Presentation on theme: "Module X Session Hijacking"— Presentation transcript:
1Module X Session Hijacking Ethical HackingModule XSession Hijacking
2Module Objective Spoofing Vs Hijacking Types of session hijacking TCP/IP conceptsPerforming Sequence predictionACK StormsSession Hijacking Tools
3Understanding session hijacking Understanding the flow of message packets over the Internet by dissecting the TCP stack.Understanding the security issues involved in the use of IPv4 standardFamiliarizing with the basic attacks possible due to the IPv4 standard.
4Spoofing Vs HijackingA spoofing attack is different from a hijack in that an attacker is not actively taking another user offline to perform the attack. he pretends to be another user or machine to gain access.Bob (Victim)ServerI am Bob!
5Spoofing Vs HijackingWith Hijacking an attacker is taking over an existing session, which means he is relying on the legitimate user to make a connection and authenticate. Then take over the session.I am Bob!Bob (Victim)AttackerServerBob logs on to serverDial in
6Steps in Session Hijacking Tracking the sessionDesynchronizing the connectionInjecting the attacker’s packet
7Types of session Hijacking There are two types of hijacking attacks:ActiveIn an active attack, an attacker finds an active session and takes over.PassiveWith a passive attack, an attacker hijacks a session, but sits back and watches and records all of the traffic that is being sent forth.
8TCP Concepts 3 Way Handshake Bob Initiates a connection with the server. Bob sends a packet to the server with SYN bit set.The server receives this packet and sends back a packet with the SYN bit and an ISN (Initial Sequence Number) for the server.Bob sets the ACK bit acknowledging the receipt of the packet and increments the sequence number by 1The two machines have successfully established a session.123
9Sequence NumbersSequence Numbers are very important to provide reliable communication but they are also crucial to hijacking a session.Sequence numbers are a 32-bit counter, which means the value can be any of over 4 billion possible combinations.The sequence numbers are used to tell the receiving machine what order the packets should go in when they are received.Therefore an attacker must successfully guess the sequence number to hijack a session.
10Programs that perform Session Hijacking There are several programs available that perform session hijacking.Following are a few that belongs to this category:JuggernautHuntTTY WatcherIP WatcherT-Sight
11Hacking Tool: Juggernaut Juggernaut is a network sniffer that can be used to hijack TCP sessions. It runs on Linux Operating systems.Juggernaut can be set to watch for all network traffic or it can be given a keyword like password to look out for.The main function of this program is to maintain information about various session connections that are occurring on the network.The attacker can see all the sessions and he can pick a session he wants to hijack.
12Hacking Tool: Hunt http://lin.fsid.cvut.cz/^kra/index.html Hunt is a program that can be used to listen, intercept, and hijack active sessions on a network.Hunt Offers:Connection managementARP SpoofingResetting ConnectionWatching ConnectionMAC Address discoverySniffing TCP traffic
13Hacking Tool: TTY Watcher TTY-watcher is a utility to monitor and control users on a single system.Sharing a TTY. Anything the user types into a monitored TTY window will be sent to the underlying process. In this way you are sharing a login session with another user.After a TTY has been stolen, it can be returned to the user as though nothing happened.(Available only for Sun Solaris Systems.)
14Hacking Tool: IP watcher IP watcher is a commercial session hijacking tool that allows you to monitor connections and has active countermeasures for taking over a session.The program can monitor all connections on a network allowing an attacker to display an exact copy of a session in real-time, just as the user of the session sees the data.
15T-Sight http://engarde.com T-Sight, an advanced intrusion investigation and response tool for Windows NT and Windows 2000 can assist you when an attempt at a break-in or compromise occurs.With T-sight, you can monitor all your network connections (i.e. traffic) in real-time and observe the composition of any suspicious activity that takes place.T-Sight has the capability to hijack any TCP sessions on the network.Due to security reasons Engarde Systems licenses this software to pre-determined IP address.
17Dangers posed by Hijacking Most computers are vulnerableLittle can be done to protect against itHijacking is simple to launchMost countermeasures do not workHijacking is very dangerous.
18Protecting against Session Hijacking Use EncryptionUse a secure protocolLimit incoming connectionsMinimize remote accessHave strong authentication.
19SummaryIn the case of a session hijacking an attacker relies on the legitimate user to connect and authenticate and then take over the session.In spoofing attack, the attacker pretends to be another user or machine to gain access.Successful session hijacking is extremely difficult and only possible when a number of factors are under the attacker's control.Session hijacking can be active or passive in nature depending on the degree of involvement of the attacker in the attack.A variety of tools exist to aid the attacker in perpetrating a session hijack.Session Hijacking could be very dangerous and there is a need for implementing strict countermeasures.