DNS POISONING + CENSORSHIP LAB DUSTIN VANDENBERG, VIPUL AGARWAL, LIANG ZHAO 1.

Slides:



Advertisements
Similar presentations
Review iClickers. Ch 1: The Importance of DNS Security.
Advertisements

SSL Man-in-the-Middle Attack over Wireless Vivek Ramachandran
1 Address Resolution Protocol (ARP) Relates to Lab 2. This module is about the address resolution protocol.
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
VOYAGER: Yet Another Secure Web Browser to Demonstrate Secure Socket Layer Working and Implementation By : Shrinivas G. Deshpande Advisor: Dr. Chung E.
Hands-On Ethical Hacking and Network Defense Lecture 15 Man in the Middle Attack to get Passwords from HTTPS Sessions.
Final Presentation Topics 1) Firewalls 1) Firewalls 2) Virtual Private Networks 2) Virtual Private Networks 3) Secure Socket Layer 3) Secure Socket Layer.
Objectives Install, configure, and troubleshoot DNS
S. Stamm, Z. Ramzan, and M. Jakobsson Presented by Anh Le.
DNS Poisoning Attacks November 2005 John (Jenya) Neystadt Security Test Lead Microsoft Israel R&D.
Internet: Authoritive DNS Servers Resolver: gethostbyname( Server: is Client Caching DNS Server.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
CLIENT / SERVER ARCHITECTURE AYRİS UYGUR & NİLÜFER ÇANGA.
Lesson 17 – UNDERSTANDING OTHER NETWARE SERVICES.
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
Viruses, Phishing and Pharming Megan, Matt, Rishi.
Windows Server 2008 Chapter 8 Last Update
Wireshark and TCP/IP Basics ACM SIG-Security Lance Pendergrass.
Test Review. What is the main advantage to using shadow copies?
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
By : Windi Widiastuti XII TKJ  DEFINITION.
DNS POISONING + CENSORSHIP LAB DUSTIN VANDENBERG, VIPUL AGARWAL, LIANG ZHAO.
Welcome Today Our Topics are: DNS (The Potential Problem for Complete Anonymity) Transparent DNS Proxy (The Problem & The Solution) How To.
Exercises ARP ICMP DNS HTTP/TCP Trace analysis. ARP launch Wireshark ipconfig /all ; see local IP and gateway route -print ; find gateway arp -a ; list.
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
Connecting Networks © 2004 Cisco Systems, Inc. All rights reserved. Exploring How IP Address Protocols Work INTRO v2.0—4-1.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
PACKET ANALYSIS WITH WIRESHARK DHCP, DNS, HTTP Chanhyun park.
Chapter 13 Microsoft DNS Server n DNS server: A Microsoft service that resolves computer names to IP addresses, such as resolving the computer name Brown.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
Introduction to Wireshark Making Sense of the Matrix
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
DNS Tunneling Mihir Nanavati & Long Zhang {mihirn, April 19th 2010.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Packet Capture and Analysis: An Introduction to Wireshark 1.
Chapter 2 The Internet Underlying Architecture. How the DNS works? DNS: Domain Name System Visiting a website: - Write the address - IP will use the address.
Presented by Rebecca Meinhold But How Does the Internet Work?
* Agenda  What is the DNS ?  Poisoning the cache  Short term solution  Long term solution.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Web Caching and Replication Presented by Bhushan Sonawane.
Networks Part 3: Packet Paths + Wireshark NYU-Poly: HSWP Instructor: Mandy Galante.
Security fundamentals Topic 10 Securing the network perimeter.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Dynamic Host Configuration Protocol DHCP Every device that connects to a network needs a unique IP address. Network administrators assign static IP addresses.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
11 MAINTAINING A NETWORK INFRASTRUCTURE Chapter 9.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
UDP Socket Programming
NAT、DHCP、Firewall、FTP、Proxy
Firewall Techniques Matt Cupp.
Xenia Mountrouidou (Dr. X)
Planning and Configuring IPv4
Client Client 4) Hello , please give me the website
Hiding Network Computers Gateways
Computer Networks: Domain Name System 1.
CS4622: Computer Networking
File Transfer Protocol
Mangling Packets on the Fly With Divert Sockets
Network Models, Hardware, Protocols and number systems
Network Hardware and Protocols
Lecture 6: TCP/IP Networking 1nd semester By: Adal ALashban.
Read this to find out how the internet works!
Presentation transcript:

DNS POISONING + CENSORSHIP LAB DUSTIN VANDENBERG, VIPUL AGARWAL, LIANG ZHAO 1

OUR LAB 1. Background Information 2. Reconnaissance 3. Control System 4. Redirection 5. Exploit 6. Context 2

1. BACKGROUND INFORMATION Domain Name System (DNS) DNS Attacks Wireshark Socket Programming Proxies 3 Combination of explanation and sources DNS Architecture The Hosts File and What it can do for you Decrypting SSL traffic with Wireshark and ways to prevent it Traffic Analysis with Wireshark Using Wireshark to Decode SSL/TLS Packets Investigation of DHCP Packets using Wireshark Wireshark Lab: DNS Wireshark User’s Guide Man in the Middle

1. BACKGROUND INFORMATION (CONT.) DOMAIN NAME SYSTEM (DNS) 4 Internet: Authoritive DNS Servers Resolver: gethostbyname( Server: is Caching DNS Server dns.microsoft.com dns.hacker.com Client

1. BACKGROUND INFORMATION (CONT.) DNS ATTACKS DNS Cache Poisoning Rogue DNS Server DNS Amplification Attack 5 This is what we use in the lab These are just given as examples for further study

1. BACKGROUND INFORMATION (CONT.) WIRESHARK Packet Capture Packet Analysis 6 Source:

1. BACKGROUND INFORMATION (CONT.) SOCKET PROGRAMMING Sockets -> Network Connections in Java 7 Out In Out In Connection Sockets

8 1. BACKGROUND INFORMATION (CONT.) PROXIES (MAN-IN-THE-MIDDLE) Proxy (Evil?) Client Microsoft HTML We want control of this power

2. RECONNAISSANCE What is our target website? How is the target accessing that website? Ports, Protocols, Proxies, Network Setup How can we become a man-in-the-middle? 9 Source:

3. CONTROL SYSTEM What happens once we are a man-in-the-middle? We have to create that proxy functionality 10 DEMO!

4. REDIRECTION We now must take control of the traffic Examples: Hosts file redirection, configure router 11 DEMO! (Another)

5. EXPLOIT Have fun with this power! 12 DEMO! (Yet Another) …surprise, surprise

6. CONTEXT Reflection on what this actually accomplished Limitations of our methods Ways to improve How this is used in the real world 13

THANK YOU! QUESTIONS/COMMENTS 14