Packets and Protocols Recognizing Attacks with the protocol analyzer.

Slides:



Advertisements
Similar presentations
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Advertisements

Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
April 5, 2004 Prof. Paul Lin 1 CPET 355 Data Communications & Networking 6. The Transport Layer (Transmission Control Protocol) Paul I-Hai Lin, Professor.
SYSTEM ADMINISTRATION Chapter 19
Troubleshooting TCP/IP COSC513 FALL By :Ming Wei.
Introduction to Network Analysis and Sniffer Pro
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
CPSC 441 Tutorial - Network Tools 1 Network Tools CPSC 441 – Computer Communications Tutorial.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
Network Debugging Organizational Communications and Technologies Prithvi Rao H. John Heinz III School of Public Policy and Management Carnegie Mellon University.
ICMP: Ping and Trace CCNA 1 version 3.0 Rick Graziani Spring 2005.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Chapter 12 NM Tools and Systems
NETWORK MANAGEMENT Semester 4, Chapter 7. The Administrative Side of Network Management.
CISCO NETWORKING ACADEMY Chabot College ELEC ping & traceroute.
Ping and traceroute Lab/Homework exercise Assigned 9/12/2006 Due 9/19/2006 CSIT 220 Fall, 2006 Based on T. Blum Exercises.
1 ICMP – Using Ping and Trace CCNA Semester
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
CT1304 LAN L AB Rehab AlFallaj. TCP\IP U TILITIES Objectives: To understand the following TCP\IP utilities: Hostname Ipconfig Ping Arp Tracert Netstat.
1 by Behzad Akbari Fall 2011 In the Name of the Most High Network Management Tools and Systems.
Port Scanning.
Module 1: Reviewing the Suite of TCP/IP Protocols.
Chapter Twelve Using TCP/IP on the Network. Objectives Here, we’ll examine how to configure TCP/IP. The concepts of subnetting will be examined in detail.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
Guide to TCP/IP, Third Edition
Hands-on Networking Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Arparp* Displays and modifies the IP-to-Physical address translation tables used by address resolution protocol (ARP) getmacgetmac Shows the mac address(es)
Herramientas para diagnósticos. Ping USO: Ping nombre.dominio o dirección IP Options: -t Ping the specifed host until interrupted. -a Resolve addresses.
Robert E. Meyers CCNA, CCAI Youngstown State University Manager, Cisco Regional Academy Cisco Networking Academy Program Semester 4, v Chapter 7:
Exploring the Packet Delivery Process Chapter
ICMP : Internet Control Message Protocol. Introduction ICMP is often considered part of the IP layer. It communicates error messages and other conditions.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Module 5: Isolating Common Connectivity Issues. Overview Determining the Causes of Connectivity Issues Network Utilities That You Can Use to Isolate Connectivity.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP: A helper protocol to IP The Internet Control Message Protocol (ICMP) is the protocol used for error.
Guide to TCP/IP, Second Edition1 Guide To TCP/IP, Second Edition Chapter 4 Internet Control Message Protocol (ICMP)
Linux Networking and Security
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Error and Control An IP datagram travels from node to node on the way to its destination Each router operates autonomously Failures or problems may occur.
TCP/IP History 1970 – ARPANET started using Network Control Protocol
1 by Behzad Akbari Fall 2008 In the Name of the Most High Network Management Tools and Systems.
Internet Control Message Protocol (ICMP) Chapter 7.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
1 8 Traceroute Program. 2 8 Introduction - Problem Wich route do my packets follow towards my destination?
ERICSON BRANDON M. BASCUG Alternate - REGIONAL NETWORK ADMINISTRATOR HOW TO TROUBLESHOOT TCP/IP CONNECTIVITY.
1 Connectivity with ARP and RARP. 2 There needs to be a mapping between the layer 2 and layer 3 addresses (i.e. IP to Ethernet). Mapping should be dynamic.
LSNDI RMRA 1 Design and troubleshooting M Clements.
1 7 Ping Program. 2 7 Introduction - Problem How do I know if a host is reachable?
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
Ping and Traceroute by Aleisa A. Drivere Supervisor Graciela Perera.
Click to edit Master subtitle style
CompTIA Network+ N Authorized Cert Guide
Ping and traceroute.
Network Tools and Utilities
Troubleshooting Network Communications
ICMP ICMP = Internet Control Message Protocol Layer 3
Part1: Ipconfig ping command Tracert command Getmac command
Internet Control Message Protocol (ICMP)
NETWORK MANAGEMENT Semester 4, Chapter 7.
ICMP – Using Ping and Trace
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol
EVAPI - Enumeration Auburn Hacking club
Presentation transcript:

Packets and Protocols Recognizing Attacks with the protocol analyzer

Packets and Protocols Recognizing attacks   Hacker tools – –Many tools exist – –Most are freeware – –Many are simply adaptations of existing features/tools in the operating system   Ping   Trace route   Nbtstat   nslookup

Packets and Protocols Recognizing attacks   Ping – –Uses ICMP   Many options exist for the ping command

C:\WINDOWS>ping Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS] [-r count] [-s count] [[-j host-list] | [-k host-list]] [-r count] [-s count] [[-j host-list] | [-k host-list]] [-w timeout] target_name [-w timeout] target_nameOptions: -t Ping the specified host until stopped. -t Ping the specified host until stopped. To see statistics and continue - type Control-Break; To see statistics and continue - type Control-Break; To stop - type Control-C. To stop - type Control-C. -a Resolve addresses to hostnames. -a Resolve addresses to hostnames. -n count Number of echo requests to send. -n count Number of echo requests to send. -l size Send buffer size. -l size Send buffer size. -f Set Don't Fragment flag in packet. -f Set Don't Fragment flag in packet. -i TTL Time To Live. -i TTL Time To Live. -v TOS Type Of Service. -v TOS Type Of Service. -r count Record route for count hops. -r count Record route for count hops. -s count Timestamp for count hops. -s count Timestamp for count hops. -j host-list Loose source route along host-list. -j host-list Loose source route along host-list. -k host-list Strict source route along host-list. -k host-list Strict source route along host-list. -w timeout Timeout in milliseconds to wait for each reply. -w timeout Timeout in milliseconds to wait for each reply. Packets and Protocols Recognizing attacks

  Trace route –Uses ICMP Type 8, type 0 and TTL  Sends type 8 w/TTL=1  Receives TTL expired  Sends type 8 w/TTL=2  Received TTL expired

Packets and Protocols Recognizing attacks   NBTStat – –Displays protocol statistics and current TCP/IP connections using NBT (NetBIOS over TCP/IP). – –Yet another way a hacker can gather data to be used against you

Packets and Protocols Recognizing attacks   Nslookup – –DNS tool used to look resolve IP addresses to names and to give the DNS server servicing the request.   Similar to ping -a

Packets and Protocols Recognizing attacks   There are many tools already written that bring together these common utilities – –Common hacker tools can be found at – –Sourceforge

Packets and Protocols Recognizing attacks   Sam Spade – –GUI tool used for gathering information from Websites

Packets and Protocols Recognizing attacks   Ping sweep tools – –Used to discover IP addresses on networks by using ICMP and ARP

Packets and Protocols Recognizing attacks   Port scan tools – –Used to find what ports are open on what devices – –Can scan sequentially or random

Packets and Protocols Recognizing attacks  Cain and Able –Good multipurpose tool for cross platform vulnerability checks

Packets and Protocols Recognizing attacks  ZenMap –Another multipurpose tool to gather information against network nodes

Packets and Protocols Recognizing attacks   SNMP Sweeps – –Two types   Brute force – –Simple guessing program   Starts with the password of a then b -> z then aa, ab, ac ->zz then aaa, aab etc   Dictionary – –Uses a pre-made list of common words or phrases

Packets and Protocols Recognizing attacks   Brute Force

Packets and Protocols Recognizing attacks   Dictionary Attack

Packets and Protocols Recognizing attacks   What to look for: – –Ping sweep   Look for an inordinate amount of ICMP traffic – –Port Scan   Look for incrementing destination ports – –SNMP Attack   Look for a sudden bust of SNMP traffic and monitor the community field in the capture

Packets and Protocols Recognizing attacks   How to defend: – –Ping   Filter out unwanted ICMP types – –Port Scan   Lock down devices and turn off unneeded applications and ports – –SNMP attacks   Use strong passwords

Packets and Protocols Recognizing attacks

 The best solution? –Get an IDS/IPS  Intrusion detection system – passive  Intrusion prevention system - active