* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download UnderstandingtheGnutellaNetwork
Survey
Document related concepts
Transcript
ICAC Peer-to-Peer Training Understanding the Gnutella (P2P) DAY ONE Network Training Objectives • IP Addresses, Ports, Netstat, & IPConfig (Overview) • Provide a general understanding of Gnutella and other Peer to Peer (P2P) file sharing networks and clients; • Provide a general understanding of the RoundUp tool and techniques used by ICAC to investigate P2P file sharing networks; and • Some of the technical implications associated with P2P file sharing. Internet Protocol (IP) Addresses What Are They? • IP addresses are unique identifiers for every device connected to the internet – Similar to a Phone Number • A typical IP address looks like this: 68.112.233.208 Connecting to the Internet Source: 67.45.23.35 Destination: 65.12.25.1 Source: 65.12.25.1 Destination: 67.45.23.35 Internet 67.45.23.35 ISP 65.12.25.1 Dynamic Host Configuration Protocol (DHCP) Server Special/Private IP Addresses • Not globally routable. • Cannot connect directly to the Internet with them. • Cannot address information to a private IP address and send it across the Internet. • Private Addresses – 10.0.0.0 through 10.255.255.255 – 172.16.0.0 through 172.31.255.255 – 192.168.0.0 through 192.168.255.255 – 127.0.0.1 (Loopback) Connecting to the Internet Behind a Router Source: 67.45.23.35 Destination: 65.12.25.1 Internet •Source: 65.12.25.1 Destination: 67.45.23.35 Source: 67.45.23.35 192.168.1.102 65.12.25.1 Destination: 192.168.1.101 External Interface 67.45.23.35 IP Address ISP 192.168.1.101 Source: 192.168.1.101 Destination: 67.45.23.35 MAC 192.168.1.1 Internal Interface 192.168.1.100 Dynamic Host Configuration (DHCP) Network Address Translation (NAT) DHCP Ports • Data is transferred through the Internet in Packets • Packets contain: – Source and destination IP addresses – Source and destination port numbers • Because of this, you can have packets that are destine for the same computer but for completely different applications • Like doors to a business Ports Common Ports: – Port 21 ------- FTP – Port 23 ------- Telnet – Port 25 ------- SMTP – Port 53 ------- Name Server – Port 80 ------- HTTP/WEB – 65,536 available port numbers – More info on Ports: www.iana.org/assignments/port-numbers IP Addresses & Ports • Gnutella Network also uses IP Addresses & Ports to communicate • IP & Port P2P Syntax: 74.234.21.132:6346 • Port Numbers are not always the same or static • Dependent on the Gnutella Client • Can change automatically or manually • Gnutella Client may use more than one port Using Ports to communicate with P2P File Sharing Program Packet(s) – File Request Source IP: 132.177.48.63 Destination IP: 216.109.118.76 Source Port: 6346 Destination Port: 15324 IP: 132.177.48.63 IP: 216.109.118.76 Port: 6346 Port: 15324 Packet(s) – File Transfer Source IP: 216.109.118.76 Destination IP: 132.177.48.63 Source Port: 15324 Destination Port: 6346 10 Netstat (Overview) • Netstat is an internal Windows program that displays the current network connections – Click the “Start” Button – Click “Run” (Windows XP only. Vista/Win7 just type in the “Search programs and files” box) – Type: cmd – Type: netstat -n • Gives us the ability to show that the suspect computer was directly connected to our computer Ipconfig (Overview) • Ipconfig is an internal Windows program that displays the assigned IP address for your computer – Click the “Start” Button – Click “Run” (Windows XP only. Vista/Win7 just type in the “Search programs and files” box) – Type: cmd – Type: ipconfig (ipconfig /all) • May show a public or private IP address assigned by a router Any Questions? • IP Addresses? • Ports? • Netstat? • Ipconfig? P2P File Sharing Programs What is Peer to Peer file sharing?? Peer to Peer (P2P) file sharing programs are a standard way to transfer files from one computer system to another while connected to a network, usually the Internet. What is the Gnutella Network?? An Open Source file sharing network. Why Investigate P2P? • Peer to peer (P2P) file sharing networks, including the Gnutella network, are frequently used to obtain and trade digital files of child pornography. • These files include both image and movie files. • These files range from commercially produced to homemade. • Easy to identify Computers sharing these files Operation RoundUp • Investigative effort into the dissemination of child pornography by the Gnutella file sharing network. • This operation has led to the issuance and execution of search warrants resulting in numerous arrests & convictions for possession and distribution of child pornography. • Additionally, numerous contact offenders & live victims have been located and identified. • RoundUp – PA/MA State Police & UMass/Georgetown RoundUp Investigative Tool • Enhanced from publicly available Gnutella Client (Phex) • Open access to download and candidate details including Hash value, IP address, & GUID • Integrated Geo Location & Files of Interest • Support for high number of Ultra-Peers - Increases search results • Allows separation of downloads / uploads • Multiple, Single Source, or Never Ending Downloads • Collaborative Effort!!!! With RoundUp Four Investigative Obstacles are Overcome: • 1) P2P Clients are Geographically Indiscriminate – they gather candidates and files throughout the world – Regionalize investigations with IP Geo Mapping • 2) File names may be misleading or inaccurate – Uses hash values to identify prosecutable files • 3) Files transferred from multiple sources – Allows either multiple or single source downloads • 4) Dynamic IP Addresses – Ability to track offenders via the GUID What is the GUID? • GUID • Globally Unique Identifier • Example: 09D62EA7D03F677BF252C451ADC83A00 • http://en.wikipedia.org/wiki/Globally_Unique_Identifier • Most Gnutella Clients generate a unique GUID per User Account • When target’s IP changes, GUID stays the same • Allows Investigator to track suspect when IP changes or identify computer/user on-scene • May change with client upgrade or randomly • Can be spoofed Geographic IP Mapping Go to IPChicken.com & Maxmind.com http://www.maxmind.com/ Geographic IP Mapping • IP trace returns city, state, & country • Can’t serve a search warrant based on the IP trace, it is only to show which IP addresses are most likely to be in your jurisdiction. • IP tracing minimizes the amount of effort spent working leads that end up outside your jurisdiction. • Subpoena or Court Order is needed to get the exact location and subscriber of an IP address. P2P File Sharing Programs • Peer-to-Peer file sharing programs allow groups of computers using the same file sharing network (i.e. Gnutella) and protocols to connect directly to each other to share files. Why P2P file sharing networks are so “efficient”? •Fault Tolerance is built in… • If the connection with one peer fails, you will be connected to another •Load Balancing • If a peer becomes too busy you will be connected to another one P2P File Sharing Programs Why P2P file sharing networks are so “efficient”? •Redundancy • There is more then one source for the same file •File Swarming • You get a file from multiple sources depending on your settings and you will continually try to find more sources for that file P2P File Sharing Programs Investigative Bonus: •IP addresses – • Identifies the computers that have the files •File Hashing • SHA-1 or the “Gnutella Hash” uniquely identifies the target file Some client programs display the IP address & SHA-1 hash value of target. Hash Functions • A hash function, also known as a message digest, digital fingerprint, or compression function, is a mathematical function that takes a variable-length input string and converts it into a fixed-length value. • A hash function is designed in such a way that it is impossible to reverse the process, that is, to find a string that hashes to a given value. Common Hash Functions • MD5 (Message Digest) hash takes up 16 bytes, which is 128 bits, and can be expressed as 32 hexadecimal characters. • SHA1 (Secure Hash Algorithm) hash takes up 20 bytes, which is 160 bits, and can be expressed as 40 hexadecimal characters or as 32 characters (Base32). • http://www.itl.nist.gov/fipspubs/fip180-1.htm to learn more about the Secure Hash Standard. Comparison Method Odds of a Match DNA (RFLP analysis) One in 100,000,000,0001 (Billion) MD5 (128 bit) One in 340,282,366,920,938,000,000,000,000,000, 000,000,000 SHA1 (160 bit) One in 1,461,501,637,330,900,000,000,000,000,00 0,000,000,000,000,000,000 1 Excluding monozygotic twins, which are 0.2% of the human population Hash Functions • A "collision" occurs when two different data streams generate the same hash value. – No known “collision” outside a lab environment. – No known SHA-1 collision • “Avalanche Effect” - a slight change in an input string will cause the hash value to change drastically. Even if 1 bit is changed in the input string, often at least half of the bits in the hash value will change as a result. SHA1 - Demonstration JQTPDSTHWKMNDT2VLIE3H7EVLMPH6QNO S33EBO3O5SKAHKKHVATJWSXYSZFQJ5NF Hashing Demonstration • Cyohash (Found on ICACCops Website) SHA-1 – Secure Hash Algorithm v1 Training Point • SHA-1 is used for computing a condensed representation of a message or a data file. SHA-1 produces a secure 160-bit output called a message digest. • It is secure because it is computationally infeasible (2^160th) to find two different files that produce the same SHA-1 value. • The Secure Hash Algorithm (SHA) was developed by the National Institute of standards and Technology (NIST), along with the National Security Agency (NSA), for use with the Digital Signature Standard (DSS) as specified within the Secure Hash Standard (SHS). P2P Networks Free Net Gnutella ed2k Gnutella Network •Open source •Typically free •UltraPeer (Multiple) •True SHA1 (Base32) •160 bit •Clients may display SHA1 and IP address •Cross Platform •Windows, Mac, Linux/Unix • Descriptive File names 12y walking (upskirt) white thong PTHC,ls magazine, little models, PEDO.jpg Gnutella Operation Two types of computers on the Gnutella Network • UltraPeer – indexing servers • Does not contain the actual file • Peer (aka Host or Leaf) - Connects to Ultrapeers • Contains the actual file Who can be an Ultrapeer? • • • • A peer who has agreed in the settings; Must be online a minimum of six hours; Must have spare bandwidth; Must be able to receive UDP/TCP/UPnP connections; • Not behind a firewall or router that hasn’t been configured to allow incoming connections; • Dependant upon network need; and • Can’t be running Mac Classic or Windows 98. Who can be an Ultrapeer? • User chooses to be an Ultrapeer – Options Tab Ultrapeer/Peer Practical 1. You will need a piece of paper and a pen/pencil 2. Write down two picture names from the next slide and your IP Address. 3. Give the piece of paper to the person on the end of your row (at the center of the aisle). 4. YOU are a Peer on our “Gnutella” network 5. The person with all the papers from your row is an Ultrapeer on our “Gnutella” network 6. The name of the file on the piece of paper is NOT the picture file, only a note telling the Ultrapeer what file you are sharing. 7. The Peer (or you) has the picture on your computer. PENCIL BICYCLE CAR AAIGRGUERNWK2LNOVFYDZ7 ZBJ6UA2ZQA S6OTFEMMEKBZOUTBGPQ XMQQCUC2DYGJV CYSV6LGXLNBMO5N6N43KHP4ANYYBLGO5 BRIDGE OSVD6AKWSIR4YONJNOEX6WLHAQMUHQI4 COMPUTER ZXBNTQMIHPTPJXGJLHJ6EQDM2POHCTHC Gnutella P2P Network Training Point Gnutella is an open source file-sharing network. Most computers that are part of this network are referred to as peers, hosts or leaves. A peer can simultaneously provide files (upload) to other peers while getting files (download) from other peers. Peers may be elevated to temporary indexing servers referred to as an “ultrapeer.” Ultrapeers increase the efficiency of the Gnutella network by maintaining an index of the contents of network peers. Gnutella users query ultrapeers for files and are directed to one or more peers sharing that file. There are many ultrapeers on the network, if one shuts down the network continues to operate. The “Push” • If two computers on the Gnutella network are behind a firewall/router, direct communication between the two computers CANNOT occur • If only one computer is behind firewall/router, the common UltraPeer acts as the Push Proxy • Your computer needs to be connected to the same UltraPeer as your target for the “Push” to occur Ultra Peer 68.112.233.208 Ultra Peer Ultra Peer Push Proxy Target’s GUID 09D62EA7D03F677BF 69.114.23.24 U/C Computer Target Computer 0.0.0.0 72.128.122.14 Gnutella P2P Clients Phex P2P Clients in Cases Limewire Frostwire 31% Bearshare 2% Bearshare Shareaza Other Other 2% Shareaza 65% Source Data from RoundUp as of 01/07/2012 Searching for Files • Gnutella clients allow a user to search for pictures, movies and other files by entering descriptive text as a search term. • These terms are typically processed by Ultrapeers based upon the information about terms found in filenames that had been sent by individual peers. Search Terms for CP • PJK • BABY J • PTHC • Vicky Compilation Many Others Searching in Roundup Type search term here Gnutella Operation – Search (Roundup) Search Tab Search Results Gnutella Operation – Search Results With Roundup File Name File Type File Size Source IP • Search Results are reported to User from: – Clients through UltraPeers (Hearsay) – Clients themselves (out of band searching) • No Ultrapeer middle man on the response – Results are complete files (not partial) Hash Value Additional Search Results With RoundUp Vendor • • Files of Interest Location GUID Push Required Files of interest are highlighted in red and submitted to ICACCOPS database REMEMBER: Results are reported either directly from a client or from a client through Ultrapeers – Possible Issue: Hearsay if going through Ultrapeers – Investigator’s responsibility to remove Hearsay issue Eliminate the Issue of Hearsay • Establish a Direct Connection to the source computer. – Download a file or partial file - The download of data from an IP address removes hearsay issues. – Browse Host - This is a “get” command that can usually be completed even if the target’s slots are full • Direct Connect establishes that the target computer was on-line on a specific date and time. – Allows you to get a subpoena, court order or search warrant Gnutella Network – Downloading a File Peer Peer Ultra Peer Ultra Peer Ultra Peer Ultra Peer Send Data Peer Peer File is obtained from Multiple Peer(s) called Swarming Peer Quick/Swarming Download of a File pthc Search Results Quick/Swarming Download of a File File being Downloaded Download Candidates Swarming Download “Locate Candidates” Download of a File pthc Search Results Generates Candidates without Downloading File “Locate Candidate” Download of a File File Generating Candidates Download Candidates Never Ending Download Gnutella Operation – Browsing a Host Peer Peer Ultra Peer Ultra Peer Search Results Ultra Peer Ultra Peer Peer Peer Peer - File List is obtained from a selected Peer - Direct Connect to the Peer Must Occur!!! Browsing a Host with RoundUp Attempt to Browse IP #71.167.48.184 from Hicksville, NY Browsing a Host Results with RoundUp Successful Browse of IP #71.167.48.184 Push Proxy Browse Target’s GUID Target’s Ultrapeers How the Gnutella Network Shares Files Packet I have it Packet Leaf Sender 24.21.23.215 Recipient 68.15.23.25 Leaf Packet I have it Leaf Packet Leaf Packet Packet YOU Search Term Ultrapeer I have it Leaf Packet Leaf Packet I have it Packet Leaf Leaf Packet I have it Leaf Packet Packet 63 Packets are Reassembled To Make Identical Copy of File Packet Packet Packet Packet Packet Packet Packet Packet Packet Packet Packet Packet Packet Packet Packet 64 Single Source Downloading Single Source Download of File Starting with SHA1 Value: 3IIG2EII Single Source Download Download Tab Confirmed Single Source Download Target is the only Candidate Source Client & GUID of Target Also Displayed Why you may be unable to get the Download • Their upload slots are full • Their Bandwidth is maxed out or they turned bandwidth down to zero • They set the number of downloads per user to zero • They aren’t sharing • They are no longer on the network – Are you able to browse?? Why is this important? Static IP vs. Dynamic IP • Cable vs. Dial Up • Hearsay issue • You don’t want to hit the wrong house • By obtaining a browse, file download, or partial file download, then the target MUST be on-line at that time • Check NETSTAT artifact file Gnutella Configurations/Options • The Gnutella network is accessed by sources running different client programs. • These programs share common protocols for network access and file sharing. • HOWEVER, the user interface, features and configuration may vary between clients and versions of the same client. • Many Options can be configured • Know the default configurations/settings Gnutella Configurations/Options Training Point • Some P2P file sharing networks are designed to allow users to download files and frequently provide enhanced capabilities to reward the sharing of files by providing reduced wait periods, higher user ratings, or other benefits. • In some instances, users are not allowed to download files if they are not sharing files. • Typically, settings within these programs control sharing thresholds. Questions??