KULIAH III THREAT AND ATTACK (2) Aswin Suharsono KOM 15008 Keamanan Jaringan 2012/2013 KOM 15008 Keamanan Jaringan 2012/2013.

Slides:



Advertisements
Similar presentations
Module X Session Hijacking
Advertisements

Ethical Hacking Module VII Sniffers.
Network Vulnerabilities and Attacks Dr. John Abraham UTPA.
Password Cracking, Network Sniffing, Man-in-the-Middle attacks, and Virtual Private Networks Lab 2 – Class Discussion Group 3 Ruhull Alam Bhuiyan Keon.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 5 Omar Meqdadi Department of Computer Science and Software Engineering University of.
1 Reading Log Files. 2 Segment Format
Sniffing, Spoofing, Hijacking This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
1 Eastern Michigan University Asad Khailany, Eastern Michigan University Dmitri Bagatelia, Eastern Michigan University Wafa Khorsheed, Eastern Michigan.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Network Attacks Mark Shtern.
 In MHP 105, same time as our class  Reading list is online  Sample midterm is online o Try to solve it before the next class.
Introduction to Security Computer Networks Computer Networks Term B10.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Slide 1 Attacks on TCP/IP. slide 2 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Lecture 3 Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
1-1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet.
COEN 252: Computer Forensics Router Investigation.
Chapter 9 Phase 3: Denial-of-Service Attacks. Fig 9.1 Denial-of-Service attack categories.
University of Calgary – CPSC 441.  The field of network security is about:  how bad guys can attack computer networks  how we can defend networks against.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
CPSC 441 TUTORIAL TA: FANG WANG NETWORK SECURITY.
Chapter 11 Phase 5: Covering Tracks and Hiding. Attrition Web Site  Contains an archive of Web vandalism attacks
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
Network Security Kevin Diep. Outline The five phrases of network penetration How to prevent exploitations and network vulnerability Ethical issues behind.
COEN 252 Computer Forensics
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Chapter 8 Phase3: Gaining Access Using Network Attacks.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
COEN 252 Computer Forensics Collecting Network-based Evidence.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
COEN 350 Security Threats. Network Based Exploits Phases of an Attack  Reconnaissance  Scanning  Gaining Access  Expanding Access  Covering Tracks.
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
CS 3830 Day 5 Introduction 1-1. Announcements  Program 1 due today at 3pm  Program 2 posted by tonight (due next Friday at 3pm)  Quiz 1 at the end.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
Linux Networking and Security
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
CHAPTER 9 Sniffing.
Chapter 8 Phase3: Gaining Access Using Network Attacks
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Network Attacks Bharatha Yajaman ISQS Outline Sniffing  Passive Sniffing  Active Sniffing IP Address Spoofing  Changing the IP address  Undermining.
COEN 250 Security Threats. Network Based Exploits Phases of an Attack Reconnaissance Scanning Gaining Access Expanding Access Covering Tracks.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Backdoors and Rootkits.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006 Group 9 Greg Sheridan Terry Harvey Group 10 Matthew Bowman Laura Silaghi Michael.
DoS/DDoS attack and defense
CPSC441 Computer Communications Aniket Mahanti Introduction 1-1.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
CPSC 441 TUTORIAL – APRIL 4, 2012 TA: MARYAM ELAHI NETWORK SECURITY.
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Network and System Security Risk Assessment
An Introduction To ARP Spoofing & Other Attacks
Introduction to Information Security
Packet Sniffers Lecture 10 - NETW4006 NETW4006-Lecture09.
Presentation transcript:

KULIAH III THREAT AND ATTACK (2) Aswin Suharsono KOM Keamanan Jaringan 2012/2013 KOM Keamanan Jaringan 2012/2013

Overview Phase 3: Gaining Access Using Network Attacks – Sniffing – IP Address Spoofing – Session Hijacking – Netcat – DOS Phase 4: Maintain Access – Trojan – Backdoors Phase 5 Covering Tracks and Hiding

Sniffer Allows attacker to see everything sent across the network, including userIDs and passwords NIC placed in promiscuous mode Tcpdump Windump Snort Ethereal Sniffit Dsniff

Passive Sniffers Sniffers that passively wait for traffic to be sent to them Well suited for hub environment Snort Sniffit

Figure 8.2 A LAN implemented with a hub

Introduction Bad guys can sniff packets packet “sniffing”: – broadcast media (shared ethernet, wireless) – promiscuous network interface reads/records all packets (e.g., including passwords!) passing by A B C src:B dest:A payload  wireshark software used for end-of-chapter labs is a (free) packet-sniffer 1-6

Introduction Bad guys can use fake addresses IP spoofing: send packet with false source address A B C src:B dest:A payload 1-7 … lots more on security (throughout, Chapter 8)

Ethereal

Gunakan switch, jangan hub

IP Address Spoofing Changing or disguising the source IP address used by Nmap in decoy mode Used by Dsniff in dnsspoof attack – DNS response sent by Dsniff contains source address of the DNS server Used in denial-of-service attacks Used in undermining Unix r-commands Used with source routing attacks

Simple IP Address Spoofing Pros – Works well in hiding source of a packet flood or other denial-of- service attack Cons – Difficult for attacker to monitor response packets – Any response packet will be sent to spoofed IP address – Difficult to IP address spoof against any TCP-based service unless machines are on same LAN and ARP spoof is used

Figure 8.13 The TCP three-way handshake inhibits simple spoofing

Figure 8.14 Bob trusts Alice

Figure 8.15 Everyone trusts Alice, the administrator’s main management system

Session Hijacking Session Hijacking, Perpaduan antara Sniffing dan Spoofing Pengertian Session Sniff for session Rekam Gunakan untuk masuk Dengan mencuri Session milik orang lain, maka bisa masuk tanpa perlu login

Introduction target Denial of Service (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic 1. select target 2. break into hosts around the network (see botnet) 3. send packets to target from compromised hosts Bad guys: attack server, network infrastructure 1-16

SYN Flood Attacker sends continuous stream of SYN packets to target Target allocates memory on its connection queue to keep track of half-open connections Attacker does not complete 3-way handshake, filling up all slots on connection queue of target machine If target machine has a very large connection queue, attacker can alternatively send sufficient amount of SYN packets to consume target machine’s entire network bandwidth

Smurf Attacks Aka directed broadcast attacks Smurf attacks rely on an ICMP directed broadcast to create a flood of traffic on a victim Attacker uses a spoofed source address of victim Smurf attack is a DOS that consumes network bandwidth of victim Smurf amplifier is a network that responds to directed broadcast messages

4. Maintaining Access

Trojan Horses Software program containing a concealed malicious capability but appears to be benign, useful, or attractive to users

Backdoor Software that allows an attacker to access a machine using an alternative entry method Installed by attackers after a machine has been compromised May Permit attacker to access a computer without needing to provide account names and passwords Used in movie “War Games” Can be sshd listening to a port other than 22 Can be setup using Netcat

Netcat as a Backdoor A popular backdoor tool Netcat must be compiled with “GAPING_SECURITY_HOLE” option On victim machine, run Netcat in listener mode with –e flag to execute a specific program such as a command shell On attacker’s machine run Netcat in client mode to connect to backdoor on victim

Traditional RootKits A suite of tools that allow an attacker to maintain root-level access via a backdoor and hiding evidence of a system compromise More powerful than application-level Trojan horse backdoors(eg. BO2K, Netcat) since the latter run as separate programs which are easily detectable a more insidious form of Trojan horse backdoor than application-level counterparts since existing critical system components are replaced to let attacker have backdoor access and hide

Kernel-Level RootKits More sinister, devious, and nasty than traditional RootKits Operating system kernel replaced by a Trojan horse kernel that appears to be well-behaved but in actuality is rotten to the core Critical system files such as ls, ps, du, ifconfig left unmodified Trojanized kernel can intercept system calls and run another application chosen by atttacker – Execution request to run /bin/login is mapped to /bin/backdoorlogin – Tripwire only checks unaltered system files If the kernel cannot be trusted, nothing on the system can be trusted

5. Covering Tracks

Hiding Evidence by Altering Event Logs Attackers like to remove evidence from logs associated with attacker’s gaining access, elevating privileges,and installing RootKits and backdoors – Login records – Stopped and restarted services – File access/update times

Covert Channels Communication channels that disguises data while it moves across the network to avoid detection Require a client and server Can be used to remotely control a machine and to secretly transfer files or applications

Figure 11.5 A covert channel between a client and a server

Tunneling Carrying one protocol inside another protocol – Eg. Tunneling AppleTalk traffic over IP Any communications protocol can be used to transmit another protocol – SSH protocol used to carry telnet, FTP, or X-Windows session Used by covert channels – Loki – Reverse WWW Shell

Terima Kasih