1 Figure 3-13: Internet Protocol (IP) IP Addresses and Security  IP address spoofing: Sending a message with a false IP address (Figure 3-17)  Gives.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

IP Fragmentation. MTU Maximum Transmission Unit (MTU) –Largest IP packet a network will accept –Arriving IP packet may be larger IP Packet MTU.
Introduction1-1 message segment datagram frame source application transport network link physical HtHt HnHn HlHl M HtHt HnHn M HtHt M M destination application.
Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies A Little More on Chapter 7 And Start Chapter 8 TCP/IP.
Module A.  This is a module that some teachers will cover while others will not  This module is a refresher on networking concepts, which are important.
Network Layer Packet Forwarding IS250 Spring 2010
Internet Control Message Protocol (ICMP). Introduction The Internet Protocol (IP) is used for host-to-host datagram service in a system of interconnected.
1 TCP/IP Internetworking (February 1, 2012) © Abdou Illia – Spring 2012.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
Examining IP Header Fields
Source Port # (16)Destination Port # (16) Sequence Number (32 bits) Acknowledgement Number (32 bits) Hdr Len (4) Flags (6)Window Size (16) Options (if.
1 Internet Control Message Protocol (ICMP) RIZWAN REHMAN CCS, DU.
ECE Prof. John A. Copeland fax Office: Klaus 3362.
Module A Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson.
ITIS 6167/8167: Network Security Weichao Wang. 2 Contents ICMP protocol and attacks UDP protocol and attacks TCP protocol and attacks.
1 Figure 3-33: Internet Control Message Protocol (ICMP) ICMP is for Supervisory Messages at the Internet Layer ICMP and IP  An ICMP message is delivered.
Internet Control Message Protocol ICMP. ICMP has two major purposes: –To report erroneous conditions –To diagnose network problems ICMP has two major.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
Internet Protocol (IP)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Internet Control Message Protocol (ICMP) Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
1 LAN Protocols (Week 3, Wednesday 9/10/2003) © Abdou Illia, Fall 2003.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 5 Internet Protocol (IP) Basics.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
More on TCP Acknowledgements Sequence Number Field Initial Sequence Number Acknowledgement Number Field.
ICMP (Internet Control Message Protocol) w.lilakiatsakun.
1 Figure 3-27: Use of TCP and UDP Port Number Client From: :50047 To: :80 SMTP Server Port 25 Webserver.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
Internet Protocol Formats. IP (V4) Packet byte 0 byte1 byte 2 byte 3 data... – up to 65 K including heading info Version IHL Serv. Type Total Length Identifcation.
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
1 Computer Communication & Networks Lecture 19 Network Layer: IP and Address Mapping Waleed Ejaz.
1 Figure 3-5: IP Packet Total Length (16 bits) Identification (16 bits) Header Checksum (16 bits) Time to Live (8 bits) Flags Protocol (8 bits) 1=ICMP,
or call for office visit,
Lecture 21: Network Primer 7/9/2003 CSCE 590 Summer 2003.
Network Layer Protocols COMP 3270 Computer Networks Computing Science Thompson Rivers University.
Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Internet Control Message Protocol (ICMP)
IP Fragmentation. MTU Maximum Transmission Unit (MTU) –Largest IP packet a network will accept –Arriving IP packet may be larger IP Packet MTU.
Internet Control Message Protocol (ICMP)
Multiplexing.
Dr. Richard Spillman Fall 2006
or call for office visit, or call Kathy Cheek,
Internet Control Message Protocol (ICMP)
Review of TCP/IP Internetworking
or call for office visit,
Internet Protocol Formats
Error and Control Messages in the Internet Protocol
TCP/IP Internetworking
8 Network Layer Part V Computer Networks Tutun Juhana
Standards Basics.
TCP/IP Internetworking
Review of TCP/IP Internetworking
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
ITIS 6167/8167: Network Security
Internet Protocol (IP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
What does this packet do?
Figure 3-23: Transmission Control Protocol (TCP) (Study Figure)
Net 323 D: Networks Protocols
Internet Protocol Formats
46 to 1500 bytes TYPE CODE CHECKSUM IDENTIFIER SEQUENCE NUMBER OPTIONAL DATA ICMP Echo message.
IPv4 Addressing By, Ishivinder Singh( ) Sharan Patil ( )
ITIS 6167/8167: Network and Information Security
Presentation transcript:

1 Figure 3-13: Internet Protocol (IP) IP Addresses and Security  IP address spoofing: Sending a message with a false IP address (Figure 3-17)  Gives sender anonymity so that attacker cannot be identified  Can exploit trust between hosts if spoofed IP address is that of a host the victim host trusts

2 Figure 3-17: IP Address Spoofing Trusted Server Victim Server Trust Relationship 2. Attack Packet Spoofed Source IP Address Attacker’s Identity is Not Revealed Attacker’s Client PC Server Accepts Attack Packet

3 Figure 3-13: Internet Protocol (IP) (Study Figure) IP Addresses and Security  LAND attack: send victim a packet with victim’s IP address in both source and destination address fields and the same port number for the source and destination (Figure 3-18). In 1997, many computers, switches, routers, and even printers, crashed when they received such a packet.

4 Figure 3-18: LAND Attack Based on IP Address Spoofing Victim Port 23 Open Crashes From: :23 To: :23 Attacker Source and Destination IP Addresses are the Same Source and Destination Port Numbers are the Same

5 Figure 3-13: Internet Protocol (IP) (Study Figure) Other IP Header Fields  Protocol field: Identifies content of IP data field Firewalls need this information to know how to process the packet  Time-to-Live field Each router decrements the TTL value by one Router decrementing TTL field to zero discards the packet

6 Figure 3-13: Internet Protocol (IP) (Study Figure) Other IP Header Fields  Time-to-Live field Router also sends an error advisement message to the sender The packet containing this message reveals the sender’s IP address to the attacker Traceroute uses TTL to map the route to a host (Figure 3-19)  Tracert on Windows machines

7 Figure 3-19: Tracert Program in Windows

8 Figure 3-13: Internet Protocol (IP) (Study Figure) Other IP Header Fields  Header Length field and Options With no options, Header Length is 5  Expressed in units of 32 bits  So, 20 bytes Many options are dangerous  So if Header Length is More Than 5, be Suspicious  Some firms drop all packets with options

9 Figure 3-13: Internet Protocol (IP) (Study Figure) Other IP Header Fields  Length Field Gives length of entire packet Maximum is 65,536 bytes Ping-of-Death attack sent IP packets with longer data fields Many systems crashed

10 Figure 3-20: Ping-of-Death Attack Victim Crashes IP Packet Containing ICMP Echo Message That is Illegally Long Attacker

11 Figure 3-13: Internet Protocol (IP) (Study Figure) Other IP Header Fields  Fragmentation Routers may fragment IP packets (really, packet data fields) en route  All fragments have same Identification field value  Fragment offset values allows fragments to be ordered  More fragments is 0 in the last fragment Harms packet inspection: TCP header, etc. only in first packet in series  Cannot filter on TCP header, etc. in subsequent packets

12 Figure 3-22: TCP Header is Only in the First Fragment of a Fragmented IP Packet 5. Firewall Can Only Filter TCP Header in First Fragment Attacker Fragmented IP Packet 2. Second Fragment 4. TCP Data Field No TCP Header IP Header TCP Data Field 2. First Fragment IP Header 3. TCP Header Only in First Fragment

13 Figure 3-13: Internet Protocol (IP) (Study Figure) Other IP Header Fields  Fragmentation Teardrop attack: Crafted fragmented packet does not make sense when reassembled Some firewalls drop all fragmented packets, which are rare today

14 Figure 3-21: Teardrop Denial-of- Service Attack Victim Crashes Attack Pretends to be Fragmented IP Packet When Reassembled, “Packet” does not Make Sense. Gaps and Overlaps Attacker “Defragmented” IP Packet” GapOverlap

15 Figure 3-24: IP Packet with a TCP Segment Data Field Source Port Number (16 bits)Destination Port Number (16 bits) Bit 0 Bit 31 Acknowledgment Number (32 bits) Sequence Number (32 bits) TCP Checksum (16 bits) Window Size (16 bits) Flag Fields (6 bits) Reserved (6 bits) Header Length (4 bits) Urgent Pointer (16 bits) IP Header (Usually 20 Bytes)