Module 6 - Network Attacks - A Deeper Look and Protecting The Network
Module 6 - Network Attacks - A Deeper Look and Protecting The Network
ASSURANCE &
SECURITY 2
MODULE 6
NETWORK ATTACKS: A DEEPER
LOOK / PROTECTING THE
NETWORK
OBJECTIVES
Upon completion of this module, the student would be able to:
➢ Explain network traffic monitoring it importance.
➢ Explain how network monitoring is conducted.
➢ Explain how TCP/IP vulnerabilities enable network attacks.
➢ Explain how IP, TCP and UDP vulnerabilities enable network attacks.
➢ Explain how network application vulnerabilities enable network attacks.
OBJECTIVES
Upon completion of this module, the student would be able to:
➢ Explain approaches to network security defense.
➢ Explain how the defense-in-depth strategy is used to protect networks.
➢ Explain security policies, regulations, and standards.
➢ Describe access control policies.
➢ Explain how AAA is used to control network access.
➢ Use various intelligence sources to locate current security threats.
➢ Use threat intelligence to identify threats and vulnerabilities.
NETWORK MONITORING AND
TOOLS
Introduction to Network Monitoring
Network Security Topology
▪ All networks are targets and need
to be secured using a defense-in-
depth approach.
▪ Security analysts must be
intimately familiar with normal
network behavior because
abnormal network behavior
typically indicates a problem.
Introduction to Network Monitoring
Network Monitoring Methods
▪ Tools used to help discover normal
network behavior include IDS, packet
analyzers, SNMP, NetFlow, and others.
▪ Network protocol analyzers are also very useful for network troubleshooting, software and protocol
development, and education. In security forensics, a security analyst may reconstruct an incident from relevant
packet captures.
Introduction to Network Monitoring Tools
NetFlow ▪ NetFlow is a Cisco IOS technology that provides
24x7 statistics on packets flowing through a
Cisco router or multilayer switch.
▪ NetFlow can be used for network and security
monitoring, network planning, and traffic
analysis; however, it does not capture the
content.
▪ NetFlow collectors like Cisco Stealthwatch can
also perform advanced functions including:
• Flow stitching: It groups individual entries into
flows.
• Flow deduplication: It filters duplicate incoming
entries from multiple NetFlow clients.
• NAT stitching: It simplifies flows with NAT entries.
Introduction to Network Monitoring Tools
SIEM
▪ Security Information Event Management (SIEM) systems provide real time
reporting and long-term analysis of security events.
▪ SIEM includes the following essential functions:
• Forensic analysis – The ability to search logs and event records from sources
throughout the organization. It provides more complete information for forensic
analysis.
• Correlation – Examines logs and events from different systems or applications,
speeding detection of and reaction to security threats.
• Aggregation - Aggregation reduces the volume of event data by consolidating
duplicate event records.
• Reporting - Reporting presents the correlated and aggregated event data in real-time
monitoring and long-term summaries.
Introduction to Network Monitoring Tools
SIEM Systems
▪ Splunk is one of the more popular proprietary
SIEM systems used by Security Operation
Centers.
▪ As an open source option, this course uses the
ELK suite for SIEM functionality. ELK is an
acronym for three open source products from
Elastic:
▪ Elasticsearch - Document oriented full text
search engine
▪ Logstash - Pipeline processing system that
connects "inputs" to "outputs" with optional
"filters" in between
▪ Kibana - Browser based analytics and search
dashboard for Elasticsearch
IP Vulnerabilities and Threats
IPv4 and IPv6
▪ It is important for security analysts
to understand the different fields
in both the IPv4 and IPv6 headers
because threat actors can tamper
with packet information.
IP Vulnerabilities and Threats
The IPv4 Packet Header
▪ There are 10 fields in the IPv4
packet header:
• Version
• Internet Header length
• Differentiated Services or DiffServ
(DS)
• Total length
• Identification, Flag, and Fragment
offset
• Time-to-Live (TTL)
• Protocol
• Header checksum
• Source IPv4 Address
• Destination IPv4 Address
• Options and Padding
IP Vulnerabilities and Threats
The IPv6 Packet Header
▪ There are 8 fields in the IPv4
packet header:
• Version
• Traffic Class
• Flow Label
• Payload Length
• Next Header
• Hop Limit
• Source IPv6 Address
• Destination IPv6 Address
IP Vulnerabilities and Threats
IP Vulnerabilities
IP Vulnerabilities and Threats
ICMP Attacks
▪ ICMP was developed to carry diagnostic
messages and to report error conditions when
routes, hosts, and ports are unavailable. ICMP
messages are generated by devices when a
network error or outage occurs.
▪ Common ICMP messages of interest to threat
actors include:
• ICMP echo request and echo reply – This is used to
perform host verification and DoS attacks.
• ICMP unreachable – This is used to perform network
reconnaissance and scanning attacks.
• ICMP mask reply – This is used to map an internal IP
network.
• ICMP redirects – This is used to lure a target host
into sending all traffic through a compromised
device and create a MITM attack.
• ICMP router discovery – This is used to inject bogus
route entries into the routing table of a target host.
IP Vulnerabilities and Threats
DoS Attacks
▪ The goal of a Denial of Service (DoS)
attack is to prevent legitimate users
from gaining access to websites, email,
online accounts, and other services.
▪ There are two major sources of DoS
attacks:
• Maliciously Formatted Packets – Threat
actors craft a maliciously formatted packet
and forward it to a susceptible host,
causing the host to crash or become
extremely slow.
• Overwhelming Quantity of Traffic – Threat
actors overwhelm a target network, host,
or application, causing them to crash or
become extremely slow.
▪ A distributed DoS (DDoS) attack
combines multiple DoS attacks.
IP Vulnerabilities and Threats
Amplification and Reflection Attacks
▪ Threat actors often use
amplification and reflection
techniques to create DoS attacks.
The example in the figure
illustrates how an amplification
and reflection technique called a
Smurf attack is used to
overwhelm a target host:
1. Amplification - The threat actor
forwards ICMP echo request
messages that contain the source
IP address of the victim to a large
number of hosts.
2. Reflection - These hosts all reply
to the spoofed IP address of the
victim to overwhelm it.
IP Vulnerabilities and Threats
DDoS Attacks
▪ A DDoS attack is larger in magnitude
than a DoS attack because it
originates from multiple, coordinated
sources. DDoS attacks introduced
new terms such as botnet, handler
systems, and zombie computers.
A DDoS attack could proceed as
follows:
1. The threat actor (botmaster) builds or purchases the use of a
botnet of zombie hosts. The command-and-control (CnC) server
communicates with zombies over a covert channel using IRC, P2P,
DNS, HTTP, or HTTPS.
1 3
2 4
Enterprise Services
HTTP and HTTPS
▪ Browsing the Web is possibly the largest vector of attack. Security analysts
should have in depth knowledge of how web attacks work.
• Malicious iFrames – an iFrame allows a page from a different domain to be opened
inline within the current page. The iFrame can be used to launch malicious code.
• HTTP 302 cushioning – allows a web page to redirect and open in a different URL. Can
be used to redirect to malicious code.
• Domain shadowing – malicious web sites are created from subdomains created from a
hijacked domain.
Enterprise Services
Email
▪ Email messages are accessed from many different devices
that are often not protected by the company’s firewall.
• Attachment-based attacks – email with
malicious executable files attached.
• Email spoofing – phishing attack where the
message appears to come from a legitimate
source.
• Spam email – unsolicited email with
advertisements or malicious content.
• Open mail relay server – massive amount of
spam and worms can be sent by misconfigured
email servers.
• Homoglyphs – phishing scheme where text
characters
(hyperlinks) look similar to real text and links.
Enterprise Services
Web-Exposed Databases
▪ Web applications commonly connect to a relational database. Because
relational databases often contain sensitive data, databases are a frequent
target for attacks.
• Command injection attacks – insecure code and web application allows OS commands
to be injected into form fields or the address bar.
• XSS Cross-site scripting attacks – insecure server-side scripting where the input is not
validated allows scripting commands to be inserted into user generated forms fields,
like web page comments. This results in visitors being redirected to a malicious website
with malware code.
• SQL injection attacks – insecure server-side scripting allows
SQL commands to be inserted into form fields where the input
is not validated.
• HTTP injection attacks – manipulation of html allows
executable code to be injected through HTML div tags, etc.
UNDERSTANDING DEFENSE,
ACCESS CONTROL AND THREAT
INTELLIGENCE
Defense-in-Depth
Assets, Vulnerabilities, Threats
▪ Cybersecurity risk consists of the following:
• Assets - Anything of value to an organization
that must be protected including servers,
infrastructure devices, end devices, and the
greatest asset, data.
• Vulnerabilities - A weakness in a system or its
design that could be exploited by a threat.
• Threats - Any potential danger to an asset.
Defense-in-Depth
Identify Assets
▪ Many organizations only have a general idea of the assets
that need to be protected.
• Emmett Dulaney and Chuck Easttom. CompTIA Security+ Study Guide: Exam SY0-501 7th Edition
• David L. Prowse (2018) Pearson. CompTIA Security+ SY0-501 Cert Guide (4th Edition)
• Omar Santos/ Joseph Muniz /Stefano De Crescenzo(June 17, 2017)CCNA Cyber Ops (SECFND #210-
250 and SECOPS #210-255)Official Cert Guide Library 1st Edition