CS 40 - Lecture 14

Cover page image

Cay S. Horstmann

Lecture 13 Recap

???

Personal Computer Security

Example: The Morris Internet Worm

Morris

Buffer Overflow

buffer overflow cartoon

Lab 1. Buffer Overflow

Lab 1. Buffer Overflow

Lab 1. Buffer Overflow

You are the attacker. Suppose you can fill locations 80, 81, etc., and there is no overflow check. Fill them so that the password check will succeed.

What do you fill them with? ActiveLecture.org

Attack Categories

Launching Applications

Example: The Image That Isn't

Scripts

Example: The Love Bug

Example: Samy

Blocking Attacks

Lab 2. How Did the Attack Work?

Read this article: http://www.eweek.com/article2/0,1895,1940747,00.asp. How did the malware get to the user's computer?

ActiveLecture.org

  1. Kazaa installed it over the network
  2. The user installed it
  3. A script installed it

Attacker Types

Threat: Botnets

Threat: Stealing Personal Data

Lab 3. Categorize Attacker

What Can You Do?

Reminders

???