;br /&gt;
* user privilege escalation&lt;br /&gt;
* abusing service vulnerabilities&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, unauthenticated==&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, unauthenticated==&lt;br /&gt;
* Samuel Prashker&lt;br /&gt;
* Daniel Lehman&lt;br /&gt;
* Roman Chametka&lt;br /&gt;
* Derek Aubin&lt;br /&gt;
* Gilbert Lavergne-Shank&lt;br /&gt;
* Xiusan Zhou&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Scenarios&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;#1 - DDOS&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Web servers, or any machine connected to a network&lt;br /&gt;
*** Attackers: Angry trolls, political warriors&lt;br /&gt;
*** Goals: Denials of service, anger your target, hurt their financials, prove a point&lt;br /&gt;
*** Means: LOIC, Chinese Botnet with Bitcoin&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Exploitable communication paths (example: ping, login spam)&lt;br /&gt;
**** In the case of a router, overpowering a signal by replacing it with your own higher powered signal&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Over the network&lt;br /&gt;
**** Over the air (wireless signals)&lt;br /&gt;
* &#039;&#039;&#039;#2 - Packet Sniffing&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Phones, servers, any networked device that can be sniffed&lt;br /&gt;
*** Attackers: Exfiltrators who want getting data, corrupting data &lt;br /&gt;
*** Goals: Exfiltration of data, snooping for data over the air&lt;br /&gt;
*** Means: Packet sniffing tools, Wireshark, &lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Wireless signals would be easy to monitor&lt;br /&gt;
**** Mission security (Msec)&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Wireless: Network cards, monitoring tools for over the air analysis&lt;br /&gt;
**** Wired: Anywhere along the line to be able to hook in a middleman&lt;br /&gt;
* &#039;&#039;&#039;#3 - Remote program already running on their service/server&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: People (social engineering), known exploits (0days)&lt;br /&gt;
*** Attackers: Blackhat hackers, whitehat hackers&lt;br /&gt;
*** Goals: Exfiltrate, corrupt, deny access, destroy, ransomware, (whitehat only: protect!)&lt;br /&gt;
*** Means: Exploitable software, social engineering&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses?&lt;br /&gt;
**** Stupid people, exploitable equipment known to be accessible to 0days, leveraging bugs&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Social networks, email, phone calls, deployed payload&lt;br /&gt;
** &#039;&#039;&#039;Point is you&#039;re trying to get someone to install software for you, or exploit software to inject the payload on the targeted system&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Ibrahim</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20568</id>
		<title>SystemsSec 2016W Lecture 5</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20568"/>
		<updated>2016-01-21T19:32:43Z</updated>

		<summary type="html">&lt;p&gt;Ibrahim: /* Administrative attacker */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Class discussion: threat models and attacker goals&lt;br /&gt;
&lt;br /&gt;
==Local attacker==&lt;br /&gt;
&lt;br /&gt;
==Administrative attacker==&lt;br /&gt;
&lt;br /&gt;
=== Group 2 ===&lt;br /&gt;
==== Members ====&lt;br /&gt;
* Kyle T.&lt;br /&gt;
* Tarek K.&lt;br /&gt;
* Jakub L.&lt;br /&gt;
* Stefan C.&lt;br /&gt;
* Matt G.&lt;br /&gt;
* Remi G.&lt;br /&gt;
* Ibrahim M.&lt;br /&gt;
&lt;br /&gt;
==== Scenarios ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #1: Disgruntled Ex-Employee(s?) - Sony Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Disgruntled ex-employees with active administrative access and knowledge of internal system architecture.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Full client information specifically financial billing information. &lt;br /&gt;
*** Showcase that Sony does not take security seriously.&lt;br /&gt;
*** Denial of service for PSN users.&lt;br /&gt;
** Means: It is rumored that ex-employees with active logins managed to access the data.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #2: Current &amp;amp; Ex-Employee(s?) - Ashley Madison Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Employees with active administrative access.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Force Ashley Madison to shut down. &lt;br /&gt;
*** Expose the true ratios of male/female user base and fake accounts.&lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #3: Military and Government Secrets&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Whistle blowers (Chelsea Manning, Edward Snowden)&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Publicize and expose questionable practices and information to the general public.&lt;br /&gt;
*** Sway public opinion  &lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
=== Group 3 ===&lt;br /&gt;
====Members====&lt;br /&gt;
* Dania Ghazal&lt;br /&gt;
* Ankush Varshneya&lt;br /&gt;
* Olivier Hamel&lt;br /&gt;
* Michael Lutaaya&lt;br /&gt;
* Ryan Morfield&lt;br /&gt;
* Daniel Vanderveen&lt;br /&gt;
* Jess Johnson&lt;br /&gt;
&lt;br /&gt;
====Example Scenario====&lt;br /&gt;
&#039;&#039;&#039;Targeted System&#039;&#039;&#039;&lt;br /&gt;
* CIA database - find out who killed Kennedy?&lt;br /&gt;
&#039;&#039;&#039;Attackers&#039;&#039;&#039;&lt;br /&gt;
* remote authenticators&lt;br /&gt;
* contractors (non CIA)&lt;br /&gt;
&#039;&#039;&#039;Goals&#039;&#039;&#039;&lt;br /&gt;
* “exfiltrating data”&lt;br /&gt;
* exfiltrate the CIA database to find out who killed Kennedy&lt;br /&gt;
&#039;&#039;&#039;Means&#039;&#039;&#039;&lt;br /&gt;
* someone at the CIA left a node.js server running in the background :)&lt;br /&gt;
* ssh credentials&lt;br /&gt;
* use outdated emacs (implementing a root privileged mail daemon) to inject a password into etc/passwd to escalate attacker’s privileges&lt;br /&gt;
* look around the system for more vulnerable/outdated services to exploit&lt;br /&gt;
* generate a race condition to create a file that you know a root user would create, then let the root user put their “sensitive data” into attacker’s file (such as files in /temp)&lt;br /&gt;
* social engineering - submit a help ticket to someone within the CIA to gain higher privileges for a seemingly innocent reason&lt;br /&gt;
====Attack Strategies====&lt;br /&gt;
&#039;&#039;&#039;Where are the Accessible Weaknesses?&#039;&#039;&#039;&lt;br /&gt;
* outdated services&lt;br /&gt;
* any service that lets attacker execute a task as another user&lt;br /&gt;
&#039;&#039;&#039;How Do You Attack Them?&#039;&#039;&#039;&lt;br /&gt;
* user privilege escalation&lt;br /&gt;
* abusing service vulnerabilities&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, unauthenticated==&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, unauthenticated==&lt;br /&gt;
* Samuel Prashker&lt;br /&gt;
* Daniel Lehman&lt;br /&gt;
* Roman Chametka&lt;br /&gt;
* Derek Aubin&lt;br /&gt;
* Gilbert Lavergne-Shank&lt;br /&gt;
* Xiusan Zhou&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Scenarios&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;#1 - DDOS&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Web servers, or any machine connected to a network&lt;br /&gt;
*** Attackers: Angry trolls, political warriors&lt;br /&gt;
*** Goals: Denials of service, anger your target, hurt their financials, prove a point&lt;br /&gt;
*** Means: LOIC, Chinese Botnet with Bitcoin&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Exploitable communication paths (example: ping, login spam)&lt;br /&gt;
**** In the case of a router, overpowering a signal by replacing it with your own higher powered signal&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Over the network&lt;br /&gt;
**** Over the air (wireless signals)&lt;br /&gt;
* &#039;&#039;&#039;#2 - Packet Sniffing&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Phones, servers, any networked device that can be sniffed&lt;br /&gt;
*** Attackers: Exfiltrators who want getting data, corrupting data &lt;br /&gt;
*** Goals: Exfiltration of data, snooping for data over the air&lt;br /&gt;
*** Means: Packet sniffing tools, Wireshark, &lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Wireless signals would be easy to monitor&lt;br /&gt;
**** Mission security (Msec)&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Wireless: Network cards, monitoring tools for over the air analysis&lt;br /&gt;
**** Wired: Anywhere along the line to be able to hook in a middleman&lt;br /&gt;
* &#039;&#039;&#039;#3 - Remote program already running on their service/server&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: People (social engineering), known exploits (0days)&lt;br /&gt;
*** Attackers: Blackhat hackers, whitehat hackers&lt;br /&gt;
*** Goals: Exfiltrate, corrupt, deny access, destroy, ransomware, (whitehat only: protect!)&lt;br /&gt;
*** Means: Exploitable software, social engineering&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses?&lt;br /&gt;
**** Stupid people, exploitable equipment known to be accessible to 0days, leveraging bugs&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Social networks, email, phone calls, deployed payload&lt;br /&gt;
** &#039;&#039;&#039;Point is you&#039;re trying to get someone to install software for you, or exploit software to inject the payload on the targeted system&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Ibrahim</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20566</id>
		<title>SystemsSec 2016W Lecture 5</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20566"/>
		<updated>2016-01-21T16:39:45Z</updated>

		<summary type="html">&lt;p&gt;Ibrahim: /* Group 2 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Class discussion: threat models and attacker goals&lt;br /&gt;
&lt;br /&gt;
==Local attacker==&lt;br /&gt;
&lt;br /&gt;
==Administrative attacker==&lt;br /&gt;
&lt;br /&gt;
=== Group 2 ===&lt;br /&gt;
==== Members ====&lt;br /&gt;
* Kyle T.&lt;br /&gt;
* Tarek K.&lt;br /&gt;
* Jakub L.&lt;br /&gt;
* Stefan C.&lt;br /&gt;
* Matt G.&lt;br /&gt;
* Remi G.&lt;br /&gt;
* Ibrahim M.&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
=== Group 3 ===&lt;br /&gt;
====Members====&lt;br /&gt;
* Dania Ghazal&lt;br /&gt;
* Ankush Varshneya&lt;br /&gt;
* Olivier Hamel&lt;br /&gt;
* Michael Aaya&lt;br /&gt;
* Ryan Morfield&lt;br /&gt;
* Daniel Vanderveen&lt;br /&gt;
* Jess Johnson&lt;br /&gt;
&lt;br /&gt;
====Example Scenario====&lt;br /&gt;
&#039;&#039;&#039;Targeted System&#039;&#039;&#039;&lt;br /&gt;
* CIA database - find out who killed Kennedy?&lt;br /&gt;
&#039;&#039;&#039;Attackers&#039;&#039;&#039;&lt;br /&gt;
* remote authenticators&lt;br /&gt;
* contractors (non CIA)&lt;br /&gt;
&#039;&#039;&#039;Goals&#039;&#039;&#039;&lt;br /&gt;
* “exfiltrating data”&lt;br /&gt;
* exfiltrate the CIA database to find out who killed Kennedy&lt;br /&gt;
&#039;&#039;&#039;Means&#039;&#039;&#039;&lt;br /&gt;
* someone at the CIA left a node.js server running in the background :)&lt;br /&gt;
* ssh credentials&lt;br /&gt;
* use outdated emacs (implementing a root privileged mail daemon) to inject a password into etc/passwd to escalate attacker’s privileges&lt;br /&gt;
* look around the system for more vulnerable/outdated services to exploit&lt;br /&gt;
* generate a race condition to create a file that you know a root user would create, then let the root user put their “sensitive data” into attacker’s file (such as files in /temp)&lt;br /&gt;
* social engineering - submit a help ticket to someone within the CIA to gain higher privileges for a seemingly innocent reason&lt;br /&gt;
====Attack Strategies====&lt;br /&gt;
&#039;&#039;&#039;Where are the Accessible Weaknesses?&#039;&#039;&#039;&lt;br /&gt;
* outdated services&lt;br /&gt;
* any service that lets attacker execute a task as another user&lt;br /&gt;
&#039;&#039;&#039;How Do You Attack Them?&#039;&#039;&#039;&lt;br /&gt;
* user privilege escalation&lt;br /&gt;
* abusing service vulnerabilities&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, unauthenticated==&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, unauthenticated==&lt;br /&gt;
* Samuel Prashker&lt;br /&gt;
* Daniel Lehman&lt;br /&gt;
* Roman Chametka&lt;br /&gt;
* Derek Aubin&lt;br /&gt;
* Gilbert Lavergne-Shank&lt;br /&gt;
* Xiusan Zhou&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Scenarios&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;#1 - DDOS&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Web servers, or any machine connected to a network&lt;br /&gt;
*** Attackers: Angry trolls, political warriors&lt;br /&gt;
*** Goals: Denials of service, anger your target, hurt their financials, prove a point&lt;br /&gt;
*** Means: LOIC, Chinese Botnet with Bitcoin&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Exploitable communication paths (example: ping, login spam)&lt;br /&gt;
**** In the case of a router, overpowering a signal by replacing it with your own higher powered signal&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Over the network&lt;br /&gt;
**** Over the air (wireless signals)&lt;br /&gt;
* &#039;&#039;&#039;#2 - Packet Sniffing&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Phones, servers, any networked device that can be sniffed&lt;br /&gt;
*** Attackers: Exfiltrators who want getting data, corrupting data &lt;br /&gt;
*** Goals: Exfiltration of data, snooping for data over the air&lt;br /&gt;
*** Means: Packet sniffing tools, Wireshark, &lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Wireless signals would be easy to monitor&lt;br /&gt;
**** Mission security (Msec)&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Wireless: Network cards, monitoring tools for over the air analysis&lt;br /&gt;
**** Wired: Anywhere along the line to be able to hook in a middleman&lt;br /&gt;
* &#039;&#039;&#039;#3 - Remote program already running on their service/server&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: People (social engineering), known exploits (0days)&lt;br /&gt;
*** Attackers: Blackhat hackers, whitehat hackers&lt;br /&gt;
*** Goals: Exfiltrate, corrupt, deny access, destroy, ransomware, (whitehat only: protect!)&lt;br /&gt;
*** Means: Exploitable software, social engineering&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses?&lt;br /&gt;
**** Stupid people, exploitable equipment known to be accessible to 0days, leveraging bugs&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Social networks, email, phone calls, deployed payload&lt;br /&gt;
** &#039;&#039;&#039;Point is you&#039;re trying to get someone to install software for you, or exploit software to inject the payload on the targeted system&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Ibrahim</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20565</id>
		<title>SystemsSec 2016W Lecture 5</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20565"/>
		<updated>2016-01-21T16:39:19Z</updated>

		<summary type="html">&lt;p&gt;Ibrahim: /* Group 2 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Class discussion: threat models and attacker goals&lt;br /&gt;
&lt;br /&gt;
==Local attacker==&lt;br /&gt;
&lt;br /&gt;
==Administrative attacker==&lt;br /&gt;
&lt;br /&gt;
=== Group 2 ===&lt;br /&gt;
* Kyle T.&lt;br /&gt;
* Tarek K.&lt;br /&gt;
* Jakub L.&lt;br /&gt;
* Stefan C.&lt;br /&gt;
* Matt G.&lt;br /&gt;
* Remi G.&lt;br /&gt;
* Ibrahim M.&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
=== Group 3 ===&lt;br /&gt;
====Members====&lt;br /&gt;
* Dania Ghazal&lt;br /&gt;
* Ankush Varshneya&lt;br /&gt;
* Olivier Hamel&lt;br /&gt;
* Michael Aaya&lt;br /&gt;
* Ryan Morfield&lt;br /&gt;
* Daniel Vanderveen&lt;br /&gt;
* Jess Johnson&lt;br /&gt;
&lt;br /&gt;
====Example Scenario====&lt;br /&gt;
&#039;&#039;&#039;Targeted System&#039;&#039;&#039;&lt;br /&gt;
* CIA database - find out who killed Kennedy?&lt;br /&gt;
&#039;&#039;&#039;Attackers&#039;&#039;&#039;&lt;br /&gt;
* remote authenticators&lt;br /&gt;
* contractors (non CIA)&lt;br /&gt;
&#039;&#039;&#039;Goals&#039;&#039;&#039;&lt;br /&gt;
* “exfiltrating data”&lt;br /&gt;
* exfiltrate the CIA database to find out who killed Kennedy&lt;br /&gt;
&#039;&#039;&#039;Means&#039;&#039;&#039;&lt;br /&gt;
* someone at the CIA left a node.js server running in the background :)&lt;br /&gt;
* ssh credentials&lt;br /&gt;
* use outdated emacs (implementing a root privileged mail daemon) to inject a password into etc/passwd to escalate attacker’s privileges&lt;br /&gt;
* look around the system for more vulnerable/outdated services to exploit&lt;br /&gt;
* generate a race condition to create a file that you know a root user would create, then let the root user put their “sensitive data” into attacker’s file (such as files in /temp)&lt;br /&gt;
* social engineering - submit a help ticket to someone within the CIA to gain higher privileges for a seemingly innocent reason&lt;br /&gt;
====Attack Strategies====&lt;br /&gt;
&#039;&#039;&#039;Where are the Accessible Weaknesses?&#039;&#039;&#039;&lt;br /&gt;
* outdated services&lt;br /&gt;
* any service that lets attacker execute a task as another user&lt;br /&gt;
&#039;&#039;&#039;How Do You Attack Them?&#039;&#039;&#039;&lt;br /&gt;
* user privilege escalation&lt;br /&gt;
* abusing service vulnerabilities&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, unauthenticated==&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, unauthenticated==&lt;br /&gt;
* Samuel Prashker&lt;br /&gt;
* Daniel Lehman&lt;br /&gt;
* Roman Chametka&lt;br /&gt;
* Derek Aubin&lt;br /&gt;
* Gilbert Lavergne-Shank&lt;br /&gt;
* Xiusan Zhou&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Scenarios&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;#1 - DDOS&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Web servers, or any machine connected to a network&lt;br /&gt;
*** Attackers: Angry trolls, political warriors&lt;br /&gt;
*** Goals: Denials of service, anger your target, hurt their financials, prove a point&lt;br /&gt;
*** Means: LOIC, Chinese Botnet with Bitcoin&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Exploitable communication paths (example: ping, login spam)&lt;br /&gt;
**** In the case of a router, overpowering a signal by replacing it with your own higher powered signal&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Over the network&lt;br /&gt;
**** Over the air (wireless signals)&lt;br /&gt;
* &#039;&#039;&#039;#2 - Packet Sniffing&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Phones, servers, any networked device that can be sniffed&lt;br /&gt;
*** Attackers: Exfiltrators who want getting data, corrupting data &lt;br /&gt;
*** Goals: Exfiltration of data, snooping for data over the air&lt;br /&gt;
*** Means: Packet sniffing tools, Wireshark, &lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Wireless signals would be easy to monitor&lt;br /&gt;
**** Mission security (Msec)&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Wireless: Network cards, monitoring tools for over the air analysis&lt;br /&gt;
**** Wired: Anywhere along the line to be able to hook in a middleman&lt;br /&gt;
* &#039;&#039;&#039;#3 - Remote program already running on their service/server&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: People (social engineering), known exploits (0days)&lt;br /&gt;
*** Attackers: Blackhat hackers, whitehat hackers&lt;br /&gt;
*** Goals: Exfiltrate, corrupt, deny access, destroy, ransomware, (whitehat only: protect!)&lt;br /&gt;
*** Means: Exploitable software, social engineering&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses?&lt;br /&gt;
**** Stupid people, exploitable equipment known to be accessible to 0days, leveraging bugs&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Social networks, email, phone calls, deployed payload&lt;br /&gt;
** &#039;&#039;&#039;Point is you&#039;re trying to get someone to install software for you, or exploit software to inject the payload on the targeted system&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Ibrahim</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20564</id>
		<title>SystemsSec 2016W Lecture 5</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20564"/>
		<updated>2016-01-21T16:38:20Z</updated>

		<summary type="html">&lt;p&gt;Ibrahim: /* Administrative attacker */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Class discussion: threat models and attacker goals&lt;br /&gt;
&lt;br /&gt;
==Local attacker==&lt;br /&gt;
&lt;br /&gt;
==Administrative attacker==&lt;br /&gt;
&lt;br /&gt;
=== Group 2 ===&lt;br /&gt;
Kyle T.&lt;br /&gt;
Tarek K.&lt;br /&gt;
Jakub L.&lt;br /&gt;
Stefan C.&lt;br /&gt;
Matt G.&lt;br /&gt;
Remi G.&lt;br /&gt;
Ibrahim M.&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
=== Group 3 ===&lt;br /&gt;
====Members====&lt;br /&gt;
* Dania Ghazal&lt;br /&gt;
* Ankush Varshneya&lt;br /&gt;
* Olivier Hamel&lt;br /&gt;
* Michael Aaya&lt;br /&gt;
* Ryan Morfield&lt;br /&gt;
* Daniel Vanderveen&lt;br /&gt;
* Jess Johnson&lt;br /&gt;
&lt;br /&gt;
====Example Scenario====&lt;br /&gt;
&#039;&#039;&#039;Targeted System&#039;&#039;&#039;&lt;br /&gt;
* CIA database - find out who killed Kennedy?&lt;br /&gt;
&#039;&#039;&#039;Attackers&#039;&#039;&#039;&lt;br /&gt;
* remote authenticators&lt;br /&gt;
* contractors (non CIA)&lt;br /&gt;
&#039;&#039;&#039;Goals&#039;&#039;&#039;&lt;br /&gt;
* “exfiltrating data”&lt;br /&gt;
* exfiltrate the CIA database to find out who killed Kennedy&lt;br /&gt;
&#039;&#039;&#039;Means&#039;&#039;&#039;&lt;br /&gt;
* someone at the CIA left a node.js server running in the background :)&lt;br /&gt;
* ssh credentials&lt;br /&gt;
* use outdated emacs (implementing a root privileged mail daemon) to inject a password into etc/passwd to escalate attacker’s privileges&lt;br /&gt;
* look around the system for more vulnerable/outdated services to exploit&lt;br /&gt;
* generate a race condition to create a file that you know a root user would create, then let the root user put their “sensitive data” into attacker’s file (such as files in /temp)&lt;br /&gt;
* social engineering - submit a help ticket to someone within the CIA to gain higher privileges for a seemingly innocent reason&lt;br /&gt;
====Attack Strategies====&lt;br /&gt;
&#039;&#039;&#039;Where are the Accessible Weaknesses?&#039;&#039;&#039;&lt;br /&gt;
* outdated services&lt;br /&gt;
* any service that lets attacker execute a task as another user&lt;br /&gt;
&#039;&#039;&#039;How Do You Attack Them?&#039;&#039;&#039;&lt;br /&gt;
* user privilege escalation&lt;br /&gt;
* abusing service vulnerabilities&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, unauthenticated==&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, unauthenticated==&lt;br /&gt;
* Samuel Prashker&lt;br /&gt;
* Daniel Lehman&lt;br /&gt;
* Roman Chametka&lt;br /&gt;
* Derek Aubin&lt;br /&gt;
* Gilbert Lavergne-Shank&lt;br /&gt;
* Xiusan Zhou&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Scenarios&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;#1 - DDOS&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Web servers, or any machine connected to a network&lt;br /&gt;
*** Attackers: Angry trolls, political warriors&lt;br /&gt;
*** Goals: Denials of service, anger your target, hurt their financials, prove a point&lt;br /&gt;
*** Means: LOIC, Chinese Botnet with Bitcoin&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Exploitable communication paths (example: ping, login spam)&lt;br /&gt;
**** In the case of a router, overpowering a signal by replacing it with your own higher powered signal&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Over the network&lt;br /&gt;
**** Over the air (wireless signals)&lt;br /&gt;
* &#039;&#039;&#039;#2 - Packet Sniffing&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Phones, servers, any networked device that can be sniffed&lt;br /&gt;
*** Attackers: Exfiltrators who want getting data, corrupting data &lt;br /&gt;
*** Goals: Exfiltration of data, snooping for data over the air&lt;br /&gt;
*** Means: Packet sniffing tools, Wireshark, &lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Wireless signals would be easy to monitor&lt;br /&gt;
**** Mission security (Msec)&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Wireless: Network cards, monitoring tools for over the air analysis&lt;br /&gt;
**** Wired: Anywhere along the line to be able to hook in a middleman&lt;br /&gt;
* &#039;&#039;&#039;#3 - Remote program already running on their service/server&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: People (social engineering), known exploits (0days)&lt;br /&gt;
*** Attackers: Blackhat hackers, whitehat hackers&lt;br /&gt;
*** Goals: Exfiltrate, corrupt, deny access, destroy, ransomware, (whitehat only: protect!)&lt;br /&gt;
*** Means: Exploitable software, social engineering&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses?&lt;br /&gt;
**** Stupid people, exploitable equipment known to be accessible to 0days, leveraging bugs&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Social networks, email, phone calls, deployed payload&lt;br /&gt;
** &#039;&#039;&#039;Point is you&#039;re trying to get someone to install software for you, or exploit software to inject the payload on the targeted system&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Ibrahim</name></author>
	</entry>
</feed>