Intrusion Techniques

Similar documents
Network Intrusion Goals and Methods

Správa sítí I Bezpečnost a řízení přístupu

Statistical Aspects of Intrusion Detection

11. Security Techniques on Smart Cards

Wireless Network Security

Network Security. Thierry Sans

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

Section 4 Cracking Encryption and Authentication

Parallel Connected Components

What is Eavedropping?

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Wireless KRACK attack client side workaround and detection

NETWORK SECURITY. Ch. 3: Network Attacks

Chapter 11: It s a Network. Introduction to Networking

Wireless LAN Security (RM12/2002)

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Defeating All Man-in-the-Middle Attacks

Chapter 2. Switch Concepts and Configuration. Part II

Modern Technology of Internet

CSC 6575: Internet Security Fall Attacks on Different OSI Layer Protocols OSI Layer Basic Attacks at Lower Layers

PRODUCT GUIDE Wireless Intrusion Prevention Systems

Parallel scan on linked lists

Wireless Attacks and Countermeasures

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

AN INTRODUCTION TO ARP SPOOFING

BackTrack 5 Wireless Penetration Testing

CIT 380: Securing Computer Systems. Network Security Concepts

Hacking Encrypted Wireless Network

ECCouncil Certified Ethical Hacker. Download Full Version :

Configuring a Basic Wireless LAN Connection

ELEC5616 COMPUTER & NETWORK SECURITY

FinIntrusion Kit / Release Notes. FINFISHER: FinIntrusion Kit 4.0 Release Notes

Man In The Middle Project completed by: John Ouimet and Kyle Newman

Gaining Access to encrypted networks

Man-In-The-Browser Attacks. Daniel Tomescu

On the Internet, nobody knows you re a dog.

FAQ on Cisco Aironet Wireless Security

Securing ARP and DHCP for mitigating link layer attacks

TestsDumps. Latest Test Dumps for IT Exam Certification

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. June 18, 2015

network security s642 computer security adam everspaugh

How Insecure is Wireless LAN?

GETTING THE MOST OUT OF EVIL TWIN

WIDS Technology White Paper

jk0-022 Exam Questions Demo CompTIA Exam Questions jk0-022

The StrideLinx Remote Access Solution comprises the StrideLinx router, web-based platform, and VPN client.

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Security of WiFi networks MARCIN TUNIA

Computer Network Routing Challenges Associated to Tackle Resolution Protocol

Semester 1. Cisco I. Introduction to Networks JEOPADY. Chapter 11

NETWORK INTRUSION. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Exam : PW Title : Certified wireless security professional(cwsp) Version : DEMO

A Framework for Optimizing IP over Ethernet Naming System

Quick Installation Guide DN-70495

Securing a Wireless LAN

Obstacle Avoiding Wireless Surveillance Bot

WLAN Timeouts. Timeouts. Timeout for Disabled Clients. Session Timeout. Information About Configuring a Timeout for Disabled Clients

Chapter 11: Networks

OSBRiDGE 24XL(i) Configuration Manual. Firmware 2.05b9

When does it work? Packet Sniffers. INFO Lecture 8. Content 24/03/2009

The OSI Model. Level 3 Unit 9 Computer Networks

Configuring Authentication Types

CSci530 Final Exam. Fall 2011

Network Defenses 21 JANUARY KAMI VANIEA 1

Linux Network Administration

Switched environments security... A fairy tale.

Wireless LAN Security. Gabriel Clothier

MTA_98-366_Vindicator930

Network Defenses KAMI VANIEA 1

Worldwide Release. Your world, Secured ND-IM005. Wi-Fi Interception System

Servers I. Ing. Jiří Kašpar prof. Ing. Pavel Tvrdík CSc.

PROTECTING INFORMATION ASSETS NETWORK SECURITY

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Endpoint Security - what-if analysis 1

WIRELESS EVIL TWIN ATTACK

Wireless Network Security

Configuring Management Frame Protection

Configuring 802.1X Authentication Client for Windows 8

PracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

Lab1. Definition of Sniffing: Passive Sniffing: Active Sniffing: How Does ARP Spoofing (Poisoning) Work?

Systems and Network Security (NETW-1002)

Exam E1 Copyright 2010 Thaar AL_Taiey

IP806GA/GB Wireless ADSL Router

Configuring your VLAN. Presented by Gregory Laffoon

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Configuring the WMIC for the First Time

VoIP Security Threat Analysis

NETGEAR-FVX Relation. Fabrizio Celli;Fabio Papacchini;Andrea Gozzi

Cisco Exactexams Questions & Answers

CompTIA E2C Security+ (2008 Edition) Exam Exam.

Q: How to setup the WDS link

CSc 466/566. Computer Security. 18 : Network Security Introduction

Configuring Layer2 Security

Wireless Network Security Spring 2016

Switching & ARP Week 3

SOHO 6 Wireless Installation Procedure Windows XP with Internet Explorer 5.x & 6.0

Cisco Exam Securing Wireless Enterprise Networks Version: 7.0 [ Total Questions: 53 ]

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Transcription:

Intrusion Techniques Mgr. Rudolf B. Blažek, Ph.D. Department of Systems Faculty of Information Technologies Czech Technical University in Prague Rudolf Blažek 2010-2011 Network Security MI-SIB, ZS 2011/12, Lecture 3 The European Social Fund Prague & EU: We Invest in Your Future

Metody síťových útoků Mgr. Rudolf B. Blažek, Ph.D. Katedra počítačových systémů Fakulta informačních technologií České vysoké učení technické v Praze Rudolf Blažek 2010-2011 Síťová bezpečnost MI-SIB, ZS 2011/12, Přednáška 3 Evropský sociální fond Praha & EU: Investujeme do vaší budoucnosf

Hubs and Switches Security in a LAN With a Hub Network Hub All hosts see all traffic Desktop PC Desktop PC Desktop PC Desktop PC Desktop PC LAN (Local Area Network) 3

Hubs and Switches Security in a LAN With a Hub Network Hub All hosts see all traffic This is not secure at all Desktop PC Desktop PC Desktop PC Desktop PC Desktop PC LAN (Local Area Network) 4

Hubs and Switches LAN Hubs and Switches OSI Layer LAN Component Host Layers Media Layers 7. Application 6. Presentation Web-switch, Content-switch 5. Session 4. Transport 3. Network Multi-Layer Switch 2. Data Link Switch 1. Physical Hub (e.g. load balancing) 5

Hubs and Switches Security in a LAN With a Switch Hosts only see traffic intended for them This is more secure, but not by much Network Switch ARP attacks can be used to capture traffic in switched networks Desktop PC Desktop PC Desktop PC Desktop PC Desktop PC 6

Hubs and Switches Security in a LAN With a Switch Hosts only see traffic intended for them This is more secure, but not by much Network Switch ARP attacks can be used to capture traffic in switched networks Desktop PC Desktop PC Attacker Desktop PC Desktop PC 7

MiM Attacks Man-in-the-Middle Attack on Two Hosts Compromising traffic between two hosts 8

MiM Attacks ARP Man-in-the-Middle Attack (2 hosts) A 192.168.1.3 Who has IP 192.168.1.8? ARP Request (broadcast) B 192.168.1.8 Attacker 192.168.1.11 9

MiM Attacks ARP Man-in-the-Middle Attack (2 hosts) A 192.168.1.3 A updates IP/MAC Cache I have IP 192.168.1.8 ARP Reply with MAC address of B B 192.168.1.8 Attacker 192.168.1.11 10

MiM Attacks ARP Man-in-the-Middle Attack (2 hosts) A 192.168.1.3 Established Connection B 192.168.1.8 Attacker 192.168.1.11 11

MiM Attacks ARP Man-in-the-Middle Attack (2 hosts) A 192.168.1.3 A updates IP/MAC Cache Forged ARP Reply with MAC address of Attacker Established Connection Attacker 192.168.1.11 My IP address is 192.168.1.8 B 192.168.1.8 12

MiM Attacks ARP Man-in-the-Middle Attack (2 hosts) A 192.168.1.3 My IP address is 192.168.1.3 Established Connection Forged ARP Reply with MAC address of Attacker Attacker 192.168.1.11 B 192.168.1.8 B updates IP/MAC Cache 13

MiM Attacks ARP Man-in-the-Middle Attack (2 hosts) A 192.168.1.3 B 192.168.1.8 Compromised Connection Attacker 192.168.1.11 14

MiM Attacks MiM Attack on a Router Compromising traffic between all hosts in a local network and the outside world (e.g. Internet) 15

MiM Attacks Man-in-the-Middle Attack Router Internet (or remote LAN) LAN A B Attacker 16

MiM Attacks Man-in-the-Middle Attack Stage 1 IP/MAC Cache is updated and updating is disabled by attacker Router Internet (or remote LAN) LAN A B Many Forged ARP Requests with MAC address of Attacker who pretends to be all the computers in the LAN My IP is that of all A, B, C Attacker 17

MiM Attacks Man-in-the-Middle Attack Stage 1 Router Internet (or remote LAN) LAN A B Inbound Traffic Compromised Attacker 18

MiM Attacks Man-in-the-Middle Attack Stage 2 Router Internet (or remote LAN) LAN A IP/MAC Cache of all computers is updated by attacker B Many Forged ARP Requests With MAC address of Attacker who pretends to be the Router Inbound Traffic Compromised Attacker My IP is that of the Router 19

MiM Attacks Man-in-the-Middle Attack Router Internet (or remote LAN) LAN A B ALL Traffic Compromised Attacker 20

WLAN Security 802.11 Deauthentication Attack 802.11 Deauthentication Attack The link-layer of wireless networks is open to intrusions. 21

WLAN Security 802.11 Deauthentication Attack 802.11 Handshake Probe Request Probe Response Authentication Request Authentication Challenge Authentication Response Authentication Success 802.11 Client Association Request Association Response 802.11 Access Point Data Data Deauthentication Deauthentication 22

WLAN Security 802.11 Deauthentication Attack Deauthentication Attack Data 802.11 Client Intruder Data Deauthentication 802.11 Access Point Deauthentication 23

WLAN Security 802.11 Deauthentication Attack Goals of 802.11 Deauthentication Attack DoS Attack: A flood of forged deauthentication frames causes some or all clients to disconnect from the AP even if they reconnect again. The WLAN is then essentially disabled WEP Cracking: In order to break the WEP encryption, the intruder forces the clients to deauthenticate so that it can observe authentication initialization vectors exchanged during reauthentication. 24

WLAN Security 802.11 Deauthentication Attack Goals of 802.11 Deauthentication Attack MiM Attack: The Man-in-the-Middle attack is performed by first forcing the clients to disconnect from an AP, and then using a fake WLAN with the same SSID. The traffic of clients that connected to the fake AP is then channeled through the intruder to steal data and credentials. 25

Man-in-the Middle Attacks Man-in-the Middle Attacks Can use ARP, DNS, WiFi or other protocols Encrypted connections like SSH or HTTPS hijacked via fake public keys (fake identity) Goals of MiM attacks: Capture login names and passwords Record or hijack connections both in a LAN and to the outside world 26

Man-in-the Middle Attacks Man-in-the Middle Attacks False feeling of security: Encrypted communication channels Switched networks Encrypted communications and switched networks do not protect us completely from MiM attacks! New: Quantum computers may soon decrypt secure connections that are captured now 27

Intrusion Detection Methods Detecting Network Intrusions Common detection methods: Data-mining Statistical modeling Neural networks Genetic algorithms Signature based approaches... 28