760 likes | 849 Views
Objectives. Recognize voice and data systems use the same communications networks Describe the components of a typical network Describe countermeasures for network-related threats. Telecommunications and Network. Physical and Personnel. System. Application and Individual.
E N D
Objectives Recognize voice and data systems use the same communications networks Describe the components of a typical network Describe countermeasures for network-related threats Telecommunications and Network Physical and Personnel System Application and Individual Planning, Policies, and Procedures
Objectives • Describe the concept of “defense-in-depth” • Identify technologies used to apply countermeasures for network-related threats • Identify components that comprise wireless networks • Identify threats related to wireless technologies • Identify countermeasures for wireless related threats
Communication Networks History Moving ideas Electric communication Circuit switching
Voice Communications • Public Switched Telephone Network (PSTN) • Private Branch Exchange (PBX) • Acts as organization’s internal phone company • Cost savings
Voice Networks • History • Introduction of packet-switched networks in 1960s • Computers used for switching instead of relays • Now voice communication is treated as data
PBX Threats • Toll fraud • Disclosure of information • Unauthorized access • Traffic analysis • Denial of Service (DoS)
PBX ThreatCountermeasures • Implement physical security • Inhibit maintenance port access • Enable alarm and audit trails • Remove all default passwords • Review the configuration of your PBX against known hacking techniques
Data Networks • International voice network already existed • For computers to communicate, less expensive to use same network • Modems designed to leverage this asset
Modem Threats • Unauthorized and misconfigured modems • Authorized but misconfigured modems
Wardialing Experiment Peter Shipley conducted a wardialing exercise in the San Francisco Bay area from April 1997 to January 2000, looking for unsecured modems. • Dialed 5.7 million phone numbers • Area codes: 408, 415, 510, 650 • Carriers found: 46,192 • Experiment and results presented at DEFCON
Common Wardialers • ToneLoc (DOS, Windows NT, 2000) • ShokDial (UNIX/Linux) • PhoneSweep (Commercial – Windows)
Modem Threat Countermeasures • Policy • Scanning • Administrative action • Passwords • Elimination of modem connections • Use a device to protect from telephony-based attacks and abuses
Voice Over Internet Protocol (VoIP) • Transmission of voice conversations using traditional “data network” transmission methods • Taking calls off the regular phone lines and sending them on a data network
VoIP Benefits • Less expensive • Increased functionality • Flexibility • Mobility
Service theft Eavesdropping Spam/SPIT (SPam over Internet Telephony) Denial of Service (DoS) Vishing (VoIP Phishing) Call tampering VoIP Threats
VoIP Threat Countermeasures • Physical control • Authentication and encryption • Develop appropriate network architecture • Employ VoIP firewall and security devices
Data Networks: History Refresher • Modems put on voice network to carry data • No need to build new, separate network • Early on most data networks used modems over voice network • 1960s, data networks include introduction of satellites and radios • Also packet switching
Data Networks Computers linked together Components found in most networks Hosts (computers) Workstations (desktops, laptops, etc.) Servers (e-mail, web, database, etc.) Switches and hubs Routers
Common Network Terms • Local Area Network (LAN) • Wide Area Network (WAN) • Wireless LAN (WLAN)
Data Network Protocols • Common protocols • Transmission Control Protocol (TCP) • User Datagram Protocol (UDP) • Internet Control Message Protocol (ICMP) • Hypertext Transfer Protocol (HTTP)
Common Protocols • TCP • Moves data across networks with a connection- oriented approach • UDP • Moves information across networks with a connectionless-oriented approach • ICMP • Often used by operating systems to send error messages across networks • HTTP • Transfers web pages, hypermedia, and other query response communications
Data Network Threats • Information gathering: assessing targets to plan attacks • Denial of Service (DoS): degrading or preventing communication through or across specific network(s) • Other exploitation/interception: • Disinformation: fooling users or network components/services • Man-in-the-middle: getting between communicators • Session hijacking: illicitly assuming control of a legitimate connection
Information Gathering Threats • Attackers want to determine nature of targets • Reduce wasted effort • Formulate attack plans • Pick specific tools • Select tactics
Network Scanning Finding Active Machines • An organization has a range of IP addresses assigned to it • May not use them all • Ping sweep finds IP addresses in use • Ping utility designed to determine whether remote system is active
Ping Sweep • Using ping, attacker sends ICMP echo request to range of addresses • Every functional system responds with echo reply • Provides a list of potential targets
Echo Request Echo Request Echo Reply Echo Request Ping Sweep Unused Address 10.1.1.9 Attacker 10.1.1.10 Target List 10.1.1.9 10.1.1.10 10.1.1.11 Unused Address 10.1.1.11
Activity 03.1: Perform Ping Sweep Using nmap • Purpose: • In this activity, you will perform a scan in the form of a ping sweep. This will familiarize you with one of the most common techniques to gather information about a target environment. • Estimated completion time: • 10 – 15 minutes
Activity 03.1: Perform Ping Sweep Using nmap What did we detect? Is this a useful tool? • From an attacker’s perspective • From an administrator’s perspective
Port Scanning • Checks a computer for open ports • 65,535 possible ports • 1-1,023 are considered “well-known” • 1,024-49,151 are called “registered ports” • 49,152-65,535 are dynamic or private ports
Some Well-Known Ports Port # Network Service 20 File Transfer Protocol (FTP) Data 21 File Transfer Protocol (FTP) Control 23 Telnet 25 Simple Mail Transfer Protocol (SMTP) 53 Domain Name Server (DNS) 79 Finger 80 World Wide Web (HTTP) 110 Post Office Protocol – Version 3 443 HTTPS
79 80 80 81 82 How Port Scanning Works Attacker Web server Services List HTTP
Activity 03.2: Perform Port Scanning Using Different Tools • Purposes: • In this activity, you will perform port scans using different scanning tools. This will familiarize you with one of the most common techniques to gather information about a target environment, and learn the efficacy of various tools. • Estimated completion time: • 50 – 55 minutes
Activity 03.2: Perform Port Scanning Using Different Tools What were the results of our port scanning tests? • What did they mean? Would this be helpful for an attacker? Would this be helpful for an administrator?
Sniffing • Monitoring traffic flow across a network • Pull all packets • Be selective • Only grab packets to and from certain addresses • Only grab packets carrying a certain type of traffic • Needs to view all traffic on the network • On internal network • On main connection into/out of a network
Denial of Service (DoS) • Degrade and prevent operations/functionality • Distributed denial of service (DDoS) attack uses multiple attack machines simultaneously
Ping Flood / Ping Of Death • Ping flood • Too much ping traffic drowns out all other communication • Ping of Death • Oversized or malformed ICMP packets cause target to reboot or crash • Hosts can’t handle packets over maximum 65,535 bytes • Causes a type of buffer overflow
Smurf Attack • Large stream of spoofed Ping packets sent to a broadcast address • Source address listed as the target’s IP address (spoofed) • Broadcast host relays request to all hosts on network • Hosts reply to victim with Ping responses • If multiple requests sent to broadcast host, target gets overloaded with replies
Smurf Attack (ICMP Flooding) Multiple Ping Replies Multiple Ping Requests System or Network Overloaded Ping Broadcast Request (Spoofed) Ping Broadcast Request (Actual) Attacker
SYN Flooding • Exploits synchronization protocol used to initiate connections • Subverts the normal process • In the customary “three-way handshake”: • Initiator sends synchronization (SYN) packet • Target replies with a SYN/ACK (acknowledgement) • Initiator sends ACK • Machines are now ready to communicate • In SYN flooding, attacker sends SYN packets, but no ACK • Target replies with SYN/ACK • Target waits for ACK, eventually gives up • If enough SYNs are received, communication capacity will deplete
SYN Flooding Handshake (Normal) Handshake (SYN Flood) 1. SYN 1. SYN 1. SYN 2. SYN-ACK 1. SYN 3. ACK 2. SYN-ACK 2. SYN-ACK 2. SYN-ACK X
Man-In-The-Middle Attacks • Instead of shutting down target networks, attackers may want access • Types of attacks • Eavesdropping • Session hijacking
Network Attack Countermeasures • Discussion: countering the threats • Scans/Sniffing/Ping sweeps • DoS/DDoS • Ping of Death • SYN flood • Smurf attack • Others • Session hijacking • Eavesdropping
Ways To Recognize Scanning • System log file analysis • Network traffic • Firewall and router logs • Intrusion Detection Systems (IDSs)
Defending Against Scanning Block ports at routers and firewalls Block ICMP, including echo Segment your network properly Hide private, internal IP addresses Change default account settings and remove or disable unnecessary services Restrict permissions Keep applications and operating systems patched
Sniffing Countermeasures • Strong physical security • Proper network segmentation • Communication encryption
DoS And DDoS Countermeasures • Stop the attack before it happens • Block “marching orders” • Patch systems • Implement IDS • Harden TCP/IP • Avoid putting “all eggs in one basket” • Adjust state limits
Other Countermeasures • All countermeasures already mentioned • Encrypted session negotiation • Repeating credential verification during session • User training