Are you secured in the network ?: a quick look at the TCP/IP protocols Based on: A look back at “Security Problems in the TCP/IP Protocol Suite” by Steven.

Slides:



Advertisements
Similar presentations
Module X Session Hijacking
Advertisements

Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Computer Security and Penetration Testing
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
1 Reading Log Files. 2 Segment Format
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Intrusion Detection and Hackers Exploits IP Spoofing Attack Yousef Yahya & Ahmed Alkhamaisa Prepared for Arab Academy for Banking and Financial Sciences.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Network Attacks Mark Shtern.
Firewalls and Intrusion Detection Systems
IP Spoofing, CS2651 IP Spoofing Bao Ho ToanTai Vu CS Security Engineering Spring 2003 San Jose State University.
Slide 1 Attacks on TCP/IP. slide 2 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
FIREWALL Mạng máy tính nâng cao-V1.
IIT Indore © Neminath Hubballi
Computer Security and Penetration Testing
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.
Chapter 6: Packet Filtering
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Security Problems in the TCP/IP Protocol Suite Presented by: Sandra Daniels, José Nieves, Debbie Rasnick, Gary Tusing.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
Transmission Control Protocol TCP. Transport layer function.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
TCP/IP Vulnerabilities
CS426Network Security1 Computer Security CS 426 Network Security (1)
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Security Problems in the TCP/IP Protocol Suite S.M. Bellovin Presented By, Sammer Zai Computer Vision and Pattern Recognition Laboratory, Hanyang.
TCP Security Vulnerabilities Phil Cayton CSE
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Telecommunications Networking II Lecture 41d Denial-of-Service Attacks.
© 2002, Cisco Systems, Inc. All rights reserved..
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Computer Network Security Dr. X. OSI stack… again.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Presentation on ip spoofing BY
1 Lecture A.2: Security Problems in TCP/IP r Reference: Security Problems in the TCP/IP Protocol Suite : by Steve Bellovin r R-services r Source-routing.
Agenda Spoofing Types of Spoofing o IP Spoofing o URL spoofing o Referrer spoofing o Caller ID spoofing o Address Spoofing.
An Introduction To ARP Spoofing & Other Attacks
Executive Director and Endowed Chair
General Classes of TCP/IP Problems
Outline Basics of network security Definitions Sample attacks
Defending Against DDoS
Defending Against DDoS
* Essential Network Security Book Slides.
IP Spoofing Sometimes on the internet, a girl named Alice is really a man named Yves.
IIT Indore © Neminath Hubballi
DDoS Attack and Its Defense
Intrusion Detection and Hackers Exploits IP Spoofing Attack
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

Are you secured in the network ?: a quick look at the TCP/IP protocols Based on: A look back at “Security Problems in the TCP/IP Protocol Suite” by Steven M. Bellovin, AT&T Labs-Research Presented by :Moinul I Zaber, Kent State University

What’s on Today! A soft brief on the Network Security Problems that we have inherited ! TCP sequence number Prediction IP spoofing Routing Threats Application layer Threats : s, Finger, FTP

Introduction Internet is a system of interconnected computers. Layers of communication types and interfaces connects them. TCP/IP is the dominant Protocol We will discuss some security problems inherent to this layered protocol. TCP is the process to process connectivity IP is the source to destination connectivity

A brief on TCP/IP

TCP sequence Number Prediction The normal TCP connection establishment sequence involves a 3-way handshake. The client selects and transmits an initial sequence number ISN c, the server acknowledges it and sends its own sequence number ISNs, and the client acknowledges that. That is, for a conversation to take place, C must first hear ISNS, a more or less random number. Suppose, though, that there was a way for an intruder X to predict ISNS. In that case, it could send the following sequence to impersonate trusted host T:

So How to predict the sequence number ? The initial sequence number variable is incremented by a constant amount once per second and by half that amount each time a connection is initiated. Thus if one initiates a legitimate connection and observes the ISN s one can calculate the ISNs’ used on the next connection attempt. The real host T receives the Server S’s ack so Flooding/ DOS attack should be opted against T to S->T message should be lost. Using ‘netstat’ could be a good option to get the sequence number!

Defenses Against Syn Prediction TCP sepcs requires that this variable be incremented approximately 250,000 times per second. But unfortunately this does not help as RTT Could be easily guessed. Randomizing the increment of the sequence number.

IP Spoofing In spoofing (fooling, deceiving), an attacker impersonates someone else. This allows him/her to exploit the access privileges of the spoofed.

IP spoofing is the creation of TCP/IP packets with somebody else's IP address in the header. Routers use the destination IP address to forward packets, but ignore the source IP address. The source IP address is used only by the destination machine, when it responds back to the source. When an attacker spoofs someone’s IP address, the victim’s reply goes back to that address. Since the attacker does not receive packets back, this is called a one-way attack or blind spoofing. To see the return packets, the attacker must intercept them.

Misconception (IP spoofing) A common misconception is that via spoofing you can surf the net, chat on line, send/receive while hiding your identity. This is not possible since the replies do not go to you.

Basic types of IP spoofing attacks Basic address change Use of source routing to intercept packets Exploitation of trust relationships on UNIX machines Session Hijacking

IP session Hijacking Here the user’s session is taken over. Let user on Host A is carrying on a telnet session with host G. Host H is ran by a naughty person. He watches the traffic between A and G and runs a tool which starts to impersonate A to G, and at the same time tells A to shut up. After a few seconds of this if the attack is successful, the naughty person has hijacked illegitimately. G knows nothing has happened.

Routing!! Routing- Somebody’s Following! Source Routing One way for an attacker to see return traffic from a spoofing attack is for him to insert himself in the path the traffic would normally take. Internet routing is normally dynamic, there is no guarantee that the same route between 2 IPs is always taken. Source routing can be used to guarantee that a packet follows a set path Routing Information Protocol Attacks

How does it work! Loose source routing (LSR): The sender specifies a list of some IP addresses that a packet must go through (it might go through more) An attacker sends a packet to the destination with a spoofed address but specifies LSR and puts his IP address in the list.

Defenses against Source Routing Attack It is rather hard! The best way to protect against source routing spoofing is to simply disable source routing at your routers. Gateways into the local net can reject external packets that claim to be from the local net. ( less practical. What will happen to organizations that has two trusted networks connected via a multi- organization backbone ?) Warning!!!: fire walls don’t defend against insider attacks!

RIP attack Routing Information Protocol (RIP) is used to propagate routing information on local networks, especially broadcast media. Typically, the information received is unchecked! This allows an intruder to send bogus routing information to a target host, and to each of the gateways along the way, to impersonate a particular host.

Defenses Against RIP attack Easier to defend! A paranoid gateway- one that filters packets based on source or destination address- will block any form of host spoofing( including TCP sequence number attacks).

ICMP- friends can also become a foe! Internet control message protocol (ICMP) is the basic network management tool. ICMP attacks are rather difficult and rare! ICMP redirect message (used by gateways to advise hosts of better routes). It can often be abused in the same way the RIP can. Intruder penetrating a secondary gateway available to the target can do the harm.

Defenses against ICMP attacks Easy! If a host is careful about checking that message rally does refer to a particular connection, most such attacks will not succeed. Don’t worry! It’s never been real!

Application layer Finger service : this server display useful information about users. Netstat, tracert, mail server provides no authentication mechanisms. The door is wide open for faked messages!

Discussion!!