Review For Exam 2
Download
Report
Transcript Review For Exam 2
Review For Exam 2
March 9, 2010
MIS 4600 – MBA 5880 - © Abdou Illia
Network & Computer Attacks
(Part 2)
Denial of Service (DoS)
Attempt to make a computer resources unavailable to
legitimate users
Intel Pentium 4 540 (3 Ghz)
512 MB SDRAM
2 x 100 GB SATA HDD
16x CD Drive
Gateway 3-button mouse
Gateway 108 keyboard
SVGA graphic card
NetworkNetwork
Attacker’sHome
Home
Legitimate user
Legitimate user
HTTP requests
Workstation
Stream of HTTP requests
Workstation
Internet
Router
Hub
Workstation
Web Server
HTTP requests
All workstations use IP spoofing
to send HTTP requests to the
web server.
Legitimate user
Workstation
Legitimate user
3
The attackers tries to overload the server by sending a stream of HTTP requests.
The server needs to use its limited resources (processor, RAM) to respond to each request
When overloaded, the server slows down or even crashes.
Workstation
TCP opening and DoS
Server
1
SYN
SYN/ACK
ACK
Waiting for request
from Computer 1
2
SYN
SYN/ACK
ACK
Waiting for request
from Computer 2
3
SYN
SYN/ACK
ACK
Waiting for request
from Computer 3
.
.
.
...
.
Server can maintain multiple connections
For each TCP connection request (SYN), server…
Responds to the request (SYN/ACK)
Set resources aside (Processor’s capacity, RAM, bandwidth)
4
in order respond to each upcoming data request
TCP Connection opening
TCP connection opening is accomplish as follow
3-way
handshake
Client sends a TCP SYN to request connection
Server responds by sending back a TCP SYN/ACK
Client responds by sending a TCP ACK
Some form of computer attacks exploit the 3-way
handshake process
Example: A client may send a TCP ACK without the two
steps of the 3-way handshake being accomplished
ACK
Attacker
5
Victim
SYN Flood DoS
Attacker sends a series of TCP SYN opening requests
For each SYN, the target has to
Send back a SYN/ACK segment, and
set aside memory, and other resources to respond
When overwhelmed, target slows down or even crash
SYN takes advantage of client/server workload
asymmetry
SYN
SYN
SYN
SYN
SYN
Attacker
6
Victim
Web Server configuration
7
Bandwidth Throttling
Method of ensuring a bandwidth-intensive
device, such as a server…
will limit ("throttle") the quantity of data it transmits
and/or accepts within a specified period of time
For web servers, bandwidth throttling …
helps limit network congestion and server crashes
For ISPs, bandwidth throttling …
can be used to limit users' speeds across certain
applications (such as BitTorrent), or limit upload
speeds.
When allowed bandwidth is reached, the
server will block further connection
attempts…
8
By moving them into a queue, or
By dropping them
Bandwidth Throttling (cont)
When you enable bandwidth throttling,
Internet Information Services (IIS)
activates a set of counters to monitor it in
System Monitor (SysMon).
9
Current Blocked Async I/O
Requests counter
Number of requests blocked or
held in a buffer until bandwidth
is available.
Measured Async I/O
Bandwidth Usage/Minute
number of bytes sent per
minute as indicated by a
sample taken by bandwidth
throttling.
Rejected Async I/O Requests
number of requests rejected by
bandwidth throttling since the
service was last started.
Total Length (16 bits)
Flags
Fragment Offset (13 bits)
Ping of Death attacks
Take advantage of
Fact that TCP/IP allows large packets to be fragmented
Some network applications & operating systems’ inability to handle
packets larger than 65536 bytes
Attacker sends IP packets that are larger than 65,536
bytes through IP fragmentation.
Ping of death attacks are rare today as most operating
systems have been fixed to prevent this type of attack
from occurring.
List of OS that were vulnerable:
http://insecure.org/sploits/ping-o-death.html
Fix
Add checks in the reassembly process of servers
Add checks in firewall to protect hosts with bug not fixed
Check that Sum of Total Length fields for fragmented IP is < 65536 bytes
10
or less than maximum allowed
Distributed DoS (DDoS)
Attack
Attacker hacks into multiple clients and plants handler
programs and Zombie programs on them
Attacker sends attack commands to Handlers and Zombie
programs which execute the attacks
First appeared in 2000 with Mafiaboy attack against cnn.com,
ebay.com, etrade.com, yahoo.com, etc.
Attack
Command
DoS Messages
Computer with
Zombie
Server
11
Attack
Command
Handler
DoS Messages Computer with
Zombie
Attack
Command
Attacker
Buffer Overflow Attack
Occurs when ill-written programs allow data destined to a
memory buffer to overwrite instructions in adjacent
memory register that contains instructions.
If the data contains malware, the malware could run and
creates a DoS
Example of input data: ABCDEF LET JOHN IN WITHOUT
PASSWORD
Buffer
1
2
3
Instructions
4
5
6
Print
Run Program
Accept input
Buffer
1
A
2
B
3
C
Instructions
4
D
5
E
6
F
LET JOHN IN WITHOUT PASSWORD
Run Program
12
Accept input
Keyloggers
Used to capture keystrokes on a computer
Hardware
Software
Software
Behaves like Trojan programs
Hardware
Easy to install
Goes between the keyboard and the CPU
KeyKatcher and KeyGhost
13
Summary Questions
Describe SYN flooding.
What is a Zombie program?
Explain how Ping of Death attack occurs?
Explain difference between DoS and DDoS.
Do DoS attacks primarily attempt to
jeopardize confidentiality, integrity, or
availability?
What is a Buffer Overflow attack?
What is a hardware keylogger?
14
Footprinting
Footprinting
Process of collecting information about an
organization, its network, its IP address ranges,
its IP address registration, and the people
involved in network/computers issues.
Footprinting is conducted through social
engineering and by researching information
from
printed resources
From online resources
Footprinting tools/techniques:
Gathering WHOIS information
Performing web reconnaissance
DNS interrogation
16
Understanding Footprinting Lab (Lab 4)
You must understand the footprinting activities
performed in Lab 4. In particular:
What Footprinting tools were used
What can be done with each
You are allowed to have your lab sheet during
the exam
17
Scanning
What is Scanning?
Step after footprinting
1. Footprinting
2. Scanning
3. Enumeration Searching
vulnerabilities
4. Attack
Referred to as port scanning, service scanning,
or network scanning
Process of scanning a range of IP addresses in
order to determine what services/programs are
running on networked computers
Typically performed using scanning tools like
Command
line utilities like Fping, Hping, nmap,
tcpdump, etc
GUI scanners
19
Types of Port scanning
SYN
SYN/ACK
ACK
SYN scan—In normal TCP session, first the client sends the server a TCP packet with
the SYN flag set. The server responds to this with a packet having both SYN and ACK
flags set, acknowledging the SYN. The client then replies with an ACK of its own,
completing the connection. With SYN scan the 3-way handshaking is not completed;
which means the target never log the “transaction”. After all you don’t want the log
to show your IP address.
FIN scan—In this scan, a TCP packet with the FIN flag set is sent to the target
computer to “see” how it react. Normally, a TCP packet with the FIN flag set is sent to
a client when the server is ready to terminate the connection. The client responds
with an ACK which acknowledges the disconnect.
NULLscan—In a NULL scan, all the packet flags are turned off, that means none of the
RST (reset), FIN, SYN, or ACK flags is set. If the ports of the target are closed, the
target responds with a TCP RST packet. If the ports are open, the target sends no
reply, effectively noting that port number as an open port to the user.
ACK scan—A TCP packet with the ACK flag set. Scans of the TCP ACK type are used
to identify Web sites that are active, which are normally set not to respond to ICMP
pings. Active Web sites respond to the TCP ACK with a TCP RST, giving the user
confirmation of the status of a site.
TCP Connect scan—The “three-way handshake” process described under TCP SYN
20
above. When one system sends a packet with the SYN flag set, the target device
responds with SYN and ACK flags set, and the initiator completes the connection with
a packet containing a set ACK flag. Unlike in a SYN scan, the “transaction” is logged.
Types of Port scanning
XMAS scan—In this kind of scan, the FIN, PSH, and URG flags are set. Closed ports
respond with a RST packet. Can be used to determine which ports are open. Not
getting the RST packet doesn’t mean that the port is open because firewalls or other
packet filtering devices may be configured to drop the UDP scan packet.
UDP scan—In this scan, a UDP packet is sent to the target computer. If the computer
sends back an ICMP “Port unreachable” message, the port is. Not getting this
message doesn’t mean that the port is open because firewalls or other packet
filtering devices may be configured to drop the UDP scan packet.
21
Understanding Scanning Lab (Lab 5)
You must understand the scanning activities
performed in Lab 5. In particular:
What scanning tools were used
What can be done with each
What kind of information can be collected using
the tools
You are allowed to have your lab sheet during
the exam
22
Enumeration
What is Enumeration?
1. Footprinting
2. Scanning
3. Enumeration
4. Attack
Searching
vulnerabilities
Security Testing Step to be performed after
Discovering live targets >>[Scanning]
Determining open ports and services hosted
by discovered live targets >>[Scanning]
Determining OS >> [Scanning]
Process of extracting the following from targets
Available resources or shares
User/group names and password
Enumeration is more intrusive than footprinting
and scanning because you try to access
resources
Typically performed using Enumeration tools like
24
NetBIOS names scanners
Share scanners
Vulnerability scanners such
as Nessus
Understanding Enumeration Lab (Lab 6)
You must understand the Enumeration activities
performed in Lab 6. In particular:
What Enumeration tools were used
What can be done with each
What kind of information can be collected using
the tools
You are allowed to have your lab sheet during
the exam
25