University Hacking & Security Frontier Spoofing & Scanning 2008. 2. 25. 서 승 현 1.

Slides:



Advertisements
Similar presentations
Security Lab 2 MAN IN THE MIDDLE ATTACK
Advertisements

Sniffing in a Switched Network -With A Recipe To Hack A Switch Using Ettercap and Ethereal -Manu GargManu Garg manugarg at gmail.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Computer Security and Penetration Testing
Hands-On Ethical Hacking and Network Defense Lecture 15 Man in the Middle Attack to get Passwords from HTTPS Sessions.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Dr. Igor Santos.  Denial of Service  Man in the middle  ICMP attacks 2.
Precept 3 Host Configuration 1 Peng Sun. What TCP conn. running? Commands netstat [-n] [-p] [-c] (Linux) lsof -i -P (Mac) ss (newer version of netstat)
1 Reading Log Files. 2 Segment Format
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
Sniffing, Spoofing, Hijacking This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added.
Network Attacks Mark Shtern.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Slide 1 Attacks on TCP/IP. slide 2 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
ITIS 6167/8167: Network and Information Security Weichao Wang.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
1 Reminding - ARP Two machines on a given network can communicate only if they know each other’s physical network address ARP (Address Resolution Protocol)
COEN 252: Computer Forensics Router Investigation.
ECE Prof. John A. Copeland fax Office: Klaus 3362.
Introduction An introduction to the software and organization of the Internet Lab.
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Lecture 8 Modeling & Simulation of Communication Networks.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CS426Fall 2010/Lecture 331 Computer Security CS 426 Lecture 33 Network Security (1)
1 CSCD 434 Lecture 3 NetworkProtocol Vulnerabilities Spring 2012.
Exercises ARP ICMP DNS HTTP/TCP Trace analysis. ARP launch Wireshark ipconfig /all ; see local IP and gateway route -print ; find gateway arp -a ; list.
ARP Scenarios CIS 81 and CST 311 Rick Graziani Fall 2005.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
DoS Seminar 2 Spoofed Packet Attacks and Detection Methods By Prateek Arora.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 4 Routing Fundamentals and Subnets/ TCP/IP Transport and Application Layers.
A day in the life: scenario
Chapter 9 & 10 TCP/IP. TCP/IP Model Application Transport Internet Internet Access.
Introduction to InfoSec – Recitation 11 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Module 01: Dynamic Host Configuration Protocol (DHCP)
Snort & Nmap Mike O’Connor Eric Tallman Matt Yasiejko.
CS426Network Security1 Computer Security CS 426 Network Security (1)
Chapter 2 Scanning Last modified Determining If The System Is Alive.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
CS526Topic 18: Network Security1 Information Security CS 526 Network Security (1)
Chapter 8 Phase3: Gaining Access Using Network Attacks
Router 구성 RAM Interfaces LAN Interfaces (e, t, f) WAN Interfaces (s, hssi) Console Auxiliary bootstrap program IOS(Internetwork OS)실행명령어 programactiveconfigfiletablesbuffers.
Network Attacks CS432 - Security in Computing
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
1 Router 동작 mode (1/2) User Mode Router 동작 상태, Interface 의 상태, 현황등을 check 할 수 있는 command 사용 가능 Router Configuration 의 변경은 불가 Privileged Mode Router 의 Full.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
0x440 Network Sniffing.
1 Interview Questions - What is the difference between TCP and UDP? - What is Nagle's Algorithm? - Describe the TCP handshaking process. - What is Slow.
Inferring Denial of Service Attacks David Moore, Geoffrey Volker and Stefan Savage Presented by Rafail Tsirbas 4/1/20151.
Hands-On Ethical Hacking and Network Defense
or call for office visit,
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. SANS ‘98 Conference -
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Mobile Packet Sniffer Ofer Borosh Vadim Lanzman Dr. Chen Avin
Shambhu Upadhyaya Computer Science & Eng. University at Buffalo Buffalo, New York ATTACK TOOLS & SECURITY POLICIES Shambhu Upadhyaya 1.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
An Introduction To ARP Spoofing & Other Attacks
Introduction to Information Security
Rick Graziani Cabrillo College
MAC Address Tables on Connected Switches
General Classes of TCP/IP Problems
or call for office visit, or call Kathy Cheek,
or call for office visit,
LAN Vulnerabilities.
Introduction An introduction to the software and organization of the Internet Lab.
Network Protocol Vulnerabilities
Presentation transcript:

University Hacking & Security Frontier Spoofing & Scanning 서 승 현 1

University Hacking & Security Frontier PAraDOx CONference 2008 발표자 소개 홍익대학교 컴공과 2 학년 Nchovy.kr 네트워크 담당 Nchovy.kr 웹개발 RSS Reader 개발 관련 자격증 - CCNP - LPIC

University Hacking & Security Frontier PAraDOx CONference 2008 목 차 ARP Packet 분석 - Header 의 내용 ARP Spoofing MAC Flooding DNS Spoofing IDLE Scan 3 PAraDOx CONference 2008

University Hacking & Security Frontier PAraDOx CONference 2008 Test 환경 VMware 상 PC3(4) 대 - Server, XP, Whoppix(or BackTrack) 필요한 상황에서는 GNS 를 이용 - 가상 Emulator 사용 원격환경 설정 Packet Analyzer - WireShark Cisco Simulator 사용 4

University Hacking & Security Frontier PAraDOx CONference 2008 Test 구성 Test 환경 - 좌측 Local 은 /24 - 우측 Local 은 /24 - Routing protocol 은 Rip 을 사용 - Cisco 2xxx 장비를 사용 - Ethernet 환경

University Hacking & Security Frontier PAraDOx CONference 2008 ARP Packet Test Cisco Emulator 환경

University Hacking & Security Frontier PAraDOx CONference 2008 Test > 20.1 Ping Test ( 외부 Network)

University Hacking & Security Frontier PAraDOx CONference 2008 Test 2 Router –ARP Request Packet 받음 BB,CC,DD –ARP Request Packet 드랍

University Hacking & Security Frontier PAraDOx CONference 2008 Test 3 PC -> Router : Arp Request Router -> Pc : Arp Reponse

University Hacking & Security Frontier PAraDOx CONference 2008 Packet Analyze 환경 VMware 환경구축 - NAT 환경 /24 Network - PC 8.1, VMware 8.100, GW 8.2 Flooding Attack : MAC Flooding - Packet Analyzer 로 확인 Sniffing Attack : Analyzer 로 확인

University Hacking & Security Frontier PAraDOx CONference 2008 Packet Analyze 1 VMware -> PC Ping Test

University Hacking & Security Frontier PAraDOx CONference 2008 Packet Analyze 2 ARP 요청 -> ICMP 패킷의 교환 - Request -> Reply 로 이루어져 있음 - Packet Forwarding 시 Ethernet 헤더 (MAC) 이 필요함을 알수 있음 - ARP Packet 에는 인증이 없음.

University Hacking & Security Frontier PAraDOx CONference 2008 ARP Request Header ARP Request Packet 내용

University Hacking & Security Frontier PAraDOx CONference 2008 ARP Request Header 분석 Ethernet Header - DM : FF:FF:FF:FF:FF:FF(Broad Cast) - SM : ARP Request 요청 PC MAC ARP Header - Target MAC : 00:00:00:00:00:00 - Target IP : 수신자측 ( ) ※ ARP 는 상대의 MAC 만 알아올때 쓰인다 !

University Hacking & Security Frontier PAraDOx CONference 2008 ARP Reply Header ARP Reply Header 내용

University Hacking & Security Frontier PAraDOx CONference 2008 ARP Reply Header 분석 Ethernet Header - DM : ARP Request 요청 PC MAC - SM : Reply 측 PC MAC ARP Header - Target MAC : Reply 측 PC MAC - Target IP : 수신자측 ( ) ※ ARP Request 의 DM & TM 내용만 바뀐다.

University Hacking & Security Frontier PAraDOx CONference 2008 공 격 방 법공 격 방 법 ARP 를 이용한 ARP Spoofing - 결국 Sniffing 을 위한 사전공격 - MITM 공격을 위한 사전공격 Analyzer 를 이용한 Sniffing - Data 를 빼내기 위한 공격 TCP 취약점을 이용한 Scanning - Idle Scanning - Syn Scanning, Fin Scanning - X-mas Scanning, Y-mas Scanning

University Hacking & Security Frontier PAraDOx CONference 2008 ARP Spoofing Ethernet 통신의 취약점 이용한 공격 ARP 프로토콜 취약점 – 인증이 없다 ! Local 에서 일어나는 공격 PC 가 Routing 이 가능해야 한다.

University Hacking & Security Frontier PAraDOx CONference 2008 MAC Flooding Switch 의 MAC Table 학습 취약점 이용 DoS 공격의 일종 - Local DoS 공격 - Rip Flooding, (BPDU, HSRP) Attack

University Hacking & Security Frontier PAraDOx CONference 2008 Sniffing Sniffing : 훔쳐듣다 - ARP Spoofing 이 선행되어야한다 - Hub 환경에서는 기본적으로 가능 MITM 공격의 일종 Data 를 빼내는 공격.

University Hacking & Security Frontier PAraDOx CONference 2008 Scanning Scanning : 검색 - 원격에서 Attacker 가 공격을 위한 사전조사 단계에서 실행 - TCP 의 성질을 이용함 - Three-way Handshaking 을 이용

University Hacking & Security Frontier PAraDOx CONference 2008 ARP Spoofing 방법론 ARP 취약점을 이용한 ARP Spoofing - Local 통신시 Ethernet(MAC) 통신임을 노린 공격 - ARP Reply 를 피해자에게 변조공격 - Sniffing 공격을 시도하기 위한 사전공격

University Hacking & Security Frontier PAraDOx CONference 2008 ARP Spoofing 공격 환경설정 - XP *.1.100, Server *.1.101, Whoppix * 외부 환경과 단절된 네트워크 구성 - XP 와 Server 의 통신 간 패킷이 공격자를 거쳐가는 경로 확인.

University Hacking & Security Frontier PAraDOx CONference 2008 ARP Spoofing 정상경로와 Spoofing 후의 경로

University Hacking & Security Frontier PAraDOx CONference 2008 정상적인 통신 MAC

University Hacking & Security Frontier PAraDOx CONference 2008 정상적인 ARP Table

University Hacking & Security Frontier PAraDOx CONference 2008 공격 Packet Forwarding

University Hacking & Security Frontier PAraDOx CONference 2008 WireShark Analyze

University Hacking & Security Frontier PAraDOx CONference 2008 공격 후 ARP Table

University Hacking & Security Frontier PAraDOx CONference 2008 ARP Spoofing 검토 ARP Spoofing 만으로 할 수 있는 일은 없다. 공격자의 NIC 이 Promiscuous mode 로 되어있어 야 한다. - /proc/sys/net/ipv4/ip_forward File 0 -> 1 - FragRouter Tool 사용 Sniffing 을 위한 사전단계 공격

University Hacking & Security Frontier PAraDOx CONference 2008 MAC Flooding 방법론 MAC & IP Random 변조 공격 Switch 의 MAC Table 학습 취약점 - Table 에 없는 Mac Address 일 경우 All Port Flooding 48 Bit Random MAC 생성할수 있음 - 거의 무한으로 Flooding 할수 있다.

University Hacking & Security Frontier PAraDOx CONference 2008 MAC Flooding 정상적인 Packet 들

University Hacking & Security Frontier PAraDOx CONference 2008 MAC Flooding MAC Address, IP 랜덤 생성 무한루프

University Hacking & Security Frontier PAraDOx CONference 2008 MAC Flooding 공격중인 화면

University Hacking & Security Frontier PAraDOx CONference 2008 MAC Flooding 공격 중 패킷 캡처

University Hacking & Security Frontier PAraDOx CONference 2008 MAC Flooding 랜덤 MAC 확인

University Hacking & Security Frontier PAraDOx CONference 2008 MAC Flooding 사후검토 DoS Attack 의 일종 - Smurf, Syn Flooding, Land Attack - BPDU Attack, Rip Flooding,HSRP Attack Switch 의 MAC 학습 취약점 이용 Network 점유율 대폭 증가 - Local Network 속도 저하

University Hacking & Security Frontier PAraDOx CONference 2008 DNS Spoofing 방법론 MITM 공격의 일종 DNS 프로토콜의 인증이 없는 취약점 공격 Phishing 에 이용될 수 있음. ARP Spoofing 이 선행되어야 함.

University Hacking & Security Frontier PAraDOx CONference 2008 DNS Spoofing 정상 DNS 쿼리 경로와 Spoofing 후 경로

University Hacking & Security Frontier PAraDOx CONference 2008 DNS Spoofing XP 의 통신확인

University Hacking & Security Frontier PAraDOx CONference 2008 DNS Spoofing 사전 ARP Spoofing

University Hacking & Security Frontier PAraDOx CONference 2008 DNS Spoofing DNS Spoofing 정보 파일 작성

University Hacking & Security Frontier PAraDOx CONference 2008 DNS Spoofing ARP Spoofing 후 통신불능 상태 해제 DNS Spoofing 공격

University Hacking & Security Frontier PAraDOx CONference 2008 DNS Spoofing DNS Spoofing 공격 성공

University Hacking & Security Frontier PAraDOx CONference 2008 DNS Spoofing 사후 검토 MITM 공격의 일종 ARP Spoofing 으로 Packet Sniffing DNS 의 통신 취약점 - DNS 쿼리는 먼저 온 패킷을 받아들인다. - 나중에 온 패킷은 Drop

University Hacking & Security Frontier PAraDOx CONference 2008 Idle Scanning 방법론 조용한 윈도우 서버를 이용한 Scanning Linux 와 Windows 의 패킷 ID 값 관리 차이를 이용한 Scanning 윈도우는 모든 세션에 대하여 ID 를 공유 리눅스는 세션별로 ID 가 다르다.

University Hacking & Security Frontier PAraDOx CONference 2008 Idle Scanning Idle Scan Packet 흐름

University Hacking & Security Frontier PAraDOx CONference 2008 Idle Scanning IP Spoofing 을 이용한 Scanning Server 가 Victim 에게 ICMP 패킷을 보내는 것으로 위장 Windows 는 패킷 ID 를 공유하므로 ID 값의 변화를 관찰하여 포트를 스캐닝

University Hacking & Security Frontier PAraDOx CONference 2008 Idle Scanning Hping 으로 조용한 Server 에 지속적인 ICMP Packet Forwarding

University Hacking & Security Frontier PAraDOx CONference 2008 Idle Scanning IP Spoofing 을 통한 Syn Scan

University Hacking & Security Frontier PAraDOx CONference 2008 Idle Scanning 검토 조용한 서버를 찾기만 한다면 Attacker 가 드러나지 않는다. 가능한 이유 - Victim 의 Port 가 닫힌 경우 RST 를 보내므로 Server 가 응답하지 않음. - Victim 의 Port 가 열린 경우 ACK/SYN 을 보내므로 서버가 RST 를 보낸다.