Shambhu Upadhyaya Computer Science & Eng. University at Buffalo Buffalo, New York 14260 ATTACK TOOLS & SECURITY POLICIES Shambhu Upadhyaya 1.

Slides:



Advertisements
Similar presentations
Module X Session Hijacking
Advertisements

Ethical Hacking Module VII Sniffers.
Overview How to crack WEP and WPA
Wireless LAN Security Understanding and Preventing Network Attacks.
Network Vulnerabilities and Attacks Dr. John Abraham UTPA.
Wireless Cracking By: Christopher Zacky.
Sniffing, Spoofing, Hijacking This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added.
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Network Attacks Mark Shtern.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Computer Security and Penetration Testing
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
MASNET GroupXiuzhen ChengFeb 8, 2006 CSCI388 Project 1 Crack the WEP key Liran Ma Department of Computer Science The George Washington University
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Linux Networking and Security
Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Networks Part 3: Packet Paths + Wireshark NYU-Poly: HSWP Instructor: Mandy Galante.
NT SECURITY: HACKING AND HOW TO PREVENT IT BY GREG WATSON.
1 Wireless Hacking Joffrey Czarny, SRC TELiNDUS State of the Art Wireless Hacking Workshop.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Wireless Hacking Lesson 13. Reminder As a reminder, remember that the tools and techniques that you learn this semester are only to be used on systems.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
Packet Sniffing Hans Kokx
Network security Vlasov Illia
An Introduction To ARP Spoofing & Other Attacks
IPsec Problems and Solutions
Nertwork Security.
Lab 2: Packet Capture & Traffic Analysis with Wireshark
Wireless Protocols WEP, WPA & WPA2.
Instructor & Todd Lammle
Securing A Wireless Network
Outline Basics of network security Definitions Sample attacks
Troubleshooting IP Communications
Wireless Hacking.
Real GPEN GIAC Information Security Study Guide Killtest
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
EVAPI - Enumeration Auburn Hacking club
Outline Basics of network security Definitions Sample attacks
Advanced Penetration testing
Presentation transcript:

Shambhu Upadhyaya Computer Science & Eng. University at Buffalo Buffalo, New York ATTACK TOOLS & SECURITY POLICIES Shambhu Upadhyaya 1

Part III  Ad hoc networks and security  Sensor networks and security  Security tools  Mesh networks and security  Long Term Evolution (LTE)  Advanced Metering Infrastructure (AMI)  Internet of Things (IoT) Shambhu Upadhyaya 2

Shambhu Upadhyaya 3 Wireless Security Tools

Shambhu Upadhyaya 4 Popular Attack Tools  Tools  NetStumbler  Kismet  Airsnort  Airjack  These tools may not work against WPA or RSN  Purpose is to “know the enemy”

Shambhu Upadhyaya 5 Attacker Goals  One of the main issues to understand is the goal of the attacker  Snooping for gaining information  Disruption of service (DoS)  Network traffic modification  Masquerading  Some may do availability attack (DoS)  Some may do confidentiality attack (identity theft)

Shambhu Upadhyaya 6 Attack Process Reconnaissance Planning Collection Analysis Execution

Shambhu Upadhyaya 7 Reconnaissance  Finding the victim  Actively searching till an easy target is identified  Looking at publicly available databases or maps of access points  Targeted attack  Finding a specific target requires tools such as war driving  Tools  NetStumbler  Kismet

Simpler Reconnaissance  Hand held devices with notifications to connect to wireless Internet  iPhone, BlackBerry  “Security expert converts popular music/movie player and browsing device into a penetration testing, hacking tool”  rticle.jhtml?articleID=  Can be used for ARP spoofing, Sniffing (using popular tools like NMAP)

Shambhu Upadhyaya 9 NetStumbler  One of the most popular war driving software  Works only under MS Windows  Intuitive UI  Easy to install and operate  Ability to connect with several types of GPS receivers  Also available as MiniStumbler, which can run on Pocket PCs

Shambhu Upadhyaya 10 NetStumbler  It displays most of the needed info. in one screen broken into two panes  Left pane provides shortcuts for displaying the networks  Right pane displays all the networks  See Figure 16.2 of Edney’s book

Shambhu Upadhyaya 11 Kismet  Passive tool for war driving  Runs under Linux and OpenBSD  Includes all the functionality of NetStumbler along with basic traffic analysis functionality  Can display strings of characters it sees in the traffic on unprotected networks  Good for finding passwords, etc.

Shambhu Upadhyaya 12 Kismet  Saves the info it collects in series of text files  These files contains list of all information about a network, raw packet dumps, and captured WEP traffic  Use may violate State and/or federal laws by intercepting communications

Shambhu Upadhyaya 13 Kismet  The main window of Kismet is shown in Figure 16.4 of Edney and Arbaugh

Shambhu Upadhyaya 14 Planning  For a Open Network  Using Kismet one can capture the network traffic which can be analyzed using tools like Wireshark (  Using such tools one can determine the MAC addresses of valid clients  For Protected Networks  First WEP keys have to be cracked  Dwepdump  Dwepcrack

Shambhu Upadhyaya 15 Collection  It is simple to collect enough packets using dwepdump to recover a WEP key  The most difficult part is determining the size of the key (40 bits or 104 bits)  Good to start with the assumption of 40 bits

Shambhu Upadhyaya 16 Collection  Collect enough packets using Dwepdump  Purpose is to recover a WEP key  Dwepdump must run until you collect at least 60 weak IVs

Shambhu Upadhyaya 17 Analysis  After collecting enough information one can analyze it using tools like dwepcrack  Sometimes you may have to go back and collect more packets (because the approach is probabilistic)  Each weak IV for the first key byte provides a hint as to the first key byte with a 5% probability  Having around 80 weak IVs guarantees success

Shambhu Upadhyaya 18 Other Tools of Interest  Airsnort  Offers additional features like parallel cracking  Works consistently in the background to crack WEP keys  Allows capture over multiple networks  Airjack  Provides features like carrying out DoS, determining ESSID for closed networks, establishing man in the middle attacks, setting MAC addresses of wireless cards, etc.

Other Kinds of Attack  Solar Winds  Has proprietary tools for all kinds of attacks  SNMP Password Cracker  SNMP: Simple Net Management Protocol  Used in network management systems to monitor network-attached devices  A brute force attack on this basically gives control to the attacker on all the network- attached devices

Contd…  Router Password Attack  This wireless Tool lets you change the password of the router and then configure it to your liking  TCP connection reset program  Resetting TCP connections by setting the RST flag  DDOS  Various tools on the Internet to allow  Smurf attack – issue a large no. of ICMP requests from victim’s spoofed IP, then get flooded with replies  Ping of Death – sending large (> 65,535 bytes) malformed ping request from victim’s spoofed IP (also called long ICMP)  Syn Flood – send large no. of connection requests but do not reply to the syn-ack, resulting in half-open connections

Shambhu Upadhyaya 21 Popular Attacks  Man-in-the-middle attack  ARP Spoofing  Used to learn MAC address for a given IP address  ARP packets have no integrity protection, so, anyone can respond with incorrect information  This poisons the ARP cache of the requestor  Until the cache entry times out, the client uses an improper MAC address for the given IP address  DOS attacks  WPA Cryptographic DOS attacks  Because Michael provides only 20 bit protection against message modification attacks

Shambhu Upadhyaya 22 References  Jon Edney and William Arbaugh, Real Security, Addison-Wesley, 2004  Maximum Wireless Security By Cyrus Peikari, Seth Fogie, Sams Publishing, 2003 Maximum Wireless Security  