Sniffing and Session Hijacking Lesson 12. Session Hijacking Passive Attacker hijacks a session, but just sits back and watches and records all of the.

Slides:



Advertisements
Similar presentations
Module X Session Hijacking
Advertisements

Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
Computer Security and Penetration Testing
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Intermediate TCP/IP TCP Operation.
Are you secured in the network ?: a quick look at the TCP/IP protocols Based on: A look back at “Security Problems in the TCP/IP Protocol Suite” by Steven.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
1 Reading Log Files. 2 Segment Format
1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Sniffing, Spoofing, Hijacking This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added.
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
System Security Scanning and Discovery Chapter 14.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Network Attacks Mark Shtern.
Firewalls and Intrusion Detection Systems
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Lecture 23: Network Primer 7/15/2003 CSCE 590 Summer 2003.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
1 The Attack and Defense of Computers Dr. 許 富 皓. 2 Network Architecture:
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Scanning, Sniffing, Spoofing and Man-in-the-middle Attacks
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
OSI Model Routing Connection-oriented/Connectionless Network Services.
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
FIREWALL Mạng máy tính nâng cao-V1.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
1 LAN Protocols (Week 3, Wednesday 9/10/2003) © Abdou Illia, Fall 2003.
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
Transmission Control Protocol TCP. Transport layer function.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Transmission Control Protocol
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
CIS 450 – Network Security Chapter 5 – Session Hijacking.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
1 The Attack and Defense of Computers Dr. 許 富 皓. 2 Network Architecture:
Networking Basics CCNA 1 Chapter 11.
Lesson 7: Network Security and Attacks. Computer Security Operational Model Protection = Prevention+ (Detection + Response) Access Controls Encryption.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
Role Of Network IDS in Network Perimeter Defense.
© 2002, Cisco Systems, Inc. All rights reserved..
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
WIRESHARK Lab#3. Computer Network Monitoring  Port Scanning  Keystroke Monitoring  Packet sniffers  takes advantage of “friendly” nature of net. 
K. Salah1 Security Protocols in the Internet IPSec.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
Network Devices and Firewalls Lesson 14. It applies to our class…
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
TCP Sliding Windows For each TCP connection each hosts keep two Sliding Windows, send sliding window, and receive sliding window to make sure the correct.
CSCE 548 Student Presentation By Manasa Suthram
TCP/IP Internetworking
Wireshark Lab#3.
TCP/IP Internetworking
Introduction to Networking
CCNA 2 v3.1 Module 10 Intermediate TCP/IP
Lecture 3: Secure Network Architecture
Session 20 INST 346 Technologies, Infrastructure and Architecture
TCP Connection Management
Presentation transcript:

Sniffing and Session Hijacking Lesson 12

Session Hijacking Passive Attacker hijacks a session, but just sits back and watches and records all of the traffic that is being sent back and forth Also referred to as “sniffing” Active Attacker finds an active session and takes over. Done by forcing one of the parties offline, where the user can no longer communicate – usually done with a Denial of Service attack.

Sniffing Sniffers are programs or HW devices that monitor (“listen in to”) traffic flowing across a network. They can pull in all packets or be selective and only grab packets destined for certain addresses or that carry a certain type of traffic For a sniffer to work correctly, it needs to view all of the traffic going across a network. Thus, it must be on internal network or on main connection into/out of a network.

Computer Network Monitoring Port Scanning Keystroke Monitoring Packet sniffers takes advantage of “friendly” nature of net. Grabs packets not destined for system used by hackers sysadmins Law enforcement agencies

IP Packet VersionLengthType of Srvc Total Length Identification Flags Fragment Offset Time to live Protocol Header Checksum Source Address Destination Address Options Data

SnifferPro

NetXray

TCP packet Data offset Unused U A P R S F R C S S Y I G K H T NN Window Source Port Urgent Pointer Sequence Number Acknowledgement Number Options Padding Data Destination Port Checksum

NetXray

Van Eck reception Relies on the fact that electronic equipment radiates electromagnetic signals which can be intercepted With the proper equipment signals can be recreated up to 1 kilometer away

Seizing the Signals Eavesdropping on conversations “listening in”, the content Traffic analysis data about the signals themselves

Eavesdropping Cellular Intercepts extremely vulnerable to interception Pager Intercepts also fairly simple Law Enforcement Wiretaps generally require court order with probable cause Foreign Intelligence Intercepts US and others have VERY active program in this arena

ECHELON

Sniffing VoIP sessions

Defeating Sniffer Attacks Detecting and Eliminating Sniffers Possible on a single box if you have control of the system Difficult (depending on OS) to impossible (if somebody splices network and adds hardware) from network perspective Safer Topologies Sniffers capture data from network segment they are attached to, so – create segments Encryption If you sniff encrypted packets, who cares? (outside of traffic analysis, of course)

Traffic Analysis Looks at activity, not contents Pen Registers and Tap & Trace pen registers provides access to the numbers that are dialed from a phone tap & trace provides incoming numbers Location Tracking possible with cellular phones can work even when phone not in use

Session Hijacking Review for a second, the three-way handshake in TCP: UserServer SYN (SN-U) SYN(SN-S),ACK(SN-U+1) ACK (SN-S+1)

Revisit Sequence Numbers Depending on the session to be hijacked, you may or may not be able to observe the traffic and thus know the sequence number. Sequence numbers are 32-bit numbers, Used by recipient to know what order to put received packets in, and To acknowledge packets received so sender knows if it has to resend a packet. There is one for the sender and one for the receiver

Steps in Session Hijacking Find a target Perform sequence number prediction Find an active session Guess the sequence numbers Take one of the parties offline Take over the session

Find a target Need to find a suitable target Need to be able to sample sequence numbers Need to be able to get through the firewall for this Needs to have connected sessions Probably should be a server that allows session- oriented connections (e.g. telnet or FTP)

Perform sequence number prediction If you can view the traffic, no problem… Predictability of sequence number depends on OS (Windows more predictable) Use scanning tool to determine OS (e.g. nmap) Attempt several connections and observe sequence numbers to see how random the sequence is – gather information.

Find an Active Session In session hijacking you want to take over a session – you want somebody to be around This is opposite of usual hacker activity where you don’t want folks around to notice activity The more traffic the better off since there will less chance of somebody noticing (individual may assume heavy traffic is causing them any network problems experienced)

Guess the sequence number For communication to occur need several things: IP address (doesn’t change during session) Port number (doesn’t generally change) Sequence number (changes each packet sent) Thus, attacker must successfully guess sequence number to hijack session Goal is to get server to accept packet sent, take some educated guessing based on knowledge of sequence predictability

Take One of the Parties Offline Once you’ve guessed the correct sequence number, time to eliminate the sender so you can take over the session. Generally done with some form of Denial of Service attack. Server still responds to original system but it never knows because it has been taken out.

Take Over the Session Now the attacker has everything set up Session Sequence number Sender (usually client) taken out Now exploit session, ideally something like a telnet session where you can issue commands such as creating a new account or adding system to list of trusted systems.

Hijacking, doesn’t sound so simple… In theory, it is very complex, fortunately there are some programs out there that can help you. Juggernaut Hunt TTY Watcher IP Watcher All of these are of the “sniffer” type, must see traffic to be able to hijack it. Think about what is needed to hijack a session you can’t see. Remember, however, that I don’t need to be able to sniff all traffic to a server, I can be sniffing at the client side.

Protecting Against Session Hijacking Use encryption Use a secure protocol (usually includes encryption) Limit incoming connections Minimize remote access (referring to outgoing) Have strong authentication (though this is less effective in protecting against hijacking since you are taking over a session after authentication has taken place.)

Summary Hijacking is a real threat Technology is straightforward Many tools available to do this There are legal ramifications