Easy Traffic Manipulation Techniques Using Scapy

Slides:



Advertisements
Similar presentations
Ethical Hacking Module VII Sniffers.
Advertisements

Intrusion Detection/Prevention Systems Charles Poff Bearing Point.
Christopher Avilla. What is MiTM?Computer MiTMGSM MiTM Tips for Detection of MiTM.
Security Lab 2 MAN IN THE MIDDLE ATTACK
Man in the Middle Attack
Hands-On Ethical Hacking and Network Defense Lecture 15 Man in the Middle Attack to get Passwords from HTTPS Sessions.
Security Q&A OSG Site Administrators workshop Indianapolis August Doug Olson LBNL.
Sniffing, Spoofing, Hijacking This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added.
Tim Maletic Security Consultant. Goal of this talk To convince you that: Layer 2 must be included in the scope of your security assessments Thou shalt.
OWASP Xenotix XSS Exploit Framework

Security Issues and Challenges in Cloud Computing
Packet Sniffing - By Aarti Dhone.
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
Demonstrating HTTP Session Hijacking through ARP Cache Poisoning and Man-in-the-Middle Attack and exploring HTTPS and VOIP session vulnerabilities Mainuddin.
ITIS3100 By Fei Xu. Acknowledge This document is basically a digest from “Wireshark User's Guide for Wireshark 1.0.0” You can download the software.
A Study in TCP/BGP Session Security
Norman SecureSurf Protect your users when surfing the Internet.
SSL Man-in-the-Middle Attacks with Dsniff Rochester OWASP & ISSA Chapters Ralph Durkee Durkee Consulting, Inc.
Introduction to Honeypot, Botnet, and Security Measurement
DNS POISONING + CENSORSHIP LAB DUSTIN VANDENBERG, VIPUL AGARWAL, LIANG ZHAO.
IIT Indore © Neminath Hubballi
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
Linux Networking and Security Chapter 11 Network Security Fundamentals.
© British Telecommunications plc Network Filtering.
DNS POISONING + CENSORSHIP LAB DUSTIN VANDENBERG, VIPUL AGARWAL, LIANG ZHAO 1.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
IBM Rational Application Security Group (aka Watchfire) Web Based Man In the Middle Attack © 2009 IBM Corporation 1 Active Man in the Middle Attacks The.
Network Protocol Testing www. Rockfortnetworks.com www. Rockfortnetworks.com Rockfortnetworks
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
DHCP Security DHCP Snooping and Security David Mitchell 03/19/2008.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Scapy. Introduction  It’s a packet manipulation tool.  It can forge or decode packets of a wide number of protocols, send them on the wire, capture.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
E-Detective HTTPS/SSL Interception – MITM & Proxy Decision Group
Web Applications Testing By Jamie Rougvie Supported by.
Network Attacks Bharatha Yajaman ISQS Outline Sniffing  Passive Sniffing  Active Sniffing IP Address Spoofing  Changing the IP address  Undermining.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Slides and projects at samsclass.info. Adding Trojans to Apps Slides and projects at samsclass.info.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
Adding Trojans to Apps Slides and projects at samsclass.info.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Evil Twin Wireless Access Point Attack (or, Thanks for Your Passwords!) Dan Ginsberg 5/4/2015.
Network Devices and Firewalls Lesson 14. It applies to our class…
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
IBM Rational Application Security Group (aka Watchfire) Web Based Man In the Middle Attack © 2009 IBM Corporation 1 Active Man in the Middle Attacks The.
The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors.
It's Everywhere Point of Sale attacks ● The free WiFi is connected to the same DSL or cable service as the PoS computers ● Depending if this free WiFi.
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
TCP Sliding Windows For each TCP connection each hosts keep two Sliding Windows, send sliding window, and receive sliding window to make sure the correct.
How To Be nosey on the Interwebz. What you need Linux Laptop Local Wireless Network you want to do sniffing on ettercap Wireshark driftnet nmap.
NodeJS Security Using PassportJS and HelmetJS:
Penetration Testing: Concepts,Attacks and Defence Stratagies
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
Jason Ewing Troy Behmer
Man in the middle attacks Demos
Man-in-the-Middle Attacks
CS4622: Computer Networking
Secure Browsing Because malware usually doesn’t identify itself.
Information Assurance Day Course Man-in-the-middle Attacks
SUBMISSION TITLE Srinivas Munigala & Principal QA Engineer
Webscarab, an introduction.
Backtrack Metasploit and SET
Burp Suite Web Analysis
EVAPI - Enumeration Auburn Hacking club
The Hacking Suite For Governmental Interception
Presentation transcript:

Easy Traffic Manipulation Techniques Using Scapy Introduction MITM 101 Easy Traffic Manipulation Techniques Using Scapy

Bob Simpson Introduction @bobby_simpson Bob Simpson has fun researching security… and is CIO for Finley & Cook, PLLC, and inventor of GhostSentry, a technology that uses MITM techniques for good purposes.

MITM (aka MiTM, MitM, etc.) NOT just sniffing What is MITM? MITM (aka MiTM, MitM, etc.) NOT just sniffing Involves getting in the middle of a two-way conversation Often explained as Alice talking to Bob, with Mallory in the middle convincing Alice that she’s Bob, and Bob that she’s Alice. Picture from https://en.wikipedia.org/wiki/Man-in-the-middle_attack

What is MITM? Let’s do it! [ DEMO ] Picture from https://en.wikipedia.org/wiki/Man-in-the-middle_attack

What do we get? What do we get? Reconnaissance (fingerprinting) NTLM capture, relay, escalation, redirection SSL bypass Steal and/or break credentials Or, simple redirection ( … and the resulting software download, browser exploit, etc)

What do we get? What do we get? Pwnage!!!

How is it done? Google it: Tools: Ettercap, Cain and Abel, Arpspoofing, mitmf, websploit, Burp suite, SSL Strip, middler, Fiddler2, Subterfuge, DSniff, wsniff, and commercial stuff (Hack5’s new LanTurtle) Methods: ICMP redirect, STP Mangling, Route mangling, imposter domains and URLs Attacking local systems ARP, DNS, STP, hardware Attacking remote systems DNS, route mangling, proxy and tunneling

How is it done? Why easy is good: From the DEF CON ROOTZ Asylum area:

Let’s do it! Our Setup: Tools: Scapy (packet manipulation for Python) NFQUEUE (bindings for netfilter queue) Method: Bridging

Basic Method Preparation: Ubuntu 14.04 (or your own flavor) Apt-get install bridge-utils, scapy, python-nfqueue Execution: Follow the three steps: Create a Bridge Redirect Packets to Scapy Mangle to your hearts content

Basic Method Let’s do it! [ DEMO ]

Summary Preparation Ubuntu 14.04 (or your own flavor) Apt-get install bridge-utils, scapy, python-nfqueue Execution Follow the three steps: Create a Bridge Redirect Packets to Scapy Mangle to your hearts content

Google Scapy and NFQUEUE for great tutorials Summary Google Scapy and NFQUEUE for great tutorials

What would you like to know? Q&A What would you like to know?

The End Bob Simpson @bobby_simpson