Transcript DDos

DDos
Distributed Denial of Service Attacks
by Mark Schuchter
Overview






Introduction
Why?
Timeline
How?
Typical attack (UNIX)
Typical attack (Windows)
Introduction
limited and consumable resources
(memory, processor cycles, bandwidth, ...)
inet security highly interdependent
DDos-Attack
prevent and impair computer use
Introduction
Why?
Timeline
How?
Typ. UNIX atk
Typ. Windows atk
Why?
sub-cultural status
nastiness
revenge
to gain access
economic reasons
political reasons
Introduction
Why?
Timeline
How?
Typ. UNIX atk
Typ. Windows atk
Timeline
<1999: Point2Point (SYN flood, Ping of death, ...), first distributed attack tools (‘fapi’)
1999: more robust tools (trinoo, TFN, Stacheldraht), auto-update, added encryption
2000: bundled with rootkits, controlled with talk or ÍRC
2001: worms include DDos-features (i.e. Code Red), include time synchro.,
2002: DrDos (reflected) attack tools, (179/TCP; BGP=Border Gateway Protocol)
2003: Mydoom infects thousands of victims to attack SCO and Microsoft
Introduction
Why?
Timeline
How?
Typ. UNIX atk
Typ. Windows atk
How?
TCP floods
(various flags)
ICMP echo requests
(i.e.. Ping floods)
UDP floods
Introduction
Why?
Timeline
How?
Typ. UNIX atk
Typ. Windows atk
SYN-Attack
Handshake
Attack
SYN-ACK
Client
Attacker
(spoofed IP)
Server
SYN
Server
SYN
SYN-ACK
SYN
SYN-ACK
ACK
Introduction
Why?
Timeline
How?
Typ. UNIX atk
Typ. Windows atk
Typical attack
1. prepare attack
Introduction
Why?
2. set up network
Timeline
How?
3. communication
Typ. UNIX atk
Typ. Windows atk
UNIX (‘trin00’) – preparation I

use stolen account (high bandwidth) for
repository of:
scanners
 attack tools (i.e. buffer overrun exploit)
 root kits
 sniffers
 trin00 master and daemon program
 list of vulnerable host, previously compromised
hosts...

Introduction
Why?
Timeline
How?
Typ. UNIX atk
Typ. Windows atk
UNIX (‘trin00’) – preparation II


scan large range of network blocks to identify
potential targets (running exploitable service)
list used to create script that:
performs exploit
 sets up cmd-shell running under root that listens on
a TCP port (1524/tcp)
 connects to this port to confirm exploit

 list of owned systems
Introduction
Why?
Timeline
How?
Typ. UNIX atk
Typ. Windows atk
UNIX (‘trin00’) – network I



store pre-compiled binary of trin00 daemon on
some stolen account on inet
script takes ‘owned-list’ to automate installation
process of daemon
same goes for trin00 master
Introduction
Why?
Timeline
How?
Typ. UNIX atk
Typ. Windows atk
UNIX (‘trin00’) – network II
attacker
attacker
master
daemon
Introduction
master
daemon
Why?
Timeline
master
daemon
How?
daemon
Typ. UNIX atk
Typ. Windows atk
UNIX (‘trin00’) – communication

attacker controls master via telnet and a pw
(port 27665/tcp)
trin00 master to daemon via 27444/udp (arg1
pwd arg2)
daemon to master via 31335/udp

‘dos <pw> 192.168.0.1’ triggers attack


Introduction
Why?
Timeline
How?
Typ. UNIX atk
Typ. Windows atk
Windows (‘Sub7’) – preparation I

set up the following things on your home pc:
freemail
 kazaa
 trojan-toolkit
 IRC-client
 IRC-bot

Introduction
Why?
Timeline
How?
Typ. UNIX atk
Typ. Windows atk
Windows (‘Sub7’) – preparation II

assemble different trojans (GUI)
define ways of communication
 name
 file

Introduction
Why?
Timeline
How?
Typ. UNIX atk
Typ. Windows atk
Windows (‘Sub7’) – network I

start spreading via
email/news lists
 IRC
 P2P-Software

Introduction
Why?
Timeline
How?
Typ. UNIX atk
Typ. Windows atk
Windows (‘Sub7’) – network II
attacker
client
Introduction
client
Why?
client
Timeline
client
How?
Typ. UNIX atk
Typ. Windows atk
Windows (‘Sub7’) – communication



sub7client
IRC channel
1 click to launch attack
Introduction
Why?
Timeline
How?
Typ. UNIX atk
Typ. Windows atk
Development
binary encryption
“stealth” / advanced
scanning techniques
High
Tools
packet spoofing denial of service
distributed
attack tools
www attacks
automated probes/scans
GUI
sniffers
Intruder
Knowledge
back doors
disabling audits
network mgmt. diagnostics
hijacking
burglaries sessions
exploiting known vulnerabilities
Attack
Sophistication
password cracking
Attackers
password guessing
Low
1980
1985
1990
1995
2001
:
Source CERT/CC
Introduction
Why?
Timeline
How?
Typ. UNIX atk
Typ. Windows atk
Solutions

statistical analyses (i.e. D-ward) at core routers not ready yet

change awareness of people (firewalls,
attachments, V-scanners,...)
Thanks for your attention!