1. Trang chủ
  2. » Công Nghệ Thông Tin

Lecture Security+ Certification: Chapter 3 (part 1) - Trung tâm Athena

43 43 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 43
Dung lượng 0,98 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Chapter 3 - Attacks and malicious code (part 1). After reading the material in this chapter, you should be able to: Explain denial-of-service (DoS) attacks, explain and discuss ping-of-death attacks, identify major components used in a DDoS attack and how they are installed, understand major types of spoofing attacks.

Trang 1

Chapter 3:

Attacks and Malicious Code

Trang 2

Objectives in this chapter

attack and how they are installed

attacks, and TCP session hijacking

ATHENA

attack and how they are installed

attacks, and TCP session hijacking

continued…

Trang 3

Learning Objectives

and explain why they can be incrediblydamaging

encrypted data

identify a countermeasure for each one

and explain why they can be incrediblydamaging

encrypted data

identify a countermeasure for each one

Trang 4

Why Secure a Network?

External attacker

Internal attacker

Trang 5

Vulnerability – a problem or error that opens

up a security “hole”

Patch – code that will eliminate the

vulnerability (patch must be applied)

Exploit – code (often a virus or a worm) that

can take advantage of a particular vulnerability

Vulnerability – a problem or error that opens

up a security “hole”

Patch – code that will eliminate the

vulnerability (patch must be applied)

Exploit – code (often a virus or a worm) that

can take advantage of a particular vulnerability

Trang 6

What should happen

ATHENA

Trang 7

Denial-of-Service Attacks

unusable by its real user(s)

unusable by its real user(s)

Trang 8

TCP Three-Way Handshake

ATHENA

Trang 9

SYN Flood

machine sends back a SYN, ACK Initiatingmachine never sends back the final ACK tocomplete the connection

time before before clearing the connection

machine sends back a SYN, ACK Initiatingmachine never sends back the final ACK tocomplete the connection

time before before clearing the connection

Trang 10

SYN Flood

written, the programmers decided on a certainnumber of connections that could be “waiting”

accept new connections, so it is effectively notlistening

ATHENA

written, the programmers decided on a certainnumber of connections that could be “waiting”

accept new connections, so it is effectively notlistening

Trang 11

SYN Flood

Trang 13

Things the Blackhat Must Consider

the spoofed address

 If this is a real machine, it will reply with a RST,which will clear the connection This is not

what the blackhat wants

 Solution, use a private address or an

unallocated address as the spoofed source IPaddress

the spoofed address

 If this is a real machine, it will reply with a RST,which will clear the connection This is not

what the blackhat wants

 Solution, use a private address or an

unallocated address as the spoofed source IPaddress

Trang 14

What Can the Good-guys Do?

wait before clearing the connection

attempts

receiving machine This will allow theconnection to be moved out of the half-openqueue

ATHENA

wait before clearing the connection

attempts

receiving machine This will allow theconnection to be moved out of the half-openqueue

Trang 16

to amplify its effect on the victim

broadcast address using the victim’s address

as the source

replies

traffic and delays/prevents legitimate trafficfrom reaching its destination

ATHENA

to amplify its effect on the victim

broadcast address using the victim’s address

as the source

replies

traffic and delays/prevents legitimate trafficfrom reaching its destination

Trang 18

Protective Measures Against Smurf

messages with a destination of an internalbroadcast or multicast address

requests directed to their broadcast address

list of smurf amplifier networks and

http://www.netscan.org/ to make sure yournetwork is configured properly

ATHENA

messages with a destination of an internalbroadcast or multicast address

requests directed to their broadcast address

list of smurf amplifier networks and

http://www.netscan.org/ to make sure yournetwork is configured properly

Trang 19

IP Fragmentation Attacks:

Ping of Death

crash remote systems

most network topologies can’t handle packets ofthat size – so the packet is broken into smallerpackets (fragmentation)

would crash older operating systems

crash remote systems

most network topologies can’t handle packets ofthat size – so the packet is broken into smallerpackets (fragmentation)

would crash older operating systems

Trang 20

Ping of Death

ATHENA

Trang 21

Distributed Denial-of-Service Attacks

the victim by flooding its link to the Internet ordepriving it of resources

business Internet sites

kiddies

 Result in temporary loss of access to a given site

the victim by flooding its link to the Internet ordepriving it of resources

business Internet sites

kiddies

 Result in temporary loss of access to a given site

Trang 22

ATHENA

Trang 23

DDoS Tools and Attack Methods

Trang 24

filtering

Trang 25

Ingress and Egress Filtering

Trang 26

Preventing the Network from

Inadvertently Attacking Others

for a broadcast address

that has a source address that is not permissible

on the Internet (see Figures 3-8 and 3-9)

ATHENA

for a broadcast address

that has a source address that is not permissible

on the Internet (see Figures 3-8 and 3-9)

continued…

Trang 27

Preventing the Network from

Inadvertently Attacking Others

 Block at the firewall any packet that uses a

protocol or port that is not used for Internetcommunications on the network

inside your network from entering yournetwork

 Block at the firewall any packet that uses a

protocol or port that is not used for Internetcommunications on the network

inside your network from entering yournetwork

Trang 28

Ingress Filtering of Packets with RFC 1918 Addresses

ATHENA

Trang 29

Filtering of Packets

with RFC 2827 Addresses

Trang 30

IP – What to Filter

 All private addresses: 10.0.0.0, 172.16.0.0 –

172.31.0.0, 192.168.0.0 coming in or going out

see http://www.iana.org/assignments/

ipv4-address-space) coming or going

ATHENA

 All private addresses: 10.0.0.0, 172.16.0.0 –

172.31.0.0, 192.168.0.0 coming in or going out

see http://www.iana.org/assignments/

ipv4-address-space) coming or going

Trang 32

IP Address Spoofing

hosts

router, the firewall, by an application, or by theOS

source address

ATHENA

hosts

router, the firewall, by an application, or by theOS

source address

Trang 33

Problems to be overcome

addresses, the attacker can’t cause the returnpackets to be delivered back to him/her

 The return packets will be delivered to the

trusted host, which could reset the connectionand foil the attack

correct sequence number

addresses, the attacker can’t cause the returnpackets to be delivered back to him/her

 The return packets will be delivered to the

trusted host, which could reset the connectionand foil the attack

correct sequence number

Trang 34

ATHENA

Trang 35

ARP Poisoning

corrupting ARP caches of directly connectedmachines (gratuitous arp)

hijacking attacks

• ARPoison

corrupting ARP caches of directly connectedmachines (gratuitous arp)

hijacking attacks

• ARPoison

Trang 36

Web Spoofing

 Convinces victim that he or she is visiting a realand legitimate site

and a denial-of-service attack

ATHENA

Trang 37

Web Spoofing

Trang 38

DNS Spoofing Effects

hacker’s server where it can be copied ormodified before sending mail to final

destination

ATHENA

hacker’s server where it can be copied ormodified before sending mail to final

destination

Trang 39

DNS Spoofing 1

and changes hostname-to-IP address mappings

the clients could be directed anywhere

organization.)

and changes hostname-to-IP address mappings

the clients could be directed anywhere

organization.)

Trang 40

DNS Spoofing 2

server and gives out bogus info

 Attacker poisons the arp caches of the clientmachines to direct their requests to the bogusDNS machine

(DoSes it)

ATHENA

server and gives out bogus info

 Attacker poisons the arp caches of the clientmachines to direct their requests to the bogusDNS machine

(DoSes it)

Trang 41

DNS Spoofing 3

IP number “out there”, the attacker sends areply packet to the DNS server with bogus info

 DNS server will accept the first reply with

correct query number

IP number “out there”, the attacker sends areply packet to the DNS server with bogus info

 DNS server will accept the first reply with

correct query number

Trang 42

To Thwart Spoofing Attacks

• Disable source routing on all internal routers

• Filter out packets entering local networkfrom the Internet that have a source address

of the local network

• Disable source routing on all internal routers

• Filter out packets entering local networkfrom the Internet that have a source address

of the local network

features

continued…

Trang 43

To Thwart Spoofing Attacks

Ngày đăng: 30/01/2020, 11:57