IP Spoofing Sometimes on the internet, a girl named Alice is really a man named Yves.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

TCP/IP Christopher Zacky. lolwut Decimal Numbers.
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
Computer Security and Penetration Testing
Transmission Control Protocol (TCP)
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Are you secured in the network ?: a quick look at the TCP/IP protocols Based on: A look back at “Security Problems in the TCP/IP Protocol Suite” by Steven.
1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
1 CS 4396 Computer Networks Lab Transmission Control Protocol (TCP) Part I.
Instructor: Sam Nanavaty TCP/IP protocol. Instructor: Sam Nanavaty Version – Allows for the evolution of the protocol IHL (Internet header length) – Length.
Network Attacks Mark Shtern.
CS470, A.SelcukReal-Time Communication Issues1 Real-Time Communication Security IPsec & SSL Issues CS 470 Introduction to Applied Cryptography Instructor:
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
IIT Indore © Neminath Hubballi
Computer Security and Penetration Testing
Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
1 LAN Protocols (Week 3, Wednesday 9/10/2003) © Abdou Illia, Fall 2003.
Transmission Control Protocol TCP. Transport layer function.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Department of Information Engineering1 About your assignment 5 -layers Model Application Layer(HTTP, DNS,...) TCP Layer(add sequence number to packets)
Networking Basics CCNA 1 Chapter 11.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
1 Figure 3-13: Internet Protocol (IP) IP Addresses and Security  IP address spoofing: Sending a message with a false IP address (Figure 3-17)  Gives.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
© 2002, Cisco Systems, Inc. All rights reserved..
WIRESHARK Lab#3. Computer Network Monitoring  Port Scanning  Keystroke Monitoring  Packet sniffers  takes advantage of “friendly” nature of net. 
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Presentation on ip spoofing BY
© 2003, Cisco Systems, Inc. All rights reserved.
An Introduction To ARP Spoofing & Other Attacks
Introduction To TCP/IP Networking Mr. Zeeshan Ali, Asst. Professor
Introduction to TCP/IP networking
COMP2322 Lab 6 TCP Steven Lee Mar 29, 2017.
Introduction to TCP/IP
or call for office visit, or call Kathy Cheek,
5. End-to-end protocols (part 1)
or call for office visit,
Chapter 17 and 18: TCP is connection oriented
Domain 4 – Communication and Network Security
Outline Basics of network security Definitions Sample attacks
Transport Layer.
Process-to-Process Delivery, TCP and UDP protocols
TCP/IP Internetworking
TCP.
© 2003, Cisco Systems, Inc. All rights reserved.
Wireshark Lab#3.
TCP/IP Internetworking
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
TCP - Part I Karim El Defrawy
Network Security: IP Spoofing and Firewall
CCNA 2 v3.1 Module 10 Intermediate TCP/IP
The IP, TCP, UDP protocols
Figure 3-23: Transmission Control Protocol (TCP) (Study Figure)
Chapter 15 – Part 2 Networks The Internal Operating System
Lecture 2: Overview of TCP/IP protocol
Lecture 3: Secure Network Architecture
TCP and UDP Layer 3 of the TCP/IP protocol stack. Transport layer
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
was not invented by Al Gore…
Network Architecture Models: Layered Communications
Process-to-Process Delivery: UDP, TCP
Outline Basics of network security Definitions Sample attacks
Transport Layer 9/22/2019.
TCP Connection Management
Presentation transcript:

IP Spoofing Sometimes on the internet, a girl named Alice is really a man named Yves

Sources General Information: Mitnick Attack Sequence: http://en.wikipedia.org/wiki/Ip_spoofing http://www.securityfocus.com/infocus/1674 http://tarpit.rmc.ca/knight/EE579index.htm (See ppts on subject) Mitnick Attack Sequence: http://www.gulker.com/ra/hack/tsattack.html Session Hijack Sequence: http://tarpit.rmc.ca/knight/EEE466Lectures/DA14/14%20-%20Security%20I.ppt DoS and DDoS attacks: Conversation with Todd ‘Hot Toddy’ Jackson Phrack Article: http://www.phrack.org/issues.html?issue=64&id=15#article

Overview TCP/IP – in brief IP Spoofing Defending Against the Threat Basic overview Examples Mitnick Attack Session Hijack DoS/DDoS Attack Defending Against the Threat Continuous Evolution Conclusion

TCP/IP in 3 minute or less General use of term describes the Architecture upon which the Interweb is built. TCP/IP are specific protocols within that architecture.

TCP/IP in 3 minutes or less Application Transport TCP Interweb IP Network Access Physical

TCP/IP in 3 minute or less IP is the internet layer protocol. Does not guarantee delivery or ordering, only does its best to move packets from a source address to a destination address. IP addresses are used to express the source and destination. IP assumes that each address is unique within the network.

TCP/IP in 3 minutes or less TCP is the transport layer protocol. It guarantees delivery and ordering, but relies upon IP to move packets to proper destination. Port numbers are used to express source and destination. Destination Port is assumed to be awaiting packets of data.

TCP/IP in 3 minutes or less Client Using Mozilla Some Web Server HTTP - GET Application But what happens if someone is lying?? Application Transport Transport TCP – Port 80 Interweb Interweb IP – 10.24.1.1 Network Access Network Access MAC – 00:11:22:33:44:55 Physical Physical 1101001001110100110100110101

IP Spoofing – Basic Overview Basically, IP spoofing is lying about an IP address. Normally, the source address is incorrect. Lying about the source address lets an attacker assume a new identity.

IP Spoofing – Basic Overview Because the source address is not the same as the attacker’s address, any replies generated by the destination will not be sent to the attacker. Attacker must have an alternate way to spy on traffic/predict responses. To maintain a connection, Attacker must adhere to protocol requirements

IP Spoofing – Basic Overview Difficulties for attacker: TCP sequence numbers One way communication Adherence to protocols for other layers

IP Spoofing – The Reset Victim - Bob Sucker - Alice Attacker - Eve 2. SYN ACK – Sure, what do you want to talk about? 3. RESET – Umm.. I have no idea why you are talking to me Victim - Bob Sucker - Alice 1. SYN – Let’s have a conversation 4. No connection – Guess I need to take Bob out of the picture… Attacker - Eve

IP Spoofing – Mitnick Attack Merry X-mas! Mitnick hacks a Diskless Workstation on December 25th, 1994 The victim – Tsutomu Shinomura The attack – IP spoofing and abuse of trust relationships between a diskless terminal and login server.

Mitnick Attack Workstation Server Kevin Mitnick 6. Mitnick fakes the ACK using the proper TCP sequence number 4. Mitnick forges a SYN from the server to the terminal 5. Terminals responds with an ACK, which is ignored by the flooded port (and not visible to Mitnick) 7. Mitnick has now established a one way communications channel Workstation Server 3. Mitnick discovers that the TCP sequence number is incremented by 128000 each new connection 2. Mitnick Probes the Workstation to determine the behaviour of its TCP sequence number generator 1. Mitnick Flood’s server’s login port so it can no longer respond Kevin Mitnick

Mitnick Attack – Why it worked Mitnick abused the trust relationship between the server and workstation He flooded the server to prevent communication between it and the workstation Used math skillz to determine the TCP sequence number algorithm (ie add 128000) This allowed Mitnick to open a connection without seeing the workstations outgoing sequence numbers and without the server interrupting his attack

IP Spoofing - Session Hijack IP spoofing used to eavesdrop/take control of a session. Attacker normally within a LAN/on the communication path between server and client. Not blind, since the attacker can see traffic from both server and client.

Session Hijack Bob Alice I’m Bob! I’m Alice! Eve 3. At any point, Eve can assume the identity of either Bob or Alice through the Spoofed IP address. This breaks the pseudo connection as Eve will start modifying the sequence numbers 2. Eve can monitor traffic between Alice and Bob without altering the packets or sequence numbers. 1. Eve assumes a man-in-the-middle position through some mechanism. For example, Eve could use Arp Poisoning, social engineering, router hacking etc... Bob Alice I’m Bob! I’m Alice! Eve

IP Spoofing – DoS/DDoS Denial of Service (DoS) and Distributed Denial of Service (DDoS) are attacks aimed at preventing clients from accessing a service. IP Spoofing can be used to create DoS attacks

DoS Attack Server Interweb Attacker Legitimate Users Service Requests Flood of Requests from Attacker Service Requests Interweb Server queue full, legitimate requests get dropped Service Requests Fake IPs Attacker Legitimate Users

DoS Attack The attacker spoofs a large number of requests from various IP addresses to fill a Services queue. With the services queue filled, legitimate user’s cannot use the service.

Server (already DoS’d) DDoS Attack Server (already DoS’d) Queue Full SYN ACK Interweb 1. Attacker makes large number of SYN connection requests to target servers on behalf of a DoS’d server 2. Servers send SYN ACK to spoofed server, which cannot respond as it is already DoS’d. Queue’s quickly fill, as each connection request will have to go through a process of sending several SYN ACKs before it times out SYN ACK SYN ACK SYN ACK SYN SYN SYN SYN Target Servers Attacker

DDoS Attack Many other types of DDoS are possible. DoS becomes more dangerous if spread to multiple computers.

IP Spoofing – Defending IP spoofing can be defended against in a number of ways: As mentioned, other protocols in the Architectural model may reveal spoofing. TCP sequence numbers are often used in this manner New generators for sequence numbers are a lot more complicated than ‘add 128000’ Makes it difficult to guess proper sequence numbers if the attacker is blind “Smart” routers can detect IP addresses that are outside its domain. “Smart” servers can block IP ranges that appear to be conducting a DoS.

IP Spoofing continues to evolve IP spoofing is still possible today, but has to evolve in the face of growing security. New issue of Phrack includes a method of using IP spoofing to perform remote scans and determine TCP sequence numbers This allows a session Hijack attack even if the Attacker is blind

Conclusion IP Spoofing is an old school Hacker trick that continues to evolve. Can be used for a wide variety of purposes. Will continue to represent a threat as long as each layer continues to trust each other and people are willing to subvert that trust.

Questions?

Application Application Transport Transport Interweb Interweb Extra slide for questions – Two TCP/IP protocol Stacks Network Access Network Access Physical Physical

Sucker - Alice Victim - Bob Attacker - Eve Extra Slide for Questions – Alice Bob Eve w/o interweb Attacker - Eve

Interweb Sucker - Alice Victim - Bob Attacker - Eve Extra Slide for Questions – Alice Bob Eve with interweb Attacker - Eve

IP header 0 16 31 Version IHL Total Length Type of Service Stolen from: http://tarpit.rmc.ca/knight/EE579/mitnik.ppt IP header 0 16 31 Version IHL Type of Service Total Length Identification Flags Fragment Offset Time to Live Header Checksum Protocol IP Header for Questions Source Address Destination Address Options and Padding

TCP header 0 16 31 Source Port Destination Port Sequence Number Stolen from: http://tarpit.rmc.ca/knight/EE579/mitnik.ppt TCP header 0 16 31 Source Port Destination Port Sequence Number Acknowledgement Number Data Offset Reserved Flags Window TCP header for questions Checksum Urgent Pointer Options and Padding

TCP Sequence Numbers Client Server 2. Server transmits 20 bytes 1. Client transmits 50 bytes 3. Client ACKs, sends no data Start SEQ - 1892 Start SEQ - 15562 SEQ – 1892 ACK – 15562 Size - 50 SEQ – 15562 ACK – 1942 Size - 25 TCP Sequence number demonstration – for questions SEQ – 1942 ACK – 15587 Size - 0 End SEQ - 1942 End SEQ - 15587