110 likes | 233 Views
Chapter 7. Denial of Service & Session Hijacking. Denial of Service. Rendering a system unusable to those who deserve it Consume bandwidth or disk space Overwhelming amount of spam Perform account lockout of valid users Considered an unsophisticated attack BOTs (zombies) and BOTnets
E N D
Chapter 7 Denial of Service & Session Hijacking
Denial of Service • Rendering a system unusable to those who deserve it • Consume bandwidth or disk space • Overwhelming amount of spam • Perform account lockout of valid users • Considered an unsophisticated attack • BOTs (zombies) and BOTnets • “Botnet of 1,000 bots has larger bandwidth than the Internet connection of most corporate networks.” • Oct 20, 2002: 9 of 13 DNS Root servers disabled for 1 hour • DoSTools • Ping of Death: packets are too large for reassembly • Ping Flood: too many pings to handle the traffic • Land attack: source IP matches target IP
Distributed Denial of Service • Use master/slave configuration • Phase 1: intrusion: infect systems to be zombies • Phase 2: attack: trigger slaves to attack • DDosTools • Trinoo, Tribal Flood Network (TFN), TFN2K, Stacheldraht • Controlling Bots • Usually done by IRC connections due to unencrypted and long connection times • http://www.pcmag.com/article2/0,2817,2348902,00.asp • http://it.slashdot.org/story/11/09/06/1944233/rent-your-own-botnet • http://www.inquisitr.com/19880/bbc-shows-what-happens-when-you-buy-a-botnet/
Smurf and SYN Flood Attacks • Smurf attack: send much ICMP Echo (ping) to broadcast IP address with spoofed source address of victim • http://www.nordu.net/articles/smurf.html • Fraggleattack: use large amounts of UDP traffic instead of ICMP • Preventing Smurf and Fraggle Attacks • http://www.javvin.com/networksecurity/SmurfAttack.html • Teardrop attack: send overlapping or over-sized payloads to the target machine • http://www.physnet.uni-hamburg.de/physnet/security/vulnerability/teardrop.html • SYN Flood: flood victim with TCP connection requests and then don’t finish 3 way handshake • http://www.tech-mavens.com/synflood.htm
Preventing SYN Flood Attacks • SYN Cookies: don’t allocate resources until 3 way handshake is complete • RST Cookies: victim responds with incorrect SYN • ACK so attacker has to respond with notice of error • Micro Blocks: allocate smaller memory space for connection record • Stack Tweaking: modify the TCP/IP stack
PING of Death • Send ICMP echo packets of more than the 65,536 bytes allowed by the IP protocol • Causes system to freeze, crash, or reboot • Operating systems after 1997 are patched to prevent this
DoS/DDoS Countermeasures • Network-Ingress filter • Rate-Limiting network Traffic (traffic shaping) • Intrusion Detection Systems • Automated Network-Tracing Tools • Host & Network Auditing Tools • DoS Scanning Tools • SARA (Security Auditor’s Research Assistant) • RID • Zombie Zapper
Session Hijacking • Hacker gains control of authenticated session • Made possible by sequence number projecting • SN range from 1 to 4,294,967,295 • Incremented by 128,000 / second + 64,000 for each connection
Session Hijacking • Methods of hijacking • Session fixation: attacker sets user’s session to one know to him; (I set your session ID to one I know) • Session sidejacking: attacker sniffs traffic to steal the session cookie • Cross-site scripting: attacker tricks user’s computer to run code that captures the session cookie • Active vs Passive Hijacking • Active: attacker takes over the session • Passive: attacker watches/records all traffic (sniffing) • Relies on Sequence Prediction
Session Hijacking • Tools • Hunt • Dangers of hijacking • Easy to perform • Few countermeasures • Information gathering is successful • Preventing hijacking • Encryption: IPSec, SSH, HTTPS, VPNs • Minimize remote access • Strong Authentication • Educated users • Variety of usernames and passwords