Intro to Networks (part 1)

Slides:



Advertisements
Similar presentations
1 Address Resolution Protocol (ARP) Relates to Lab 2. This module is about the address resolution protocol.
Advertisements

CISCO NETWORKING ACADEMY Chabot College ELEC Address Resolution Protocol.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
Network Security (part 3). In our simple topologies from yesterday (generally built with hubs), there is nothing preventing a host from sniffing traffic.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Security Awareness: Applying Practical Security in Your World
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
CSEE W4140 Networking Laboratory
Routing Going from one network to the next. Where is routing handled? IP serves the functions of –routing –universal naming Identification is easiest.
CSEE W4140 Networking Laboratory Lecture 2: ARP Jong Yul Kim
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Chapter 4: Managing LAN Traffic
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
CS3502: Data and Computer Networks Local Area Networks - 4 Bridges / LAN internetworks.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
CS 453 Computer Networks Lecture 21 Layer 3 Network Layer Network Layer of the Internet.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
1 Network Administration Module 3 ARP/RARP. 2 Address Resolution The problem Physical networks use physical addresses, not IP addresses Need the physical.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
ARP The Process and the Protocol. Note to reader The information explained in this section is a simplification and extrapolation of the actual ARP determination.
NET 324 D Networks and Communication Department Lec1 : Network Devices.
CSIT 220 (Blum)1 ARP Based on Computer Networks and Internets (Comer)
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Networking Components WILLIAM NELSON LTEC HUB  Device that operated on Layer 1 of the OSI stack.  All I/O flows out all other ports besides the.
Networking 101. OSI Reference Model Data Header Header Header.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Virtual Local Area Networks In Security By Mark Reed.
Network Concepts.
An Introduction To ARP Spoofing & Other Attacks
Introduction to Information Security
Introduction to Networks v6.0
IP: Addressing, ARP, Routing
Instructor Materials Chapter 3 Communicating on a Local Network
MAC Address Tables on Connected Switches
Local Area Networks Honolulu Community College
Instructor Materials Chapter 5: Ethernet
Networking Devices.
CS4470 Computer Networking Protocols
Objective: ARP.
LAN Vulnerabilities.
Layered Architectures
Welcome! Thank you for joining us. We’ll get started in a few minutes.
Chapter 4 Data Link Layer Switching
Introducing To Networking
Computer Networks 9/17/2018 Computer Networks.
Net 323: NETWORK Protocols
Faiza Iqbal Mobile Networks Faiza Iqbal EC-425 Mobile Networks Lab 1.
LAN switching and Bridges
CS4622: Computer Networking
Topic 5: Communication and the Internet
NAT/ARP/RARP (Ch 5 & 8) Dr. Clincy Lecture.
8PM – Quickly Overview Final Project
TCP/IP Networking An Example
Firewalls Routers, Switches, Hubs VPNs
Data Communications and Networking
LAN switching and Bridges
ARP Spoofing.
1 ADDRESS RESOLUTION PROTOCOL (ARP) & REVERSE ADDRESS RESOLUTION PROTOCOL ( RARP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University,
Networking Essentials For Firewall-1 Administrators
Computer Networks ARP and RARP
Review of Important Networking Concepts
Presentation transcript:

Intro to Networks (part 1)

Networking basics A huge part of modern security deals with networking, since a huge number of attacks come from something internet-based Not to discount malware – we’ll talk about that later on. So, the next few lectures will be a crash course on networking with an emphasis on security-related topics.

The OSI model The Open Systems Interconnection (OSI) model is the standard way to model communication functions in computers It divides the system into abstraction layers

The OSI model Each layer concerns a different level of how computers communicate with each other Security is important on multiple levels Helpful to keep this in mind as we dive in starting at the lower levels

The data layer We won’t worry too much about the link layer Go take more ECE if you’re focused there The data layer is concerned with actual physical addressing Typically MAC addresses Each machine must have a completely unique identifier, which is usually hardwired into it at the time of construction Technically, hardwired into every piece of hardware that communicates, so a single machine may have several of these identifiers

MAC addresses The MAC header contains the MAC address of the source and destination machine. (MAC address and ethernet address are interchangeable here.) They look like: 00-40-33-25-85-BB, or 00:40:33:25:85:BB

The OSI model Moving up a layer, we need some way for computers to use the data layer MAC address to actually communicate This is the first really interesting place we can dive in

Network layer: IP addresses Every computer has an address by which other computers can identify it Two current standards in use: IPv4 is still the dominant one

More on IPv4 There are different classes of networks, each of a different size:

Problem: space IPv4 was designed in 1981. Classes A-C allow for under 4.3 billion addresses total. The reality is actually smaller, given restrictions and reserved windows. Conclusion: Too many machines for IPv4 to stay feasible. Solutions: Subnetting NAT IPv6

Network Address Translation (NAT) Simple early solution: instead of purchasing a class of addresses, just get one IP and address all of your traffic to it. Then put a single machine visible the outside world That machine then routes all internal traffic based on internal IPv4 addresses that are local Can reuse addresses since no external machine sees them But the router will need to do a lot of translation and keep records of all internal machines

NAT pros and Cons Pros of NAT Cons of NAT Simple and secure Combines well with firewalls on the network Cheap and builds onto existing IPv4 framework Cons of NAT Single point of failure Slower

IPv6 Invented in 1998, and allows for 128-bit addresses The transition has been slower than expected, but is growing: Google estimates that about 13% of their current traffic load comes via IPv6 In 2012, that was under 1%, so it is increasing

Sending Data Messages are actually sent by dividing into packets, which encode bits of data Each layer actually adds headers to the data, so the final packet contains different information

Security and packets Certain areas of these headers and footers are very interesting from a security point view. In particular, much information which details possible vulnerabilities can be available. Also, impossible to hide it. (Why?)

Routing packets Moving back a step – let’s consider routing in this situation Each machine has a MAC address and an IP, but how do these message actually get passed around?

Network infrastructure At the smallest scale, we have Local Area Networks (LANs): “a small interconnection infrastructure that typically uses a shared transmission medium” – Computer and communication networks by N. Mir “Local” is relative – can be many or few computers – but generally all will connect to a single router or switch that serves traffic

In simple LAN topologies (generally built with hubs), there is nothing preventing a host from sniffing traffic intending for someone else.

When a packet is translated from the internet (network) layer to the link layer, the machine must translate the destination IP address to a destination physical ethernet address.

ARP: Address Resolution Protocol This translation process is done via ARP. Each node in memory has an ARP table, which looks something like this:

Viewing ARP data On most systems (windows, linux, or mac), type “arp –a”: Example (on my laptop): Macintosh:~ echambe5$ arp -a setup.ampedwireless.com;setup.ampedwireless.net (192.168.1.67) at f8:78:8c:0:1a:e6 on en0 ifscope [ethernet] ? (192.168.1.69) at 0:23:31:ee:37:56 on en0 ifscope [ethernet] ? (192.168.1.254) at 64:f:28:66:fc:c1 on en0 ifscope [ethernet] ? (192.168.1.255) at ff:ff:ff:ff:ff:ff on en0 ifscope [ethernet]

ARP Example First example: Host 1 transmits to host 2 No entry in the table. Host 1 broadcasts an ARP request on LAN 1. Essentially: “If your IP is 133.176.8.57, then reply with your MAC.”

ARP Example First example: Host 2 then replies with AB-49-9B-66-B2-69. The entry is added to ARP table, and transmission proceeds.

ARP Example Second example: Host 1 transmits to host 2 again. Entry is in the ARP table, so we use it. (If entry has changed, communication will fail and host 1 will try another ARP request.)

ARP Example Third example: Host 1 transmits to host 3 No entry in ARP table. Host 1 broadcasts an ARP request on LAN 1: “if you IP is 133.176.8.222, then reply with your MAC address.”

ARP Example Third example: Host 1 transmits to host 3 No reply is received. Host 1 then transmits a frame with destination IP address 133.176.8.222 and a source MAC address of AB-49-9B-25-B1-CA

ARP Example Third example: Host 1 transmits to host 3 The 2 port router gets the frame and sees the destination IP. Either it is in its ARP table, or it sends an ARP request on all ports.

Network devices Hubs, switches, and routers are all types of packet forwarding devices. A hub is a layer-1 device. That means it only has knowledge of the physical layer, so it sends all frames to all hosts. In essence, this means security is impossible.

Network devices Switches are layer-2 devices, so they live on the link level. This means they know about MAC addresses! So they can extract MAC addresses and only send the data to the target. Inherently more secure, since harder to “sniff” for traffic on the local network.

Network devices Routers live on layer 3, the actual network layer. They can: Perform like switches Forward frames across different kinds of networks Utilize NAT to hide IP addresses Forward frames across networks with different Net IDs. (Recall our IPv4 discussion last time.)

An attacker’s goal Given that switchers and routers provide much more secure transmission, an attackers goal is essentially to get these to behave more like hubs. We’ll talk about a few common types of network attacks that essentially do this.

ARP Poisoing The goal is to convince the other computer that you are another IP (generally the default gateway), so that all traffic gets sent to you. Step 1: Send unsolicited ARP replies to fill up another machine’s ARP table (so that it has to send ARP requests of its own) Step 2: Reply to those ARP requests with your own MAC.

ARP Poisoning There is no solid defense here, since ARP is inherently flexible. Possibilities: Extra software to check for possible spoofs Hard coded entries (but difficult to update) OS level guards (timeouts, ignore unsolicited ARPS, etc.) Note that there are legitimate uses! Page redirects, setting up redundancy, etc.

Implementing ARP Poisoning ARP Poisoning sets the network up for a man-in-the-middle attack: once you have everyone talking to your computer, you can intercept and modify traffic at will Tools: In a future lab, we will use tcpdump to monitor traffic and ettercap to sniff and filter content from the network (We’ll dive into this in a week or two…)