Chapter 2 Flashcards
Basics of a program
- Data resides in RAM: numbers and other coded data, stored in consecutively numbered locations
- Programs are lists of instructions
- Instructions reside in RAM
Sections of RAM
- Control Sections: instructions and unchanging data
- Data sections: variables that change, stack, heap, BSS Segments
Memory Layout
low -> high
text data bss segment heap (goes down) stack(goes up)
Stack Frame for function call
local variables, parameters, return address
Process
A running program
isolated and contained
Operating system
In charge of process management, dispatching, RAM Management (MMU), I/O management (file management, user interface, network protocols)
Buffer Overflow: The Morris Worm
First major internet worm
disabled 10% of computers
utilized buffer overflow(program fails to keep track of input, input modifies RAM it shouldn’t and an attacker can take over)
Finger Program
Retrieved info about other users, was vulnerable to buffer overflow
Buffer Overflow
When calling another procedure we have to save the PC on the stack, overrunning a buffer can modify data on the stack and potentially overwrite the PC causing the wrong instruction to be executed when the procedure is finished.
Data Execution Prevention (DEP)
Protective measure where the OS will only execute instructions in a control section not the data section. Not all systems or programs can use DEP
Lessons from Morris Worm
1) Pick good passwords
2) Patch Regularly
3) Review System Configuration
4) created CERT (computer emergency response team) which was first nationwide computer security team
Common Vulnerability Enumeration (CVE)
Tracks and reports problems with security
Ways to study cyber attacks
1) Attack Scenarios
2) Attack Case Studies
Attack Scenario
Goals: Describe goals of attack
Resources: Required personnel, skills, equipment
How it happens: descibe how it takes place
Collateral Results: attack results in addition to the goals noted above
Recommended Mitigation: basic steps that could prevent attack
References: authoritative sources
Attack Case Study
Overview: summarizes the attack
Perpetrator: brief description of threat agent
Attack Scenario: as previously described
Risk Management: how pre-attack risk management affected outcome
References: consolidated list including those from the attack scenario