How Kazaa Works The inner workings of Kazaa and other Peer-2-Peer technologies By Troy Jessup.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 22 World Wide Web and HTTP.
1. 2 Branch Office Network Performance Caches content downloaded from file and Web servers Users in the branch can quickly open files stored in the cache.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
1 Content Delivery Networks iBAND2 May 24, 1999 Dave Farber CTO Sandpiper Networks, Inc.
Intrusion Detection Systems and Practices
Hypertext Transfer Protocol Kyle Roth Mark Hoover.
An Analysis of Internet Content Delivery Systems Stefan Saroiu, Krishna P. Gommadi, Richard J. Dunn, Steven D. Gribble, and Henry M. Levy Proceedings of.
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
1 Enabling Secure Internet Access with ISA Server.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Chapter 8 PIX Firewall. Adaptive Security Algorithm (ASA)  Used by Cisco PIX Firewall  Keeps track of connections originating from the protected inside.
P2P File Sharing Systems
BitTorrent Internet Technologies and Applications.
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Scalability Don McGregor Research Associate MOVES Institute
Information Systems and Network Engineering Laboratory II DR. KEN COSH WEEK 1.
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Page 1 © 2001, Epicentric - All Rights Reserved Epicentric Modular Web Services Alan Kropp Web Services Architect WSRP Technical Committee – March 18,
FastTrack Network & Applications (KaZaA & Morpheus)
2007cs Servers on the Web. The World-Wide Web 2007 cs CSS JS HTML Server Browser JS CSS HTML Transfer of resources using HTTP.
1 WWW. 2 World Wide Web Major application protocol used on the Internet Simple interface Two concepts –Point –Click.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Computer Networks & FirewallsUniversity IT Security Office - Tom Davis, CISSP University IT Security Officer Office of the Vice.
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Information Systems and Network Engineering Laboratory I DR. KEN COSH WEEK 1.
Managing Peer to Peer Protocols Lucent Security Products Configuration Example Series.
Skype.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Port Scanning James Tate II
Information Systems and Network Engineering Laboratory II
C IBM Security QRadar SIEM V7.2.6 Associate Analyst
NET 536 Network Security Firewalls and VPN
CISC103 Web Development Basics: Web site:
Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Threat Management Gateway
Web Caching? Web Caching:.
Introduction to Networking
6.6 Firewalls Packet Filter (=filtering router)
Lecture 3: Secure Network Architecture
The BitTorrent Protocol
Firewalls Chapter 8.
ABC’s of Research.
Enterprise Use Cases and A-Level Attestation
Presentation transcript:

How Kazaa Works The inner workings of Kazaa and other Peer-2-Peer technologies By Troy Jessup

Terms of Use Use of this presentation is granted to education and non- profit entities for education in security topics as described herein. The following limitations and restrictions apply: –The content of this presentation remain unchanged from its original published format, except for updates to the content for accuracy or current tactics/trends –Any changes made to the presentation are understood to not be the original work of the author, and noted in the presentation as such. –Credit to the author is retained as-is in the original presentation format. –Use by “for profit” or “commercial” entities must be granted permission by the author, and are subject to further restrictions.

About the Author Troy Jessup (CISSP) –Sr. Security Analyst for the Utah Education Network –Security Professional for 6 years –Author of Security related articles and information available free to the public at the URL listed below. –Updates to this and other presentations are available via the website:

The History Kazaa Version 1 –Basic Design in Peer to Peer (P2P) –Followed in the footsteps of Napster –Static use of Port 1214/TCP for access

The Present Kazaa Version 2 –Basic Design in Peer to Peer (P2P) –Follows in the footsteps of Gnutella and Napster –Dynamic use of Port nearly ANY port for access –Block and Firewall Evasion Built in.

How Kazaa v2 Works Kazaa Client on your Network The Kazaa Network Kazaa Client on a Remote Network Normal File Sharing Concept for Kazaa Version 2 File List This Client Registers itself on Port 1214/TCP with the Kazaa Network This Client Sends a List of Shared Files to the Network This Client Searches for a File which the other client has available The Network Responds with a Client ID to connect to for the file The Client Initiates a Connection to the Hosting Client This client Responds to the request and sends back the file

File List How Kazaa v2 Works – Blocked From the Outside Kazaa Client on your Network The Kazaa Network Kazaa Client on a Remote Network What Happens if we Try to Block Port 1214/TCP This Client Registers itself on Port 1214/TCP with the Kazaa Network This Client Sends a List of Shared Files to the Network This Client Searches for a File which the other client has available The Network Responds with a Client ID to connect to for the file The Client Initiates a Connection to the Hosting Client and is Blocked This client PUSHES the File to the other Client Firewall X This Client Tells the Network that the Host is Blocked As part of the KeepAlive, The Network Sends a Msg to the Client

File List How Kazaa v2 Works – Blocked From the Inside and Outside Kazaa Client on your Network The Kazaa Network Kazaa Client on a Remote Network What Happens if we Try to Block Port 1214/TCP Outbound This Client Registers itself on Port 80/TCP with the Kazaa Network This Client Sends a List of Shared Files to the Network This Client Searches for a File which the other client has available The Network Responds with a Client ID to connect to for the file The Client Initiates a Connection to the Hosting Client and is Blocked This client PUSHES the File to the other Client Firewall X This Client Tells the Network that the Host is Blocked As part of the KeepAlive, The Network Sends a Msg to the Client X Tries to get out on Ports: 1214/TCP - BLOCKED 1215/TCP - BLOCKED 3536/TCP - BLOCKED MANY OTHERS/TCP – BLOCKED It will Try Hundreds of Ports Including: 80,53,1024,etc etc etc

The Future Kazaa Version 2 –Has Basic Block and Firewall Evasion –There are only a few options available for blocking Kazaa v2 None of which are easy to implement Most Cost Money –Kazaa v3 is expected to make it even harder to block P2P traffic –Kazaa is Expected to take up more bandwidth than Web Traffic in the coming years