CIT 480: Securing Computer Systems

Slides:



Advertisements
Similar presentations
1 ICS 156: Lecture 2 (part 2) Data link layer protocols Address resolution protocol Notes on lab 2.
Advertisements

Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
ITIS 6167/8167: Network and Information Security Weichao Wang.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
CS 356 Systems Security Spring Dr. Indrajit Ray
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
OSI Model Routing Connection-oriented/Connectionless Network Services.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Common Devices Used In Computer Networks
Network Admin Course Plan Accede Institute Of Science & Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Operating Systems Lesson 10. Networking Communications protocol is the set of standard rules for ◦ Data representation ◦ Signaling ◦ Authentication ◦
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
Addressing Through the Layers  Data Link Layer Address  Network Layer Address.
CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
1 Network Administration Module 3 ARP/RARP. 2 Address Resolution The problem Physical networks use physical addresses, not IP addresses Need the physical.
Security fundamentals Topic 10 Securing the network perimeter.
CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler.
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
Network Layer 1. OSI network layer  OSI model layer 3  TCP/IP model Internet layer Application Presentation Session Transport Network Data link Physical.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Virtual Local Area Networks In Security By Mark Reed.
Security fundamentals
An Introduction To ARP Spoofing & Other Attacks
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Introduction to Networks v6.0
IP: Addressing, ARP, Routing
Networks Fall 2009.
or call for office visit Chapter 6 - IPsec (IP Secure)
Functions of Presentation Layer
A quick intro to networking
Instructor Materials Chapter 5: Ethernet
Scaling the Network: The Internet Protocol
IT443 – Network Security Administration Instructor: Bo Sheng
MAC Addresses and ARP 32-bit IP address:
LAN Vulnerabilities.
OSI Protocol Stack Given the post man exemple.
Layered Architectures
Understand the OSI Model Part 2
Understand Networking Services
Lecture 6: TCP/IP Networking By: Adal Alashban
Chapter 2: Basic Switching Concepts and Configuration
Network Architecture Introductory material
Virtual LANs.
CSE 4905 Network Security Overview
Computer Networks 9/17/2018 Computer Networks.
The Open System Interconnection (OSI) Model & Network Protocols.
Net 323: NETWORK Protocols
Chapter 12 Communications Security & Countermeasures
Topic 5: Communication and the Internet
Review of Important Networking Concepts
I. Basic Network Concepts
TCP/IP Protocol Suite: Review
Lecture 2: Overview of TCP/IP protocol
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
1 ADDRESS RESOLUTION PROTOCOL (ARP) & REVERSE ADDRESS RESOLUTION PROTOCOL ( RARP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University,
Networking Essentials For Firewall-1 Administrators
Virtual Private Network
Presentation transcript:

CIT 480: Securing Computer Systems Network Security Concepts

Topics Policies and Assurance Protocols and Layers Layer 2 Network Concepts MAC Spoofing ARP ARP Spoofing Network Sniffing

Network Security Policy Usage policies Define acceptable uses for organization members, partners, and other user classes. Risk analysis Identify assets. Evaluate importance. Determine security policy for each asset based on importance.

Detecting Problems Change management process Intrusion detection Require security approval of network changes. Intrusion detection Automated network and/or host based intrusion detection systems. Network scans Scan network for rogue/missing machines. Verify security status of each network device. Log monitoring Monitor sensitive logs (e.g. firewall) in real time.

Network Mission Assurance Asset identification Systems and information assets. Infrastructure model and control Network diagrams and inventory database. Change control. Threat analysis and prediction Response coordination Attack identification. Incident response team.

Network Hardening Network device integrity Secure protocols Firmware and OS patches. Password quality and change policies. Secure protocols Secure management protocols: SSH, SNMP3 + encrypt. Encrypt all sensitive data + use MACs for integrity. Network design Isolate sensitive/dangerous devices via firewalls, VLANs. Compartmentalize different information asset classes. Network access control Restrict access to Ethernet ports and wireless access.

Protocols A protocol defines the rules for communication between computers. Two primary types of protocols: Connectionless protocol Sends data out as soon as there is enough data to be transmitted E.g., user datagram protocol (UDP) Connection-oriented protocol Provides a reliable connection stream between two nodes Consists of set up, transmission, and tear down phases Creates virtual circuit-switched network E.g., transmission control protocol (TCP)

Encapsulation A packet typically consists of Control information for addressing the packet: header and footer Data: payload A network protocol N1 can use the services of another network protocol N2 A packet p1 of N1 is encapsulated into a packet p2 of N2 The payload of p2 is p1 The control information of p2 is derived from that of p1 Header Header Payload Footer Footer Payload

Network Layers Network models typically use a stack of layers Higher layers use the services of lower layers via encapsulation A layer can be implemented in hardware or software The bottommost layer must be in hardware A network device may implement several layers A communication channel between two nodes is established for each layer Actual channel at the bottom layer Virtual channel at higher layers

Internet Layers Physical Layer Application Transport Network Link Ethernet Fiber Optics Wi-Fi Physical Layer

Intermediate Layers Link layer Network layer Transport layer Local area network: Ethernet, WiFi, optical fiber 48-bit media access control (MAC) addresses Packets called frames Network layer Internet-wide communication Best effort transmission 32-bit internet protocol (IP) addresses in IPv4 128-bit IP addresses in IPv6 Transport layer 16-bit addresses (ports) for classes of applications Connection-oriented transmission layer protocol (TCP) Connectionless user datagram protocol (UDP)

Internet Packet Encapsulation Application Packet TCP Data TCP Header IP Frame Footer Link Layer Network Layer Transport Layer IP Data Frame Data Application Layer

Internet Packet Encapsulation Data link frame IP packet TCP or UDP packet Application packet Data link header IP header TCP or UDP header Application packet Data link footer

The OSI Model The OSI (Open System Interconnect) Reference Model is a network model consisting of seven layers

Network Interfaces Network interface: device connecting a computer to a network, such as an Ethernet or WiFi card. A computer may have multiple network interfaces. Most local area networks, including Ethernet and WiFi, broadcast frames, so all hosts on the LAN receive them. In regular mode, each network interface sends only packets destined for it to OS for processing. Network sniffing can be accomplished by configuring the network interface to send all frames (promiscuous mode) to OS for processing.

MAC Addresses Layer 2 protocols identify nodes by MAC addresses. A MAC address is a 48-bit number: E.g., 00-1A-92-D4-BF-86 The first three octets of any MAC address are IEEE-assigned Organizationally Unique Identifiers E.g., Cisco 00-1A-A1, D-Link 00-1B-11, ASUSTek 00-1A-92 The next three can be assigned by manufacturers as they please, with uniqueness being the only constraint. Note that uniqueness is not always the case in practice. Admins can set MAC addresses to any desired value. MAC addresses can be permanently burned in (BIA), or be a locally administered address (LAA) set by an administrator. A MAC address starting out with 00-08-74 for instance is assigned by Dell, while one starting out with 00-0a- 95 is assigned by Apple. Despite the IEEE limitations on LAAs, most OSs allow you to specify an arbitrary MAC for an interface.

Switch A switch Operation of a switch Operates at the link layer. Has multiple ports, each connected to a computer. Operation of a switch Learn the MAC address of each connected device. Forward frames only to the destination device.

Combining Switches Switches can be arranged into a tree. Each port learns the MAC addresses of the machines in the segment (subtree) connected to it. Fragments to unknown MAC addresses are broadcast. Frames to MAC addresses in the same segment as the sender are ignored. 10/13/2018

MAC Address Filtering A switch can be configured to provide service only to machines with specific MAC addresses Users must register devices with network admin. A MAC spoofing attack impersonates another PC Find out MAC address of target machine. Threat sets MAC address of his PC to that of target. Turn off or unplug target machine. Countermeasures to MAC spoofing: Block switch port when machine is turned off. Disable duplicate MAC addresses.

Viewing and Changing MAC Addresses Viewing the MAC addresses of the interfaces of a machine Linux: ifconfig Windows: ipconfig /all Changing a MAC address in Linux Stop the networking service: /etc/init.d/network stop Change the MAC address: ifconfig eth0 hw ether <MAC-address> Start the networking service: /etc/init.d/network start Changing a MAC address in Windows Open the Network Connections applet Access the properties for the network interface Click “Configure …” In the advanced tab, change the network address to the desired value Changing a MAC address requires administrator privileges In other derivatives like FreeBSD, MacOSX and others stopping the network service is not required, and the hw flag is dropped, leading to a single command ifconfig eth0 ether <MAC-address>

CS166: Computer Networks ARP The address resolution protocol (ARP) connects the network layer to the data layer by translating IP addresses to MAC addresses. ARP broadcasts requests and caches responses for future use Protocol begins with a computer broadcasting a message of the form who has <IP address1> tell <IP address2> When the machine with <IP address1> or an ARP server receives this message, its broadcasts the response <IP address1> is <MAC address> Requestor’s IP address <IP address2> contained in the link header The Linux and Windows command arp - a displays the ARP table Internet Address Physical Address Type 128.148.31.1 00-00-0c-07-ac-00 dynamic 128.148.31.15 00-0c-76-b2-d7-1d dynamic 128.148.31.71 00-0c-76-b2-d0-d2 dynamic IPv6 does not use ARP, and ARP is instead replaced by Neighbor Discovery Protocol.

ARP Caches IP: 192.168.1.105 MAC: 00:11:22:33:44:02 IP: 192.168.1.1 MAC: 00:11:22:33:44:01 Data 192.168.1.1 is at 00:11:22:33:44:01 192.168.1.105 is at 00:11:22:33:44:02 ARP Cache 192.168.1.105 00:11:22:33:44:02 ARP Cache 192.168.1.1 00:11:22:33:44:01

ARP Spoofing ARP table updated when ARP response is received Requests are not tracked ARP announcements are not authenticated, so A rogue machine can spoof other machines Rogue sends ARP redirecting IP to its MAC Network traffic destined for that IP sent to rogue machine by all hosts on subnet including switch. Countering ARP spoofing Use static ARP table. Requires admin to reconfigure each time a new host is added or a host is removed from the subnet.

Poisoned ARP Caches Data Data 192.168.1.106 00:11:22:33:44:03 192.168.1.105 is at 00:11:22:33:44:03 192.168.1.1 is at 00:11:22:33:44:03 192.168.1.1 00:11:22:33:44:01 192.168.1.105 00:11:22:33:44:02 Poisoned ARP Cache 192.168.1.105 00:11:22:33:44:03 Poisoned ARP Cache 192.168.1.1 00:11:22:33:44:03

ARP Spoofing Cracker .1 LAN: 192.168.1.x CLIENT SERVER Regular traffic switch Alice Using arp poisoning Bob .10 .100 MAC: 00:0A:E4:2E:9B:11 MAC: 00:0A:E4:3B:47:7E gratuitous arp reply Bob’s IP→ Cracker’s MAC arpspoof 192.168.1.10 192.168.1.100 gratuitous arp reply Alice’s IP→ Cracker’s MAC arpspoof 192.168.1.100 192.168.1.10 victim ip gateway ip victim ip gateway ip Cracker MAC: 00:22:64:34:60:88 .1

Telnet Protocol (RFC 854) Telnet is a protocol that provides unencrypted communication to another machine to issue commands and receive output. Allows remote shell access like ssh. Sends whatever you type. Prints whatever comes back. Telnet client can connect to any TCP port Useful for testing TCP services (ASCII based protocols) like HTTP, SMTP, etc. One computer can connect to another to use its services

Packet Sniffing Packet sniffing is the process of intercepting and observing traffic on a network. If packets are not encrypted, attacker can read confidential data, such as passwords, etc. Wired networks Broadcast traffic is observable by all hosts. Hubs send all packets to all hosts on subnet. Switches send packets only to destination host, but ARP poisoning can let attacker see all packets. Wireless networks Sniffer can see all packets.

 menu  main toolbar  filter toolbar  packet list pane  packet details pane  packet bytes pane  status bar

Packet Sniffer Applications Legitimate applications Debug network problems. Monitor network usage. Network intrusion detection. Attacker applications View confidential information. Gather data required for other attacks, especially spoofing attacks.

Defending against Sniffing Encrypt traffic Use application level encryption, e.g. HTTPS instead of HTTP, SSH instead of telnet. Use network level encryption, like WPA2 or IPsec, where possible. Traffic patterns can still be observed. Use wired networks with switches Use static ARP tables to avoid ARP spoofing. Limits attacker to broadcasts and packets directed to attacker controlled machines.

Attempting to Sniff Telnet CLIENT LAN: 192.168.1.x SERVER << link >> << link >> switch Alice Bob Add a user on server: adduser user and then follow program instructions .10 .100 In a switched network, packets are sent only to the destination computer One would think that another computer plugged to the switch cannot sniff traffic << link >> Cracker Ethernet UTP .1 RJ 45

Sniffing Telnet Passwords LAN: 192.168.1.x CLIENT SERVER Regular traffic switch Alice Using arp poisoning Bob .10 .100 With dsniff, we catch the passwords used to log in to a telnet service: dsniff -n Acts as a router Cracker .1

Key Points Layer 2 concepts Hosts identified by 48-bit MAC addresses. OS can spoof MACs by setting to any value. Switches manage layer 2 traffic. ARP translates IPs to MACs so packets can be delivered on hosts on local subnet. There is no authentication. ARP spoofing can be used to receive frames destined for other hosts. Network sniffing View confidential network traffic of other hosts. ARP spoofing can let attacker sniff even if switches used.

References Cisco, Network Security Policies: Best Practices White Paper, http://www.cisco.com/c/en/us/support/docs/availability/high-availability/13601-secpol.html Goodrich and Tammasia, Introduction to Computer Security, Pearson, 2011. NSA, Hardening Network Infrastructure, http://www.nsa.gov/ia/_files/factsheets/Hardening_Network_Infrastructure_FS.pdf