Chapter 6
Chapter 6
HACKING
ATTACKS THROUGH
SNIFFING
2
INTRODUCTION
• We find that, as passengers, while navigating
through the security check in areas at Airports, go
through a series of background checks,
conducted at various levels, by the staff, using a
variety of tools.
• The intention of these security checks is to detect
and conduct investigation on passengers carrying
suspected illegal items.
• Sniffing is a similar technique that employs
sniffing tools for observing all the packets
transferred via network. This method helps the
network experts to resolve network issues, and
also to capture the usernames and passwords.
3
NETWORK SNIFFING
Sniffing is a process of monitoring and capturing data
packets as they pass over the wires or in airwaves in
network. It is a sort of wiretapping applied to a
computer network.
The tool which performs sniffing is known as sniffer.
4
MAC ATTACKS
5
MAC FLOODING
• In the DHCP starvation attack, the attacker broadcasts numerous DHCP request messages with fake
source MAC addresses.
• If DHCP server in the network start responding to all these requests, then all the IP addresses available
gets depleted in a very short time span.
• The DHCP starvation attacks can be performed using tools such as Yersinia and DHCPstarvation.
10
ROGUE DHCP SERVER ATTACK
ADD A FOOTER 11
Defending against DHCP Attack
• There are two techniques which helps in defending DHCP starvation attack and rogue
server attack:
• Port security
• DHCP snooping
• Switch(config)# ip dhcp snooping
• Switch(config)# ip dhcp snooping vlan 42
• Switch(config)# interface fastetherne1/0
• Switch(config-if)# ip dhcp snooping trust 12
ARP POISONING
13
ARP SPOOFING
• ARP spoofing or ARP poisoning is an attack where the ARP
cache on a target host is corrupted via faulty entries by an
attacker.
• This results in linking of the IP address of the legitimate host
with attacker’s machine’s MAC address.
• This way, the attacker obtains access to the data within that IP
address.
• ARP spoofing can stop the data transmission, intercept or
modify the data. 14
MAC SPOOFING ATTACK
• MAC spoofing technique is used for changing the MAC address that is assigned to
the network device by the manufacturer.
• In a MAC spoofing attack, the MAC address of attacker’s host replaces the original
MAC address of the destination. So the target host sends all the data to attacker
instead of the actual host.
15
DNS POISONING
• DNS cache poisoning, is also known as DNS spoofing, which is a kind of attack that
exploits DNS vulnerabilities.
• It impresses upon the DNS server that it has received authentic information.
• It diverts Internet traffic away from the legitimate servers towards fake ones.
• It substitutes with the false IP address while the web addresses are being converted into
numeric IP addresses.
Intranet Internet
DNS DNS
Spoofing Spoofing
Proxy server
DNS Cache 16
DNS
Poisoning
poisoning
Defending Against DNS Spoofing
• Always secure your DNS resolver. It should be restricted to only users within the network
and not open to external users.
• Secure your DNS server against cache poisoning using a random source port instead of
UDP port 53 and randomizing the query ID.
• Resolve each and every DNS queries to a local DNS server and block DNS requests, so
that it cannot go to external servers.
• Implement DNSSEC. It digitally signs the DNS queries so that attacker will not be able to
forge that.
• Configure a firewall and restrict external DNS lookup.
17
VARIOUS SNIFFING TOOLS
Capsa OmniPeek
EtherApe Network Network Observer
Analyzer Analyzer
18
COUNTERMEASURES
• Limit the physical access to the network media to avoid the installation of a packet sniffer
• Use static ARP table and static IP addresses to protect it from attackers from adding the
spoofed ARP entries.
• Switch off network identification broadcasts and restrict the network access only to
authorized users to ensure that the network is not being identified by sniffing tools.
• Use HTTPS and avoid HTTP to protect the user, information like names and passwords.
• Use switch instead of a hub because switch transfers data only to a particular recipient.
• Use SFTP, and avoid using FTP for secure communication to transfer files.
• Use IPv4 protocol.
• Use encrypted sessions like SSL for email connection, SSH instead of Telnet, Secure Copy 19
CONTACT US!
Phone:
+91 – 72597-87316
Email:
[email protected]