DoS Suite and Raw Socket Programming Group 16 Thomas Losier Paul Obame Group 16 Thomas Losier Paul Obame.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
Computer Security and Penetration Testing
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
Chapter 7 – Transport Layer Protocols
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Raw Sockets CS-480b Dick Steflik Raw Sockets Raw Sockets let you program at just above the network (IP) layer You could program at the IP level using.
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Chapter 5 The Network Layer.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Application Layer PART VI.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
1 Application Presentation Session Transport Network Datalink Physical OSI model Application IPv4, IPv6 Device Driver Hardware TCPUDP Internet.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Network Security Philadelphia UniversityAhmad Al-Ghoul Module 9 TCP/IP Layers and Vulnerabilities  MModified by :Ahmad Al Ghoul  PPhiladelphia.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
1 Introduction to Raw Sockets 2 IP address Port address MAC address TCP/IP Stack 67 Bootp DHCP OSPF protocol frame type UDP Port # TCP Port.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.
Overview Network communications exposes one to many different types of risks: No protection of the privacy, integrity, or authenticity of messages Traffic.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
LWIP TCP/IP Stack 김백규.
Jozef Goetz, Application Layer PART VI Jozef Goetz, Position of application layer The application layer enables the user, whether human.
Introduction to InfoSec – Recitation 11 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
1 Tao Wan Digital Security Group School of Computer Science Carleton University Oct 30, 2003 IP Spoofing Attacks & Defenses.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
Transport Layer: TCP and UDP. Overview of TCP/IP protocols Comparing TCP and UDP TCP connection: establishment, data transfer, and termination Allocation.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Network Programming Chapter 5: Raw Socket Programming.
Position of application layer. Application layer duties.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
1 Figure 3-13: Internet Protocol (IP) IP Addresses and Security  IP address spoofing: Sending a message with a false IP address (Figure 3-17)  Gives.
DoS/DDoS attack and defense
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
TCP/IP Illustrated, Volume 1: The Protocols Chapter 6. ICMP: Internet Control Message Protocol ( 월 ) 김 철 환
UDP : User Datagram Protocol 백 일 우
1 Kyung Hee University Chapter 11 User Datagram Protocol.
© 2002, Cisco Systems, Inc. All rights reserved..
Lecture 21: Network Primer 7/9/2003 CSCE 590 Summer 2003.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
1 K. Salah Application Layer Module K. Salah Network layer duties.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
© 2003, Cisco Systems, Inc. All rights reserved.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
DDoS Attacks on Financial Institutions Presentation
Error and Control Messages in the Internet Protocol
TCP/IP Internetworking
8 Network Layer Part V Computer Networks Tutun Juhana
TCP/IP Internetworking
TCP Transport layer Er. Vikram Dhiman LPU.
The IP, TCP, UDP protocols
46 to 1500 bytes TYPE CODE CHECKSUM IDENTIFIER SEQUENCE NUMBER OPTIONAL DATA ICMP Echo message.
Process-to-Process Delivery: UDP, TCP
ITIS 6167/8167: Network and Information Security
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Layer 9/22/2019.
Presentation transcript:

DoS Suite and Raw Socket Programming Group 16 Thomas Losier Paul Obame Group 16 Thomas Losier Paul Obame

Motivation  “We are not teaching you to be script kiddies in this class” Henry Owen  Give the students a better understanding of:  Raw Socket programming  Coding  Modifying  Understanding  DoS Attacks  Dangers  Defenses  “We are not teaching you to be script kiddies in this class” Henry Owen  Give the students a better understanding of:  Raw Socket programming  Coding  Modifying  Understanding  DoS Attacks  Dangers  Defenses

Raw Socket Programming  “Raw socket is a computer networking term used to describe a socket that allows access to packet headers on incoming and outgoing packets. Raw sockets are usually used at the transport or network layers.” wikipedia.org  The ability to craft packet headers is a powerful tool that allows hackers to do many nefarious things  “Raw socket is a computer networking term used to describe a socket that allows access to packet headers on incoming and outgoing packets. Raw sockets are usually used at the transport or network layers.” wikipedia.org  The ability to craft packet headers is a powerful tool that allows hackers to do many nefarious things

Lab Structure  Expand knowledge on Particular DoS attack and IP protocols  Edit/Develop code based on understanding of previous section and given resources  Compile and Execute attack  Gather data  Analyze and implement defenses  Expand knowledge on Particular DoS attack and IP protocols  Edit/Develop code based on understanding of previous section and given resources  Compile and Execute attack  Gather data  Analyze and implement defenses

IP Headder What we are trying to create: Figure 1: IP Packet Diagram (

Creation of an IP headder void addIP(unsigned char *buf, struct pktInfo *pktInfo, int offset) { struct ip* ip = (struct ip*) (buf + offset); //ip points to some place in the buffer ip->ip_v = 4; //ipv4 ip->ip_hl = 5; //4 * 5 = 20 bytes ip->ip_tos = 0; //didn't specify any special type of service ip->ip_len = htons(pktInfo->pktSize); //total packet size ip->ip_src.s_addr = pktInfo->srcAddr; //4 byte source IP address ip->ip_dst.s_addr = pktInfo->destAddr; //4 byte destinfation IP address ip->ip_id = rand(); //random id ip->ip_off = 0; //mainly used for reassembly of fragmented IP datagrams. ip->ip_ttl = 255; //Time to live is the amount of hops before the packet is discarded ip->ip_p = pktInfo->protocol; //protocol used: TCP, UDP, etc ip->ip_sum = 0; //zero out the checksum field before computing the checksum ip->ip_sum = in_chksum((unsigned short *) ip, IPHEADER); //compute the checksum } void addIP(unsigned char *buf, struct pktInfo *pktInfo, int offset) { struct ip* ip = (struct ip*) (buf + offset); //ip points to some place in the buffer ip->ip_v = 4; //ipv4 ip->ip_hl = 5; //4 * 5 = 20 bytes ip->ip_tos = 0; //didn't specify any special type of service ip->ip_len = htons(pktInfo->pktSize); //total packet size ip->ip_src.s_addr = pktInfo->srcAddr; //4 byte source IP address ip->ip_dst.s_addr = pktInfo->destAddr; //4 byte destinfation IP address ip->ip_id = rand(); //random id ip->ip_off = 0; //mainly used for reassembly of fragmented IP datagrams. ip->ip_ttl = 255; //Time to live is the amount of hops before the packet is discarded ip->ip_p = pktInfo->protocol; //protocol used: TCP, UDP, etc ip->ip_sum = 0; //zero out the checksum field before computing the checksum ip->ip_sum = in_chksum((unsigned short *) ip, IPHEADER); //compute the checksum } using Raw Sockets

Denial of Service (DoS)  The Internet was designed for easy connectivity and scalability  Not designed to support authentication schemes  Attempt to occupy all resources of a system  Two general types of DoS attack  The Internet was designed for easy connectivity and scalability  Not designed to support authentication schemes  Attempt to occupy all resources of a system  Two general types of DoS attack

DoS Suite  First type attack  ICMP Reset attack  Second type attack  TCP syn attack  UPD flood attack  Ping Request (smurf) attack  First type attack  ICMP Reset attack  Second type attack  TCP syn attack  UPD flood attack  Ping Request (smurf) attack

Using the DoS Suite

ICMP Reset Attack  By spoofing a Hard ICMP error message a hacker can kill any running TCP connection  Requires the four-tuple  Determine the four-tuple using a packet sniffer  Guessing the four-tuple  By gathering information of the operating systems being used and the communication method in use. ICMP reset packets can be sent over a range of port addresses killing a connection you can not sniff.  By spoofing a Hard ICMP error message a hacker can kill any running TCP connection  Requires the four-tuple  Determine the four-tuple using a packet sniffer  Guessing the four-tuple  By gathering information of the operating systems being used and the communication method in use. ICMP reset packets can be sent over a range of port addresses killing a connection you can not sniff.

ICMP Reset Attack (Lab)

ICMP Reset Attack

TCP SYN Attack  When a server receives a SYN it stores the connection information in memory and sends back a SYN-ACK  Because the IP Address is spoofed it will never get a response and the information will stay until timeout  If packets are send fast enough they will fill the buffer and no new requests will be able to be processed  When a server receives a SYN it stores the connection information in memory and sends back a SYN-ACK  Because the IP Address is spoofed it will never get a response and the information will stay until timeout  If packets are send fast enough they will fill the buffer and no new requests will be able to be processed

SYN Attack (Lab)

SYN Attack

SYN Attack (Summary)

UDP Flood Attack  The premise of the UDP attack is similar to the SYN however when using UDP the client does not set aside memory for the connection information  If packets are send fast enough they will fill the network card buffer and no new requests will be able to be processed  The premise of the UDP attack is similar to the SYN however when using UDP the client does not set aside memory for the connection information  If packets are send fast enough they will fill the network card buffer and no new requests will be able to be processed

UDP Flood Attack (Lab)

UDP Flood Attack

UDP Attack (Summary)

ICMP Ping (smurf) Attack  DDoS attack  Using a network of machines a lot more information can be sent at once  Send ping requests to a network of machines with a return address of the “victim” machine  If packets are send fast enough they will fill the buffer and no new requests will be able to be processed  DDoS attack  Using a network of machines a lot more information can be sent at once  Send ping requests to a network of machines with a return address of the “victim” machine  If packets are send fast enough they will fill the buffer and no new requests will be able to be processed

ICMP Ping Attack (Lab)

ICMP Ping Attack

ICMP Attack (Summary)

DoS Defenses  SYN Cookies  Configure your firewall (refer to lab4)  IPtables  CiscoPIX  Real Secure  SYN Cookies  Configure your firewall (refer to lab4)  IPtables  CiscoPIX  Real Secure