Download presentation
Presentation is loading. Please wait.
1
DDos Distributed Denial of Service Attacks by Mark Schuchter
2
Overview Introduction Introduction Why? Why? Timeline Timeline How? How? Typical attack (UNIX) Typical attack (UNIX) Typical attack (Windows) Typical attack (Windows)
3
Introduction DDos-Attack prevent and impair computer use limited and consumable resources (memory, processor cycles, bandwidth,...) inet security highly interdependent IntroductionWhy?TimelineHow?Typ. UNIX atkTyp. Windows atk
4
Why? sub-cultural status to gain access political reasons economic reasons revenge nastiness IntroductionWhy?TimelineHow?Typ. UNIX atkTyp. Windows atk
5
Timeline 1999: more robust tools (trinoo, TFN, Stacheldraht), auto-update, added encryption 2000: bundled with rootkits, controlled with talk or ÍRC 2002: DrDos (reflected) attack tools, (179/TCP; BGP=Border Gateway Protocol) 2001: worms include DDos-features (i.e. Code Red), include time synchro., <1999: Point2Point (SYN flood, Ping of death,...), first distributed attack tools (‘fapi’) 2003: Mydoom infects thousands of victims to attack SCO and Microsoft IntroductionWhy?TimelineHow?Typ. UNIX atkTyp. Windows atk
6
How? TCP floods (various flags) ICMP echo requests (i.e.. Ping floods) UDP floods IntroductionWhy?TimelineHow?Typ. UNIX atkTyp. Windows atk
7
SYN-Attack SYN-ACK SYN ACK Client Server SYN-ACK SYN Attacker (spoofed IP) Server SYN SYN-ACK IntroductionWhy?TimelineHow?Typ. UNIX atkTyp. Windows atk HandshakeAttack
8
Typical attack 1. prepare attack 2. set up network3. communication IntroductionWhy?TimelineHow?Typ. UNIX atkTyp. Windows atk
9
UNIX (‘trin00’) – preparation I use stolen account (high bandwidth) for repository of: use stolen account (high bandwidth) for repository of: scanners scanners attack tools (i.e. buffer overrun exploit) attack tools (i.e. buffer overrun exploit) root kits root kits sniffers sniffers trin00 master and daemon program trin00 master and daemon program list of vulnerable host, previously compromised hosts... list of vulnerable host, previously compromised hosts... IntroductionWhy?TimelineHow?Typ. UNIX atkTyp. Windows atk
10
UNIX (‘trin00’) – preparation II scan large range of network blocks to identify potential targets (running exploitable service) scan large range of network blocks to identify potential targets (running exploitable service) list used to create script that: list used to create script that: performs exploit performs exploit sets up cmd-shell running under root that listens on a TCP port (1524/tcp) sets up cmd-shell running under root that listens on a TCP port (1524/tcp) connects to this port to confirm exploit connects to this port to confirm exploit list of owned systems IntroductionWhy?TimelineHow?Typ. UNIX atkTyp. Windows atk
11
UNIX (‘trin00’) – network I store pre-compiled binary of trin00 daemon on some stolen account on inet store pre-compiled binary of trin00 daemon on some stolen account on inet script takes ‘owned-list’ to automate installation process of daemon script takes ‘owned-list’ to automate installation process of daemon same goes for trin00 master same goes for trin00 master IntroductionWhy?TimelineHow?Typ. UNIX atkTyp. Windows atk
12
UNIX (‘trin00’) – network II attacker master daemon IntroductionWhy?TimelineHow?Typ. UNIX atkTyp. Windows atk
13
UNIX (‘trin00’) – communication attacker controls master via telnet and a pw (port 27665/tcp) attacker controls master via telnet and a pw (port 27665/tcp) trin00 master to daemon via 27444/udp (arg1 pwd arg2) trin00 master to daemon via 27444/udp (arg1 pwd arg2) daemon to master via 31335/udp daemon to master via 31335/udp ‘dos 192.168.0.1’ triggers attack ‘dos 192.168.0.1’ triggers attack IntroductionWhy?TimelineHow?Typ. UNIX atkTyp. Windows atk
14
Windows (‘Sub7’) – preparation I set up the following things on your home pc: set up the following things on your home pc: freemail freemail kazaa kazaa trojan-toolkit trojan-toolkit IRC-client IRC-client IRC-bot IRC-bot IntroductionWhy?TimelineHow?Typ. UNIX atkTyp. Windows atk
15
Windows (‘Sub7’) – preparation II assemble different trojans (GUI) assemble different trojans (GUI) define ways of communication define ways of communication name name file file IntroductionWhy?TimelineHow?Typ. UNIX atkTyp. Windows atk
16
Windows (‘Sub7’) – network I start spreading via start spreading via email/news lists email/news lists IRC IRC P2P-Software P2P-Software IntroductionWhy?TimelineHow?Typ. UNIX atkTyp. Windows atk
17
Windows (‘Sub7’) – network II attacker client IntroductionWhy?TimelineHow?Typ. UNIX atkTyp. Windows atk
18
Windows (‘Sub7’) – communication sub7client sub7client IRC channel IRC channel 1 click to launch attack 1 click to launch attack IntroductionWhy?TimelineHow?Typ. UNIX atkTyp. Windows atk
19
Development IntroductionWhy?TimelineHow?Typ. UNIX atkTyp. Windows atk High Low 1980198519901995 2001 password guessing password cracking exploiting known vulnerabilities disabling audits back doors hijacking sessions sniffers packet spoofing GUI automated probes/scans denial of service www attacks Tools Attackers Intruder Knowledge Attack Sophistication “stealth” / advanced scanning techniques burglaries network mgmt. diagnostics distributed attack tools binary encryption Source : CERT/CC
20
Solutions statistical analyses (i.e. D-ward) at core routers - not ready yet statistical analyses (i.e. D-ward) at core routers - not ready yet change awareness of people (firewalls, attachments, V-scanners,...) change awareness of people (firewalls, attachments, V-scanners,...)
21
Thanks for your attention!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.