Lance West.  Just what is a Denial of Service (DoS) attack, and just how can it be used to attack a network.  A DoS attack involves exploiting operating.

Slides:



Advertisements
Similar presentations
NETWORK SECURITY ADD ON NOTES MMD © Oct2012. IMPLEMENTATION Enable Passwords On Cisco Routers Via Enable Password And Enable Secret Access Control Lists.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Are you secured in the network ?: a quick look at the TCP/IP protocols Based on: A look back at “Security Problems in the TCP/IP Protocol Suite” by Steven.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
1 Reading Log Files. 2 Segment Format
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Network Attacks Mark Shtern.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Firewalls and Intrusion Detection Systems
Computer Security and Penetration Testing
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Chapter 23: ARP, ICMP, DHCP IS333 Spring 2015.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Lecture 15 Denial of Service Attacks
Denial of Service attacks. Types of DoS attacks Bandwidth consumption attackers have more bandwidth than victim, e.g T3 (45Mpbs) attacks T1 (1.544 Mbps).
DENIAL OF SERVICE ATTACK
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Port Scanning.
Advanced Networking for DVRs
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Week 8-1 Week 8: Denial of Service (DoS) What is Denial of Service Attack? –Any attack that causes a system to be unavailability. This is a violation of.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
FIREWALL Mạng máy tính nâng cao-V1.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Chapter 6: Packet Filtering
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Transmission Control Protocol TCP. Transport layer function.
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Distributed Denial of Service Attacks
DoS Suite and Raw Socket Programming Group 16 Thomas Losier Paul Obame Group 16 Thomas Losier Paul Obame.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Denial of Service Attacks
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
McLean HIGHER COMPUTER NETWORKING Lesson 13 Denial of Service Attacks Description of the denial of service attack: effect: disruption or denial of.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
DoS/DDoS attack and defense
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Introduction to Information Security
DDoS Attacks on Financial Institutions Presentation
Domain 4 – Communication and Network Security
Error and Control Messages in the Internet Protocol
Intro to Denial of Serice Attacks
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Lance West

 Just what is a Denial of Service (DoS) attack, and just how can it be used to attack a network.  A DoS attack involves exploiting operating system flaws related to vendor implementations of TCP/IP, the underlying communications protocol for the Internet. These attacks have acquired cute names such as “ping of death,” ”Smurf, and teardrop, and they were effective at crashing networks before a patch was created, and routers where upgraded.  A DoS attack is like a million people standing around your house banging on every door stopping everyone else from getting in. It causes so much traffic that the router finally gives up and crashes.  Now, It turns out there are many types of DoS attacks and each have their own degrees of mayhem they can cause.

 In this type of DoS attack the attackers consumes all available bandwidth. Moreover, the attacker needs to have access to a T1 or faster network connection.  But if the attacker has limited bandwidth, and the knowledge of the internet control message protocols (ICMP), which is also a tool used for doing diagnostics over a network. They can turn other network resources into zombies, and use armies of computers to attack the victim.

This differs from a bandwidth attack in that it uses up server resources.  Like CPU-memory,  File-System quotas or other server processes. This is often times someone who already has a limited amount of server resources, and starts depriving other users of shares server services, like temporary memory buffer space, and temporary file swapping locations. This type of attack makes applications hang, and leads to servers freezing up. Now days this type of attack can be detected early with current Fault Management tools, but you need to have your server configured and setup correctly

 Every application or operating systems has its flaws. If a flaw is in a software package relating to TCP/IP protocols. It will get out to the hacking community, and someone will write a program to exploit it.  Remember the Pentium f00f DoS attack which allowed a users process to crash any NT operating system.  They did it by executing the invalid packet instruction 0xf00fc7c8.  It’s like sending a set of weird non-RFC compliant packets to a server to determine if the server can handle the exception, or would it cause the server to panic and crash.  That was one of the ways you could use a DoS type attack on the older NT boxes, because the machine would panic and reboot. Opening the door to the hacker during the rebooting process.

 Domain Name Servers (DNS) had weak authentication protocols just a few years ago. This made it easy for hackers to gain access to the server letting the hacker redirect users to a cloned web sites using a spoofed IP address.  Example: A cloned banks login page to capture user’s personal information. In these types of attack the attacker is spoofing the sources IP address to create a DoS type condition which is convincing the victim’s server to cache bogus IP address information.

 This use to be one of the worst DoS type attacks due to the amplification effects it could cause on a network. In this type of attack the hacker sends out an amplification packet to see just how a network will responds. If your network is a standard class C or 24-bit address allocation setup.  The networks address would be.0 and the broadcast address would be.255.The broadcast address is typically used for diagnostic. The Smurf attack uses the directed broadcast address.255 to send out spoofed ICMP echo packets to the broadcast address.  These spoofed packets make it appear the victims system has initiated the request. Now all the servers on the network will respond to the victim’s request.  The attacker sends out a single ICMP packet and a 100 systems will magnify that request 10 fold. It becomes a massive saturating attack on the victim’s network and quickly consumes all available bandwidth.  Another type of Smurf attack uses the UDP function instead of the ICMP method. Each of these attack methods have the same effect of eating up bandwidth unless you setup your servers to see this type of attack early on.  Youtube video on ICMP traffic 

Normal Connection Smurf Attack

 The SYN attack was the worst type of denial of service (DoS) attack, before the Smurf attack came along. This is a type of DoS attack floods a target system via spoofed broadcast ping messages. The SYN Flood attack initiates a three-way process. It sends out a SYN pack from the client to the server targeting a specific port. If everything goes well the server will received an ACK packet back from the other machine which sets up an established state. This process exploits a built-in weakness in which a server uses limited memory resources in establishing the connection compared to once the connection is made.

 Now since the hacker has spoofed his own address in the type of attack he is unreachable by the server. So the server is setting there in SYN_REVC mode waiting for the return ACK packet to finish establishing a connection that never happens.  It will not flush the queue until it gets a response, or the server’s internal timer kicks in to stop it; which can be seconds to minutes. The diagram below gives you some idea of what happens within the TCP 3-way handshake.

 Since most servers have limited memory space used in any one connection port queue. It only takes a small number of these types of open requests to buildup which completely disables a specific port.  In addition, if the hacker has done his homework and has found out all the open ports on your server he just starts sending out thousands of requests to each port, which overloads the entire connection queue. Now no one can connect to the server on any port.

 Open command Prompt, click run type cmd.  Find target: ping for IP address.  type ping t -l  -t means ping the specified host until stopped.  -l size, Send buffer size.

 One of the first things I would recommend is setting up a demilitarized zone (DMZ) within your networks configuration.  A demilitarized zone (DMZ) setup adds an additional layer of security to an organization's Local Area Network (LAN). Because setting up a demilitarized zone (DMZ) is like setting up a sub-network.  You can do a lot of creative things to secure it, and you can disconnect it from the other parts of the network if an attack happens through the internet.

 The usual defense against a DoS type attack is to try to figure out who is sending you server requests, and block them one by one. The problem is that it takes time to figure out who is doing the attack, in the meantime your web sites are effectively inaccessible.  A new defense against a DoS attack, called Speak-Up, the defense works by asking all clients connecting to a server to pump-up the size of their requests. So instead of trying to distinguish between friend or foe traffic, it simply asks all clients to send it more and more traffic.  The theory goes, legitimate clients have way more available bandwidth than attackers, who are probably maxing out their bandwidth while trying to shut you down. As a result, legitimate clients get more of the server's time - enough, hopefully, to prevent a service interruption.

 Speak-Up works like this: at top illusion, you have the portion of the server's resources being used by legitimate traffic (black) when the server is under attack and undefended. Bottom, you've got the same server with Speak-Up in place. Now, the legitimate traffic is getting its fair share of the server's resources.

 Helping to bring modern civilization to its knees.