Joshua White - Everis Inc.
Download
Report
Transcript Joshua White - Everis Inc.
Joshua White
Director of CyOON Research and Development
“Cyber Operations for Optical Networks”
[email protected]
Everis Inc
http://www.EverisInc.com
(315)-370-1535
CyberPatriot Advanced Topics:
IP Spoofing Overview
Agenda
Company Background
IP Spoofing Overview
Why Is It So Easy
Types Of IP Spoofing
Detection Techniques
Prevention Techniques
Conclusions
IP Spoofing
Overview
IP spoofing is a technique used to gain unauthorized access to
computers/networks
The attacker sends messages to a computer using a forged IP
address indicating that the message is coming from a trusted host
IP Spoofing
Overview (2)
IP Spoofing Occurs When An Individual Inside Or Outside Of A
Network Impersonates The Conversations Of A Trusted Node
Most Spoofing Attacks Fall Under Two Techniques:
Using An IP Address Within The Range Of Trusted IP's
Using An Authorized External IP Address That Is Trusted.
For Government And Enterprise Instances A Third Technique Exists:
Using An IP Address Other Than Your Own To Place Blame On
Another Country Or Individual. This IP Address Is Neither Trusted
or Untrusted, It Simply Is Not Truthful.
IP Spoofing
Overview (3)
Considering The AAA Model For Secure Protocols, (RFC-2906) Some
Example Uses Of IP Spoofing To Perpetrate Attacks Against It Are:
Injection of Malicious Data Or Code Into An Existing Data Stream
(Authentication)
A Hacked Routing Table Set For The Attacker To Receive And
Send From A Spoofed IP Would Allowing Them To Completely
Replace The Legitimate Source. (Authorization)
DoS or Other Attacks Can Be Covered Up By Using A Spoofed IP
Address To Shirk Responsibility For The Action. Thus Breaking
The Rules Of Non-Repudiation (Accountability)
Why Is It So
Easy?
IP Spoofing Is Easy Due To A Number Of Reasons
Routers Forward Traffic Based On The Destination Address (RFC1812)
Some Security Mechanisms Allow For IP As The Sole Means Of
Authentication (RFC-5406)
Actually Changing The Source IP In a Packet Is Extremely Easy To
Do (LibPal, PacketForge, Etc.)
Types Of IP
Spoofing
Everis Engineers Define IP Spoofing Attacks As Falling Under Three
Categories:
Blind
The Attacker Has Some Real-Time Knowledge Of The
Network, Such As Packet Sequence Identifiers.
Used Heavily In Replay Attacks
Non-Blind
The Attacker Has Has No Knowledge Or Access To Real-Time
Network Information
Used Heavily In DoS and Probing
Infinite Knowledge
The Attacker Is Sitting (Sniffing) A Live Session And HiJacks It
Using Both Spoofed IP, MAC, Authentication, Etc.
Used Heavily In MITM Attacks
Advanced IP
Spoofing Attacks
A Number Of Very Advanced Attacks Can Be Accomplished Through
The Use Of IP Spoofing The Simplest Example Is SMURFING:
SMURF Attack
A LAN Is Sent An ICMP Broadcast Packet With A Spoofed
Source Address. All Computers On The LAN Reply To The
Owner Of The Real Address That Was Spoofed, Thus
Overwhelming It (D-DoS)
Detection
There's No Sure Fire Way To Detect IP Spoofing
Though Some Rule Of Thumb Exist:
If An Internal IP Address Shows Up In A Log File As Coming In
Through An External Interface Then It's Probably Been
Spoofed
If An Advanced Attack Is Happening On Your Network, You
Can Make The Assumption That The Attacker Is Covering
Their Tracks By Spoofing The Source Identifier
Prevention
There Are No Full Proof Prevention Mechanisms However To Better
Protect Yourself:
Do Not Allow Authenticated Access Without Some Layered
Mechanism Such As:
CHAP
LEAP
KERBEROS
Etc.
Do Not Allow Certain Ranges Of IP's To Pass In/Out Of Your
Border Gateway
For Instance Don't Allow The Internal Range Of IP's Access
From The External Interface
Conclusion
Their Exists A Need For Mechanism Which Prevent/Detect/Traceback
IP Spoofing Attacks
These Mechanisms Should Focus On Fixing The Problems In The
AAA Security Model
Everis Is Currently Focused On Fixing The Non-Repudiation
Aspect (Accountability) Which Is Broken By Not Being Able To
Accurately Identify Who A Perpetrator Is.
Thanks
Thanks to:
Central NY ISSA for providing time to the
CyberPatriot documentation project
www.issa.org
Everis Inc. for hosting, technical support, experienced
staff and more
www.everisinc.com
Griffiss Institute for providing space and support
• http://www.griffissinstitute.org/
Rome AFRL for their support of STEM
• http://www.wpafb.af.mil/afrl/ri/
12