Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall.

Slides:



Advertisements
Similar presentations
NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
Advertisements

Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
Chapter 21 Exercises 1. A router forwards packets between networks. (Given a destination host address, it must be able to figure out which network that.
METEOROLOGICAL TELECOMMUNICATION AND METCAP A GLANCE TO NETWORK BRIEFLY Ömer Hüdai ALBAYRAK 2010ALANYA.
DHCP Dynamic Host Configuration Part 7 NVCC Professional Development TCP/IP.
SYSTEM ADMINISTRATION Chapter 19
Operating Systems Concepts 1/e Ruth Watson Chapter 11 Chapter 11 Network Maintenance Ruth Watson.
Copyright (c) 2005 Japan Network Information Center JPNIC IPv6 registry service experience Toshiyuki Hosaka Japan Network Information Center (JPNIC) September.
Week 5: Internet Protocol Continue to discuss Ethernet and ARP –MTU –Ethernet and ARP packet format IP: Internet Protocol –Datagram format –IPv4 addressing.
Week 2 -1 Week 2: Footprinting What is Footprinting? –Systematic collection of information on an intended target with the goal to create a complete profile.
Ping and traceroute demonstration Skills: Use Ping and Traceroute and Query the Whois database IT concepts: network transit time, router hops, IP registration.
Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability.
CSC586 Network Forensics IP Tracing/Domain Name Tracing.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Reconnaissance Steps. EC-Council Gathering information from Open Sources  Owner of IP-address range  Address Range  Domain Names  Computing Platforms.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Chabot College ELEC Name Resolution.
Networking Basics: DNS IP addresses are usually paired with more human-friendly names: Domain Name System (DNS). internet.rutgers.edu HostnameOrganizationTop-level.
DNS.
Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall.
IP Addressing. Dotted Decimal Notation IP addresses are written in a so-called dotted decimal notation Each byte is identified by a decimal number in.
Chapter Twelve Using TCP/IP on the Network. Objectives Here, we’ll examine how to configure TCP/IP. The concepts of subnetting will be examined in detail.
Forensic and Investigative Accounting
1 Figure 3-33: Internet Control Message Protocol (ICMP) ICMP is for Supervisory Messages at the Internet Layer ICMP and IP  An ICMP message is delivered.
Data Gathering A hacker can’t do anything to you if they don’t know anything about you. The hacker requires: –A target –Your ip address –Your OS type –What.
DHCP: Dynamic Host Configuration Protocol
Welcome Today Our Topics are: DNS (The Potential Problem for Complete Anonymity) Transparent DNS Proxy (The Problem & The Solution) How To.
IPv6 Summit [2000/12/19]©Copyright 2000 Japan Network Information Center 1 JPNIC IPv6 Activity JPNIC (Japan Network Information Center) Ui, Takaharu
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
4: Network Layer4a-1 IP addresses: how to get one? Hosts (host portion): r hard-coded by system admin in a file r DHCP: Dynamic Host Configuration Protocol:
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
Midterm Review. Lab 4: dynamic routing protocols.
PACKET ANALYSIS WITH WIRESHARK DHCP, DNS, HTTP Chanhyun park.
Chapter 13 Microsoft DNS Server n DNS server: A Microsoft service that resolves computer names to IP addresses, such as resolving the computer name Brown.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
CIS 450 – Network Security Chapter 3 – Information Gathering.
CIS 3360: Internet: Network Layer Introduction Cliff Zou Spring 2012.
Network Layer4-1 Subnets How many?
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
The Internet School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 15, Monday 12/02/2002 and Wednesday 12/04/2002)
ARP Spoofing Attacks Dr. Neminath Hubballi IIT Indore © Neminath Hubballi.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2004.
Module 3 – Information Gathering  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
Guide to TCP/IP, Third Edition Chapter 8: The Dynamic Host Configuration Protocol.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Chapter 12 End-to-End Networking. FIGURE 12.0.F01: UDP packet fields.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 6 Resolving Network Host Names.
TCOM Information Assurance Management Casing the Establishment.
Hour 5 Subnetting 1. you will be able to Explain how subnets and supernets are used Explain the benefits of subnetting Develop a subnet mask that meets.
CPMT 1449 Computer Networking Technology – Lesson 3
1 Lecture, November 20, 2002 Message Delivery to Processes Internet Addressing Address resolution protocol (ARP) Dynamic host reconfiguration protocol.
NETWORKING (2) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Scaling the Network: Subnetting and Protocols
Security Issues with Domain Name Systems
Footprinting and Scanning
Domain Name Registration, ICANN, Registrars & Hosting Options
Troubleshooting IP Communications
NETWORK TROUBLESHOOTING COMMANDS
Attack Methods Chapter 4
Learning objectives By the end of this unit you should: Explain
Passive Research Section 2 11/29/2018.
IPv6 Allocation Service in JPNIC
Presentation transcript:

Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall

2 Figure 4-1: Targeted System Penetration (Break-In Attacks) Unobtrusive Information Collection  Do research before sending any packets into the network Use in social engineering attacks Use as background for packet attacks  Corporate website  Trade press (often online and searchable)  Securities and Exchange Commission (SEC) web-enabled Internet financial database (Figure 4-2)

3 Figure 4-2: Securities and Exchange Commission's Edgar Service

4 Figure 4-1: Targeted System Penetration (Break-In Attacks) Unobtrusive Information Collection  Whois database (Figure 4-3) Information about responsible person Information about IP addresses of DNS servers, to find firm’s IP address block Easy if assigned a classful address block (Figure 4-4) Difficult is CIDR address block or a block of ISP addresses

5 Registrant: Panko, Ray (PUKANUI-DOM)PUKANUI-DOM 1000 Pukanui St. Honolulu, HI US Domain Name: PUKANUI.COM Administrative Contact: Panko, Ray 1000 Pukanui St. Honolulu, HI US (808) Figure 4-3: Whois Entry for Pukanui.Com (from

6 Registrant: Technical Contact: VeriSign, Inc. (HOST-ORG) VeriSign, Inc Ridgetop Circle Dulles, VA US fax: - Record expires on 07-Jul-2003 Record created on 07-Jul-2001 Database last updated on 7-Jun :07:22 EDT. Domain servers in listed order: NS76.WORLDNIC.COM NS75.WORLDNIC.COM Figure 4-3: Whois Entry for Pukanui.Com (from DNS Servers

7 Figure 4-4: Classful IP Address Allocations Example  Suppose DNS server is  Must be a Class B address block (from table lookup)  Therefore, the network part is 16 bits:  Address block must be to ClassInitial IP Address in Class Last IP Address in Class Size or Network Part Addresses in Block Allocated to Firm A ,777,214 B ,534 C

8 Figure 4-1: Targeted System Penetration (Break-In Attacks) IP Address Spoofing (Figure 3-17)  Put false IP addresses in outgoing attack packets Attacker is blind to replies  Use series of attack platforms (Figure 4-5)

9 Figure 4-5: Using a Chain of Attack Hosts Attacker Victim Compromised Host Compromised Host Attack Replies Allows Reading of Replies Without Exposing Attacker

10 Figure 4-5: Using a Chain of Attack Hosts Subsequent Trace Back Successful Connection Broken Connection Broken Compromised Host Compromised Host Attacker Victim

11 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  To identify IP addresses of potential victims  Ping individual hosts (Figure 4-6)  Ping all IP addresses in block for live IP addresses (Figure 4-7)

12 Figure 4-6: Ping at the Windows Command Prompt

13 Figure 4-7: Ping Scanning With Ping Sweep