190 likes | 294 Views
CISC 210 - Class Today. Recap Packet Formats Network addressing Looking at Network Traffic Network Scanning. Recap. Going over the Exam Answers Intro Networking Technologies and Topologies Attacks: passive and active Addressing. Packet Formats. Modern computer networks use packets
E N D
CISC 210 - Class Today • Recap • Packet Formats • Network addressing • Looking at Network Traffic • Network Scanning R. Smith - University of St Thomas - Minnesota
Recap • Going over the Exam Answers • Intro Networking • Technologies and Topologies • Attacks: passive and active • Addressing R. Smith - University of St Thomas - Minnesota
Packet Formats • Modern computer networks use packets • Packets: Blocks of data of varying sizes • All data is sent in packets – never just bits or bytes • Standardized formatting • Nested Structure – packets inside of packets • Outermost packet: LAN data (10-100-1000-BaseT; “Ethernet”) • MAC addresses of LAN nodes • Next in: Internet packet: IP addresses of hosts • Next: TCP/UDP: port numbers for processes • Next: application data, like HTPP/HTML for the web R. Smith - University of St Thomas - Minnesota
Addresses • Lowest level – which plug on the machine • Separate LAN interfaces sit behind those plugs • MAC Address – node address on the LAN • Each LAN interface has its own MAC address • MAC addresses are internationally unique • There is no way to ‘route’ traffic to MAC addresses • The MAC address must be present on your LAN • Internet addresses – host address on Internet R. Smith - University of St Thomas - Minnesota
Internet Addresses • IP Address – host address on LAN/Internet • You need a unique IP address to talk to the Internet • IP addresses are valuable • Many LANs use “local” addresses – explain later • Any IP layer can send packets to any other w/IP address • The IP address contains two parts • Network number: upper bits • Routes the packet to the right LAN on the Internet • Host number: lower bits • Routes the packet to the right host on its LAN • Addresses and Routing • We route with the “Network Address” • Once on the correct LAN, use ARP to find the host R. Smith - University of St Thomas - Minnesota
Sockets • Socket address – IP +TCP/UDP port numbers • Port numbers direct packets to specific processes • Socket address = unique process-process connection • Contains sender’s IP + port and recipients' IP+port R. Smith - University of St Thomas - Minnesota
Sending Data on a LAN • If we just use LAN addresses • We fill in the MAC address of the recipient • We fill in our own MAC address • We send the packet • If we use IP addresses • We need to translate the IP address to a MAC address • We use the “ARP Table” • “Address Resolution Protocol” • Converts between MAC addresses and IP on a LAN • Fill in the destination’s MAC address, again • Fill in the IP packet data • Send it R. Smith - University of St Thomas - Minnesota
Address Resolution on a LAN • The Problem • We know the hosts’ IP addresses; we need the MAC addresses • The Solution: ARP • To ‘look up’ an address • We broadcast an ARP query “Who is 11.22.33.44?” • All LAN hosts receive it. • The owner of 11.22.33.44. replies to us with their MAC addr • If someone asks for our MAC address • We send the reply • All ARP results are saved in the ARP Table • Lists IP addresses with corresponding MAC addresses R. Smith - University of St Thomas - Minnesota
Playing with ARP • There’s an ARP command in DOS • arp –a = display of the ARP table • Use ‘ping’ to add new IP addresses • ping 140.209.69.10 • Display the ARP table again – see the update R. Smith - University of St Thomas - Minnesota
What if the host isn’t on the LAN? • Example: ARP comes back “No!” • Example: IP address is not in your network • Answer: Send it to your ‘default gateway’ • When we configure an Internet host, it gets the following: • Own IP address • Network mask – divides address into network/host parts • Gateway address – router to reach non-local hosts • DNS address – translator for Domain Names • If it’s not on our LAN, we just send it to the default gateway • The gateway has a more complete routing table • Can send to “outside” Internet or to other local LANs R. Smith - University of St Thomas - Minnesota
What do attackers see? • They can intercept your packets • If they’re on the same LAN • Sniffing traffic on a “hub” • Hubs broadcast everything to everyone on the net • A ‘promiscuous’ interface can pick up everything • Redirection tricks with ARP • An ARP packet can redirect traffic to the attacker’s host • There’s no authentication in ARP • Let’s look at some packets with WireShark • Go to the CISC 210 home page • Download the “Prairie Intl” file R. Smith - University of St Thomas - Minnesota
Wireshark • Can follow net traffic in real time • Capture from a wireless laptop • Less to capture on a LAN these days (why?) • Can save a trace in a file • We can follow a trace in a file, too • “Prairie Intl” File R. Smith - University of St Thomas - Minnesota
The Display • All the packets, color coded by type • LOTS OF NOISE DATA • Important packets/conversations • ARP • DNS • HTTP • Let’s focus -> (next slide, please) R. Smith - University of St Thomas - Minnesota
Following Network Information • ARP Transactions • Let us know who is on the LAN • DNS transactions • Who is looking for what • TCP/IP transactions • Let us know what people are actually doing • This is ‘passive’ probing of networks R. Smith - University of St Thomas - Minnesota
Class Things • Seniors – send me e-mail if you’re graduating • Reading: Chapters 3 and 4
Reading HTTP • Cookies • Authenticated sites
Active probing of networks • ARP poisoning – redirect LAN traffic to us • Send ARP Replies for all IP addresses; point to our MAC • We can wireshark the traffic and forward it to the recipient • “nmap” – map a network • Sends packets to try to identify hosts on the network • Which exist, their addresses on LAN and Internet • What OS they run • What protocols they support • What versions of protocols • “Active” because it ‘tickles’ the hosts with special packets • While the probing tries to be benign, it isn’t always. • Increased traffic, denial of service, authentication failures R. Smith - University of St Thomas - Minnesota
Wardialing • The process of searching an address space for potential targets • Usually applies just to phone lines – from Wargames movie • Same concept used by ‘nmap’ • Can search a range of IP addresses for hosts • Search using IP protocols • Also search for active ports on a host • Can search IP addresses using ARP • Hosts may respond to ARP but ignore other probes • The problem with nmap • The probes cause network traffic, sometimes disrupt hosts • ISPs see nmap as a violation of Terms of Use • Detecting nmap use R. Smith - University of St Thomas - Minnesota
Creative Commons License This work is licensed under the Creative Commons Attribution-Share Alike 3.0 United States License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/3.0/us/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. R. Smith - University of St Thomas - Minnesota