SMT 2-4 Plaintext Communication Vulnerability

NSHC Training
28 Jul 202413:56

Summary

TLDRThis script delves into the importance of secure communication in networks, highlighting the risks of plain text transmission. It introduces the CIA Triadโ€”confidentiality, integrity, and availabilityโ€”as key principles for information security. The script uses scenarios to illustrate how encryption protects data from unauthorized access and tampering, emphasizing the need for secure practices like using SSH over Telnet and HTTPS over HTTP to safeguard personal and payment information from cyber threats.

Takeaways

  • ๐Ÿ”’ The importance of avoiding plain text communication in networks due to the risk of data exposure to unauthorized third parties.
  • ๐Ÿ“ˆ The evolution of networks from simple information exchange to complex systems handling sensitive personal and payment information, necessitating enhanced security measures.
  • ๐Ÿ‘€ The visibility of network packets during transmission, making them susceptible to interception and misuse by attackers.
  • ๐Ÿ›ก๏ธ The CIA Triad (Confidentiality, Integrity, Availability) as a framework for understanding and implementing information security.
  • ๐Ÿ”‘ Confidentiality is about restricting access to information to only those with proper authorization, ensuring data is not exposed during transmission.
  • ๐Ÿ”„ Integrity ensures that data remains unaltered and reliable throughout its transmission, crucial for maintaining trust in data and systems.
  • ๐Ÿšซ Availability highlights the necessity of ensuring that services are accessible when needed, without interruptions or denial-of-service attacks.
  • ๐Ÿ”’๐Ÿ”“ Encryption is a fundamental method to protect data confidentiality and integrity, but it must be properly implemented to ensure availability.
  • ๐Ÿ”‘๐Ÿ”„ Key exchange methods, like Diffie-Hellman, are essential for secure communication, allowing parties to exchange encrypted messages without exposing keys to eavesdroppers.
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธ Demonstrating the vulnerability of plain text protocols like TELNET and HTTP through packet sniffing, and the security provided by encrypted protocols like SSH and HTTPS.
  • ๐Ÿ”’ The use of HTTPS in web services to encrypt data transmission, protecting user information from being easily intercepted and ensuring a secure browsing experience.

Q & A

  • Why should we avoid plain text communication in networks?

    -We should avoid plain text communication because it exposes data to unauthorized third parties, making it vulnerable to eavesdropping and data breaches, especially as networks now carry sensitive personal and payment information.

  • What is the significance of the CIA Triad in information security?

    -The CIA Triad represents the three core aspects of information security: Confidentiality, Integrity, and Availability. It provides a framework for understanding and ensuring that data is protected from unauthorized access, remains accurate and reliable, and is accessible when needed.

  • How does the concept of confidentiality relate to data protection?

    -Confidentiality ensures that data is protected from exposure to unauthorized individuals. It involves measures to prevent unauthorized access to sensitive information, such as through encryption or access controls.

  • What is integrity in the context of information security?

    -Integrity in information security refers to the assurance that data is accurate, consistent, and has not been modified, tampered with, or altered in an unauthorized manner during transmission or storage.

  • Why is availability important for network services?

    -Availability ensures that authorized users have access to information and services when they need them. It is crucial for services to be reliable and operational to prevent downtime and ensure continuous service delivery.

  • How can encryption help maintain the integrity of data?

    -Encryption can help maintain data integrity by preventing unauthorized modification of data during transmission. It ensures that the data remains intact and can be verified as accurate and unaltered by the recipient.

  • What is the purpose of the Diffie-Hellman key exchange method mentioned in the script?

    -The Diffie-Hellman key exchange method is used to securely exchange cryptographic keys over a public channel without having to transmit the keys themselves, thus enabling secure communication between parties.

  • How does the script illustrate the difference between plain text and encrypted communication?

    -The script uses examples of eavesdropping on plain text communication (e.g., telnet) where data can be easily read and intercepted, versus encrypted communication (e.g., SSH) where data is protected and not visible to unauthorized parties.

  • What is the risk of using plain HTTP protocol for transmitting sensitive data like passwords?

    -Using plain HTTP protocol exposes sensitive data like passwords in plain text, making it easily accessible to attackers who can intercept the data during transmission, leading to potential data breaches.

  • How does HTTPS improve the security of web services?

    -HTTPS encrypts the communication between a user and a web service, making it difficult for third parties to read or modify the data being exchanged, thus enhancing the confidentiality and integrity of the transmitted information.

  • What does the lock icon in the browser's address bar signify?

    -The lock icon in the browser's address bar indicates that the website is using HTTPS, meaning that the communication between the user and the website is encrypted and secure, providing a visual assurance of the site's security.

Outlines

00:00

๐Ÿ”’ Importance of Network Security and the CIA Triad

The first paragraph introduces the necessity of understanding cyber threats and emphasizes the importance of practicing in a secure environment without breaching networks. It discusses the evolution of network usage from simple information exchange to a complex system involving personal data. The paragraph highlights the significance of protecting data in transit, introducing the CIA Triad (Confidentiality, Integrity, and Availability) as fundamental concepts in information security. Confidentiality is about preventing unauthorized access to data, integrity ensures data remains unaltered, and availability guarantees access to services when needed. The CIA Triad is crucial for evaluating the security level of a network.

05:01

๐Ÿ›ก๏ธ Protecting Data Integrity and Availability in Cyberspace

The second paragraph delves deeper into the concepts of data integrity and availability. It explains how maintaining data integrity is vital to prevent unauthorized modifications that could lead to severe consequences, such as incorrect orders or altered financial transactions. The paragraph also addresses the importance of availability, illustrating how service disruptions or slow response times can compromise it. It discusses encryption as a method to safeguard both integrity and availability, using the analogy of a padlock to explain secure data exchange between parties. The paragraph concludes with a thought experiment on safely exchanging messages, hinting at cryptographic methods like the Diffie-Hellman key exchange.

10:03

๐ŸŒ The Risks of Plaintext Communication and the Benefits of Encryption

The third paragraph demonstrates the dangers of plaintext communication through practical examples, such as using Telnet and HTTP protocols, which expose sensitive information like login credentials and passwords. It contrasts plaintext communication with encrypted protocols like SSH and HTTPS, which protect data from being intercepted or altered by unauthorized parties. The paragraph illustrates the difference between secure and insecure communication by showing the encrypted nature of SSH packets and the readable data in HTTP packets. It concludes by highlighting the importance of the lock icon in web browsers, which indicates a secure HTTPS connection, thus promoting the use of encrypted protocols to safeguard personal and financial information.

Mindmap

Keywords

๐Ÿ’กCyber threats

Cyber threats refer to potential or active attacks against computer systems, networks, or digital infrastructure. In the video, the importance of understanding and mitigating these threats is emphasized to ensure the safety of data in network environments. The script mentions the need to practice in one's own environment to avoid breaching network security, highlighting the real-world implications of cyber threats.

๐Ÿ’กPlain Text Communication

Plain text communication is the transmission of information in its readable form without encryption. The script warns against this practice on networks, explaining that it exposes data to unauthorized viewing and interception, which can compromise personal and sensitive information. The example of typing in a password in plain text during a login process illustrates this vulnerability.

๐Ÿ’กConfidentiality

Confidentiality in the context of the video refers to the protection of information from unauthorized access or exposure. It is one of the three components of the CIA Triad and is crucial for ensuring that sensitive data remains private. The script discusses confidentiality breaches, such as eavesdropping on data transmission, and the importance of encryption to maintain it.

๐Ÿ’กIntegrity

Integrity ensures that data remains accurate, consistent, and unaltered during transmission. It is another key aspect of the CIA Triad. The script provides examples of integrity breaches, such as altering the content of an order or hacking into a system to modify data, which can lead to significant consequences.

๐Ÿ’กAvailability

Availability is the third element of the CIA Triad and it pertains to ensuring that authorized users have access to information and resources when needed. The video script discusses the importance of availability in services, such as being able to call a police station during an emergency, and how attacks can be aimed at disrupting this availability.

๐Ÿ’กEncryption

Encryption is the process of converting data into a code to prevent unauthorized access. It is highlighted in the script as a method to protect confidentiality and integrity. The script uses the analogy of a locked box to explain how encryption works and the need for secure key exchange to ensure that only the intended recipient can decrypt the message.

๐Ÿ’กKey Exchange

Key exchange is a method used in cryptography to securely share secret keys between parties. The script introduces the concept through the analogy of a padlock on a box, where both sender and receiver need to have the correct keys to access the contents. The Diffie-Hellman key exchange method is mentioned as a basis for secure communication.

๐Ÿ’กEavesdropping

Eavesdropping in the video refers to the act of secretly listening to or monitoring a communication channel without the permission of the parties involved. The script warns of the risks of eavesdropping on plain text communications, where attackers can easily access transmitted data.

๐Ÿ’กHTTPS

HTTPS stands for Hypertext Transfer Protocol Secure and is a protocol for secure communication over a computer network. The script contrasts HTTP with HTTPS, emphasizing that the latter encrypts data to protect confidentiality and integrity. The lock icon in the browser's address bar is used as an indicator of HTTPS encryption.

๐Ÿ’กSSH

SSH stands for Secure Shell and is a cryptographic network protocol for operating network services securely over an unsecured network. The script demonstrates the security of SSH by showing that it encrypts data, preventing attackers from viewing or modifying transmitted information.

๐Ÿ’กTelnet

Telnet is a network protocol used to provide a command-line interface for communicating with a remote device or server via a terminal emulator. The script mentions Telnet as an example of a plain text communication protocol that can be easily eavesdropped on, contrasting it with the security of SSH.

Highlights

The importance of not breaching network environments without approval and practicing in personal environments first.

The vulnerability of plain text communication and the risks associated with transmitting sensitive data.

The evolution from simple information exchange to internet-based services requiring login processes and personal information transmission.

The necessity of protecting data in transit due to its visibility to potential attackers.

Introduction of the CIA Triad (Confidentiality, Integrity, Availability) as fundamental concepts in information protection.

The definition and importance of confidentiality in protecting data from unauthorized exposure.

Methods to ensure confidentiality, such as restricting access to key information only to authorized individuals.

The concept of integrity and its significance in maintaining the accuracy and reliability of data.

Examples illustrating the consequences of integrity breaches, such as incorrect orders or altered bank information.

Techniques to maintain data integrity, including the use of hash algorithms and encryption.

The concept of availability and its role in ensuring timely access to services and data.

The impact of availability breaches, such as service downtime or slow response times, on user experience.

The role of encryption in maintaining confidentiality and integrity, with a hypothetical scenario involving Alice, Bob, and Eve.

The importance of key exchange methods, such as the Diffie-Hellman method, for secure communication.

A practical demonstration of the risks of plain text communication using telnet and the benefits of encrypted SSH.

The comparison between HTTP and HTTPS protocols, emphasizing the encryption and security provided by HTTPS.

The significance of the lock icon in web browsers as an indicator of a secure and encrypted connection.

Transcripts

play00:00

hello traines in this class I would like

play00:03

to introduce various cyber threats that

play00:05

can occur on the network one thing to

play00:07

keep in mind is that it's good to follow

play00:09

the practice during a class but never

play00:11

breach any of the network environments

play00:13

without approval if you want to practice

play00:16

you have to build and test in your own

play00:20

environment first let's look at the

play00:22

vulnerability of plain Tex communication

play00:25

if you think about how we normally talk

play00:27

we don't talk in encrypted language but

play00:29

why should we avoid plain text

play00:31

Communication in networks first of all

play00:34

the data sent and received on the

play00:35

network has become more important than

play00:37

in the past in the past networks were

play00:40

used to Simply exchange information but

play00:42

the number of users increased as

play00:44

multiple networks were connected to form

play00:46

an internet Network as the internet

play00:48

became active we started to provide

play00:51

services based on Authority which

play00:53

required a login process currently not

play00:56

only our login information but also much

play00:58

personal information such as our name

play01:00

address phone number and payment

play01:03

information are transmitted and received

play01:05

using the network that's why we want to

play01:07

ensure the safety of the

play01:09

data in the network data is transferred

play01:13

toward the desired destination within

play01:15

its own rules still should we protect

play01:17

our data the answer is yes packets in

play01:21

the network are transmitted from the

play01:22

sender to the receiver but during the

play01:24

transmission process the packets are

play01:27

still visible to other people too there

play01:30

are many reasons why attackers want to

play01:31

access the packets such as to obtain

play01:34

personal information in the data or to

play01:36

use malware to produce the desired

play01:38

result also they may just simply want to

play01:41

prevent the target user from accessing

play01:43

the normal internet condition therefore

play01:46

you need to protect your data from these

play01:49

attacks there is a concept called the C

play01:52

A Triad that often appears when

play01:54

explaining information protection the

play01:56

CIA stands for confidentiality integrity

play02:00

and availability the CIA Triad can be

play02:03

applied to the field of security to

play02:06

interpret and solve problems if these

play02:08

three characteristics are well met the

play02:10

network will be evaluated as highly

play02:14

secure let's start with

play02:16

confidentiality confidentiality refers

play02:18

to the protection of data from exposure

play02:20

to unauthorized third parties for

play02:23

example if you write down all your

play02:25

personal information to sign up for a

play02:27

web service and some unreliable person

play02:29

manages to read this data in the middle

play02:32

of transmission to the web service it's

play02:34

an attack that compromises

play02:36

confidentiality from a network

play02:37

perspective confidentiality breaches can

play02:40

occur in the form of someone

play02:41

eavesdropping on transmitting and

play02:43

receiving data so how do we protect

play02:47

confidentiality the key to

play02:48

confidentiality is to prevent access to

play02:51

key information by people who do not

play02:53

have the right Authority hence only

play02:56

people who have authority over the

play02:58

information should have access to it

play03:01

from a network perspective only the

play03:03

sender and the receiver will have the

play03:05

right to that data in the communication

play03:07

process by allowing only two people to

play03:10

view this data you can keep it

play03:12

confidential so how do we make sure that

play03:14

only these two people are able to see

play03:17

the data in the process of transmitting

play03:19

and receiving data this data goes

play03:22

through a lot of networks and a lot of

play03:23

equipment it is extremely dangerous to

play03:26

trust all those Network equipment

play03:28

because it means that there are a lot of

play03:30

vectors that can access your data

play03:32

anytime anywhere so we have to do

play03:34

something about the data itself such as

play03:38

encryption integrity means that when the

play03:40

data arrives at the destination the data

play03:43

initially sent by the sender arrives

play03:45

intact without modification Integrity is

play03:48

maintained when the data is accurate and

play03:50

reliable for example during the war any

play03:54

reports that are sent to the commanders

play03:56

should not be modified or tampered with

play03:57

under any situation inaccurate

play04:00

information could affect their tactics

play04:02

and in the worst case it could lead to

play04:04

their loss in the war from a CEOs point

play04:06

of view let's say you order 10 products

play04:09

but the content is altered and you end

play04:11

up ordering a th000 products then the

play04:14

system used for the order will be

play04:16

unreliable in other cases if some

play04:18

hackers are targeting a certain company

play04:20

for the purpose of damaging their

play04:21

reputation they would exploit the

play04:23

company's system vulnerabilities and

play04:25

hack their system they could steal their

play04:27

data for blackmail or to to give it to

play04:30

the company's

play04:32

competitors to give another example I

play04:35

would like to initiate a wire transfer

play04:37

to send money to my parents but if the

play04:39

bank information is changed to a

play04:40

hacker's account my parents will not be

play04:42

able to receive it in fact Integrity

play04:45

breaches can occur in a variety of ways

play04:48

you can attack the service to modify the

play04:49

contents of the database or you can

play04:52

sneak between the two devices that are

play04:53

communicating on the network and alter

play04:55

the data however malicious cases are not

play04:59

the only ones that cause the Integrity

play05:00

breach in some cases data may also be

play05:04

lost or altered unintentionally due to

play05:06

network conditions therefore we have to

play05:09

make sure that we transfer the data to a

play05:11

Flawless Network various methods can be

play05:14

used to maintain Integrity you can use

play05:16

the hash algorithm to verify whether the

play05:18

Integrity has been compromised

play05:20

encryption can also often be a way to

play05:22

maintain

play05:25

Integrity next is availability even if

play05:28

the confidentiality and integrity of the

play05:30

data are maintained it will be useless

play05:32

if communication is not made

play05:34

availability means that the right person

play05:37

must be able to access the service at

play05:38

the right time of need for example if

play05:41

there is a rubber in your house you

play05:43

should call the police station but what

play05:46

happens if the police station doesn't

play05:47

answer the phone call because they are

play05:49

having a day off the police will never

play05:51

come to help you right from a web

play05:53

service perspective users should be able

play05:56

to access the web pages any time

play05:58

anywhere in in addition if the service

play06:01

is too slow to use or becomes

play06:03

unavailable availability will not be

play06:05

guaranteed

play06:07

too from an attacker's point of view you

play06:10

can understand availability in two ways

play06:13

firstly maliciously exploiting a service

play06:15

that would result in an attack that

play06:17

compromises its availability think of a

play06:20

situation where you sneak into the

play06:21

network and Eaves drop or alter the data

play06:24

secondly to prevent users from knowing

play06:26

that they are being attacked they need

play06:28

to maintain avail a ability by

play06:30

forwarding packets that are received in

play06:32

the middle interestingly they need to

play06:34

maintain availability for successful

play06:36

attacks while also avoiding

play06:39

detection one way to maintain

play06:41

confidentiality and integrity is

play06:43

encryption so is encryption safe this is

play06:47

case one Alice and Bob are going to

play06:50

exchange letters Eve who delivers the

play06:52

letter in the middle is a malicious

play06:54

person who reads the letter in the

play06:56

process of delivering it Alice just sent

play06:58

Bob a letter but Eve can also read the

play07:01

letter very easily you can think of the

play07:04

above communication as the normal plain

play07:06

text communication process if a

play07:08

malicious user comes in the middle he

play07:10

can see the data we need to protect the

play07:13

data from being read in the

play07:14

middle this is case two this time Alice

play07:18

applied encryption to the letter so that

play07:20

no one can read it because it is an

play07:22

encrypted letter Eve can no longer check

play07:25

the message Alice has successfully

play07:27

protected the confidentiality and

play07:30

integrity of the letter is this correct

play07:33

however the Letter's availability is not

play07:36

protected Alice and Bob are the senders

play07:38

and receivers of the letter so they are

play07:40

the ones who should have access to see

play07:42

and read the

play07:45

letter however Bob will not be able to

play07:47

view the letter because the key used for

play07:49

encryption is not shared with Bob as a

play07:52

result Alice's communication objectives

play07:55

have not been achieved so both Alice's

play07:57

and Bob's availability have not been

play07:59

protected for this we need to create a

play08:02

safe data method that only Bob and Alice

play08:04

can

play08:06

see how can Alice and Bob send and

play08:09

receive messages safely think about it

play08:12

Alice wants to send Bob a very precious

play08:14

box as expected Eve is in the middle of

play08:17

the process pretending to be a delivery

play08:19

man but in fact he's going to open this

play08:22

precious box this box is designed to be

play08:24

locked with a padlock how can Alice and

play08:27

Bob safely receive the contents of this

play08:29

precious box without showing it to Eve

play08:31

there can be more than one correct

play08:33

answer if Alice and Bob can successfully

play08:36

open the box safely so that Eve can't

play08:38

see it then it's all correct I will tell

play08:40

you the answer after 10 seconds pause

play08:43

the recording and take a moment to think

play08:45

about

play08:51

it so how can Alice and Bob send and

play08:55

receive messages safely if they both use

play08:57

the logs they can safely exchange

play09:00

messages without exchanging the keys

play09:02

first Alice locks the padlock and sends

play09:04

it to Bob the box is logged with Alice's

play09:07

key and Bob can't check the contents

play09:09

inside this time Bob also locks the

play09:12

padlock and sends it again to Alice now

play09:15

that Alice's padlock and Bob's padlock

play09:17

are both hung Alice can't check the

play09:20

contents either Alice unlocks her

play09:22

padlock and sends it back to Bob then

play09:25

Bob receives the box with only his own

play09:27

padlock when he unlocks the padlock he

play09:30

is now able to see what's inside the

play09:34

box also in the process Eve is always

play09:37

watching the box with the padlog but she

play09:39

can never open it just applying

play09:41

encryption like this doesn't mean it's

play09:44

safe and it is important that you know

play09:46

how it works in fact the Diffy Helman

play09:49

key exchange method is the basis for

play09:50

exchanging the required keys in

play09:53

communication this part is about

play09:55

cryptography not the network so if

play09:57

you're interested in this it would be to

play09:59

find out more in the related

play10:02

chapter now you all know that plain text

play10:04

communication is dangerous this time I

play10:07

tried to EES drop on my computer so that

play10:10

I could show you what the data looks

play10:11

like when actually communicating as you

play10:14

can see in the image here I'm trying to

play10:16

access a remote computer the program I

play10:18

use to connect with is a program called

play10:20

telnet which helps me communicate using

play10:23

the Tet protocol so what does it look

play10:25

like if i e drop on the login process in

play10:28

fact the image below is the result of a

play10:31

wi tapping attempt as I will mention

play10:33

later this program is called wies Shock

play10:36

the image here captures the moment you

play10:38

log into the server using a protocol

play10:40

called tet on the network for your

play10:42

information blue colored letters are the

play10:44

incoming data and red colored ones are

play10:47

the outgoing

play10:49

data I received the text colly login in

play10:51

the image here and the user entered the

play10:53

ID collie in the packet below you can

play10:56

see the Blu string collie login and you

play10:58

can see that there is a string that

play11:00

looks like collie overlapping in Reds

play11:02

and blues can you guess why the string

play11:04

collie seems to overlap the reason why

play11:07

col is overlapped is that every time the

play11:09

user Types on the keyboard letters are

play11:11

printed on the screen so the input data

play11:13

is received as it is after the input if

play11:17

you look at the image again you can see

play11:18

that the password string was printed and

play11:21

it was entered by the user but it was

play11:23

not printed on the screen for security

play11:25

reasons however if you look at the

play11:27

packet below you can see the data that

play11:29

you actually entered because all of this

play11:32

was plain text communication you can see

play11:34

the data very easily therefore it is

play11:37

recommended that you log into the server

play11:39

using a cryptographic communication

play11:41

based protocol such as SSH rather than a

play11:44

plain text communication

play11:47

teling I also Bugg the SSH communication

play11:51

process the left side is the attempt to

play11:53

log into SSH and the right side is the

play11:56

Captured Moment of the action with wire

play11:58

shock the image on the left gives a

play12:00

rough idea of what data was exchanged in

play12:03

sssh

play12:04

communication however as shown on the

play12:06

right SSH cannot find the sent anded

play12:09

string because the packet is encrypted

play12:12

in this case the attacker cannot view or

play12:14

modify the data so it appears to

play12:16

communicate

play12:19

securely now let's try one of the most

play12:22

popular protocols the HTTP protocol on

play12:25

the left is a web server with HTTP

play12:28

communication

play12:29

the user will enter the password in the

play12:31

input box you may think it's safe

play12:34

because the password is covered however

play12:37

if you look at the captured image of the

play12:38

packet attempting to log in you can see

play12:41

the password that you entered financial

play12:43

services are often handled on the web as

play12:46

the number of Internet users is

play12:47

constantly increasing for the last few

play12:50

years if my personal information is

play12:52

easily accessible by a third party like

play12:55

this my data is not protected and will

play12:57

be easily breached you need to encrypt

play12:59

your data to protect it when using the

play13:02

https protocol it encrypts any

play13:05

Communications involved when using the

play13:06

web

play13:08

service the image here captures the

play13:10

moment you log into the web service

play13:12

using the https protocol on the network

play13:15

I don't see any readable data as if I

play13:18

bugged SSH packets compared to

play13:20

traditional HTTP Communications it is

play13:23

not possible to determine what data is

play13:25

sent and received when viewed by a third

play13:28

party in this way web services can also

play13:31

improve confidentiality and integrity

play13:34

because strong encryption makes it

play13:36

difficult to expose personal information

play13:38

and alter key data when you communicate

play13:40

with https the lock icon is activated in

play13:44

the address window of the browser as

play13:45

shown in the bottom right corner so if

play13:48

you want to make sure that your current

play13:50

homepage status is secured and encrypted

play13:53

remember this icon

Rate This
โ˜…
โ˜…
โ˜…
โ˜…
โ˜…

5.0 / 5 (0 votes)

Related Tags
CybersecurityData ProtectionNetwork SecurityEncryptionConfidentialityIntegrityAvailabilityInformation SecurityHTTPS ProtocolCryptographyData Breach