JMU GenCyber Boot Camp Summer, 2015. Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.

Slides:



Advertisements
Similar presentations
Ethical Hacking Module VII Sniffers.
Advertisements

Security Lab 2 MAN IN THE MIDDLE ATTACK
ARP Spoofing.
ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
Hands-On Ethical Hacking and Network Defense Lecture 15 Man in the Middle Attack to get Passwords from HTTPS Sessions.
Sniffing, Spoofing, Hijacking This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added.
SYSTEM ADMINISTRATION Chapter 19
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
System Security Scanning and Discovery Chapter 14.
1 Eastern Michigan University Asad Khailany, Eastern Michigan University Dmitri Bagatelia, Eastern Michigan University Wafa Khorsheed, Eastern Michigan.
Security Awareness: Applying Practical Security in Your World
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
CSCI 4550/8556 Computer Networks Comer, Chapter 19: Binding Protocol Addresses (ARP)
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
1 Reminding - ARP Two machines on a given network can communicate only if they know each other’s physical network address ARP (Address Resolution Protocol)
Chapter 19 Binding Protocol Addresses (ARP) Chapter 20 IP Datagrams and Datagram Forwarding.
Man in the Middle attacks and ARP poisoning explained
1 Chapter Overview Understanding Windows Name Resolution Using WINS.
Protocol Headers Pre DA SA 0800h … version H L 6 TCP Header Data FCS
Mapping Internet Addresses to Physical Addresses (ARP)
23-Support Protocols and Technologies Dr. John P. Abraham Professor UTPA.
CEN Network Fundamentals Chapter 19 Binding Protocol Addresses (ARP) To insert your company logo on this slide From the Insert Menu Select “Picture”
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
DNS (Domain Name System) Protocol On the Internet, the DNS associates various sorts of information with domain names. A domain name is a meaningful and.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Network Security: Lab#4-2 Packet Sniffers J. H. Wang Dec. 2, 2013.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Networking Functions of windows NT Sever
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
Internet Ethernet Token Ring Video High Speed Router Host A: Client browser: REQUEST:http//mango.ee.nogradesu.edu/c461.
Mahindra-British Telecom Ltd. Exploiting Layer 2 By Balwant Rathore.
Linux Networking and Security
Chapter 19 - Binding Protocol Addresses
CHAPTER 9 Sniffing.
Birgit Bonham: Prospect High School ARP….or What’s your MAC address?
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 LAN Concepts and Components Version A.01 H3065S Module 1 Slides.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Sniffer, tcpdump, Ethereal, ntop
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Dynamic Host Configuration Protocol (DHCP)
0x440 Network Sniffing.
Mapping IP Addresses to Hardware Addresses Chapter 5.
1 Syllabus at a glance – CMCN 6103 Introduction Introduction to Networking Network Fundamentals Number Systems Ethernet IP Addressing Subnetting ARP DNS.
Address Resolution Protocol (ARP). Internet and Data Link Layer Addresses Each host and router on a subnet needs a data link layer address to specify.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: interne t interface DNS server IP:
MAN-IN-THE-MIDDLE ATTACK STEGANOGRAPHY Lab# MAC Addresses and ARP  32-bit IP address:  network-layer address  used to get datagram to destination.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Fall  Computer Crimes  Operating System Identification  Firewalking 2.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
TCP Sliding Windows For each TCP connection each hosts keep two Sliding Windows, send sliding window, and receive sliding window to make sure the correct.
An Introduction To ARP Spoofing & Other Attacks
Chapter Objectives In this chapter, you will learn:
Address Resolution Protocol (ARP)
IP: Addressing, ARP, Routing
Networks Fall 2009.
Exploiting Layer 2 By Balwant Rathore.
Instructor Materials Chapter 5: Ethernet
LAN Vulnerabilities.
ARP and RARP Objectives Chapter 7 Upon completion you will be able to:
Packet Sniffers Lecture 10 - NETW4006 NETW4006-Lecture09.
Computer Networks 9/17/2018 Computer Networks.
Net 323: NETWORK Protocols
Address Resolution Protocol (ARP)
ARP Spoofing.
Ch 17 - Binding Protocol Addresses
Presentation transcript:

JMU GenCyber Boot Camp Summer, 2015

Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain valuable information: –Usernames and passwords Encrypted Unencrypted – , web requests (and replies), data files –Etc. A sniffer is a piece of software that captures network traffic

Analogy - Wiretapping The FBI conducts wiretaps –Go to a judge and get a court order authorizing the wiretap Who? What? When? Why? –With the help of the phone company, can listen to/record a suspect’s phone conversations to obtain evidence

Analogy – Wiretapping (cont) Sniffer allows an administrator (or attacker) to record/listen in on conversations between computers –May need authorization to monitor network traffic –Electronic Communications Privacy Act – –May not need authorization to monitor network traffic –“Trap and Trace”/”Pen register” –Consent –May not care - attackers

Sniffing - Environment Some networks use shared media so passive sniffing is very easy –Network interface cards can be placed in “promiscuous” mode so that they do not ignore traffic to other hosts Wireless network traffic can also be captured (but may be encrypted) Sniffing is more difficult (but not impossible) in switched environments

Protocol Analysis Captured network packets contain binary data which is difficult to interpret Most sniffers include a protocol analysis component which organizes and displays the (human-readable) contents of the traffic –Example: Wireshark

Example – An Nmap Port Scan Target host: –Start Wireshark Source host: –Perform a TCP-connect scan nmap –sT View results

Example – A Web Connection Target host: –Start Wireshark Source host: –Open a text-based web browser Get default web page on the target host View results

Example – An FTP Connection Target host: –Start Wireshark Source host: –Use the ftp client ftp View results

Example – An SFTP Connection Target host Source host –Use the sftp client sftp View results

Man-in-the-Middle In a switched environment a host only receives: –Traffic destine for itself –Broadcast traffic Cannot see traffic between other hosts Man-in-the-middle = insert yourself as an (undetected) intermediary between communicating hosts

Man-in-the-middle (cont) Normal: Man-in-the-middle: AliceBobIAliceBobI

Man-in-the-middle (cont) How to achieve man-in-the-middle in a switched environment? Exploit address resolution protocols

Address Resolution All network communications must be carried out over physical networks –Each machine has a unique physical address Programs (and humans) use IP addresses to specify the machine to which a message is sent The address resolution problem – need to map IP address to physical address

The Address Resolution Problem Hosts A and B are on the same physical network B wants to communicate with A but only knows A’s IP address EDCBA

The Address Resolution Protocol (ARP) Host A wants to resolve the IP address I B Host A broadcasts a special (ARP) packet that asks the host with IP address I B to respond with its physical address All hosts receive the request Host B recognizes its IP address Host B sends a reply containing its physical address

ARP Phase 1: Phase 2: AXB Y AXB Y

ARP Caches Each host maintains a cache of recently- used mappings –Information in the cache expires after a set time has elapsed When sending an ARP request a host includes its IP-to-physical address binding All machines on a physical network “snoop” ARP packets for mappings

Demo – ARP Cache Host.141 has not communicated with.143 –.141’s ARP cache probably doesn’t contain an entry for.143 Host.141 makes a web request to.143 –ARP for.143’s physical address Added to.141’s cache –Web request sent and reply received

ARP Cache Poisoning Broadcast ARP replies associating your physical address with a given IP address –Other hosts receive this message and put the mapping into their ARP cache –When a machine wants to communicate with the given IP address it sends the frame to your physical address –You read the frame and then forward it on to the real destination host

Cain and Abel A man-in-the-middle LAN attack tool –Sniffer –Protocol analyzer URL: Can be used to poison hosts ARP caches

Demo – ARP Cache Poisoning Hosts.142 and.143 may or may not have communicated –ARP caches may or may not contain entries for each other Start Cain (on.141) and poison both.142 and.143’s ARP caches: –.142’s HW address associated with.141’s IP –.143’s HW address associated with.141’s IP

ARP Cache Poisoning - Result.142 and.143 will communicate with each other –May not realize that their communications are flowing through a third-party All communications will flow through.141 –.141 can read/store traffic –.141 forwards between the two hosts

Example – An FTP Connection Switched Environment –Source host:.143 –Destination host:.142 –Attacker:.141 Using: –Cain and Abel

ARP Poisoning Can: Read traffic Modify traffic

Example – DNS Spoofing Switched Environment –Source host:.143 –Destination host: Google –Attacker:.141 Using: –Cain and Abel

Example – SSH Downgrade Switched Environment –Source host: my laptop –Destination host:.147 –Attacker:.141 Using: –Cain and Abel

ARP Poisoning What attackers look for: –Sensitive, unencrypted communications Web requests/replies, , FTP –Weakly-encrypted communications Old versions of SSH, RDC

ARP Poisoning - Countermeasures Static ARP tables/smart switch ARPwatch IDS

Summary Network traffic may contain valuable information: –Usernames and passwords Encrypted Unencrypted – , web requests (and replies), data files –Etc. ARP poisoning can allow an attacker to capture and modify network traffic as a man-in-the-middle: –Cain and Abel