Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Attacks CS432 - Security in Computing

Similar presentations


Presentation on theme: "Network Attacks CS432 - Security in Computing"— Presentation transcript:

1 Network Attacks CS432 - Security in Computing
Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University

2 References Security in Computing, 4th Ed. Chapter 7 (pgs )

3 Section Overview Anatomy of an Attack Denial of Service Attacks
Packet Sniffing Service Attacks Spoofing Attacks

4 Why are Networks Vulnerable?
Reliance on shared resources System Complexity Unknown perimeter Many points of attack Attacker anonymity Multiple paths to hosts

5 Anatomy of an Attack Footprinting Scanning Enumeration Gaining Access
Denial of Service Escalating Privilege Pilfering Covering Tracks Creating Back Doors Source: Hacking Exposed: Network Security: Secrets and Solutions, by S. McClure, J. Scambray, and G. Kurtz

6 Denial of Service Attacks
ICMP Redirects SYN Flooding Smurf Attacks Service Bombing FTP Finger Mail Bombing Service Bugs Ping o’ Death WinNuke Teardrop Distributed DoS Targets may be Upstream

7 Server never gets ACKs to its SYN
SYN Flood Attack SYN(C, ISNc) SYN(C, ISNc) SYN(C, ISNc) SYN(C, ISNc) SYN(S, ISNs) ACK(C, ISNc) SYN(S, ISNs) ACK(C, ISNc) Client SYN(S, ISNs) ACK(C, ISNc) SYN(S, ISNs) ACK(C, ISNc) Server Server never gets ACKs to its SYN Half Open Connections

8 IP Address Spoofing Replace actual source address in IP packets
Prevent packets from being traced back Exploit IP address-based trust relationships

9 Smurf Attacks 10.1.1.0/24 Network Attacker Ping 10.1.1.255 172.21.0.35
Spoof source: /24 Network

10 Distributed DoS Attacks
Intruder Master Master Master Z Z Z Z Z Z Z Z Victim Source: Results of the Distributed Intruder Tools Workshop

11 Impersonation Attacks
Social Engineering Cracked Passwords Stolen Passwords Sniffed Phishing Berkeley R-Commands

12 Packet Sniffing Promiscuous mode Capture account passwords Read email
See every packet as it crossed the network Transparent Capture account passwords Read Analyze network traffic

13 Network Hubs vs. Switches
Everyone can see traffic Virtual circuit between pair

14 Switch Attacks MAC Flooding – switch will act like hub ARP Spoofing
Who is ? I am (1:2:3:7:8:9)

15 Wireless Networking Bandwidth (shared) Modes
802.11b – 11Mbps 802.11g – 54Mbps 802.11n – 600Mbps (coming soon!) Modes Ad Hoc (Hosts talk directly to each other) Infrastructure (uses Access Points) Identified by Set Server ID (SSID) names

16 Infrastructure Model Internet

17 SSID Broadcasts SSID: Cisco SSID: belkin54g SSID: linksys

18 Default SSIDs

19 Wireless Network Access Control
Only allow known systems to connect Every wireless NIC has a unique address Known as the MAC address Assigned by vendor BSSID: MAC address of Access Point Access Control List MAC Spoofing?

20 Wardriving

21 High Power Mode 450ft = 40 houses, 4 streets

22 Low Power Mode 150ft = 6 Houses, 1 street

23 WEP Authentication Request to Connect Challenge Plaintext  Plaintext
Access Granted WEP Key WEP Key

24 WEP Frame Message CRC Keystream = RC4 (IV, ) IV ID Ciphertext

25 WEP Attacks Initial connection sniffing IV Reuse
Look for IV collisions Some APs reset IV to 0 each time system is (re)initialized IV Dictionary Attacks Injection attacks with known plaintext Wi-fi Protected Access / i

26 IV Reuse Occurrences 1% after 582 encrypted frames
Jesse R. Walker IEEE P Wireless LANS: Unsafe at any key size

27 Replay Attacks ARP Request ARP Request

28 FMS Attack Scott Fluhrer, Itsik Mantin, Adi Shamir
RC4 Matrix Initialization Weakness If a key is weak, keystream will contain some portions of key more than other combinations Statistical Analysis to find

29 Temporal Key Integrity Protocol
TA TSC Base Key Hash() Message CRC Keystream = RC4 (IV,PK) Ciphertext Dictionary Attacks?

30 Token-based Login Race Attack
scott Password: 4 2 3 5 6 Login: Guesses last number and enters it before Scott can finish. scott Password: 4 2 3 5 6 9

31 Resource Sharing May not need account to access files Microsoft Shares
Guest Shares Accounts NFS Exports Samba

32 Service Exploits Banner Grabbing/Vulnerability Scanners
Stack/Buffer Overflow Backdoors File Transfer Programs Anonymous FTP TFTP FTP Bounces

33 Trusted Hosts increase threat!!!
FTP Bounces PORT address, port Upload Commands File RETR file Attacker Anonymous FTP Server with upload area Target Host Trusted Hosts increase threat!!!

34 CGI / Server Side Includes
Extends capabilities of web server External programs loaded by server Form processing Dynamically created pages Runs with same access as web server Susceptible to bugs and access exploits User script dangers

35 DNS Spoofing DNS/ARP Cache Poisoning Pharming
Trust-based access to other machines Berkeley R Commands Remote File systems (NFS/SMB) Web Site Phishing DNSSEC

36 Man in the Middle Attack
Buy New CD

37 Source Routing Attacks
DoS Trusted Host Address set to Trusted Host (IP Spoofing) Trusted Host Source routed connection request R R R R Attacker R R R R Source routed response Trusted Host

38 Session Hijacking Destination Host User Host Attacker Attacker watches live sessions to record sequence numbers Attacker DoS’s User Host and IP spoofs packets to Destination using User Host’s sequence numbers Destination continues session as if nothing happened

39 TCP Sequence Guessing Attacker DoS’s Trusted Host
Attacker attempts to connect to target many times and records sequence numbers Trusted Host Target Attacker calculates sequence numbers which will be assigned for next connection. Router Attacker spoofs address of trusted host and uses calculated sequence numbers (router passes trusted internal address Target runs command from spoofed trusted host Attacker


Download ppt "Network Attacks CS432 - Security in Computing"

Similar presentations


Ads by Google