ipspoofing

25
IP SPOOFING By Ch. Rakesh S

Upload: akhil-kumar

Post on 19-Jan-2015

1.821 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Ipspoofing

IP SPOOFING

By

Ch. Rakesh Sharma

Page 2: Ipspoofing

Overview TCP/IP – in brief IP Spoofing

Basic overview Examples

Mitnick Attack Session Hijack DoS/DDoS Attack

Defending Against the Threat Continuous Evolution Conclusion

Page 3: Ipspoofing

TCP/IP in 3 minute or less

General use of term describes the Architecture upon which the Interweb is built.

TCP/IP are specific protocols within that architecture.

Page 4: Ipspoofing

TCP/IP in 3 minutes or less

Application

Transport

Interweb

Network Access

Physical

TCP

IP

Page 5: Ipspoofing

TCP/IP in 3 minute or less IP is the internet layer protocol. Does not guarantee delivery or

ordering, only does its best to move packets from a source address to a destination address.

IP addresses are used to express the source and destination.

IP assumes that each address is unique within the network.

Page 6: Ipspoofing

TCP/IP in 3 minutes or less

TCP is the transport layer protocol. It guarantees delivery and ordering,

but relies upon IP to move packets to proper destination.

Port numbers are used to express source and destination.

Destination Port is assumed to be awaiting packets of data.

Page 7: Ipspoofing

IP Spoofing

Sometimes on the internet, a girl named Alice is really a man named Yves

Page 8: Ipspoofing

IP Spoofing – Overview

Basically, IP spoofing is lying about an IP address.

Normally, the source address is incorrect.

Lying about the source address lets an attacker assume a new identity.

Page 9: Ipspoofing

IP Spoofing – Overview

Because the source address is not the same as the attacker’s address, any replies generated by the destination will not be sent to the attacker.

Attacker must have an alternate way to spy on traffic/predict responses.

To maintain a connection, Attacker must adhere to protocol requirements

Page 10: Ipspoofing

IP Spoofing – Overview

Difficulties for attacker: TCP sequence numbers One way communication Adherence to protocols for other layers

Page 11: Ipspoofing

IP Spoofing – The Reset

Victim - BobSucker - Alice

Attacker - Eve

1. SYN – Let’s have a conversation

2. SYN ACK – Sure, what do you want to talk about?

3. RESET – Umm.. I have no idea why

you are talking to me

4. No connection – Guess I need to take Bob out of

the picture…

Page 12: Ipspoofing

Types of Attacks in IP SPOOFING

Mitnick Attack Session Hijacking DoS Attack DDoS Attack

Page 13: Ipspoofing

IP Spoofing – Mitnick Attack

Merry X-mas! Mitnick hacks a Diskless Workstation on December 25th, 1994

The victim – Tsutomu Shinomura The attack – IP spoofing and abuse of

trust relationships between a diskless terminal and login server.

Page 14: Ipspoofing

Mitnick Attack

1. Mitnick Flood’s server’s login port so it can no longer respond

2. Mitnick Probes the Workstation to determine the behaviour of its TCP sequence number generator

3. Mitnick discovers that the TCP sequence number is incremented by 128000 each new connection

4. Mitnick forges a SYN from the server to the terminal

5. Terminals responds with an ACK, which is ignored by the flooded port (and not visible to Mitnick)

ServerWorkstation

Kevin Mitnick

6. Mitnick fakes the ACK using the proper TCP sequence number

7. Mitnick has now established a one way communications channel

Page 15: Ipspoofing

IP Spoofing - Session Hijack

IP spoofing used to eavesdrop/take control of a session.

Attacker normally within a LAN/on the communication path between server and client.

Not blind, since the attacker can see traffic from both server and client.

Page 16: Ipspoofing

Session Hijack

Alice Bob

Eve

I’m Bob! I’m

Alice!

1. Eve assumes a man-in-the-middle position through some mechanism. For example, Eve could use Arp Poisoning, social engineering, router hacking etc...

2. Eve can monitor traffic between Alice and Bob without altering the packets or sequence numbers.

3. At any point, Eve can assume the identity of either Bob or Alice through the Spoofed IP address. This breaks the pseudo connection as Eve will start modifying the sequence numbers

Page 17: Ipspoofing

IP Spoofing – DoS/DDoS

Denial of Service (DoS) and Distributed Denial of Service (DDoS) are attacks aimed at preventing clients from accessing a service.

IP Spoofing can be used to create DoS attacks

Page 18: Ipspoofing

DoS AttackServer

Attacker Legitimate Users

Interweb

Fake IPs

Service Requests

Flood of Requests from

Attacker

Server queue full, legitimate

requests get dropped

Service Requests

Page 19: Ipspoofing

DoS Attack

The attacker spoofs a large number of requests from various IP addresses to fill a Services queue.

With the services queue filled, legitimate user’s cannot use the service.

Page 20: Ipspoofing

DDoS Attack Server (already DoS’d)

AttackerTarget Servers

Interweb1. Attacker makes large number of SYN connection requests to target servers on behalf of a DoS’d server

2. Servers send SYN ACK to spoofed server, which cannot respond as it is already DoS’d. Queue’s quickly fill, as each connection request will have to go through a process of sending several SYN ACKs before it times out

SYN

SYN SYN SYN

SYN ACK

SYN ACKSYN

ACK

SYN ACK

Queue Full

Page 21: Ipspoofing

DDoS Attack

Many other types of DDoS are possible.

DoS becomes more dangerous if spread to multiple computers.

Page 22: Ipspoofing

IP Spoofing – Defending IP spoofing can be defended against in a number of

ways: As mentioned, other protocols in the Architectural

model may reveal spoofing. TCP sequence numbers are often used in this manner New generators for sequence numbers are a lot more

complicated than ‘add 128000’ Makes it difficult to guess proper sequence numbers if

the attacker is blind “Smart” routers can detect IP addresses that are

outside its domain. “Smart” servers can block IP ranges that appear to

be conducting a DoS.

Page 23: Ipspoofing

Conclusion

IP Spoofing is an old school Hacker trick that continues to evolve.

Can be used for a wide variety of purposes.

Will continue to represent a threat as long as each layer continues to trust each other and people are willing to subvert that trust.

Page 24: Ipspoofing
Page 25: Ipspoofing