The Security Circus & DoS Attacks. Bio Summary The DoS Circus Layer 4 DDoS: Thousands of attackers bring down one site Layer 7 DoS: One attacker brings.

Slides:



Advertisements
Similar presentations
Ethical Hacking: New Web 2.0 Attacks and Defenses HI-TEC 2011.
Advertisements

 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
DoS on Competitor Web Site.  Phoenix has a “referral” from “Mr. Dobbs” ◦ Dobbs has threatened his girlfriend in the past ◦ Dobbs sent a “client” to Phoenix.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Security Awareness: Applying Practical Security in Your World
Acquiring A Web Presence Caroline Leibinger Jimmy Neyhart Joey Tuma.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Web server security Dr Jim Briggs WEBP security1.
1 쉽게 접근하자 DoS! Sookmyung Women’s Univ. 최서윤. 2 The DoS?! Sockstress DoS using LOIC Link Local DoS.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Network Attacks. Network Trust Issues – TCP Congestion control – IP Src Spoofing – Wireless transmission Denial of Service Attacks – TCP-SYN – Name Servers.
Computer Networks IGCSE ICT Section 4.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
APA of Isfahan University of Technology In the name of God.
Special Anatomy of an Attack Or Layered Security Failure.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
POSTER TEMPLATE BY: Whitewater HTTP Vulnerabilities Nick Berry, Joe Joyce, & Kevin Vaccaro. Syntax & Routing Attempt to capture.
IPv6 RA DoS Attacks Sam Bowne gogoNET Live 4 Nov 13, 2013.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
The Security Circus.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Proxy Servers.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
FIRST TC 2002 John Kristoff - DePaul University 1 Local Network Attacks John Kristoff DePaul University Chicago, IL
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Anonymous ACG 6415 Conley, Justin Glenn, Cassady Zhang, Fan.
Two Scary DoS Attacks AND Hacking American Express and Chase Manhattan Accounts HI-TEC July 24, 2013.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
The Security Circus MPICT Summer Conference, June, 2011.
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
Last revised A.A. Degree CNIT 120: Network Security Fundamentals of Network Security Preparation for Security+ Certification Essential for.
The Security Circus CNIT 120 Jan 14, Linus Thorvalds.
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Network Attacks Instructor: Dr. X. Outline Worms DoS.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
VCE IT Theory Slideshows
Hands-On Ethical Hacking and Network Defense
DDoS Attacks on Financial Institutions Presentation
Common Methods Used to Commit Computer Crimes
Man-in-the-Middle Attacks
Topic 5: Communication and the Internet
Wikileaks, Anonymous, and The Jester
Presentation transcript:

The Security Circus & DoS Attacks

Bio

Summary The DoS Circus Layer 4 DDoS: Thousands of attackers bring down one site Layer 7 DoS: One attacker brings down one site Link-Local DoS: IPv6 RA Attack: One attacker brings down a whole network

The DoS Circus Characters

Wikileaks Published <1000 US Gov't diplomatic cables from a leak of 250,000 Distributed an encrypted "Insurance" file by BitTorrent Widely assumed to contain the complete, uncensored leaked data Encrypted with AES-256--no one is ever getting in there without the key Key to be released if Assange is jailed or killed, but he is in UK now resisting extradition to Sweden and the key has not been released

Anonymous

Operation Payback 4chan's Anonymous group Attacked Scientology websites in 2008 Attacked the RIAA and other copyright defenders Using the Low Orbit Ion Cannon with HiveMind (DDoS) "Opt-in Botnet"

HB Gary Federal Aaron Barr Developed a questionable way to track people down online By correlating Twitter, Facebook, and other postings Announced in Financial Times that he had located the “leaders” of Anonymous and would reveal them in a few days

Social Engineering & SQLi

Leaked HB Gary s For Bank of America –Discredit Wikileaks –Intimidate Journalist Glenn Greenwald For the Chamber of Commerce – Discredit the watchdog group US Chamber Watch – Using fake social media accounts For the US Air Force Spread propaganda with fake accounts

Drupal Exploit

OpBART Dumped thousands of commuter's s and passwords on the Web – Defaced MyBart.org – s%20Californias%20Infamous%20BART%20Hurts% 20Citizens%20in%20the%20Process/article htm

Booz Allen Hamilton "LulzSec" hacked it in July 2011 Dumped 150,000 US Military addresses & passwords – anonymous-hackers-breach-booz-allen-hamilton-dump military- -addresses/

Missouri Sheriff's Association Hacked by AntiSec, another part of Anonymous Published credit cards, informant personal info, police passwords, and more –

Th3j35t3r "Hacktivist for Good" Claims to be ex-military Originally performed DoS attacks on Jihadist sites Bringing them down for brief periods, such as 30 minutes Announces his attacks on Twitter, discusses them on a blog and live on irc.2600.net

Jester's Tweets from Dec 2010

Th3j35t3r v. Wikileaks He brought down Wikileaks single-handed for more than a day –I was chatting with him in IRC while he did it, and he proved it was him by briefly pausing the attack

Wikileaks Outage One attacker, no botnet

Th3j35t3r After his Wikileaks attack He battled Anonymous He claims to have trojaned a tool the Anons downloaded He claims to pwn Anon insiders now

Jester's Tweets

Westboro Baptist Outage 4 sites held down for 8 weeks From a single 3G cell phone –

LulzSec The "skilled" group of Anons who hacked US SenateAZ Police Pron.comBooz Hamilton SonyNATO InfragardThe Sun PBSFox News H B Gary FederalGame websites

Ryan Cleary Arrested June 21, 2011 Accused of DDoSing the UK’s Serious Organised Crime Agency bringing-British-FBI-site.html

T-Flow Arrested July 19, hacker-squad-arrested-in-london/

Topiary Arrested On /Free-Radicals-The-Secret-Anarchy- Science-sales-rocket-Jake-Davis-seen- clutching-copy.html

– out-hacked-lulzsec-member.html

Stay Out of Anonymous

Layer 4 DDoS Many Attackers – One Target Bandwidth Consumption

Companies that Refused Service to Wikileaks Amazon Paypal Mastercard Visa Many others

Low Orbit Ion Cannon Primitive DDoS Attack, controlled via IRC Sends thousands of packets per second from the attacker directly to the target Like throwing a brick through a window Takes thousands of participants to bring down a large site They tried but failed to bring down Amazon

Low Orbit Ion Cannon

Operation Payback v. Mastercard Brought down Visa, Mastercard, and many other sites –Easily tracked, and easily blocked –High bandwidth, cannot be run through anonymizer –Dutch police have already arrested two participants

Mastercard Outage 3,000 to 30,000 attackers working together

Layer 7 DoS One Attacker – One Target Exhausts Server Resources

Layer 7 DoS Subtle, concealable attack Can be routed through proxies Low bandwidth Can be very difficult to distinguish from normal traffic

HTTP GET

SlowLoris Send incomplete GET requests Freezes Apache with one packet per second

R-U-Dead-Yet Incomplete HTTP POSTs Stops IIS, but requires thousands of packets per second

Keep-Alive DoS HTTP Keep-Alive allows 100 requests in a single connection HEAD method saves resources on the attacker Target a page that is expensive for the server to create, like a search – A php script –pkp keep-dead.php

keep-dead

XerXes Th3j35t3r's DoS Tool Routed through proxies like Tor to hide the attacker's origin No one knows exactly what it does Layer 7 DoS?

XerXes

Link-Local DoS IPv6 Router Advertisements

IPv4: DHCP PULL process Client requests an IP Router provides one Host Router I need an IP Use this IP

IPv6: Router Advertisements PUSH process Router announces its presence Every client on the LAN creates an address and joins the network Host Router JOIN MY NETWORK Yes, SIR

Router Advertisement Packet

RA Flood

DEMO SSID: DO NOT USE Password: DO NOT USE

Windows Vulnerability It takes a LOT of CPU for Windows to process those Router Advertisements 5 packets per second drives the CPU to 100% And they are sent to every machine in the LAN (ff02::1 is Link-Local All Nodes Multicast) One attacker kills all the Windows machines on a LAN

Responsible Disclosure Microsoft was alerted by Marc Heuse on July 10, 2010 Microsoft does not plan to patch this Juniper and Cisco devices are also vulnerable Cisco has released a patch, Juniper has not

Defenses from RA Floods Disable IPv6 Turn off Router Discovery Block rogue RAs with a firewall Get a switch with RA Guard

RA Guard Evasion Add "Fragmentation Headers" to the RA Packets –

Fragmentation Headers

Defending Websites

Attack > Defense Right now, your website is only up because –Not even one person hates you, or –All the people that hate you are ignorant about network security

Defense Mod Security--free open-source defense tool Latest version has some protections against Layer 7 DoS Akamai has good defense solutions Caching DNS Redirection Javascript second-request trick

Load Balancer

Counterattacks Reflecting attacks back to the command & control server Effective against dumb attackers like Anonymous' LOIC –Will lose effect if they ever learn about Layer 7 DoS, which is happening now

Free DDoS Protection Uses a network of proxy servers Stopped th3j35t3r in real combat