Network Security: DNS Spoofing, SQL Injection, ARP Poisoning

Slides:



Advertisements
Similar presentations
Security Lab 2 MAN IN THE MIDDLE ATTACK
Advertisements

Man in the Middle Attack
ARP Spoofing.
SCADA Security, DNS Phishing
1 Address Resolution Protocol (ARP) Relates to Lab 2. This module is about the address resolution protocol.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
Understand Database Security Concepts
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Network Attacks Mark Shtern.
Security Awareness: Applying Practical Security in Your World
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Annual Safety & Security Briefing - 9/22/04 Teresa Downey – SLAC Computer Security Group & SCS Applications Group.
Foundations of Network and Computer Security J J ohn Black Lecture #35 Dec 9 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Injection Attacks by Example SQL Injection and XSS Adam Forsythe Thomas Hollingsworth.
Man in the Middle attacks and ARP poisoning explained
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security and Penetration Testing
WEB SECURITY WEEK 3 Computer Security Group University of Texas at Dallas.
CSCI 6962: Server-side Design and Programming Secure Web Programming.
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 5 “Database and Cloud Security”.
Attacking Applications: SQL Injection & Buffer Overflows.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Security Scanners Mark Shtern. Popular attack targets Web – Web platform – Web application Windows OS Mac OS Linux OS Smartphone.
ARP Spoofing Attacks Dr. Neminath Hubballi IIT Indore © Neminath Hubballi.
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
EC week Review. Rules of Engagement Teams selected by instructor Host will read the entire questions. Only after, a team may “buzz” by raise of.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
MAN-IN-THE-MIDDLE ATTACK STEGANOGRAPHY Lab# MAC Addresses and ARP  32-bit IP address:  network-layer address  used to get datagram to destination.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
System Administration(SAD622S) Name of Presenter: Shadreck Chitauro Lecturer 18 July 2016 Faculty of Computing and Informatics.
1 Address Resolution Protocol (ARP). 2 Overview 3 Need for Address Translation Note: –The Internet is based on IP addresses –Local area networks use.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Database and Cloud Security
Network security Vlasov Illia
Understand Names Resolution
An Introduction To ARP Spoofing & Other Attacks
Security Issues with Domain Name Systems
SQL Injection.
Intro to Networks (part 1)
Penetration Testing: Concepts,Attacks and Defence Stratagies
Chapter 7: Identifying Advanced Attacks
TOPIC: Web Security (Part-4)
Address Resolution Protocol (ARP)
Unit 5: Providing Network Services
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
DNS security.
Providing Network Services
Computer Networks: Domain Name System 1.
Man-in-the-Middle Attacks
Network Security Payton Turnage, Evan French, Austin Barnett, Zane Womack, Tristan Leavitt, Andrew Hubeli.
CS4622: Computer Networking
Address Resolution Protocol (ARP)
ARP Spoofing.
Brute force attacks, DDOS, Botnet, Exploit, SQL injection
Lecture 2 - SQL Injection
(DNS – Domain Name System)
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Computer Networks ARP and RARP
Wireless Spoofing Attacks on Mobile Devices
Presentation transcript:

Network Security: DNS Spoofing, SQL Injection, ARP Poisoning By: Usman Jamil, Zach Black, Frank Brahmbhatt, Kurt Floyd, Jason James, Ross Stewart, Hunter Wall

DNS Spoofing - Overview Domain Name Server (DNS) poisoning or spoofing is a type of cyber-attack that exploits system vulnerabilities in the domain name server to divert traffic away from legitimate servers and directs it towards fake ones The code for DNS spoofing is often found in URLs sent via spam emails The emails attempt to frighten users into clicking on the supplied URL, which in turn infects their computer Once poisoned, a user's computer will take them to fake websites that are spoofed to look like the real thing, exposing them to risks such as spyware, keyloggers or worms

DNS Spoofing - Cascading attack If a high level DNS server is affected, all downstream servers may be affected as well If a single subdomain is spoofed, an entire domain can be hijacked for a period of time. For www.targetdomain.com, DNS now redirects to the attacker’s server for: Targetdomain.com Mail.targetdomain.com CDN.targetdomain.com Potato.targetdomain.com etc

DNS Spoofing - Cascading Attack Affected machines at Location A Company location A DNS (Uses attacked DNS server for authoritative info) ISP DNS Company “root” DNS (containing spoofed records) Affected machines at Location B Company location B DNS (ditto)

SQL Injection - Overview SQL injection weaknesses occur when an application uses untrusted data, such as data entered into web form fields, as part of a database query SQL injection (SQLi) is an application security weakness that allows attackers to control an application’s database This lets them access or delete data, change an application’s data-driven behavior, and do other undesirable things – by tricking the application into sending unexpected SQL commands

SQL Injection - Dual Defense Application side: Input sanitation Trust nothing! Parameterized queries Procedures for everything SQL injection will usually throw an error if used as a procedure argument App-side validation of inputs App-side encrypted data Quality ORM SQL server side: Permission/access separation Separation of schemas Support for app-side encrypted data Separation of databases

Preventing SQLi Use parameterized queries Escape inputs before adding them to the query Use of Prepared Statements (with Parameterized Queries) Use of Stored Procedures White List Input Validation Escaping All User Supplied Input Enforcing Least Privilege Performing Whitelist Input Validation as a Secondary Defense

ARP poisoning - Overview ARP is short for Address Resolution Protocol. Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets. ARP spoofing can enable malicious parties to intercept, modify or even stop data in-transit. ARP spoofing attacks can only occur on local area networks that utilize the Address Resolution Protocol. ARP spoofing attacks typically follow a similar progression.

ARP poisoning - Basic Steps ARP spoofing attack usually include: The attacker opens an ARP spoofing tool and sets the tool’s IP address to match the IP subnet of a target. Examples of popular ARP spoofing software include Arpspoof, Cain & Abel, Arpoison and Ettercap. The attacker uses the ARP spoofing tool to scan for the IP and MAC addresses of hosts in the target’s subnet. The attacker chooses its target and begins sending ARP packets across the LAN that contain the attacker’s MAC address and the target’s IP address. As other hosts on the LAN cache the spoofed ARP packets, data that those hosts send to the victim will go to the attacker instead. From here, the attacker can steal data or launch a more sophisticated follow-up attack.

ARP poisoning - OS Issues Different OSs handle ARP differently Linux Ignores unsolicited replies Watches the network to update its own cache Solaris Only updates after timeout Windows Depends on OS/version/Service Pack/security updates/phases of moon/etc Can specify timeout length Built-in randomization for length of time until refresh

Sources http://linux-ip.net/html/ether-arp.html - ARP behavior https://technet.microsoft.com/en-us/library/2005.01.howitworksdns.aspx - DNS server hierarchy https://cran.r- project.org/web/packages/RODBCext/vignettes/Parameterized_SQL_queries.html - SQL query parameterization https://support.microsoft.com/en-us/help/949589/description-of-address-resolution- protocol-arp-caching-behavior-in-win - Vista ARP cache behavior https://www.veracode.com/blog/intro-appsec/sql-injection-attacks-and-how-prevent- them-infographic - SQL Injection - Overview https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet - Preventing SQLi https://usa.kaspersky.com/resource-center/definitions/dns - DNS Spoofing - Overview https://www.techopedia.com/definition/27471/address-resolution-protocol-poisoning-arp- poisoning