* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Snffing_Spoofing_Session Hjacking_Netcat
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Wireless security wikipedia , lookup
Computer security wikipedia , lookup
Deep packet inspection wikipedia , lookup
Computer network wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Distributed firewall wikipedia , lookup
Network tap wikipedia , lookup
Network Attacks Network Attacks 1 Topics Sniffing IP address spoofing Session hijacking Netcat o General-purpose network tool Network Attacks 2 Sniffing Sniffer gathers traffic from LAN o Can see packets in real time o Usually, interface put in promiscuous mode o Gathers everything, regardless of IP address Sniffer is useful for attacker o And useful for administrator Sniffer can collect data such as … o ID/password sent over telnet, DNS, email messages, files sent over NFS, etc. Network Attacks 3 Sniffing Attacker who has access to LAN can sniff packets o Usually requires admin/root privilege o Typically, use sniffer to gather pwds Sniffing can be used in “island hopping” attack o Next slide Network Attacks 4 Island Hopping Attack Network Attacks 5 Sniffers Freeware sniffers include o windump --- port of tcpdump o Snort --- sniffer/IDS o Wireshark (formerly, Ethereal) --- able to decode lots of protocols o Sniffit --- popular with attackers o Dsniff --- perhaps most powerful Network Attacks 6 Passive Sniffing Thru a Hub Recall that hub broadcasts everything Passive Network Attacks sniffer sees everything 7 Snort Snort: open source, UNIX-based IDS Started out as a sniffer o Still can serve as a capable sniffer o Why does sniffer-to-IDS make sense? Snort not often used by attackers o Has more features than attacker needs Network Attacks 8 Sniffit Sniffit popular with attackers o UNIX-based Sniffit has “interactive mode” o Keeps track of individual sessions o Can view these as separate conversations Network Attacks 9 Sniffit Interactive Mode Network Attacks 10 Wireshark Wireshark (formerly Ethereal) o Available for many platforms o Probably easiest sniffer to use, great UI, etc. Wireshark is a “protocol genius” o Decodes every bit of packet “Follow TCP stream” function o Select a TCP packet, view entire connection Network Attacks 11 Wireshark Network Attacks 12 Sniffer as Scanning Tool Nmap, Nessus, etc., may be detected o Active Sniffer is passive, so no such risk o What can be determined by sniffing? May be able to ID OS (maybe even version of OS) o E.g., based on way connections are made Network Attacks 13 P0f2 Tool to passively ID OS Available for most platforms To “fingerprint” OS’s network stack o Can also ID firewall, NAT, etc. What info does it use? TTL, IP ID, other? Network Attacks 14 P0f2 Network Attacks 15 Switch Recall Network Attacks that switch does not broadcast 16 Active Sniffing Sniffing thru a switch? Switch limits what you see with sniffers such as Wireshark May be able to “sniff” thru switch by inserting traffic o Dsniff and Ettercap Network Attacks 17 Dsniff Developed by developer of FragRouter Dsniff decodes lots application level protocols o FTP, telnet, POP,…, Napster, pcAnywhere o Makes it easy to find passwords Dsniff Network Attacks also has active operations 18 Dsniff Switch remembers MAC addresses MAC address flooding o Dsniff sends packets with random spoofed MAC addresses o Switches address memory eventually exhausted Then what does switch do? o It depends…, but some start acting like hubs o If so, then passive sniffing works Network Attacks 19 Dsniff What to do if flooding fails? ARP spoofing (ARP cache poisoning) o Attacker sets “IP forwarding” on his machine to default gateway (router) o Attacker poisons ARP cache so that he appears to be default gateway o Attacker see all traffic destined for outside world, and traffic still sent to default gateway Network Attacks 20 Default Router Network Attacks 21 Spoofed “Default Router” Network Attacks 22 Dsniff ARP Spoofing How could this be detected? What happens when packet sent from attacker to default gateway? o IP forwarding is “really simple routing” o So, TTL is decremented o Could be detected by, say, traceroute How can attacker avoid this? Network Attacks 23 Ettercap Ettercap uses method known as “port stealing” to sniff switched LAN o Sometimes, hard-coded MAC addresses o In such case, ARP poisoning not possible Port stealing may be an option Network Attacks 24 Ettercap Switch associates MAC addresses to each of its physical ports o Mapping created by examining packets Ettercap floods LAN with frames o Attacker’s MAC address is destination o Source MAC address is victim machine (e.g., default gateway) What does this accomplish? o Switch associates default gateway with its physical port on which attacker resides Network Attacks 25 Ettercap Port stealing So far… switch thinks default gateway on same physical port as attacker o Note: ARP tables on hosts not affected Then attacker can sniff data intended for victim How does attacker then get these packets to the default gateway? Network Attacks 26 Ettercap So far… packets intended for gateway can be sniffed by attacker How to get these packets to gateway? o Forward packets to switch with gateway’s MAC address? o That won’t work! Network Attacks 27 Ettercap Attacker sends ARP request for IP address of gateway When attacker sees response o Knows switch has also seen response So what? o Now switch send data intended for gateway to the gateway o Attacker can then send buffered data Brilliant! Network Attacks 28 Port Stealing Network Attacks 29 DNS Spoofing Dsniff can send false DNS info o Used to redirect traffic Victim tries to resolve name via DNS o Attacker sniffs DNS request o Attacker responds quickly with bogus IP o Victim goes to bogus address Works provided bogus reply arrives first Network Attacks 30 DNS Spoofing Network Attacks 31 Sniffing SSL and SSH Dsniff webmitm enables man-in-themiddle (MIM) attack Send certificate signed by bogus “CA” o o o o In SSL, browser warns use, and … …warning is ignored In SSH user is warned, and … …warning is ignored Network Attacks 32 Sniffing SSL and SSH Man-in-the-middle o Politically correct: “monkey-in-the-middle” Network Attacks 33 Simplified SSL Protocol Can we talk?, cipher list, RA certificate, cipher, RB {S}Bob, E(h(msgs,CLNT,K),K) Alice h(msgs,SRVR,K) Data protected with key K Bob S is pre-master secret K = h(S,RA,RB) msgs = all previous messages CLNT and SRVR are constants Network Attacks 34 SSL MiM Attack RA certificateT, RB Alice {S1}Trudy,E(X1,K1) h(Y1,K1) E(data,K1) RA certificateB, RB Trudy {S2}Bob,E(X2,K2) h(Y2,K2) E(data,K2) Bob Q: What prevents this MiM attack? A: Bob’s certificate must be signed by a certificate authority (such as Verisign) What does browser do if signature not valid? What does user do if signature is not valid? Network Attacks 35 Sniffing SSL Network Attacks 36 Firefox Certificate Warning Network Attacks 37 IE Certificate Warning Network Attacks 38 Webmitm Output Network Attacks 39 SSH Sniffing SSH gives a warning too o Specifically mentions MiM attack o Still, it’s easy to ignore Ettercap also does SSH MiM o But Ettercap is not really in the “middle” o It establishes key with client, then connects client to server using same key Network Attacks 40 Other Dsniff Features Tcpkill --- kill active TCP connection Tcpnice --- “shape traffic” using, e.g., ICMP source quench Filesnarf --- grab NFS files Mailsnarf --- grab email Msgsnarf --- grab IM traffic Urlsnarf --- grab URLs from HTTP traffic Webspy --- view web pages victim views Network Attacks 41 Sniffing Defenses Use secure protocols o SSL, SSH, SMIME, PGP, IPSec Do not use telnet for sensitive info Take certificate warnings seriously Prefer switches to hubs Hard code MAC addresses, if possible Static ARP tables, where possible Network Attacks 42 Sniffing Defenses Use tools to detect promiscuous mode Ipconfig (UNIX), PromiscDetect (Windows) Sentinel looks for anomalies on LAN that indicate sniffing o Send packet (ping, for example) with bogus destination MAC address o Any reply indicates sniffing Also, some Windows-specific tools Network Attacks 43 IP Address Spoofing IP Address Spoofing o Changing source IP address Enables Trudy to… o Cover her tracks o Break applications that use IP address for authentication Previous Network Attacks examples: Nmap, Dsniff, … 44 Simple Spoofing Simply change the IP address o Ipconfig or Windows network Control Panel Works when Trudy does not need response o DoS, for example Tools for packet crafting o Hping2 o Nemesis o NetDude Network Attacks 45 Simple Spoofing Limitations of simple spoofing o Trudy cannot easily interact with target o Spoofing TCP especially difficult Interactive simple spoofing works if Trudy on same LAN as spoofed address Network Attacks 46 Simple Spoofing Network Attacks 47 Predicting Sequence Numbers Not-so-simple spoofing… o Trusted machines often require no authentication beyond TCP connection Trudy can pretend to be trusted machine by spoofing IP address o To establish connection, Trudy must predict initial sequence number Network Attacks 48 Not-So-Simple Spoofing Network Attacks 49 Not-So-Simple Spoofing Note that… o Trudy must correctly guess ISNB o Trudy does not see responses (not a true interactive session) o Bob thinks packets came from Alice o Good attack for r-commands Network Attacks 50 Spoofing via Source Routing Source routing o Specify path packet will take Loose source routing o Specify some hops Source routing makes Trudy’s life much easier o Next slide Network Attacks 51 Spoofing via Source Routing Network Attacks 52 Spoofing via Source Routing Seldom works across Internet o Source routing blocked by gateway May work on internal network o Makes insider attacks easy Network Attacks 53 IP Spoofing Defenses Be sure ISNs are reasonably random Avoid using r-commands o Or use only with SSH or VPN IP address for authentication … NOT! Do not allow source routing Be careful with trust relationships Network Attacks 54 IP Spoofing Defense Employ Network Attacks anti-spoof packet filters 55 Session Hijacking Trudy “steals” an existing session Network-based session hijacking o o o o o Combines spoofing and sniffing Alice and Bob have existing connection Trudy is sniffing packets (on LAN) Trudy starts injecting packets Bob thinks packets came from Alice This works even if strong authentication used, provided there is no encryption Network Attacks 56 Session Hijacking Also, host-based session hijacking Tools for session hijacking o o o o o Hunt Dsniff --- sshmitm Ettercap Juggernaut IP Watcher, TTYWatcher, TTYSnoop Network Attacks 57 ACK Storm If Alice is alive during session hijack… o Limits the attack Network Attacks 58 Ettercap Ettercap can prevent ACK storm ARP cache poisoning o Ettercap makes Trudy MiM Network Attacks 59 Ettercap Network Attacks 60 Hunt Hunt offers similar feature as Ettercap Includes a “resync” feature that may allow Trudy out of MiM o And allow Alice and Bob to continue Ettercap and Hunt attacks can work even if Trudy not on same LAN o Trudy must be on network between Alice & Bob Network Attacks 61 MiM Attack Network Attacks 62 Wireless Access Points All attacks so far also work on wireless networks But wireless has unique attack… Access point hijacking o Given SSID, pretend to be access point o Then need to get victims to associate with fake access point o Tool for this: AirJack Network Attacks 63 Session Hijacking Defenses Use defenses against spoofing and sniffing Use SSH version 2 o Dsniff and Ettercap MiM work against SSH version 1 Pay careful attention to certificate warnings Network Attacks 64 Netcat General-purpose networking tool o “…single most useful tool … for interacting with a system across a network” o “Swiss army knife of network tools” o If you were stranded on a desert island, your one attack tool would be Netcat You get the idea… Network Attacks 65 Netcat Send or receive data from any TCP or UDP port to any TCP or UDP port Network Attacks 66 Netcat For File Transfer File transfer: any port, push or pull Network Attacks 67 Netcat For Port Scanning Plain vanilla port scanning o Unlike Nmap, which has many options Network Attacks 68 Netcat: Connect to Open Ports Connect to open port o Send data and see what comes back Better than telnet because o o o o o Easier to redirect output to file Easier to drop a connection No telnet control data/characters No telnet error messages telnet cannot make UDP connections Network Attacks 69 Netcat: Vulnerability Scanning Netcat as “vulnerability engine” o I.e., attacker writes scripts that use Netcat’s capabilities o Netcat comes with scripts to check for vulnerabilites in RPC, NFS, trust, FTP, a really weak passwords (very limited compared to Nessus) Network Attacks 70 Netcat Backdoors With access to a machine, Trudy can o Start a Netcat listener for future access o Create an active backdoor (i.e., push data) These are most common uses of Netcat by bad guys Network Attacks 71 Netcat to Relay Traffic Can use Netcat to relay traffic o Trudy can hide her true location 10 or more “hops” sometimes seen o Across political/language boundaries Network Attacks 72 Evade Packet Filter Network Attacks 73 How to Create Netcat Relay? Three popular techniques Modify inted in UNIX/Linux o Add a line to inted.conf file “backpipe” on UNIX/Linux o Use mknod: pipes data in FIFO order Relay Network Attacks bat file in Windows 74 Backpipe Network Attacks 75 Netcat Listeners By default, Netcat listener is nonpersistent In Windows version, can create persistent listeners In UNIX, requires a little more work from Trudy to get same effect o see book for details Network Attacks 76 Netcat Honeypots Good guys can create Netcat (persistent) listeners o These can be used as honeypots Network Attacks 77 Netcat Defenses Prevent Netcat file transfers o Firewall configuration issue Secure against port scanning o Minimal number of listening ports Block arbitrary connections to ports o Close unused ports Protect against vulnerability scanning o Apply patches Network Attacks 78 Netcat Defenses Stop backdoors o Need to know what processes are running so you can detect rogue processes Prevent relay attacks o No single point that attacker can relay around Stop persistent listeners o Periodically check for unexpected listening ports Network Attacks 79 Conclusions Network Attacks 80 Summary Network Attacks 81 Netcat Network Attacks 82