11 TCP Ip
11 TCP Ip
http://www.csc.gatech.edu/copeland/jac/6612/
4/9/2015
Ethernet Header (MAC or Link Layer)
Ethernet Hdr - 14 bytes IP Header - 20 bytes TCP Header - 20 bytes App. Hdr
(big-endian) (big-endian) (big-endian) & Data
0 31 bits
Bytes 0 - 3 Destination Address - 6 bytes
Bytes 4 - 7
Length
Frag.
Flags Fragment Offset
Next Protocol
Data Packet from Token Ring has TCP header (20 bytes) plus App.
Header and Data (3300 bytes) = 20 +1280 + 1280 + 760 bytes.
22:10:50 217.232.26.184 > 128.61.104.27: tcp Note close times, different IPs
(frag 0:20@16384) (ttl 240, len 40) Very small, isolated fragment
-------
43660:64@0+ = ID : Data-Length (without IP hdr) @ Offset
“+” means More Fragments bit set.
Wireshark display filters: ip.fragment and ip.fragment.X where X can be:
count==[number] , error, overlap, overlap.conflict, multipletails, toolongtails)
6
Protocols over IP
IPsec ESP 50
ARP
x0800 <- Ethernet “Next Protocol” Number x0806
Data Link and Physical Layers (e.g., Ethernet, WiFi, Point-to-Point, …)
7
UDP Header
(big endian)
9
Smurf Attack
Attacker 23.45.67.89
Network 222.45.6.0/24
Network Broadcast Address = 222.45.6.255
10
TCP Header – 6 Flag Bits
Ethernet Hdr - 20 bytes IP Header - 20 bytes TCP Header - 20 bytes App. Hdr
(big-endian) (big-endian) (big-endian) & Data
Syn (only)
Syn + Ack
Ack
Client Server
Fin + Ack
Ack
Fin + Ack
Ack
13
TCP Initial: SYN, SYN-ACK, ACK
Reset
15
Reset Fin Syn Ack Comment
0 0 0 1 OK
0 0 1 0 1st Packet
0 0 1 1 2nd Packet
0 1 0 0 Needs Ack
0 1 0 1 OK
0 1 1 0 Illegal
0 1 1 1 Illegal
1 0 0 0 Needs Ack
1 0 0 1 OK
1 0 1 0 Illegal
1 0 1 1 Illegal
1 1 0 0 Illegal
1 1 0 1 Illegal
1 1 1 0 Illegal
1 1 1 1 Illegal
Blue Screen of Death - Set Urgent Flag, & Urgent Offset Pointer = 3
Older Windows OS would crash.
17
TCP Session Highjack
Attacker - (1) sniffs network and watches
Alice establish TCP session with Bob
(2) - DOS
Attack to (3) - Highjacks TCP Connection
Silence by using correct sequence number
Alice (Acks
and Resets) (0) - Established Bob
TCP Connection