IP-Spoofing and Source Routing Connections

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Ipchains and Iptables Linux operating system natively supports packet-filtering rules: Kernel versions 2.2 and earlier support the ipchains command. Kernel.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Intrusion Detection and Hackers Exploits IP Spoofing Attack Yousef Yahya & Ahmed Alkhamaisa Prepared for Arab Academy for Banking and Financial Sciences.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Data Security in Local Networks using Distributed Firewalls
M2M Gateway Features Jari Lahti, CTO
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Internet and Intranet Fundamentals Class 9 Session A.
Access Control List (ACL)
1 實驗九:建置網路安全閘道器 教師: 助教:. 2 Outline  Background  Proxy – Squid  Firewall – IPTables  VPN – OpenVPN  Experiment  Internet gateway  Firewall  VPN.
TCP/IP Protocols Contains Five Layers
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Firewall Tutorial Hyukjae Jang Nc lab, CS dept, Kaist.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Firewall Security.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
Module 1: Configuring Routing by Using Routing and Remote Access.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Chapter 4: Implementing Firewall Technologies
Firewall Technology and InterCell Communication Peter T. Dinsmore Trusted Information Systems Network Associates Inc 3060 Washington Rd (Rt. 97) Glenwood,
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
IP packet filtering Breno de Medeiros. Florida State University Fall 2005 Packet filtering Packet filtering is a network security mechanism that works.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Network and System Security Risk Assessment
Exploiting Layer 2 By Balwant Rathore.
Module 3: Enabling Access to Internet Resources
Instructor Materials Chapter 7: Access Control Lists
Firewall Techniques Matt Cupp.
FIREWALL configuration in linux
Network Security Marshall Leitem 11/30/04
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Securing the Network Perimeter with ISA 2004
Outline Basics of network security Definitions Sample attacks
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
PROJECT PRESENTATION ON INTERNET FIREWALLS PRESENTED BY THE GUARDS
Introduction to Networking
Introduction to Networking
Computer Networks 9/17/2018 Computer Networks.
Welcome To : Group 1 VC Presentation
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Network Security: IP Spoofing and Firewall
Digital Pacman: Firewall Edition
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
תרגול 11 – אבטחה ברמת ה-IP – IPsec
Virtual Private Networks
OPS235: Configuring a Network Using Virtual Machines – Part 2
Firewalls By conventional definition, a firewall is a partition made
Firewall.
Intrusion Detection and Hackers Exploits IP Spoofing Attack
Firewall Installation
(DNS – Domain Name System)
Session 20 INST 346 Technologies, Infrastructure and Architecture
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

IP-Spoofing and Source Routing Connections

Overview First words Spoofing Linux configuration Sniffing IP-spoofing with source routing Vanilla IP-spoofing Ending

First Words This speech will discuss router/firewall problems Include spoofing examples Not session hijacking or TCP/UDP-spoofing

Spoofing Internet protocol (IP) spoofing: 1. The creation of IP packets with counterfeit (spoofed) IP source addresses. 2. A method of attack used by network intruders to defeat network security measures such as authentication based on IP addresses. Note 1: An attack using IP spoofing may lead to unauthorized user access, and possibly root access, on the targeted system Note 2: A packet-filtering-router firewall may not provide adequate protection against IP spoofing attacks. It is possible to route packets through this type of firewall if the router is not configured to filter incoming packets having source addresses on the local domain Note 3: IP spoofing is possible even if no reply packets can reach the attacker. Note 4: A method for preventing IP spoofing problems is to install a filtering router that does not allow incoming packets to have a source address different from the local domain In addition, outgoing packets should not be allowed to contain a source address different from the local domain, in order to prevent an IP spoofing attack from originating from the local network.

Linux 2.0.X Configuration IP forwarding enabled IP drop source routed frames disabled IP aliasing enabled

Sniffing Siphon Dsniff Tcpdump B.2 A.1 B.1 C.1 C.3 C.2 E.2 D.1 E.1

IP-Spoofing with Source Route Why source route? Example: Full connection IP-spoof with source route

Why source route? 1/3 Choose path A.1 B.1 A.3 B.3 A.2 B.2

Why source route? 2/3 Two networks have same network number A.2 A.1 D.1 D.1 D.2 D.2

Why source route? 3/3 When IP-spoofing as an internal IP-address through a filtering router you don’t get any responses back B.2 B.1 A.2 A.1 ”B.3” B.3

Full Connection IP-Spoof with Source Route net E => net B deny B.2 A.1 B.1 C.1 ”A.2” C.2 E.2 D.1 E.1 ifconfig eth0:0 A.2 route add -net A eth0:0 nc -n -v -s A.2 -g E.2 E.2 23 nc -n -v -s A.2 -g E.2 E.1 23 nc -n -v -s A.2 -g E.2 -g E.1 C.1 23 nc -n -v -s A.2 -g E.2 -g E.1 -g C.1 B.2 23

Full Connection Vanilla IP-Spoof Easy to IP-spoof as A.2 and sniff the responses Don’t get a full connection ”A.2” b.U.3 B.2 A.1 B.1 a.U.1 c.U.2 net A => net B allow any => any deny

Full Connection Vanilla IP-Spoof ”a.A.2” b.U.3 B.2 A.1 B.1 a.U.1 c.U.2 net A => net B allow any => any deny ifconfig eth0 down ifconfig eth0 hw ether a ifconfig eth0 A.2 route add -net A eth0 ifconfig eth0:0 U.3 route add -net U eth0 route add default gw U.2

Ending Very easy way to establish full connections Same attack on local network ”a.X.1” b.A.2 c.A.3 a.A.1

Ending Solution: Disable “Source Routing” (part of IP-options) (Default on firewalls, not default on routers) Implement spoofing protection (Not default on all firewalls) Do not use filter rules over an untrusted network Use VPN

Ending Questions? Ian.Vitek@infosec.se