<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Sultani</id>
	<title>Soma-notes - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Sultani"/>
	<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php/Special:Contributions/Sultani"/>
	<updated>2026-05-14T01:22:01Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20956</id>
		<title>SystemsSec 2016W Lecture 5</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20956"/>
		<updated>2016-04-17T01:29:35Z</updated>

		<summary type="html">&lt;p&gt;Sultani: /* Physical attacker, authenticated */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Class discussion: threat models and attacker goals&lt;br /&gt;
&lt;br /&gt;
==Local attacker==&lt;br /&gt;
&lt;br /&gt;
=== Group 1 ===&lt;br /&gt;
==== Members ====&lt;br /&gt;
* Abdulrahman Mufti&lt;br /&gt;
* Josiah Konrad&lt;br /&gt;
* William forest&lt;br /&gt;
* Andrew Belu&lt;br /&gt;
* Agheil Fazeli&lt;br /&gt;
* Brandon Hurley&lt;br /&gt;
&lt;br /&gt;
==== Scenarios ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #1:&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: &lt;br /&gt;
*** home computer - parent computer&lt;br /&gt;
***  &amp;gt; Windows 7 &lt;br /&gt;
** Attackers: &lt;br /&gt;
*** sibling &lt;br /&gt;
*** someone who lives in the house&lt;br /&gt;
** Goals: &lt;br /&gt;
*** the little brother wants to access big brother&#039;s account&lt;br /&gt;
*** to access programs that the little brother doesn&#039;t have&lt;br /&gt;
*** play games for a loner time&lt;br /&gt;
** Means: &lt;br /&gt;
*** watching them typing the password&lt;br /&gt;
*** using safe mode to change the parents&#039; password&lt;br /&gt;
*** change clock (to be able to play for a longer time)&lt;br /&gt;
*** take down security through the registry&lt;br /&gt;
&lt;br /&gt;
==Administrative attacker==&lt;br /&gt;
&lt;br /&gt;
=== Group 2 ===&lt;br /&gt;
==== Members ====&lt;br /&gt;
* Kyle T.&lt;br /&gt;
* Tarek K.&lt;br /&gt;
* Jakub L.&lt;br /&gt;
* Stefan C.&lt;br /&gt;
* Matt G.&lt;br /&gt;
* Remi G.&lt;br /&gt;
* Ibrahim M.&lt;br /&gt;
&lt;br /&gt;
==== Scenarios ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #1: Disgruntled Ex-Employee(s?) - Sony Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Disgruntled ex-employees with active administrative access and knowledge of internal system architecture.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Full client information specifically financial billing information. &lt;br /&gt;
*** Showcase that Sony does not take security seriously.&lt;br /&gt;
*** Denial of service for PSN users.&lt;br /&gt;
** Means: It is rumored that ex-employees with active logins managed to access the data.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #2: Current &amp;amp; Ex-Employee(s?) - Ashley Madison Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Employees with active administrative access.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Force Ashley Madison to shut down. &lt;br /&gt;
*** Expose the true ratios of male/female user base and fake accounts.&lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #3: Military and Government Secrets&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Whistleblowers (Chelsea Manning, Edward Snowden)&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Publicize and expose questionable practices and information to the general public.&lt;br /&gt;
*** Sway public opinion  &lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #4: This Wiki&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: MediaWiki CMS&lt;br /&gt;
** Attackers: Students with editor privilege on the wiki.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Modify or delete other groups&#039; entries.&lt;br /&gt;
** Means: Full access to edit the page using credentials given by the professor.&lt;br /&gt;
&lt;br /&gt;
==== Attack Strategies ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Weaknesses&#039;&#039;&#039;&lt;br /&gt;
** Employee turnover&lt;br /&gt;
** Disgruntled current and ex-employees&lt;br /&gt;
** Economically vulnerable administrators (easy to bribe)&lt;br /&gt;
** Blackmail&lt;br /&gt;
** System Administrator neglect and/or incompetence&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;How to Attack?&#039;&#039;&#039;&lt;br /&gt;
** Social Engineering&lt;br /&gt;
** If there are no safeguards in place, simply having admin access is enough to wreak havoc&lt;br /&gt;
** Installing backdoors to keep access to system&lt;br /&gt;
** Installing malicious updates and programs on users computers to siphon data and/or monitor.&lt;br /&gt;
** Remote monitoring of all users (including those with higher priviledge), using all available peripherals (webcams, microphones, keyboards, etc...)&lt;br /&gt;
** Denial of Access&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
=== Group 3 ===&lt;br /&gt;
====Members====&lt;br /&gt;
* Dania Ghazal&lt;br /&gt;
* Ankush Varshneya&lt;br /&gt;
* Olivier Hamel&lt;br /&gt;
* Michael Lutaaya&lt;br /&gt;
* Ryan Morfield&lt;br /&gt;
* Daniel Vanderveen&lt;br /&gt;
* Jess Johnson&lt;br /&gt;
&lt;br /&gt;
====Example Scenario====&lt;br /&gt;
&#039;&#039;&#039;Targeted System&#039;&#039;&#039;&lt;br /&gt;
* CIA database - find out who killed Kennedy?&lt;br /&gt;
&#039;&#039;&#039;Attackers&#039;&#039;&#039;&lt;br /&gt;
* remote authenticators&lt;br /&gt;
* contractors (non CIA)&lt;br /&gt;
&#039;&#039;&#039;Goals&#039;&#039;&#039;&lt;br /&gt;
* “exfiltrating data”&lt;br /&gt;
* exfiltrate the CIA database to find out who killed Kennedy&lt;br /&gt;
&#039;&#039;&#039;Means&#039;&#039;&#039;&lt;br /&gt;
* someone at the CIA left a node.js server running in the background :)&lt;br /&gt;
* ssh credentials&lt;br /&gt;
* use outdated emacs (implementing a root privileged mail daemon) to inject a password into etc/passwd to escalate attacker’s privileges&lt;br /&gt;
* look around the system for more vulnerable/outdated services to exploit&lt;br /&gt;
* generate a race condition to create a file that you know a root user would create, then let the root user put their “sensitive data” into attacker’s file (such as files in /temp)&lt;br /&gt;
* social engineering - submit a help ticket to someone within the CIA to gain higher privileges for a seemingly innocent reason&lt;br /&gt;
====Attack Strategies====&lt;br /&gt;
&#039;&#039;&#039;Where are the Accessible Weaknesses?&#039;&#039;&#039;&lt;br /&gt;
* outdated services&lt;br /&gt;
* any service that lets attacker execute a task as another user&lt;br /&gt;
&#039;&#039;&#039;How Do You Attack Them?&#039;&#039;&#039;&lt;br /&gt;
* user privilege escalation&lt;br /&gt;
* abusing service vulnerabilities&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, authenticated==&lt;br /&gt;
Members:&lt;br /&gt;
&lt;br /&gt;
- Matthew Preston&lt;br /&gt;
- Jon Simpson&lt;br /&gt;
- Allan Luke&lt;br /&gt;
- Chang Xu&lt;br /&gt;
- Nilofar Mansourzadeh&lt;br /&gt;
- Noor sabri&lt;br /&gt;
- Haamed Sultani&lt;br /&gt;
&lt;br /&gt;
- Targeted system&lt;br /&gt;
    - Place of work’s system&lt;br /&gt;
    - server(remote/local)&lt;br /&gt;
- Attacker&lt;br /&gt;
    - anyone who has the “attacker goals&amp;quot;&lt;br /&gt;
        - employee&lt;br /&gt;
        - pretend to be employee&lt;br /&gt;
- Goals&lt;br /&gt;
    - remotely look at data&lt;br /&gt;
    - deny access&lt;br /&gt;
    - destroy data&lt;br /&gt;
    - corrupt&lt;br /&gt;
    - social engineering&lt;br /&gt;
- Means&lt;br /&gt;
    - If data is on a server, attacker needs some level of access to the data (some way to connect to the data)&lt;br /&gt;
    - Put a physical key logger&lt;br /&gt;
    - physically freeze system&lt;br /&gt;
        - could look over your shoulder&lt;br /&gt;
    - pull the plug&lt;br /&gt;
    - physically disable verification points&lt;br /&gt;
    - slow down system&lt;br /&gt;
    - get admin access&lt;br /&gt;
    - steal employee&#039;s hardware&lt;br /&gt;
    - can get data by looking at camera feed&lt;br /&gt;
    - steal mobile phone&lt;br /&gt;
&lt;br /&gt;
- Attack strategies&lt;br /&gt;
    - could put a physical key logger&lt;br /&gt;
    - could take out the RAM(live)&lt;br /&gt;
    - infect hardware and reconnect it to the system&lt;br /&gt;
    - sell the stolen hardware&lt;br /&gt;
    - stolen employee’s computer has auto-login&lt;br /&gt;
    - most hardware is portable now so it’s easier to steal&lt;br /&gt;
    - disable cameras&lt;br /&gt;
    - record their behaviours&lt;br /&gt;
- accessible weaknesses&lt;br /&gt;
    - isolated computers&lt;br /&gt;
    - points of least physical security&lt;br /&gt;
    - on/off devices&lt;br /&gt;
        - somewhat easier to attack powered-on devices&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, unauthenticated==&lt;br /&gt;
* Abdul Bin Asif Niazi&lt;br /&gt;
* Dusan Rozman&lt;br /&gt;
* Sam Whiteley&lt;br /&gt;
* Jake Brown&lt;br /&gt;
* Nicholas Laws&lt;br /&gt;
* Miran Mirza&lt;br /&gt;
&lt;br /&gt;
Typically targeted systems include: portable systems such as laptops, smartphones, tablets, USB keys, card systems, banking machines.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attack strategies:&#039;&#039;&#039; &lt;br /&gt;
* Duplicated cards&lt;br /&gt;
* Card Readers&lt;br /&gt;
* RFID readers: can be used to duplicate RFID data and steal NFC enabled bank access systems&lt;br /&gt;
* Radio-Frequency generator used to unlock different cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Sort of attacks that can happen:&#039;&#039;&#039;&lt;br /&gt;
* Man in the middle attack on physical phone lines, people can access phone conversations by inserting some sort of hardware in a SIM card or a landline.&lt;br /&gt;
* Using the USB auto install feature to spread attacks, exploit this vulnerability to install software. An attacker can plug a USB thumb drive into computer and install software in order to escalate privileges.&lt;br /&gt;
* Phishing attack, a user can install some sort of software to reroute traffic through their system in order to collect data. A user can physically rewrite the hosts file on  system to tamper with the DNS on the system and steal data.&lt;br /&gt;
* For secured areas such as labs a vulnerability would be the door which requires some sort of card based authentication, since this can be stolen it is vulnerable.&lt;br /&gt;
* Bank Machines: a lot of bank machines have a USB port in the bank and thus can get software installed on them. People can also install a card reader on top of the card slot to collect card numbers and other sensitive data.&lt;br /&gt;
	&lt;br /&gt;
&#039;&#039;&#039;Scenarios:&#039;&#039;&#039;&lt;br /&gt;
* A user gets physical access to a device using sort of card access and then physically destroys a computer (a literal denial of service attack).&lt;br /&gt;
* An attacker swaps a keyboard for a keylogging keyboard and uses it to steal sensitive data. They are exploiting the fact that users won&#039;t notice the change&lt;br /&gt;
* A user can exploit the reset feature on a router in order to gain access to it&#039;s settings, they can then go on to flash the firmware and infect all connected devices on the network.&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, unauthenticated==&lt;br /&gt;
=== Group 6 ===&lt;br /&gt;
==== Members ====&lt;br /&gt;
* Samuel Prashker&lt;br /&gt;
* Daniel Lehman&lt;br /&gt;
* Roman Chametka&lt;br /&gt;
* Derek Aubin&lt;br /&gt;
* Gilbert Lavergne-Shank&lt;br /&gt;
* Xiusan Zhou&lt;br /&gt;
* Abdulkadir Addulkadir&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Scenarios&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;#1 - DDOS&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Web servers, or any machine connected to a network&lt;br /&gt;
*** Attackers: Angry trolls, political warriors&lt;br /&gt;
*** Goals: Denials of service, anger your target, hurt their financials, prove a point&lt;br /&gt;
*** Means: LOIC, Chinese Botnet with Bitcoin&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Exploitable communication paths (example: ping, login spam)&lt;br /&gt;
**** In the case of a router, overpowering a signal by replacing it with your own higher powered signal&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Over the network&lt;br /&gt;
**** Over the air (wireless signals)&lt;br /&gt;
* &#039;&#039;&#039;#2 - Packet Sniffing&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Phones, servers, any networked device that can be sniffed&lt;br /&gt;
*** Attackers: Exfiltrators who want getting data, corrupting data &lt;br /&gt;
*** Goals: Exfiltration of data, snooping for data over the air&lt;br /&gt;
*** Means: Packet sniffing tools, Wireshark, &lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Wireless signals would be easy to monitor&lt;br /&gt;
**** Mission security (Msec)&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Wireless: Network cards, monitoring tools for over the air analysis&lt;br /&gt;
**** Wired: Anywhere along the line to be able to hook in a middleman&lt;br /&gt;
* &#039;&#039;&#039;#3 - Remote program already running on their service/server&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: People (social engineering), known exploits (0days)&lt;br /&gt;
*** Attackers: Blackhat hackers, whitehat hackers&lt;br /&gt;
*** Goals: Exfiltrate, corrupt, deny access, destroy, ransomware, (whitehat only: protect!)&lt;br /&gt;
*** Means: Exploitable software, social engineering&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses?&lt;br /&gt;
**** Stupid people, exploitable equipment known to be accessible to 0days, leveraging bugs&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Social networks, email, phone calls, deployed payload&lt;br /&gt;
** &#039;&#039;&#039;Point is you&#039;re trying to get someone to install software for you, or exploit software to inject the payload on the targeted system&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Sultani</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_8&amp;diff=20687</id>
		<title>SystemsSec 2016W Lecture 8</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_8&amp;diff=20687"/>
		<updated>2016-02-05T00:48:16Z</updated>

		<summary type="html">&lt;p&gt;Sultani: Created page with &amp;quot;- Designing and Coding Secure Systems by Kenneth Ingham &amp;amp; Anil Somayaji     - Chapter 6: Cryptography Fundamentals         - Classic Crypto             - Enigma Cipher/Alan Tu...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;- Designing and Coding Secure Systems by Kenneth Ingham &amp;amp; Anil Somayaji&lt;br /&gt;
    - Chapter 6: Cryptography Fundamentals&lt;br /&gt;
        - Classic Crypto&lt;br /&gt;
            - Enigma Cipher/Alan Turing/Purple&lt;br /&gt;
                - Tried to break codes with very complex mechanisms with math. Therefore, computing was created to break codes&lt;br /&gt;
                - Codes can be arbitrarily secure if the code book is good enough&lt;br /&gt;
            - The “perfect” cipher&lt;br /&gt;
                - One Time Pad&lt;br /&gt;
                    - length of the key = length of the message (also known as the plaintext)&lt;br /&gt;
                    - we do an exclusive-or between the key and the plaintext to get our ciphertext&lt;br /&gt;
                    - The assumption is that the attacker cannot predict the bits of the key. This can be done with randomization.&lt;br /&gt;
                    - The important thing here is that the key can only be used once, hence, “one-time” pad&lt;br /&gt;
            - Randomness&lt;br /&gt;
                - The requirements: looks statistically random &amp;amp; unpredictable&lt;br /&gt;
                - pseudorandom number generators(PRNG)&lt;br /&gt;
                    - produces numbers that are statistically random&lt;br /&gt;
                    - Using a seed generates a stream of “random” numbers&lt;br /&gt;
                        - but if we know the seed, we can produce the same sequence of numbers&lt;br /&gt;
                        - we can also reverse engineer the stream of numbers to get the seed&lt;br /&gt;
        - Cryptographically-secure PRNG (stream cipher)&lt;br /&gt;
            - is a one-time pad using a seed generated by the PRNG&lt;br /&gt;
        - Block Ciphers&lt;br /&gt;
            - doing multiple runs of a cipher to encrypt&lt;br /&gt;
            - block sizes varies depending on the block cipher used&lt;br /&gt;
                - DES: 64 bit block size&lt;br /&gt;
                - AES: 256 bit block size&lt;br /&gt;
            - Electronic Code Book (ECB)&lt;br /&gt;
                - uses the same key for each iteration of the encryption&lt;br /&gt;
                - we can find 2 ciphertexts that are equal and find the key&lt;br /&gt;
        - Cryptography alone does not guarantee that your data will not be modified/corrupted&lt;br /&gt;
            - Checksums can detect if things have been corrupted but there are still ways the attacker can get around&lt;br /&gt;
        - Secure Hash Functions&lt;br /&gt;
            - turns data into random data&lt;br /&gt;
            - hash functions can be very efficient but being more efficient makes it easier to break&lt;br /&gt;
            - Hash Function&lt;br /&gt;
                - takes any data and turns it into 256 bits&lt;br /&gt;
            - Rules:&lt;br /&gt;
                - pre-image resistance&lt;br /&gt;
                    - given a hash value h, it is hard to find any message m such that h = hash(k, m), where k is the hash key.&lt;br /&gt;
                - collision resistance&lt;br /&gt;
                    - computationally infeasible to find two inputs that hash to the same output; that is, two inputs a and b such that H(a) = H(b), and a≠b&lt;br /&gt;
                    - one way to try to attack this type of security: birthday attack&lt;br /&gt;
        - Message Authentication Code (MAC)&lt;br /&gt;
            -  is a short piece of information used to authenticate a message—in other words, to confirm that the message came from the stated sender (its authenticity) and has not been changed in transit (its integrity)&lt;br /&gt;
&lt;br /&gt;
Note: We can check for integrity by comparing the hash of what you’re supposed to get with the hash that you got but this can be thwarted if the attacker controls the network&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Public Key Cryptography&lt;br /&gt;
    - can be paired with crypto from above to fix many of the problems&lt;br /&gt;
        - but has to be used with some type of crypto mentioned above&lt;br /&gt;
    - 2 keys that form a matched pair&lt;br /&gt;
        - one key inverts operations of the other&lt;br /&gt;
        - encrypt with Key1(public) &amp;amp; decrypt with Key2(private)&lt;br /&gt;
        - people encrypt messages with key1 and only you can decrypt with private key&lt;br /&gt;
        - these keys are very very large&lt;br /&gt;
    - Digital Signatures&lt;br /&gt;
        - ensure who sent the data and that it’s integrity isn’t compromised&lt;br /&gt;
    - Certificate Authority&lt;br /&gt;
        - an entity that issues digital certificates&lt;br /&gt;
&lt;br /&gt;
- GNU privacy guard&lt;br /&gt;
    - only trusts your keys&lt;br /&gt;
    - we can add other peoples’ keys and sign them&lt;br /&gt;
        - creating a Web of Trust&lt;/div&gt;</summary>
		<author><name>Sultani</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20607</id>
		<title>SystemsSec 2016W Lecture 5</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_5&amp;diff=20607"/>
		<updated>2016-01-26T15:16:05Z</updated>

		<summary type="html">&lt;p&gt;Sultani: /* Physical attacker, authenticated */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Class discussion: threat models and attacker goals&lt;br /&gt;
&lt;br /&gt;
==Local attacker==&lt;br /&gt;
&lt;br /&gt;
=== Group 1 ===&lt;br /&gt;
==== Members ====&lt;br /&gt;
* Abdulrahman Mufti&lt;br /&gt;
* Josiah Konrad&lt;br /&gt;
* William forest&lt;br /&gt;
* Andrew Belu&lt;br /&gt;
* Agheil Fazeli&lt;br /&gt;
* Brandon Hurley&lt;br /&gt;
&lt;br /&gt;
==== Scenarios ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #1:&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: &lt;br /&gt;
*** home computer - parent computer&lt;br /&gt;
***  &amp;gt; Windows 7 &lt;br /&gt;
** Attackers: &lt;br /&gt;
*** sibling &lt;br /&gt;
*** someone who lives in the house&lt;br /&gt;
** Goals: &lt;br /&gt;
*** the little brother wants to access big brother&#039;s account&lt;br /&gt;
*** to access programs that the little brother doesn&#039;t have&lt;br /&gt;
*** play games for a loner time&lt;br /&gt;
** Means: &lt;br /&gt;
*** watching them typing the password&lt;br /&gt;
*** using safe mode to change the parents&#039; password&lt;br /&gt;
*** change clock (to be able to play for a longer time)&lt;br /&gt;
*** take down security through the registry&lt;br /&gt;
&lt;br /&gt;
==Administrative attacker==&lt;br /&gt;
&lt;br /&gt;
=== Group 2 ===&lt;br /&gt;
==== Members ====&lt;br /&gt;
* Kyle T.&lt;br /&gt;
* Tarek K.&lt;br /&gt;
* Jakub L.&lt;br /&gt;
* Stefan C.&lt;br /&gt;
* Matt G.&lt;br /&gt;
* Remi G.&lt;br /&gt;
* Ibrahim M.&lt;br /&gt;
&lt;br /&gt;
==== Scenarios ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #1: Disgruntled Ex-Employee(s?) - Sony Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Disgruntled ex-employees with active administrative access and knowledge of internal system architecture.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Full client information specifically financial billing information. &lt;br /&gt;
*** Showcase that Sony does not take security seriously.&lt;br /&gt;
*** Denial of service for PSN users.&lt;br /&gt;
** Means: It is rumored that ex-employees with active logins managed to access the data.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #2: Current &amp;amp; Ex-Employee(s?) - Ashley Madison Hack&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Employees with active administrative access.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Force Ashley Madison to shut down. &lt;br /&gt;
*** Expose the true ratios of male/female user base and fake accounts.&lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #3: Military and Government Secrets&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: Service &amp;amp; Database servers&lt;br /&gt;
** Attackers: Whistleblowers (Chelsea Manning, Edward Snowden)&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Publicize and expose questionable practices and information to the general public.&lt;br /&gt;
*** Sway public opinion  &lt;br /&gt;
** Means: Ex-employees with full administrative access to databases.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Scenario #4: This Wiki&#039;&#039;&#039;&lt;br /&gt;
** Targeted System: MediaWiki CMS&lt;br /&gt;
** Attackers: Students with editor privilege on the wiki.&lt;br /&gt;
** Goals: &lt;br /&gt;
*** Modify or delete other groups&#039; entries.&lt;br /&gt;
** Means: Full access to edit the page using credentials given by the professor.&lt;br /&gt;
&lt;br /&gt;
==== Attack Strategies ====&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Weaknesses&#039;&#039;&#039;&lt;br /&gt;
** Employee turnover&lt;br /&gt;
** Disgruntled current and ex-employees&lt;br /&gt;
** Economically vulnerable administrators (easy to bribe)&lt;br /&gt;
** Blackmail&lt;br /&gt;
** System Administrator neglect and/or incompetence&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;How to Attack?&#039;&#039;&#039;&lt;br /&gt;
** Social Engineering&lt;br /&gt;
** If there are no safeguards in place, simply having admin access is enough to wreak havoc&lt;br /&gt;
** Installing backdoors to keep access to system&lt;br /&gt;
** Installing malicious updates and programs on users computers to siphon data and/or monitor.&lt;br /&gt;
** Remote monitoring of all users (including those with higher priviledge), using all available peripherals (webcams, microphones, keyboards, etc...)&lt;br /&gt;
** Denial of Access&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, authenticated==&lt;br /&gt;
&lt;br /&gt;
=== Group 3 ===&lt;br /&gt;
====Members====&lt;br /&gt;
* Dania Ghazal&lt;br /&gt;
* Ankush Varshneya&lt;br /&gt;
* Olivier Hamel&lt;br /&gt;
* Michael Lutaaya&lt;br /&gt;
* Ryan Morfield&lt;br /&gt;
* Daniel Vanderveen&lt;br /&gt;
* Jess Johnson&lt;br /&gt;
&lt;br /&gt;
====Example Scenario====&lt;br /&gt;
&#039;&#039;&#039;Targeted System&#039;&#039;&#039;&lt;br /&gt;
* CIA database - find out who killed Kennedy?&lt;br /&gt;
&#039;&#039;&#039;Attackers&#039;&#039;&#039;&lt;br /&gt;
* remote authenticators&lt;br /&gt;
* contractors (non CIA)&lt;br /&gt;
&#039;&#039;&#039;Goals&#039;&#039;&#039;&lt;br /&gt;
* “exfiltrating data”&lt;br /&gt;
* exfiltrate the CIA database to find out who killed Kennedy&lt;br /&gt;
&#039;&#039;&#039;Means&#039;&#039;&#039;&lt;br /&gt;
* someone at the CIA left a node.js server running in the background :)&lt;br /&gt;
* ssh credentials&lt;br /&gt;
* use outdated emacs (implementing a root privileged mail daemon) to inject a password into etc/passwd to escalate attacker’s privileges&lt;br /&gt;
* look around the system for more vulnerable/outdated services to exploit&lt;br /&gt;
* generate a race condition to create a file that you know a root user would create, then let the root user put their “sensitive data” into attacker’s file (such as files in /temp)&lt;br /&gt;
* social engineering - submit a help ticket to someone within the CIA to gain higher privileges for a seemingly innocent reason&lt;br /&gt;
====Attack Strategies====&lt;br /&gt;
&#039;&#039;&#039;Where are the Accessible Weaknesses?&#039;&#039;&#039;&lt;br /&gt;
* outdated services&lt;br /&gt;
* any service that lets attacker execute a task as another user&lt;br /&gt;
&#039;&#039;&#039;How Do You Attack Them?&#039;&#039;&#039;&lt;br /&gt;
* user privilege escalation&lt;br /&gt;
* abusing service vulnerabilities&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, authenticated==&lt;br /&gt;
Members:&lt;br /&gt;
&lt;br /&gt;
- Matthew Preston&lt;br /&gt;
- Jon Simpson&lt;br /&gt;
- Allan Luke&lt;br /&gt;
- Chang Xu&lt;br /&gt;
- Nilofar Mansourzadeh&lt;br /&gt;
- Noor sabri&lt;br /&gt;
&lt;br /&gt;
- Targeted system&lt;br /&gt;
    - Place of work’s system&lt;br /&gt;
    - server(remote/local)&lt;br /&gt;
- Attacker&lt;br /&gt;
    - anyone who has the “attacker goals&amp;quot;&lt;br /&gt;
        - employee&lt;br /&gt;
        - pretend to be employee&lt;br /&gt;
- Goals&lt;br /&gt;
    - remotely look at data&lt;br /&gt;
    - deny access&lt;br /&gt;
    - destroy data&lt;br /&gt;
    - corrupt&lt;br /&gt;
    - social engineering&lt;br /&gt;
- Means&lt;br /&gt;
    - If data is on a server, attacker needs some level of access to the data (some way to connect to the data)&lt;br /&gt;
    - Put a physical key logger&lt;br /&gt;
    - physically freeze system&lt;br /&gt;
        - could look over your shoulder&lt;br /&gt;
    - pull the plug&lt;br /&gt;
    - physically disable verification points&lt;br /&gt;
    - slow down system&lt;br /&gt;
    - get admin access&lt;br /&gt;
    - steal employee&#039;s hardware&lt;br /&gt;
    - can get data by looking at camera feed&lt;br /&gt;
    - steal mobile phone&lt;br /&gt;
&lt;br /&gt;
- Attack strategies&lt;br /&gt;
    - could put a physical key logger&lt;br /&gt;
    - could take out the RAM(live)&lt;br /&gt;
    - infect hardware and reconnect it to the system&lt;br /&gt;
    - sell the stolen hardware&lt;br /&gt;
    - stolen employee’s computer has auto-login&lt;br /&gt;
    - most hardware is portable now so it’s easier to steal&lt;br /&gt;
    - disable cameras&lt;br /&gt;
    - record their behaviours&lt;br /&gt;
- accessible weaknesses&lt;br /&gt;
    - isolated computers&lt;br /&gt;
    - points of least physical security&lt;br /&gt;
    - on/off devices&lt;br /&gt;
        - somewhat easier to attack powered-on devices&lt;br /&gt;
&lt;br /&gt;
==Physical attacker, unauthenticated==&lt;br /&gt;
* Abdul Bin Asif Niazi&lt;br /&gt;
* Dusan Rozman&lt;br /&gt;
* Sam Whiteley&lt;br /&gt;
* Jake Brown&lt;br /&gt;
* Nicholas Laws&lt;br /&gt;
* Miran Mirza&lt;br /&gt;
&lt;br /&gt;
Typically targeted systems include: portable systems such as laptops, smartphones, tablets, USB keys, card systems, banking machines.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attack strategies:&#039;&#039;&#039; &lt;br /&gt;
* Duplicated cards&lt;br /&gt;
* Card Readers&lt;br /&gt;
* RFID readers: can be used to duplicate RFID data and steal NFC enabled bank access systems&lt;br /&gt;
* Radio-Frequency generator used to unlock different cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Sort of attacks that can happen:&#039;&#039;&#039;&lt;br /&gt;
* Man in the middle attack on physical phone lines, people can access phone conversations by inserting some sort of hardware in a SIM card or a landline.&lt;br /&gt;
* Using the USB auto install feature to spread attacks, exploit this vulnerability to install software. An attacker can plug a USB thumb drive into computer and install software in order to escalate privileges.&lt;br /&gt;
* Phishing attack, a user can install some sort of software to reroute traffic through their system in order to collect data. A user can physically rewrite the hosts file on  system to tamper with the DNS on the system and steal data.&lt;br /&gt;
* For secured areas such as labs a vulnerability would be the door which requires some sort of card based authentication, since this can be stolen it is vulnerable.&lt;br /&gt;
* Bank Machines: a lot of bank machines have a USB port in the bank and thus can get software installed on them. People can also install a card reader on top of the card slot to collect card numbers and other sensitive data.&lt;br /&gt;
	&lt;br /&gt;
&#039;&#039;&#039;Scenarios:&#039;&#039;&#039;&lt;br /&gt;
* A user gets physical access to a device using sort of card access and then physically destroys a computer (a literal denial of service attack).&lt;br /&gt;
* An attacker swaps a keyboard for a keylogging keyboard and uses it to steal sensitive data. They are exploiting the fact that users won&#039;t notice the change&lt;br /&gt;
* A user can exploit the reset feature on a router in order to gain access to it&#039;s settings, they can then go on to flash the firmware and infect all connected devices on the network.&lt;br /&gt;
&lt;br /&gt;
==Remote attacker, unauthenticated==&lt;br /&gt;
* Samuel Prashker&lt;br /&gt;
* Daniel Lehman&lt;br /&gt;
* Roman Chametka&lt;br /&gt;
* Derek Aubin&lt;br /&gt;
* Gilbert Lavergne-Shank&lt;br /&gt;
* Xiusan Zhou&lt;br /&gt;
* Abdulkadir Addulkadir&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Scenarios&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;#1 - DDOS&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Web servers, or any machine connected to a network&lt;br /&gt;
*** Attackers: Angry trolls, political warriors&lt;br /&gt;
*** Goals: Denials of service, anger your target, hurt their financials, prove a point&lt;br /&gt;
*** Means: LOIC, Chinese Botnet with Bitcoin&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Exploitable communication paths (example: ping, login spam)&lt;br /&gt;
**** In the case of a router, overpowering a signal by replacing it with your own higher powered signal&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Over the network&lt;br /&gt;
**** Over the air (wireless signals)&lt;br /&gt;
* &#039;&#039;&#039;#2 - Packet Sniffing&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: Phones, servers, any networked device that can be sniffed&lt;br /&gt;
*** Attackers: Exfiltrators who want getting data, corrupting data &lt;br /&gt;
*** Goals: Exfiltration of data, snooping for data over the air&lt;br /&gt;
*** Means: Packet sniffing tools, Wireshark, &lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses&lt;br /&gt;
**** Wireless signals would be easy to monitor&lt;br /&gt;
**** Mission security (Msec)&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Wireless: Network cards, monitoring tools for over the air analysis&lt;br /&gt;
**** Wired: Anywhere along the line to be able to hook in a middleman&lt;br /&gt;
* &#039;&#039;&#039;#3 - Remote program already running on their service/server&#039;&#039;&#039;&lt;br /&gt;
** Scenario&lt;br /&gt;
*** Targeted System: People (social engineering), known exploits (0days)&lt;br /&gt;
*** Attackers: Blackhat hackers, whitehat hackers&lt;br /&gt;
*** Goals: Exfiltrate, corrupt, deny access, destroy, ransomware, (whitehat only: protect!)&lt;br /&gt;
*** Means: Exploitable software, social engineering&lt;br /&gt;
** Attack strategies&lt;br /&gt;
*** Accessible weaknesses?&lt;br /&gt;
**** Stupid people, exploitable equipment known to be accessible to 0days, leveraging bugs&lt;br /&gt;
*** How do you access them?&lt;br /&gt;
**** Social networks, email, phone calls, deployed payload&lt;br /&gt;
** &#039;&#039;&#039;Point is you&#039;re trying to get someone to install software for you, or exploit software to inject the payload on the targeted system&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Sultani</name></author>
	</entry>
</feed>