M ITNICK A TTACK. WHO IS THIS GUY?

Slides:



Advertisements
Similar presentations
Bro: A System for Detecting Network Intruders in Real-Time Vern Paxson Lawrence Berkeley National Laboratory,Berkeley, CA A stand-alone system for detecting.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
TCP Flooding. TCP handshake C S SYN C SYN S, ACK C ACK S Listening Store data Wait Connected.
Are you secured in the network ?: a quick look at the TCP/IP protocols Based on: A look back at “Security Problems in the TCP/IP Protocol Suite” by Steven.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
1 Reading Log Files. 2 Segment Format
Using tcpdump. tcpdump is a powerful tool that allows us to sniff network packets and make some statistical analysis out of those dumps. tcpdump operates.
Sniffing, Spoofing, Hijacking This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Network Attacks Mark Shtern.
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
IP Spoofing, CS2651 IP Spoofing Bao Ho ToanTai Vu CS Security Engineering Spring 2003 San Jose State University.
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
source router Destination IP packet IP packet fragments Reassembly Required Fragments Created.
Port Scanning Yiqian Zhang CS 265 Project. What is Port Scanning? port scanning is equivalent to knocking on the walls to find all the doors and windows.
Communication Protocols III Tenth Meeting. Connections in TCP A wants to send to B. What is the packet next move? A travels through hub and bridge to.
1 Figure 5-4: Drivers of Performance Requirements: Traffic Volume and Complexity of Filtering Performance Requirements Traffic Volume (Packets per Second)
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Scanning and Spoofing Lesson 7. Scanning Ping Sweeps Port Scanners Vulnerability Scanning tools.
Port Scanning 0x470~0x480 Presenter SangDuk Seo 1.
The Transmission Control Protocol (TCP) TCP is a protocol that specifies: –How to distinguish among multiple destinations on a given machine –How to initiate.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 25 – Network Security.
Shepard’s Valley Cowboy Church Web Server File Download Problem Analysis Last Update Copyright 2013 Kenneth M. Chipps Ph.D.
The complete picture Linux Network Management. End to End Connection Being able to describe the end to end connection sequence is a useful thing Very.
Chapter 4 TCP/IP Overview Connecting People To Information.
1 A Web Application Example. 2 SQL Injection!
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 26.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
FORESEC Academy FORESEC Academy Security Essentials (III)
CS 6401 Secure Shell & Denial of Service Attacks Outline Secure Shell Overview Authentication Practical issues Denial of Service Attacks Definition Examples.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
CSE 461 Section. Let’s learn things first! Joke Later!
1 A Web Application Example. 2 SQL Injection!
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Department of Information Engineering1 About your assignment 5 -layers Model Application Layer(HTTP, DNS,...) TCP Layer(add sequence number to packets)
Denial of Service Attacks
Connection Establishment and Termination. Tcpdump tcpdump is a common packet analyzer that runs under the command line. It allows the user to intercept.
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
DoS/DDoS attack and defense
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
General Unix Security Group A2 Rachit Gupta Roland Hollis E.J. Chambers.
1 Security of NIS (YP) Gary Lam
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Transport Layer1 TCP Connection Management Recall: TCP sender, receiver establish “connection” before exchanging data segments r initialize TCP variables:
End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: interne t interface DNS server IP:
COMP2322 Lab 6 TCP Steven Lee April 1, TCP Transmission Control Protocol Transport layer protocol User Datagram Protocol (UDP) is another one 2.
1 Lecture A.2: Security Problems in TCP/IP r Reference: Security Problems in the TCP/IP Protocol Suite : by Steve Bellovin r R-services r Source-routing.
An Introduction To ARP Spoofing & Other Attacks
1. Introduction to Intrusion Detection
General Classes of TCP/IP Problems
COMP2322 Lab 6 TCP Steven Lee Mar 29, 2017.
NetworkS Fall 2009.
Port Scanning (based on nmap tool)
Module 18 (More Network Discovery)
Lab 2: TCP IP Attacks ( Indirect)
CS4470 Computer Networking Protocols
IP Spoofing Sometimes on the internet, a girl named Alice is really a man named Yves.
Threats in Networks Jagdish S. Gangolly School of Business
Lecture 3: Secure Network Architecture
Mitnick Attack.
TCP Connection Management
Presentation transcript:

M ITNICK A TTACK

WHO IS THIS GUY?

IDENTIFYING TRUST RELATIONSHIPS Mitnick used IP spoofing to identify the trust relationship. 14:09:32 toad.com# finger 14:10:21 toad.com# finger 14:10:50 toad.com# finger -l 14:11:07 toad.com# finger 14:11:38 toad.com# showmount -e x-terminal 14:11:49 toad.com# rpcinfo -p x-terminal 14:12:05 toad.com# finger -l The finger command checks if anyone logon. The showmount provides information about the file systems mounted with Network File System (NFS). Rpcinfo lists the available rpc-services.

Server silenced Send SYN/ACK x-terminalServer Send SYN/ACK Send SYN/ACK-ACK Open 20 connections to predict the sequence no. Send SYNs Send RESETs to empty Server connection queue Attacker

SYN-F LOODING Six minutes later, a flurry of TCP-SYN (initial connection requests) from to port 513 (login) on server. The purpose of these SYNs is to fill the connection queue for port 513 on server with "half-open" connections so it will not respond to any new connection requests. In particular, it will not generate TCP RSTs in response to unexpected SYN-ACKs. Finally the server is being silenced.

SYN-F LOODING ( CONT.) 14:18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win :18: > server.login: S : (0) win 4096

SYN-F LOODING ( CONT.) 20 connection attempts from apollo.it.luc.edu to x-terminal.shell. The purpose of these attempts is to determine the behavior of x-terminal's TCP sequence number generator :18: apollo.it.luc.edu.1000 > x-terminal.shell: S : (0) win :18: x-terminal.shell > apollo.it.luc.edu.1000: S : (0) ack win :18: apollo.it.luc.edu.1000 > x-terminal.shell: R : (0) win :18: apollo.it.luc.edu.999 > x-terminal.shell: S : (0) win :18: x-terminal.shell > apollo.it.luc.edu.999: S : (0) ack win :18: apollo.it.luc.edu.999 > x-terminal.shell: R : (0) win 0 +++

SYN-F LOODING ( CONT.) The sequence number in x-terminal’s SYN/ACK from the second set packet is The sequence number in the preceding set's SYN/ACK is =128,000 As we trace down the rest of set of packets we found that 128,000 is repeatable. We know that anytime we send a SYN to x-terminal, the SYN/ACK will come back 128,000 or higher, as long as it is the next connection.

S ETTING U P T HE S YSTEM C OMPROMISE / H IJACKING A forged SYN (connection request), allegedly from server.login to x-terminal.shell. The assumption is that x-terminal probably trusts server, so x-terminal will do whatever server (or anything masquerading as server) asks. x-terminal then replies to server with a SYN-ACK, which must be ACK'd in order for the connection to be opened. As server is ignoring packets sent to server.login, the ACK must be forged as well. 14:18: server.login > x-terminal.shell: S : (0) win :18: server.login > x-terminal.shell:. ack win 4096

S ETTING U P T HE S YSTEM C OMPROMISE / H IJACKING ( CONT.) In the first line x-terminal is stimulated by server to open the connection. Server never sees the SYN/ACK so that is why it is missing from the trace. However, he knows to add 128,000 plus 1 to the initial sequence number that x-terminal proposed when sending the SYN/ACK. After the lone ACK, the connection is open. With the real server disabled by the SYN flood, the trusted connection is used to execute the following UNIX command with rshell: rsh x-terminal "echo + + >>/.rhosts".

S ETTING U P T HE S YSTEM C OMPROMISE / H IJACKING ( CONT.) The result of this causes x-terminal to trust, as root, all computers and all users on these computers (as already discussed). That trace is as follows: 14:18: server.login > x-terminal.shell: P 0:2(2) ack 1 win :18: server.login > x-terminal.shell: P 2:7(5) ack 1 win :18: server.login > x-terminal.shell: P 7:32(25) ack 1 win 4096 At this point, the connection is terminated by sending a FIN to close the connection. Mr. Mitnick logs on to x-terminal from the computer of his choice and can execute any command. The target system, x-terminal, is compromised: 14:18: server.login > x-terminal.shell:. ack 2 win :18: server.login > x-terminal.shell:. ack 3 win :18: server.login > x-terminal.shell: F 32:32(0) ack 3 win 4096

S ETTING U P T HE S YSTEM C OMPROMISE / H IJACKING ( CONT.) If Mitnick were now to leave the computer named server in its mute state and someone else were to try to rlogin, he would fail, which might bring unwanted attention to the situation. Therefore, the connection queue is emptied with a series of RESETs. 14:18: > server.login: R : (0) win :18: > server.login: R : (0) win :18: > server.login: R : (0) win :18: > server.login: R : (0) win :18: > server.login: R : (0) win 4096 …

Server silenced Send SYN/ACK x-terminalServer Send SYN/ACK Send SYN/ACK-ACK Open 20 connections to predict the sequence no. Send SYNs Send RESETs to empty Server connection queue Attacker

THE END