DNS Attack Dalia Solomon. CONFIGURATION KNOPPIX SDT STD stands for security tools distribution A bootable CD with Linux OS, Linux kernel 2.4.2 STD focuses.

Slides:



Advertisements
Similar presentations
Ethical Hacking Module VII Sniffers.
Advertisements

Everything.
Security Lab 2 MAN IN THE MIDDLE ATTACK
Man in the Middle Attack
ARP Spoofing.
Sniffing in a Switched Network -With A Recipe To Hack A Switch Using Ettercap and Ethereal -Manu GargManu Garg manugarg at gmail.
1 Address Resolution Protocol (ARP) Relates to Lab 2. This module is about the address resolution protocol.
ARP: Address Resolution Protocol
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
1 Address Resolution Protocol (ARP) Relates to Lab 2. This module is about the address resolution protocol.
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
An Attack at Indiana University ARP Poison Routing David A. Greenberg, GSEC, GCWN, GCFA Principal Security Engineer University Information Security Office.
Precept 3 Host Configuration 1 Peng Sun. What TCP conn. running? Commands netstat [-n] [-p] [-c] (Linux) lsof -i -P (Mac) ss (newer version of netstat)
CCNPv5 Minimizing Service Loss and Data Theft in a Campus Network 1 Minimizing Service Loss and Data Theft in a Switched BCMSN Module 8 – Sec 2.
SYSTEM ADMINISTRATION Chapter 19
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
CSEE W4140 Networking Laboratory
Address Resolution Protocol (ARP). Mapping IP Address to Data-Link Address  How does a machine map an IP address to its Data- Link layer (hardware or.
Everything. MACIP End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: MACIP MACInterfaceMACInterface.
Network Layer – Subnetting and Control Protocols Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing,
ARP Scenarios CIS 81 and CST 311 Rick Graziani Fall 2005.
Network Tools TCP/IP interface configuration query - MAC (HW) address and IP address – Linux - /sbin/ifconfig – MS Windows – ipconfig/all 1.
DNS (Domain Name System) Protocol On the Internet, the DNS associates various sorts of information with domain names. A domain name is a meaningful and.
LAN Switching and Wireless – Chapter 2
A day in the life: scenario
Link Layer 5-1 Link layer, LAN s: outline 5.1 introduction, services 5.2 error detection, correction 5.3 multiple access protocols 5.4 LANs  addressing,
1 John Magee 11 July 2013 CS 101 Lecture 11: How do you “visit” a web page, revisted Slides adapted from Kurose and Ross, Computer Networking 5/e Source.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
Networking Colin Alworth May 26, Quick Review IP address: four octets Broadcast addresses –IP addresses use all 1’s for the host bits, and whatever.
Polytechnic University1 The internetworking solution of the Internet Prof. Malathi Veeraraghavan Elec. & Comp. Engg. Dept/CATT Polytechnic University
CS 447 Networks and Data Communication ARP (Address Resolution Protocol) for the Internet Department of Computer Science Southern Illinois University Edwardsville.
ARP Spoofing Attacks Dr. Neminath Hubballi IIT Indore © Neminath Hubballi.
Link Layer5-1 Synthesis: a day in the life of a web request  journey down protocol stack complete!  application, transport, network, link  putting-it-all-together:
CSCI 3335: C OMPUTER N ETWORKS A DAY IN THE LIFE OF A WEB REQUEST Vamsi Paruchuri University of Central Arkansas
1 Network Administration Module 3 ARP/RARP. 2 Address Resolution The problem Physical networks use physical addresses, not IP addresses Need the physical.
Chapter 23: ARP, ICMP, DHCP CS332, IS333 Spring 2014.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
ARP The Process and the Protocol. Note to reader The information explained in this section is a simplification and extrapolation of the actual ARP determination.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Link Layer5-1 Synthesis: a “day” in the life of a web request  journey down protocol stack!  application, transport, network, link  putting-it-all-together:
Mapping IP Addresses to Hardware Addresses Chapter 5.
Ethernet switch Hosts Can talk using Ethernet addresses only.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
ARP ‘n RARP. The Address Resolution Protocol (ARP) is a request sent out by a computer to find another computer’s MAC address. It already knows the IP.
ADDRESS MAPPING ADDRESS MAPPING The delivery of a packet to a host or a router requires two levels of addressing: logical and physical. We need to be able.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: interne t interface DNS server IP:
1 K. Salah Module 5.1: Internet Protocol TCP/IP Suite IP Addressing ARP RARP DHCP.
4: DataLink Layer1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
1 Address Resolution Protocol (ARP). 2 Overview 3 Need for Address Translation Note: –The Internet is based on IP addresses –Local area networks use.
LAN Switching and Wireless – Chapter 2
IP: Addressing, ARP, Routing
A Typical Connection Scenario
Address Resolution Protocol (ARP)
MAC Addresses and ARP 32-bit IP address:
LAN Vulnerabilities.
Address Resolution Protocol (ARP)
ARP: Address Resolution Protocol
IP Network Layer and Ethernet Encapsulation
Computer Networks 9/17/2018 Computer Networks.
Address Resolution Protocol
LAN Switching and Wireless – Chapter 2
Address Resolution Protocol (ARP)
ARP Spoofing.
Address Resolution Protocol (ARP)
LAN Switching and Wireless – Chapter 2
Synthesis A day in the life of a web request
Computer Networks ARP and RARP
Data-Link Layer The Internet is a combination of networks glued together by connecting devices (routers or switches) If a packet is to travel from a host.
Presentation transcript:

DNS Attack Dalia Solomon

CONFIGURATION

KNOPPIX SDT STD stands for security tools distribution A bootable CD with Linux OS, Linux kernel STD focuses on information security and network management tools.

Step I Laptop A Was booted from CD drive, with Knoppix STD. Laptop B Runs Ethereal

Step II On laptop A, I type the following command: arpspoof –i eth Arpspoof intercepts packets on a switched LAN

What actually happens? Laptop A, constantly sends laptop B, ARP replies ARP saying: MAC address (00-0c-29- df-af-9b) belongs to the IP of the DNS server ( ) laptop B, makes a wrong entry in his ARP cache

Result….. Laptop B wants to send an IP packet to the DNS server it sends the Ethernet frame to Laptops A MAC address, so actually laptop A gets the IP packet.

On laptop A, we have the following screen :

Note when I type the command (on Laptop B): arp -a Shows us the local machines arp table Table gives the machine a set of remembered MAC addresses for IP address Reason does not need to repeatedly broadcast to find this information for each network transmission.

ARP Table

Step III on laptop A, and type the following command dnsspoof

Next….. edit /var/www/index.htm Write the html code. In our case youve been spoofed.

Questions?