<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Sam</id>
	<title>Soma-notes - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Sam"/>
	<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php/Special:Contributions/Sam"/>
	<updated>2026-04-14T22:00:37Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=User:Sam&amp;diff=20704</id>
		<title>User:Sam</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=User:Sam&amp;diff=20704"/>
		<updated>2016-02-11T15:57:02Z</updated>

		<summary type="html">&lt;p&gt;Sam: Created page with &amp;quot;bruteforce&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;bruteforce&lt;/div&gt;</summary>
		<author><name>Sam</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20608</id>
		<title>SystemsSec 2016W Lecture 5</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20608"/>
		<updated>2016-01-26T15:24:36Z</updated>

		<summary type="html">&lt;p&gt;Sam: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Class discussion: threat models and attacker goals&lt;br /&gt;
&lt;br /&gt;
==Local attacker==&lt;br /&gt;
&lt;br /&gt;
=== Group 1 ===&lt;br /&gt;
==== Members ====&lt;br /&gt;
* Abdulrahman Mufti&lt;br /&gt;
* Josiah Konrad&lt;br /&gt;
* William forest&lt;br /&gt;
* Andrew Belu&lt;br /&gt;
* Agheil Fazeli&lt;br /&gt;
* Brandon Hurley&lt;br /&gt;
&lt;br /&gt;
==== Scenarios ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #1:&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: &lt;br /&gt;
*** home computer - parent computer&lt;br /&gt;
***  &amp;gt; Windows 7 &lt;br /&gt;
** Attackers: &lt;br /&gt;
*** sibling &lt;br /&gt;
*** someone who lives in the house&lt;br /&gt;
** Goals: &lt;br /&gt;
*** the little brother wants to access big brother&#039;s account&lt;br /&gt;
*** to access programs that the little brother doesn&#039;t have&lt;br /&gt;
*** play games for a loner time&lt;br /&gt;
** Means: &lt;br /&gt;
*** watching them typing the password&lt;br /&gt;
*** using safe mode to change the parents&#039; password&lt;br /&gt;
*** change clock (to be able to play for a longer time)&lt;br /&gt;
*** take down security through the registry&lt;br /&gt;
&lt;br /&gt;
==Administrative attacker==&lt;br /&gt;
&lt;br /&gt;
=== Group 2 ===&lt;br /&gt;
==== Members ====&lt;br /&gt;
* Kyle T.&lt;br /&gt;
* Tarek K.&lt;br /&gt;
* Jakub L.&lt;br /&gt;
* Stefan C.&lt;br /&gt;
* Matt G.&lt;br /&gt;
* Remi G.&lt;br /&gt;
* Ibrahim M.&lt;br /&gt;
&lt;br /&gt;
==== Scenarios ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #1: Disgruntled Ex-Employee(s?) - Sony Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Disgruntled ex-employees with active administrative access and knowledge of internal system architecture.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Full client information specifically financial billing information. &lt;br /&gt;
*** Showcase that Sony does not take security seriously.&lt;br /&gt;
*** Denial of service for PSN users.&lt;br /&gt;
** Means: It is rumored that ex-employees with active logins managed to access the data.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #2: Current &amp;amp; Ex-Employee(s?) - Ashley Madison Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Employees with active administrative access.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Force Ashley Madison to shut down. &lt;br /&gt;
*** Expose the true ratios of male/female user base and fake accounts.&lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #3: Military and Government Secrets&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Whistleblowers (Chelsea Manning, Edward Snowden)&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Publicize and expose questionable practices and information to the general public.&lt;br /&gt;
*** Sway public opinion  &lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #4: This Wiki&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: MediaWiki CMS&lt;br /&gt;
** Attackers: Students with editor privilege on the wiki.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Modify or delete other groups&#039; entries.&lt;br /&gt;
** Means: Full access to edit the page using credentials given by the professor.&lt;br /&gt;
&lt;br /&gt;
==== Attack Strategies ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Weaknesses&#039;&#039;&#039;&lt;br /&gt;
** Employee turnover&lt;br /&gt;
** Disgruntled current and ex-employees&lt;br /&gt;
** Economically vulnerable administrators (easy to bribe)&lt;br /&gt;
** Blackmail&lt;br /&gt;
** System Administrator neglect and/or incompetence&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;How to Attack?&#039;&#039;&#039;&lt;br /&gt;
** Social Engineering&lt;br /&gt;
** If there are no safeguards in place, simply having admin access is enough to wreak havoc&lt;br /&gt;
** Installing backdoors to keep access to system&lt;br /&gt;
** Installing malicious updates and programs on users computers to siphon data and/or monitor.&lt;br /&gt;
** Remote monitoring of all users (including those with higher priviledge), using all available peripherals (webcams, microphones, keyboards, etc...)&lt;br /&gt;
** Denial of Access&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
=== Group 3 ===&lt;br /&gt;
====Members====&lt;br /&gt;
* Dania Ghazal&lt;br /&gt;
* Ankush Varshneya&lt;br /&gt;
* Olivier Hamel&lt;br /&gt;
* Michael Lutaaya&lt;br /&gt;
* Ryan Morfield&lt;br /&gt;
* Daniel Vanderveen&lt;br /&gt;
* Jess Johnson&lt;br /&gt;
&lt;br /&gt;
====Example Scenario====&lt;br /&gt;
&#039;&#039;&#039;Targeted System&#039;&#039;&#039;&lt;br /&gt;
* CIA database - find out who killed Kennedy?&lt;br /&gt;
&#039;&#039;&#039;Attackers&#039;&#039;&#039;&lt;br /&gt;
* remote authenticators&lt;br /&gt;
* contractors (non CIA)&lt;br /&gt;
&#039;&#039;&#039;Goals&#039;&#039;&#039;&lt;br /&gt;
* “exfiltrating data”&lt;br /&gt;
* exfiltrate the CIA database to find out who killed Kennedy&lt;br /&gt;
&#039;&#039;&#039;Means&#039;&#039;&#039;&lt;br /&gt;
* someone at the CIA left a node.js server running in the background :)&lt;br /&gt;
* ssh credentials&lt;br /&gt;
* use outdated emacs (implementing a root privileged mail daemon) to inject a password into etc/passwd to escalate attacker’s privileges&lt;br /&gt;
* look around the system for more vulnerable/outdated services to exploit&lt;br /&gt;
* generate a race condition to create a file that you know a root user would create, then let the root user put their “sensitive data” into attacker’s file (such as files in /temp)&lt;br /&gt;
* social engineering - submit a help ticket to someone within the CIA to gain higher privileges for a seemingly innocent reason&lt;br /&gt;
====Attack Strategies====&lt;br /&gt;
&#039;&#039;&#039;Where are the Accessible Weaknesses?&#039;&#039;&#039;&lt;br /&gt;
* outdated services&lt;br /&gt;
* any service that lets attacker execute a task as another user&lt;br /&gt;
&#039;&#039;&#039;How Do You Attack Them?&#039;&#039;&#039;&lt;br /&gt;
* user privilege escalation&lt;br /&gt;
* abusing service vulnerabilities&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, authenticated==&lt;br /&gt;
Members:&lt;br /&gt;
&lt;br /&gt;
- Matthew Preston&lt;br /&gt;
- Jon Simpson&lt;br /&gt;
- Allan Luke&lt;br /&gt;
- Chang Xu&lt;br /&gt;
- Nilofar Mansourzadeh&lt;br /&gt;
- Noor sabri&lt;br /&gt;
&lt;br /&gt;
- Targeted system&lt;br /&gt;
    - Place of work’s system&lt;br /&gt;
    - server(remote/local)&lt;br /&gt;
- Attacker&lt;br /&gt;
    - anyone who has the “attacker goals&amp;quot;&lt;br /&gt;
        - employee&lt;br /&gt;
        - pretend to be employee&lt;br /&gt;
- Goals&lt;br /&gt;
    - remotely look at data&lt;br /&gt;
    - deny access&lt;br /&gt;
    - destroy data&lt;br /&gt;
    - corrupt&lt;br /&gt;
    - social engineering&lt;br /&gt;
- Means&lt;br /&gt;
    - If data is on a server, attacker needs some level of access to the data (some way to connect to the data)&lt;br /&gt;
    - Put a physical key logger&lt;br /&gt;
    - physically freeze system&lt;br /&gt;
        - could look over your shoulder&lt;br /&gt;
    - pull the plug&lt;br /&gt;
    - physically disable verification points&lt;br /&gt;
    - slow down system&lt;br /&gt;
    - get admin access&lt;br /&gt;
    - steal employee&#039;s hardware&lt;br /&gt;
    - can get data by looking at camera feed&lt;br /&gt;
    - steal mobile phone&lt;br /&gt;
&lt;br /&gt;
- Attack strategies&lt;br /&gt;
    - could put a physical key logger&lt;br /&gt;
    - could take out the RAM(live)&lt;br /&gt;
    - infect hardware and reconnect it to the system&lt;br /&gt;
    - sell the stolen hardware&lt;br /&gt;
    - stolen employee’s computer has auto-login&lt;br /&gt;
    - most hardware is portable now so it’s easier to steal&lt;br /&gt;
    - disable cameras&lt;br /&gt;
    - record their behaviours&lt;br /&gt;
- accessible weaknesses&lt;br /&gt;
    - isolated computers&lt;br /&gt;
    - points of least physical security&lt;br /&gt;
    - on/off devices&lt;br /&gt;
        - somewhat easier to attack powered-on devices&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, unauthenticated==&lt;br /&gt;
* Abdul Bin Asif Niazi&lt;br /&gt;
* Dusan Rozman&lt;br /&gt;
* Sam Whiteley&lt;br /&gt;
* Jake Brown&lt;br /&gt;
* Nicholas Laws&lt;br /&gt;
* Miran Mirza&lt;br /&gt;
&lt;br /&gt;
Typically targeted systems include: portable systems such as laptops, smartphones, tablets, USB keys, card systems, banking machines.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attack strategies:&#039;&#039;&#039; &lt;br /&gt;
* Duplicated cards&lt;br /&gt;
* Card Readers&lt;br /&gt;
* RFID readers: can be used to duplicate RFID data and steal NFC enabled bank access systems&lt;br /&gt;
* Radio-Frequency generator used to unlock different cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Sort of attacks that can happen:&#039;&#039;&#039;&lt;br /&gt;
* Man in the middle attack on physical phone lines, people can access phone conversations by inserting some sort of hardware in a SIM card or a landline.&lt;br /&gt;
* Using the USB auto install feature to spread attacks, exploit this vulnerability to install software. An attacker can plug a USB thumb drive into computer and install software in order to escalate privileges.&lt;br /&gt;
* Phishing attack, a user can install some sort of software to reroute traffic through their system in order to collect data. A user can physically rewrite the hosts file on  system to tamper with the DNS on the system and steal data.&lt;br /&gt;
* For secured areas such as labs a vulnerability would be the door which requires some sort of card based authentication, since this can be stolen it is vulnerable.&lt;br /&gt;
* Bank Machines: a lot of bank machines have a USB port in the bank and thus can get software installed on them. People can also install a card reader on top of the card slot to collect card numbers and other sensitive data.&lt;br /&gt;
	&lt;br /&gt;
&#039;&#039;&#039;Scenarios:&#039;&#039;&#039;&lt;br /&gt;
* A user gets physical access to a device using sort of card access and then physically destroys a computer (a literal denial of service attack).&lt;br /&gt;
* An attacker swaps a keyboard for a keylogging keyboard and uses it to steal sensitive data. They are exploiting the fact that users won&#039;t notice the change&lt;br /&gt;
* A user can exploit the reset feature on a router in order to gain access to it&#039;s settings, they can then go on to flash the firmware and infect all connected devices on the network.&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, unauthenticated==&lt;br /&gt;
=== Group 6 ===&lt;br /&gt;
==== Members ====&lt;br /&gt;
* Samuel Prashker&lt;br /&gt;
* Daniel Lehman&lt;br /&gt;
* Roman Chametka&lt;br /&gt;
* Derek Aubin&lt;br /&gt;
* Gilbert Lavergne-Shank&lt;br /&gt;
* Xiusan Zhou&lt;br /&gt;
* Abdulkadir Addulkadir&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Scenarios&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;#1 - DDOS&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Web servers, or any machine connected to a network&lt;br /&gt;
*** Attackers: Angry trolls, political warriors&lt;br /&gt;
*** Goals: Denials of service, anger your target, hurt their financials, prove a point&lt;br /&gt;
*** Means: LOIC, Chinese Botnet with Bitcoin&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Exploitable communication paths (example: ping, login spam)&lt;br /&gt;
**** In the case of a router, overpowering a signal by replacing it with your own higher powered signal&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Over the network&lt;br /&gt;
**** Over the air (wireless signals)&lt;br /&gt;
* &#039;&#039;&#039;#2 - Packet Sniffing&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Phones, servers, any networked device that can be sniffed&lt;br /&gt;
*** Attackers: Exfiltrators who want getting data, corrupting data &lt;br /&gt;
*** Goals: Exfiltration of data, snooping for data over the air&lt;br /&gt;
*** Means: Packet sniffing tools, Wireshark, &lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Wireless signals would be easy to monitor&lt;br /&gt;
**** Mission security (Msec)&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Wireless: Network cards, monitoring tools for over the air analysis&lt;br /&gt;
**** Wired: Anywhere along the line to be able to hook in a middleman&lt;br /&gt;
* &#039;&#039;&#039;#3 - Remote program already running on their service/server&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: People (social engineering), known exploits (0days)&lt;br /&gt;
*** Attackers: Blackhat hackers, whitehat hackers&lt;br /&gt;
*** Goals: Exfiltrate, corrupt, deny access, destroy, ransomware, (whitehat only: protect!)&lt;br /&gt;
*** Means: Exploitable software, social engineering&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses?&lt;br /&gt;
**** Stupid people, exploitable equipment known to be accessible to 0days, leveraging bugs&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Social networks, email, phone calls, deployed payload&lt;br /&gt;
** &#039;&#039;&#039;Point is you&#039;re trying to get someone to install software for you, or exploit software to inject the payload on the targeted system&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Sam</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20606</id>
		<title>SystemsSec 2016W Lecture 5</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20606"/>
		<updated>2016-01-26T15:15:45Z</updated>

		<summary type="html">&lt;p&gt;Sam: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Class discussion: threat models and attacker goals&lt;br /&gt;
&lt;br /&gt;
==Local attacker==&lt;br /&gt;
&lt;br /&gt;
=== Group 1 ===&lt;br /&gt;
==== Members ====&lt;br /&gt;
* Abdulrahman Mufti&lt;br /&gt;
* Josiah Konrad&lt;br /&gt;
* William forest&lt;br /&gt;
* Andrew Belu&lt;br /&gt;
* Agheil Fazeli&lt;br /&gt;
* Brandon Hurley&lt;br /&gt;
&lt;br /&gt;
==== Scenarios ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #1:&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: &lt;br /&gt;
*** home computer - parent computer&lt;br /&gt;
***  &amp;gt; Windows 7 &lt;br /&gt;
** Attackers: &lt;br /&gt;
*** sibling &lt;br /&gt;
*** someone who lives in the house&lt;br /&gt;
** Goals: &lt;br /&gt;
*** the little brother wants to access big brother&#039;s account&lt;br /&gt;
*** to access programs that the little brother doesn&#039;t have&lt;br /&gt;
*** play games for a loner time&lt;br /&gt;
** Means: &lt;br /&gt;
*** watching them typing the password&lt;br /&gt;
*** using safe mode to change the parents&#039; password&lt;br /&gt;
*** change clock (to be able to play for a longer time)&lt;br /&gt;
*** take down security through the registry&lt;br /&gt;
&lt;br /&gt;
==Administrative attacker==&lt;br /&gt;
&lt;br /&gt;
=== Group 2 ===&lt;br /&gt;
==== Members ====&lt;br /&gt;
* Kyle T.&lt;br /&gt;
* Tarek K.&lt;br /&gt;
* Jakub L.&lt;br /&gt;
* Stefan C.&lt;br /&gt;
* Matt G.&lt;br /&gt;
* Remi G.&lt;br /&gt;
* Ibrahim M.&lt;br /&gt;
&lt;br /&gt;
==== Scenarios ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #1: Disgruntled Ex-Employee(s?) - Sony Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Disgruntled ex-employees with active administrative access and knowledge of internal system architecture.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Full client information specifically financial billing information. &lt;br /&gt;
*** Showcase that Sony does not take security seriously.&lt;br /&gt;
*** Denial of service for PSN users.&lt;br /&gt;
** Means: It is rumored that ex-employees with active logins managed to access the data.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #2: Current &amp;amp; Ex-Employee(s?) - Ashley Madison Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Employees with active administrative access.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Force Ashley Madison to shut down. &lt;br /&gt;
*** Expose the true ratios of male/female user base and fake accounts.&lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #3: Military and Government Secrets&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Whistleblowers (Chelsea Manning, Edward Snowden)&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Publicize and expose questionable practices and information to the general public.&lt;br /&gt;
*** Sway public opinion  &lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #4: This Wiki&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: MediaWiki CMS&lt;br /&gt;
** Attackers: Students with editor privilege on the wiki.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Modify or delete other groups&#039; entries.&lt;br /&gt;
** Means: Full access to edit the page using credentials given by the professor.&lt;br /&gt;
&lt;br /&gt;
==== Attack Strategies ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Weaknesses&#039;&#039;&#039;&lt;br /&gt;
** Employee turnover&lt;br /&gt;
** Disgruntled current and ex-employees&lt;br /&gt;
** Economically vulnerable administrators (easy to bribe)&lt;br /&gt;
** Blackmail&lt;br /&gt;
** System Administrator neglect and/or incompetence&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;How to Attack?&#039;&#039;&#039;&lt;br /&gt;
** Social Engineering&lt;br /&gt;
** If there are no safeguards in place, simply having admin access is enough to wreak havoc&lt;br /&gt;
** Installing backdoors to keep access to system&lt;br /&gt;
** Installing malicious updates and programs on users computers to siphon data and/or monitor.&lt;br /&gt;
** Remote monitoring of all users (including those with higher priviledge), using all available peripherals (webcams, microphones, keyboards, etc...)&lt;br /&gt;
** Denial of Access&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
=== Group 3 ===&lt;br /&gt;
====Members====&lt;br /&gt;
* Dania Ghazal&lt;br /&gt;
* Ankush Varshneya&lt;br /&gt;
* Olivier Hamel&lt;br /&gt;
* Michael Lutaaya&lt;br /&gt;
* Ryan Morfield&lt;br /&gt;
* Daniel Vanderveen&lt;br /&gt;
* Jess Johnson&lt;br /&gt;
&lt;br /&gt;
====Example Scenario====&lt;br /&gt;
&#039;&#039;&#039;Targeted System&#039;&#039;&#039;&lt;br /&gt;
* CIA database - find out who killed Kennedy?&lt;br /&gt;
&#039;&#039;&#039;Attackers&#039;&#039;&#039;&lt;br /&gt;
* remote authenticators&lt;br /&gt;
* contractors (non CIA)&lt;br /&gt;
&#039;&#039;&#039;Goals&#039;&#039;&#039;&lt;br /&gt;
* “exfiltrating data”&lt;br /&gt;
* exfiltrate the CIA database to find out who killed Kennedy&lt;br /&gt;
&#039;&#039;&#039;Means&#039;&#039;&#039;&lt;br /&gt;
* someone at the CIA left a node.js server running in the background :)&lt;br /&gt;
* ssh credentials&lt;br /&gt;
* use outdated emacs (implementing a root privileged mail daemon) to inject a password into etc/passwd to escalate attacker’s privileges&lt;br /&gt;
* look around the system for more vulnerable/outdated services to exploit&lt;br /&gt;
* generate a race condition to create a file that you know a root user would create, then let the root user put their “sensitive data” into attacker’s file (such as files in /temp)&lt;br /&gt;
* social engineering - submit a help ticket to someone within the CIA to gain higher privileges for a seemingly innocent reason&lt;br /&gt;
====Attack Strategies====&lt;br /&gt;
&#039;&#039;&#039;Where are the Accessible Weaknesses?&#039;&#039;&#039;&lt;br /&gt;
* outdated services&lt;br /&gt;
* any service that lets attacker execute a task as another user&lt;br /&gt;
&#039;&#039;&#039;How Do You Attack Them?&#039;&#039;&#039;&lt;br /&gt;
* user privilege escalation&lt;br /&gt;
* abusing service vulnerabilities&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, unauthenticated==&lt;br /&gt;
* Abdul Bin Asif Niazi&lt;br /&gt;
* Dusan Rozman&lt;br /&gt;
* Sam Whiteley&lt;br /&gt;
* Jake Brown&lt;br /&gt;
* Nicholas Laws&lt;br /&gt;
* Miran Mirza&lt;br /&gt;
&lt;br /&gt;
Typically targeted systems include: portable systems such as laptops, smartphones, tablets, USB keys, card systems, banking machines.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attack strategies:&#039;&#039;&#039; &lt;br /&gt;
* Duplicated cards&lt;br /&gt;
* Card Readers&lt;br /&gt;
* RFID readers: can be used to duplicate RFID data and steal NFC enabled bank access systems&lt;br /&gt;
* Radio-Frequency generator used to unlock different cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Sort of attacks that can happen:&#039;&#039;&#039;&lt;br /&gt;
* Man in the middle attack on physical phone lines, people can access phone conversations by inserting some sort of hardware in a SIM card or a landline.&lt;br /&gt;
* Using the USB auto install feature to spread attacks, exploit this vulnerability to install software. An attacker can plug a USB thumb drive into computer and install software in order to escalate privileges.&lt;br /&gt;
* Phishing attack, a user can install some sort of software to reroute traffic through their system in order to collect data. A user can physically rewrite the hosts file on  system to tamper with the DNS on the system and steal data.&lt;br /&gt;
* For secured areas such as labs a vulnerability would be the door which requires some sort of card based authentication, since this can be stolen it is vulnerable.&lt;br /&gt;
* Bank Machines: a lot of bank machines have a USB port in the bank and thus can get software installed on them. People can also install a card reader on top of the card slot to collect card numbers and other sensitive data.&lt;br /&gt;
	&lt;br /&gt;
&#039;&#039;&#039;Scenarios:&#039;&#039;&#039;&lt;br /&gt;
* A user gets physical access to a device using sort of card access and then physically destroys a computer (a literal denial of service attack).&lt;br /&gt;
* An attacker swaps a keyboard for a keylogging keyboard and uses it to steal sensitive data. They are exploiting the fact that users won&#039;t notice the change&lt;br /&gt;
* A user can exploit the reset feature on a router in order to gain access to it&#039;s settings, they can then go on to flash the firmware and infect all connected devices on the network.&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, unauthenticated==&lt;br /&gt;
* Samuel Prashker&lt;br /&gt;
* Daniel Lehman&lt;br /&gt;
* Roman Chametka&lt;br /&gt;
* Derek Aubin&lt;br /&gt;
* Gilbert Lavergne-Shank&lt;br /&gt;
* Xiusan Zhou&lt;br /&gt;
* Abdulkadir Addulkadir&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Scenarios&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;#1 - DDOS&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Web servers, or any machine connected to a network&lt;br /&gt;
*** Attackers: Angry trolls, political warriors&lt;br /&gt;
*** Goals: Denials of service, anger your target, hurt their financials, prove a point&lt;br /&gt;
*** Means: LOIC, Chinese Botnet with Bitcoin&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Exploitable communication paths (example: ping, login spam)&lt;br /&gt;
**** In the case of a router, overpowering a signal by replacing it with your own higher powered signal&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Over the network&lt;br /&gt;
**** Over the air (wireless signals)&lt;br /&gt;
* &#039;&#039;&#039;#2 - Packet Sniffing&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Phones, servers, any networked device that can be sniffed&lt;br /&gt;
*** Attackers: Exfiltrators who want getting data, corrupting data &lt;br /&gt;
*** Goals: Exfiltration of data, snooping for data over the air&lt;br /&gt;
*** Means: Packet sniffing tools, Wireshark, &lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Wireless signals would be easy to monitor&lt;br /&gt;
**** Mission security (Msec)&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Wireless: Network cards, monitoring tools for over the air analysis&lt;br /&gt;
**** Wired: Anywhere along the line to be able to hook in a middleman&lt;br /&gt;
* &#039;&#039;&#039;#3 - Remote program already running on their service/server&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: People (social engineering), known exploits (0days)&lt;br /&gt;
*** Attackers: Blackhat hackers, whitehat hackers&lt;br /&gt;
*** Goals: Exfiltrate, corrupt, deny access, destroy, ransomware, (whitehat only: protect!)&lt;br /&gt;
*** Means: Exploitable software, social engineering&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses?&lt;br /&gt;
**** Stupid people, exploitable equipment known to be accessible to 0days, leveraging bugs&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Social networks, email, phone calls, deployed payload&lt;br /&gt;
** &#039;&#039;&#039;Point is you&#039;re trying to get someone to install software for you, or exploit software to inject the payload on the targeted system&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Sam</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20605</id>
		<title>SystemsSec 2016W Lecture 5</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20605"/>
		<updated>2016-01-26T15:15:05Z</updated>

		<summary type="html">&lt;p&gt;Sam: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Class discussion: threat models and attacker goals&lt;br /&gt;
&lt;br /&gt;
==Local attacker==&lt;br /&gt;
&lt;br /&gt;
=== Group 1 ===&lt;br /&gt;
==== Members ====&lt;br /&gt;
* Abdulrahman Mufti&lt;br /&gt;
* Josiah Konrad&lt;br /&gt;
* William forest&lt;br /&gt;
* Andrew Belu&lt;br /&gt;
* Agheil Fazeli&lt;br /&gt;
* Brandon Hurley&lt;br /&gt;
* Abdulkadir Addulkadir&lt;br /&gt;
&lt;br /&gt;
==== Scenarios ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #1:&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: &lt;br /&gt;
*** home computer - parent computer&lt;br /&gt;
***  &amp;gt; Windows 7 &lt;br /&gt;
** Attackers: &lt;br /&gt;
*** sibling &lt;br /&gt;
*** someone who lives in the house&lt;br /&gt;
** Goals: &lt;br /&gt;
*** the little brother wants to access big brother&#039;s account&lt;br /&gt;
*** to access programs that the little brother doesn&#039;t have&lt;br /&gt;
*** play games for a loner time&lt;br /&gt;
** Means: &lt;br /&gt;
*** watching them typing the password&lt;br /&gt;
*** using safe mode to change the parents&#039; password&lt;br /&gt;
*** change clock (to be able to play for a longer time)&lt;br /&gt;
*** take down security through the registry&lt;br /&gt;
&lt;br /&gt;
==Administrative attacker==&lt;br /&gt;
&lt;br /&gt;
=== Group 2 ===&lt;br /&gt;
==== Members ====&lt;br /&gt;
* Kyle T.&lt;br /&gt;
* Tarek K.&lt;br /&gt;
* Jakub L.&lt;br /&gt;
* Stefan C.&lt;br /&gt;
* Matt G.&lt;br /&gt;
* Remi G.&lt;br /&gt;
* Ibrahim M.&lt;br /&gt;
&lt;br /&gt;
==== Scenarios ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #1: Disgruntled Ex-Employee(s?) - Sony Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Disgruntled ex-employees with active administrative access and knowledge of internal system architecture.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Full client information specifically financial billing information. &lt;br /&gt;
*** Showcase that Sony does not take security seriously.&lt;br /&gt;
*** Denial of service for PSN users.&lt;br /&gt;
** Means: It is rumored that ex-employees with active logins managed to access the data.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #2: Current &amp;amp; Ex-Employee(s?) - Ashley Madison Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Employees with active administrative access.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Force Ashley Madison to shut down. &lt;br /&gt;
*** Expose the true ratios of male/female user base and fake accounts.&lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #3: Military and Government Secrets&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Whistleblowers (Chelsea Manning, Edward Snowden)&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Publicize and expose questionable practices and information to the general public.&lt;br /&gt;
*** Sway public opinion  &lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #4: This Wiki&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: MediaWiki CMS&lt;br /&gt;
** Attackers: Students with editor privilege on the wiki.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Modify or delete other groups&#039; entries.&lt;br /&gt;
** Means: Full access to edit the page using credentials given by the professor.&lt;br /&gt;
&lt;br /&gt;
==== Attack Strategies ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Weaknesses&#039;&#039;&#039;&lt;br /&gt;
** Employee turnover&lt;br /&gt;
** Disgruntled current and ex-employees&lt;br /&gt;
** Economically vulnerable administrators (easy to bribe)&lt;br /&gt;
** Blackmail&lt;br /&gt;
** System Administrator neglect and/or incompetence&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;How to Attack?&#039;&#039;&#039;&lt;br /&gt;
** Social Engineering&lt;br /&gt;
** If there are no safeguards in place, simply having admin access is enough to wreak havoc&lt;br /&gt;
** Installing backdoors to keep access to system&lt;br /&gt;
** Installing malicious updates and programs on users computers to siphon data and/or monitor.&lt;br /&gt;
** Remote monitoring of all users (including those with higher priviledge), using all available peripherals (webcams, microphones, keyboards, etc...)&lt;br /&gt;
** Denial of Access&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
=== Group 3 ===&lt;br /&gt;
====Members====&lt;br /&gt;
* Dania Ghazal&lt;br /&gt;
* Ankush Varshneya&lt;br /&gt;
* Olivier Hamel&lt;br /&gt;
* Michael Lutaaya&lt;br /&gt;
* Ryan Morfield&lt;br /&gt;
* Daniel Vanderveen&lt;br /&gt;
* Jess Johnson&lt;br /&gt;
&lt;br /&gt;
====Example Scenario====&lt;br /&gt;
&#039;&#039;&#039;Targeted System&#039;&#039;&#039;&lt;br /&gt;
* CIA database - find out who killed Kennedy?&lt;br /&gt;
&#039;&#039;&#039;Attackers&#039;&#039;&#039;&lt;br /&gt;
* remote authenticators&lt;br /&gt;
* contractors (non CIA)&lt;br /&gt;
&#039;&#039;&#039;Goals&#039;&#039;&#039;&lt;br /&gt;
* “exfiltrating data”&lt;br /&gt;
* exfiltrate the CIA database to find out who killed Kennedy&lt;br /&gt;
&#039;&#039;&#039;Means&#039;&#039;&#039;&lt;br /&gt;
* someone at the CIA left a node.js server running in the background :)&lt;br /&gt;
* ssh credentials&lt;br /&gt;
* use outdated emacs (implementing a root privileged mail daemon) to inject a password into etc/passwd to escalate attacker’s privileges&lt;br /&gt;
* look around the system for more vulnerable/outdated services to exploit&lt;br /&gt;
* generate a race condition to create a file that you know a root user would create, then let the root user put their “sensitive data” into attacker’s file (such as files in /temp)&lt;br /&gt;
* social engineering - submit a help ticket to someone within the CIA to gain higher privileges for a seemingly innocent reason&lt;br /&gt;
====Attack Strategies====&lt;br /&gt;
&#039;&#039;&#039;Where are the Accessible Weaknesses?&#039;&#039;&#039;&lt;br /&gt;
* outdated services&lt;br /&gt;
* any service that lets attacker execute a task as another user&lt;br /&gt;
&#039;&#039;&#039;How Do You Attack Them?&#039;&#039;&#039;&lt;br /&gt;
* user privilege escalation&lt;br /&gt;
* abusing service vulnerabilities&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, unauthenticated==&lt;br /&gt;
* Abdul Bin Asif Niazi&lt;br /&gt;
* Dusan Rozman&lt;br /&gt;
* Sam Whiteley&lt;br /&gt;
* Jake Brown&lt;br /&gt;
* Nicholas Laws&lt;br /&gt;
* Miran Mirza&lt;br /&gt;
&lt;br /&gt;
Typically targeted systems include: portable systems such as laptops, smartphones, tablets, USB keys, card systems, banking machines.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attack strategies:&#039;&#039;&#039; &lt;br /&gt;
* Duplicated cards&lt;br /&gt;
* Card Readers&lt;br /&gt;
* RFID readers: can be used to duplicate RFID data and steal NFC enabled bank access systems&lt;br /&gt;
* Radio-Frequency generator used to unlock different cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Sort of attacks that can happen:&#039;&#039;&#039;&lt;br /&gt;
* Man in the middle attack on physical phone lines, people can access phone conversations by inserting some sort of hardware in a SIM card or a landline.&lt;br /&gt;
* Using the USB auto install feature to spread attacks, exploit this vulnerability to install software. An attacker can plug a USB thumb drive into computer and install software in order to escalate privileges.&lt;br /&gt;
* Phishing attack, a user can install some sort of software to reroute traffic through their system in order to collect data. A user can physically rewrite the hosts file on  system to tamper with the DNS on the system and steal data.&lt;br /&gt;
* For secured areas such as labs a vulnerability would be the door which requires some sort of card based authentication, since this can be stolen it is vulnerable.&lt;br /&gt;
* Bank Machines: a lot of bank machines have a USB port in the bank and thus can get software installed on them. People can also install a card reader on top of the card slot to collect card numbers and other sensitive data.&lt;br /&gt;
	&lt;br /&gt;
&#039;&#039;&#039;Scenarios:&#039;&#039;&#039;&lt;br /&gt;
* A user gets physical access to a device using sort of card access and then physically destroys a computer (a literal denial of service attack).&lt;br /&gt;
* An attacker swaps a keyboard for a keylogging keyboard and uses it to steal sensitive data. They are exploiting the fact that users won&#039;t notice the change&lt;br /&gt;
* A user can exploit the reset feature on a router in order to gain access to it&#039;s settings, they can then go on to flash the firmware and infect all connected devices on the network.&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, unauthenticated==&lt;br /&gt;
* Samuel Prashker&lt;br /&gt;
* Daniel Lehman&lt;br /&gt;
* Roman Chametka&lt;br /&gt;
* Derek Aubin&lt;br /&gt;
* Gilbert Lavergne-Shank&lt;br /&gt;
* Xiusan Zhou&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Scenarios&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;#1 - DDOS&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Web servers, or any machine connected to a network&lt;br /&gt;
*** Attackers: Angry trolls, political warriors&lt;br /&gt;
*** Goals: Denials of service, anger your target, hurt their financials, prove a point&lt;br /&gt;
*** Means: LOIC, Chinese Botnet with Bitcoin&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Exploitable communication paths (example: ping, login spam)&lt;br /&gt;
**** In the case of a router, overpowering a signal by replacing it with your own higher powered signal&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Over the network&lt;br /&gt;
**** Over the air (wireless signals)&lt;br /&gt;
* &#039;&#039;&#039;#2 - Packet Sniffing&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Phones, servers, any networked device that can be sniffed&lt;br /&gt;
*** Attackers: Exfiltrators who want getting data, corrupting data &lt;br /&gt;
*** Goals: Exfiltration of data, snooping for data over the air&lt;br /&gt;
*** Means: Packet sniffing tools, Wireshark, &lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Wireless signals would be easy to monitor&lt;br /&gt;
**** Mission security (Msec)&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Wireless: Network cards, monitoring tools for over the air analysis&lt;br /&gt;
**** Wired: Anywhere along the line to be able to hook in a middleman&lt;br /&gt;
* &#039;&#039;&#039;#3 - Remote program already running on their service/server&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: People (social engineering), known exploits (0days)&lt;br /&gt;
*** Attackers: Blackhat hackers, whitehat hackers&lt;br /&gt;
*** Goals: Exfiltrate, corrupt, deny access, destroy, ransomware, (whitehat only: protect!)&lt;br /&gt;
*** Means: Exploitable software, social engineering&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses?&lt;br /&gt;
**** Stupid people, exploitable equipment known to be accessible to 0days, leveraging bugs&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Social networks, email, phone calls, deployed payload&lt;br /&gt;
** &#039;&#039;&#039;Point is you&#039;re trying to get someone to install software for you, or exploit software to inject the payload on the targeted system&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Sam</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20563</id>
		<title>SystemsSec 2016W Lecture 5</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20563"/>
		<updated>2016-01-21T16:36:09Z</updated>

		<summary type="html">&lt;p&gt;Sam: Remote attacker, unauthenticated (group 6)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Class discussion: threat models and attacker goals&lt;br /&gt;
&lt;br /&gt;
==Local attacker==&lt;br /&gt;
&lt;br /&gt;
==Administrative attacker==&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
=== Group 3 ===&lt;br /&gt;
====Members====&lt;br /&gt;
* Dania Ghazal&lt;br /&gt;
* Ankush Varshneya&lt;br /&gt;
* Olivier Hamel&lt;br /&gt;
* Michael Aaya&lt;br /&gt;
* Ryan Morfield&lt;br /&gt;
* Daniel Vanderveen&lt;br /&gt;
* Jess Johnson&lt;br /&gt;
&lt;br /&gt;
====Example Scenario====&lt;br /&gt;
&#039;&#039;&#039;Targeted System&#039;&#039;&#039;&lt;br /&gt;
* CIA database - find out who killed Kennedy?&lt;br /&gt;
&#039;&#039;&#039;Attackers&#039;&#039;&#039;&lt;br /&gt;
* remote authenticators&lt;br /&gt;
* contractors (non CIA)&lt;br /&gt;
&#039;&#039;&#039;Goals&#039;&#039;&#039;&lt;br /&gt;
* “exfiltrating data”&lt;br /&gt;
* exfiltrate the CIA database to find out who killed Kennedy&lt;br /&gt;
&#039;&#039;&#039;Means&#039;&#039;&#039;&lt;br /&gt;
* someone at the CIA left a node.js server running in the background :)&lt;br /&gt;
* ssh credentials&lt;br /&gt;
* use outdated emacs (implementing a root privileged mail daemon) to inject a password into etc/passwd to escalate attacker’s privileges&lt;br /&gt;
* look around the system for more vulnerable/outdated services to exploit&lt;br /&gt;
* generate a race condition to create a file that you know a root user would create, then let the root user put their “sensitive data” into attacker’s file (such as files in /temp)&lt;br /&gt;
* social engineering - submit a help ticket to someone within the CIA to gain higher privileges for a seemingly innocent reason&lt;br /&gt;
====Attack Strategies====&lt;br /&gt;
&#039;&#039;&#039;Where are the Accessible Weaknesses?&#039;&#039;&#039;&lt;br /&gt;
* outdated services&lt;br /&gt;
* any service that lets attacker execute a task as another user&lt;br /&gt;
&#039;&#039;&#039;How Do You Attack Them?&#039;&#039;&#039;&lt;br /&gt;
* user privilege escalation&lt;br /&gt;
* abusing service vulnerabilities&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, unauthenticated==&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, unauthenticated==&lt;br /&gt;
* Samuel Prashker&lt;br /&gt;
* Daniel Lehman&lt;br /&gt;
* Roman Chametka&lt;br /&gt;
* Derek Aubin&lt;br /&gt;
* Gilbert Lavergne-Shank&lt;br /&gt;
* Xiusan Zhou&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Scenarios&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;#1 - DDOS&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Web servers, or any machine connected to a network&lt;br /&gt;
*** Attackers: Angry trolls, political warriors&lt;br /&gt;
*** Goals: Denials of service, anger your target, hurt their financials, prove a point&lt;br /&gt;
*** Means: LOIC, Chinese Botnet with Bitcoin&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Exploitable communication paths (example: ping, login spam)&lt;br /&gt;
**** In the case of a router, overpowering a signal by replacing it with your own higher powered signal&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Over the network&lt;br /&gt;
**** Over the air (wireless signals)&lt;br /&gt;
* &#039;&#039;&#039;#2 - Packet Sniffing&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Phones, servers, any networked device that can be sniffed&lt;br /&gt;
*** Attackers: Exfiltrators who want getting data, corrupting data &lt;br /&gt;
*** Goals: Exfiltration of data, snooping for data over the air&lt;br /&gt;
*** Means: Packet sniffing tools, Wireshark, &lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Wireless signals would be easy to monitor&lt;br /&gt;
**** Mission security (Msec)&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Wireless: Network cards, monitoring tools for over the air analysis&lt;br /&gt;
**** Wired: Anywhere along the line to be able to hook in a middleman&lt;br /&gt;
* &#039;&#039;&#039;#3 - Remote program already running on their service/server&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: People (social engineering), known exploits (0days)&lt;br /&gt;
*** Attackers: Blackhat hackers, whitehat hackers&lt;br /&gt;
*** Goals: Exfiltrate, corrupt, deny access, destroy, ransomware, (whitehat only: protect!)&lt;br /&gt;
*** Means: Exploitable software, social engineering&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses?&lt;br /&gt;
**** Stupid people, exploitable equipment known to be accessible to 0days, leveraging bugs&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Social networks, email, phone calls, deployed payload&lt;br /&gt;
** &#039;&#039;&#039;Point is you&#039;re trying to get someone to install software for you, or exploit software to inject the payload on the targeted system&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Sam</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=WebFund_2013W:_Symbols&amp;diff=17698</id>
		<title>WebFund 2013W: Symbols</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=WebFund_2013W:_Symbols&amp;diff=17698"/>
		<updated>2013-01-14T23:00:20Z</updated>

		<summary type="html">&lt;p&gt;Sam: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Question of the day: What is a symbol in a programming language?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What could &#039;x&#039; be to a programmer? ==&lt;br /&gt;
&lt;br /&gt;
* Variable&lt;br /&gt;
* Operator&lt;br /&gt;
* Classes&lt;br /&gt;
* Constants&lt;br /&gt;
* Keywords&lt;br /&gt;
* Separator&lt;br /&gt;
* Namespace&lt;br /&gt;
* Undefined&lt;br /&gt;
* Function&lt;/div&gt;</summary>
		<author><name>Sam</name></author>
	</entry>
</feed>