Attacks & Hacker Tools: Before Talking About Defenses, Need To Look at Network From Attacker S Perspective
Attacks & Hacker Tools: Before Talking About Defenses, Need To Look at Network From Attacker S Perspective
Before talking about defenses, need to look at network from attackers perspective
Reconnaissance Network mapping IP address spoofing
Port scanning
Sniffing
Session hijacking
DoS DDoS
Polytechnic University
Attacks
Reconnaissance
casing the joint
Lets take a close look at: Reconnaissance with whois Reconnaissance with DNS
A few words about a Registrar: Organization where you register a domain name Verifies uniqueness of name Enters domain name into various databases: whois & DNS
Polytechnic University
Attacks 2
Polytechnic University
Attacks
Whois databases
Input: domain name or company name
Output: registrar, whois server, dns server
Two steps First find targets registrar Then whois target at registrar
Polytechnic University
Attacks
Polytechnic University
Attacks
of people (administrator, billing contact) Telephone numbers E-mail addresses Name servers and IP addresses
Polytechnic University
Attacks
Polytechnic University
Attacks
Reconnaissance: IP Ranges
ARIN: American Registry for Internet
Numbers
Polytechnic University
Attacks
Query at ARIN
Polytechnic University
Attacks
address of packets. Can use whois database to obtain info about the domain from where the attack is coming. Can inform admin that their systems are source of an attack
Polytechnic University
Attacks
10
Polytechnic University
Attacks
11
DNS: queries
2
requesting host
cis.poly.edu
DNS records
DNS: distributed db storing resource records (RR) RR format: (name,
Type=A name is hostname value is IP address Type=NS name is domain (e.g. foo.com) value is IP address of authoritative name server for this domain
Polytechnic University
Attacks
14
caches
Polytechnic University
Attacks
16
authoritative server for target organization using whois. Attacker can then query the DNS by sending DNS query messages. Tools (often available in Unix and Windows machines; also available at web sites):
nslookup host dig
Polytechnic University
Attacks 17
nslookup
Avaiable in most unix & Windows machines Get dialpad DNS server IP address from whois set type=any get all
Polytechnic University
Attacks
18
Reconnaissance summary
Obtaining information from public
databases:
whois databases
Tool: web sites
DNS database
Tool: nslookup
Defense
Keep to a minimum what you put in the public database: only what is necessary
Polytechnic University
Attacks
19
Port scanning
Sniffing
Session hijacking
DoS DDoS
Polytechnic University
Attacks
20
Network mapping
Goal: Learn about a remote network
attacker
121.27.2.1
121.27.2.4
firewall?
Internet
firewall?
Internal network
121.27.2.16
Polytechnic University
Attacks 21
Network mapping
Attacker uses ping sweeps to determine live
hosts Attacker uses port scans to determine live services Attacker often uses traceroute to determine path to each host discovered during ping sweep.
Polytechnic University
Attacks
22
Traceroute
traceroute: gaia.cs.umass.edu to www.eurecom.fr
Three delay measements from gaia.cs.umass.edu to cs-gw.cs.umass.edu
1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms 2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms 3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms 4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms 5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms 6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms 7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms trans-oceanic 8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms link 9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms 10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms 11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms 12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms 13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms 14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms 15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms 16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms 17 * * * * means no reponse (probe lost, router not replying) 18 * * * 19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms Polytechnic University
Attacks 23
to an unlikely port 3 packets with the same TTL, then increments TTL
When router decrements TTL to 0, sends
Polytechnic University
Ping Sweep
Ping Recall ICMP messages are directly encapsulated in IP datagrams (protocol 1) To ping a host:
send ICMP Echo Request (ICMP type 8) Host responds with ICMP Echo Reply (type 0)
So lets ping the entire IP address range Use automated tool for this ping sweep If firewall blocks ping packets: Try sweeping with TCP SYN packets to port 80 Or try sending UDP packets to possible ports
Polytechnic University
Attacks
25
Port scanning
Now that we have a map with some hosts, lets find
out what ports are open on a target host 65,535 TCP ports; 65,535 UDP ports
Port scanning tools can scan: List of ports Range of ports All possible TCP and UDP ports
Web server: TCP port 80 DNS server: UDP port 53 Mail server: TCP port 25
detection
Polytechnic University
Attacks
26
source port #
ACK: ACK # valid
dest port #
sequence number
head not UA P R S F len used
acknowledgement number
Receive window Urg data pnter checksum
Polytechnic University
Attacks
27
Host B
time
28
SYN=1, ACK=0
SYN=1, ACK=1
server host allocates buffers specifies server initial seq. # Step 3: client receives SYN-ACK, replies with ACK segment, which may contain data
SYN=0, ACK=1
Attacks 29
Polytechnic University
unreachable instead
Polytechnic University
Attacks
30
Nmap (1)
Extremely popular usually run over linux rich feature set, exploiting raw sockets need root to use all features Ping sweeping over any range of IP addresses with ICMP, SYN, ACK OS determination Port scanning Over any range of ports Almost any type of TCP, UDP packet Source IP address
spoofing
Decoy scanning
Polytechnic University
Nmap (2)
Input:
nmap [Scan Type] [Options] <target hosts>
Default for port scanning: ports 1-1024 plus ports
Output: open ports: syn/ack returned; port is open unfiltered ports: RST returned: port is closed but not blocked by firewall filtered ports: nothing returned; port is blocked by firewall
Polytechnic University
Attacks 32
addresses Can change options so that pings with SYNs, ACKs -sP = ping -v = verbose
Polytechnic University
Attacks
33
Instead RST packet is typically returned Target (e.g. Web server) may log completed connections Gives away attackers IP address
Polytechnic University
Attacks
34
Polytechnic University
Attacks
35
firewall
RST
Polytechnic University
Internal Network
Attacks
36
port
ICMP Port Unreachable: interpret port closed Nothing comes back: interpret port open
False positives common
Polytechnic University
Attacks
37
addresses into Nmap For each packet it sends, Nmap also sends packets from decoy source IP addresses
For
at least one packet, to get a result If there are 30 decoys, victim network will have to investigate 31 different sources!
Polytechnic University
Attacks 38
Polytechnic University
Attacks
39
SYN to open port NULL to open port (no flag bits set) SYN/FIN/URG/PSH to open port SYN to closed port ACK to closed port FIN/PSH/URG to closed port UDP to closed port
Polytechnic University
Scans all TCP default ports on target.com; verbose mode First pings addresses in target network to find hosts that are up. Then scans default ports at these hosts; stealth mode (doesnt complete the connections); tries to determine OS running on each scanned host Sends an Xmas tree scan to the first half of each of the 255 possible subnets in the 198.116/16. Testing whether the systems run ssh, DNS, pop3, or imap
nmap -v -p 80 *.*.2.3-5
finds all web servers on machines with IP addresses ending in .2.3, .2.4, or .2.5
Polytechnic University
Attacks
41
capabilities of routers
Block incoming ICMP packets, except to the hosts that you want to be pingable Filter Time Exceeded ICMP messages leaving your network
Close all unused ports Scan your own systems to verify that
Attacks
42
Port scanning
Sniffing
Session hijacking
DoS DDoS
Polytechnic University
Attacks
43
Switches
Routers
Polytechnic University
Attacks
44
Hubs
Hubs are essentially physical-layer repeaters: bits coming from one link go out all other links at the same rate no frame buffering no CSMA/CD at hub: adapters detect collisions provides net management functionality
twisted pair
hub
Polytechnic University
Attacks
45
Sniffing
Attacker is inside
firewall Requirements
Grab and file away: userids and passwords credit card numbers secret e-mail conversations
components
Island hopping attack: Take over single machine (eg virus) Install sniffer, observe passwords, take over more machines, install sniffers
Polytechnic University
Attacks
46
Passive sniffing
Easy to sniff: 802.11 traffic Ethernet traffic passing through a hub
Cable
Any packets sent to hub is broadcast to all interfaces Not true for a switch
Popular sniffers Wireshark (saw this in CS 684) tcpdump (for unix) Snort (sniffing and intrusion detection)
modem traffic
Polytechnic University
Attacks
47
switch
victim
48
Polytechnic University
Attacks
49
Defenses
Tie MAC addresses to switch ports
Available
Polytechnic University
Attacks
50
(1) Send fake ARP response, mapping router IP address to attackers MAC address
outside world
Polytechnic University
Attacks
51
Polytechnic University
Attacks
52
Sniffing defenses
Encrypt data: IPsec, SSL, PGP, SSH
network Use encryption for wireless and cable channels Configure switches with MAC addresses
Honeypot Create fake account and send password over network Identify attacker when it uses the password
Polytechnic University
Attacks 53
Port scanning
Sniffing
Session hijacking
DoS DDoS
Polytechnic University
Attacks
54
145.13.145.67
212.68.212.7
Polytechnic University
attacker
victim
But attacker cannot interact with victim. Unless attacker is on path between victim and spoofed address.
Polytechnic University
Attacks
56
server with a spoofed IP address? Not easy: SYNACK and any subsequent packets sent to spoofed address. If attacker can guess initial sequence number, can attempt to send commands
Send ACK with spoofed IP and correct seq #, say, one second after SYN
numbers.
Polytechnic University
Attacks
57
127.32.1.1
privately administered
Internet
222.22/16
Polytechnic University
Attacks 58
Polytechnic University
Attacks
59
34.34/24
56.56/24
78.78/24
Polytechnic University
Attacks
60
tier-1 ISP
56.56/24 regional ISP 78.78/24
Filter all but 56.56/24 and 78.78/24
Polytechnic University
Attacks
61
regional ISP
34.34/24
tier-1 ISP
56.56/24 regional ISP 78.78/24
Filter all but 56.56/24 and 78.78/24
Polytechnic University
Attacks
62
deployment at access ISPs Deployment in upstream ISPs helps, but does not eliminate IP spoofing
Filtering
hacker can still spoof another address in its access network 12.12/24 See RFC 2827 Network Ingress Filtering: Defeating DDoS
Polytechnic University
Attacks 63
Port scanning
Sniffing
Session hijacking
DoS DDoS
Polytechnic University
Attacks
64
Session hijacking
Take control of one side of a TCP connection
Marriage of sniffing and spoofing
Alice
Alice to Bob
Attacker sniffs packets Sees TCP packets between Bob and Alice and their sequence numbers
Bob now obeys commands sent by attacker, thinking they were sent by Alice
Principal defense: encyrption Attacker does not have keys to encrypt and insert meaningful traffic
Polytechnic University
Attacks
66
Bob
Bob is getting segments from attacker and Alice. Source IP address same, but seq #s different. Bob likely drops connection.
Attacker
Attackers solution: Send unsolicited ARP replies to Alice and Bob with non-existent MAC addresses Overwrite IP-to-MAC ARP tables Alices segments will not reach Bob and vice-versa But attacker continues to hear Bobs segments, communicates with Bob
Attacks 67
Polytechnic University
Netcat
General
Polytechnic University
Attacks
68
Denial-of-Service
Prevent access by legitimate users or stop critical system processes
Vulnerability attack: Send a few crafted messages to target app that has vulnerability Malicious messages called the exploit Remotely stopping or crashing services
Connection flooding Overwhelming connection queue with SYN flood Bandwidth flooding
attack:
Polytechnic University
Overwhelming communications link with packets Strength in flooding attack lies in volume rather than content
Attacks 69
Polytechnic University
70
length fragment 16-bit identifier flgs offset upper time to Internet layer live checksum 32 bit source IP address 32 bit destination IP address Options (if any)
Polytechnic University
Attacks
71
Polytechnic University
Attacks
72
packet with source and dest address/port the same Ping of death: sends oversized ping packet Jolt2: sends a stream of fragments, none of which have offset of 0. Rebuilding consumes all processor capacity.
Polytechnic University
Teardrop, Newtear,
Bonk, Syndrop: tools send overlapping segments, that is, fragment offsets incorrect.
Patches fix the problem, but malformed packet attacks continue to be discovered.
Attacks
73
packet with initial seq. number when initiating a connection. TCP on server machine allocates memory on its connection queue, to track the status of the new halfopen connection. For each half-open connection, server waits for ACK segment, using a timeout that is often > 1 minute
Polytechnic University
attacker
Connection queue freed up with RST segment
victim Alice Expert attack: Use multiple source IP addresses, each from unresponsive addresses.
Attacks 75
Polytechnic University
Host B
Source and destination IP addresses and port numbers, and a secret number
Polytechnic University
Attacks
76
If SYN-flood attack with spoofed IP address No ACK comes back to B for connection. No problem: B is not waiting for an ACK What if Host A sends only ACK (no SYN)? Will host B establish a connection?
Attacks
77
legitimate traffic, hindering detection. Flow of traffic must consume targets bandwidth resources.
Attacker
Polytechnic University
Attacks
78
bot attacker bot bot processes wait for command from attacker to flood a target bot Polytechnic University
Attacks 79
Internet victim
reply
reply
attacker
victim
request
reply
Source IP = victims IP
January 2001 attack: requests for large DNS record generated 60-90 Mbps of traffic Reflection attack can be also be done with
Polytechnic University
Attacks
81
DDoS Defenses
Dont let your systems Over-provisioning of
become bots
resources
Filter dangerous
Abundant bandwidth Large pool of servers ISP needs abundant bandwidth too. Multiple ISPs
packets
Polytechnic University
DNS attacks
Reflector attack: already discussed Leverage DNS for attacks on arbitrary targets Denying DNS service Stop DNS root servers Stop top-level-domain servers (e.g. .com domain) Stop local (default name servers) Use fake DNS replies to redirect user Poisoning DNS: Insert false resource records into various DNS caches False records contain IP addresses operated by attackers
Polytechnic University
Attacks
83
DNS caching rate limiting at upstream routers: filter ping when they arrive at an excessive rate
root servers remained up. Root server attack is easy to defend: download root server database to local (default) name servers
Polytechnic University
Attacks
84
1 network
local DNS server Issues: Must spoof IP address: set to local DNS server (easy) Must match reply ID with request ID (easy) May need to stop reply from the local DNS server
client
attacker 1. Client sends DNS query to its local DNS server; sniffed by attacker 2. Attacker responds with bogus DNS reply
(harder)
Polytechnic University
Attacks
85
Bogus records could point to attacker nodes Attacker nodes could phish
a name server.
Name servers use IDs in DNS messages to match replies to queries So cant just insert a record into a name server by sending a DNS reply message.
Attacks
86
Polytechnic University
Goal: Put bogus IP address for poly.edu in local Berkeley DNS server 1) Attacker queries local DNS server 2) Local DNS makes iterative queries 3) Attacker waits for some time; sends a bogus reply, spoofing authoritative server for poly.edu.
Attacks 87
Polytechnic University
88
Attacker needs to know sequence number in request message sent to upstream server
Not easy!
Polytechnic University
Attacks
89
DDoS attacks against root servers have been largely unsuccessful Poisoning and redirection attacks are difficult unless you can sniff DNS requests
And even so, may need to stop DNS servers from replying
DNS
Polytechnic University
Attacks
90
Port scanning
Sniffing
Session hijacking
DoS DDoS
Polytechnic University
Attacks
91