Download presentation
Presentation is loading. Please wait.
Published byLoraine Lester Modified over 9 years ago
1
DNS POISONING + CENSORSHIP LAB DUSTIN VANDENBERG, VIPUL AGARWAL, LIANG ZHAO 1
2
OUR LAB 1. Background Information 2. Reconnaissance 3. Control System 4. Redirection 5. Exploit 6. Context 2
3
1. BACKGROUND INFORMATION Domain Name System (DNS) DNS Attacks Wireshark Socket Programming Proxies 3 Combination of explanation and sources DNS Architecture The Hosts File and What it can do for you Decrypting SSL traffic with Wireshark and ways to prevent it Traffic Analysis with Wireshark Using Wireshark to Decode SSL/TLS Packets Investigation of DHCP Packets using Wireshark Wireshark Lab: DNS Wireshark User’s Guide Man in the Middle
4
1. BACKGROUND INFORMATION (CONT.) DOMAIN NAME SYSTEM (DNS) 4 Internet: Authoritive DNS Servers Resolver: gethostbyname(www.microsoft.com) Server: www.microsoft.com is 1.2.3.4 Caching DNS Server dns.microsoft.com dns.hacker.com Client
5
1. BACKGROUND INFORMATION (CONT.) DNS ATTACKS DNS Cache Poisoning Rogue DNS Server DNS Amplification Attack 5 This is what we use in the lab These are just given as examples for further study
6
1. BACKGROUND INFORMATION (CONT.) WIRESHARK Packet Capture Packet Analysis 6 Source: http://files.filecluster.com/media/screens/33832.jpg
7
1. BACKGROUND INFORMATION (CONT.) SOCKET PROGRAMMING Sockets -> Network Connections in Java 7 Out In Out In Connection Sockets
8
8 1. BACKGROUND INFORMATION (CONT.) PROXIES (MAN-IN-THE-MIDDLE) www.Microsoft.com Proxy (Evil?) Client Microsoft www.Microsoft.com HTML We want control of this power
9
2. RECONNAISSANCE What is our target website? How is the target accessing that website? Ports, Protocols, Proxies, Network Setup How can we become a man-in-the-middle? 9 Source: http://bahansen.info/wp-content/uploads/2014/01/6a00e008d95770883400e54f354d4b8834-800wi.jpg
10
3. CONTROL SYSTEM What happens once we are a man-in-the-middle? We have to create that proxy functionality 10 DEMO!
11
4. REDIRECTION We now must take control of the traffic Examples: Hosts file redirection, configure router 11 DEMO! (Another)
12
5. EXPLOIT Have fun with this power! 12 DEMO! (Yet Another) …surprise, surprise
13
6. CONTEXT Reflection on what this actually accomplished Limitations of our methods Ways to improve How this is used in the real world 13
14
THANK YOU! QUESTIONS/COMMENTS 14
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.