1 / 24

Being an Intermediary for Another Attack

Being an Intermediary for Another Attack. Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007). Introduction.

Download Presentation

Being an Intermediary for Another Attack

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)

  2. Introduction • The rapid development of Internet and computer technologies makes it easier for the intruders to break into other people's computers. On one hand, application software becomes more and more complex and, therefore, thorough testing becomes increasingly difficult. As a result, "security holes" are unintentionally left open which are discovered and exploited by hackers.

  3. On the other hand, the computational power of computers is continuously increasing which means that a large number of computers connected on the Internet can be scanned in a short time and various security holes can be discovered quite easily.

  4. Ways of being an intermediary for another attack • Smurf Flooding Attacks • Distributed DoS attack by compromising others’ host. (ex.MafiaBoy)

  5. 1- Smurf Flooding Attacks • The attacker sends a long stream of pings (ICMP echo messages) to a third party. The attacker uses IP address spoofing, making source IP address in these pings the IP address of the victim. Consequently, pinged hosts send their ICMP echo replies to the victim host, overwhelming it.

  6. For this attack to be successful, the third party being pinged must have a router that will broadcast the ping message to all hosts in the router’s attached networks. This way, a single echo request give rise to dozens or even hundreds or echo response packets that will flood the victim.

  7. Smurf Flooding Scenario • Let's look at the scenario to paint a picture of the dangerous nature of this attack. Assume a co-location switched network with 100 hosts, and that the attacker has a T1. The attacker sends, say, a 768kb/s stream of ICMP echo (ping) packets, with a spoofed source address of the victim, to the broadcast address of the "bounce site".

  8. These ping packets hit the bounce site's broadcast network of 100 hosts; each of them takes the packet and responds to it, creating 100 ping replies out-bound. If you multiply the bandwidth, you'll see that 76.8 Mbps is used outbound from the "bounce site" after the traffic is multiplied. This is then sent to the victim (the spoofed source of the originating packets).

  9. Smurf Flooding DoS Attack “Innocent” Firm Echo 4. Echo Replies Attacker 1.34.150.37 2. Router with Broadcasting Enabled 1. Single ICMP Echo Message Source IP: 60.168.47.47 (Victim) Destination IP: Broadcast 3. Broadcast Echo Message Victim 60.168.47.47

  10. HOW TO DETERMINE IF YOUR NETWORK IS VULNERABLE • Several sites have been established to do both active and passive scanning of networks to determine whether or not directed-broadcast is enabled. http://www.powertech.no/smurf/ is a site which will test scan your network and allow you to enter a known smurf amplifier site.

  11. How to keep your site from being an intermediary use to attack victims • The perpetrators of these attacks rely on the ability to source spoofed packets to the "amplifiers" in order to generate the traffic which causes the denial of service.

  12. Disable IP-directed broadcasts at your router • In order to stop this, all networks should perform filtering either at the edge of the network where customers connect (access layer) or at the edge of the network with connections to the upstream providers, in order to defeat the possibility of source-address-spoofed packets from entering from downstream networks, or leaving for upstream networks.

  13. Disable IP-directed broadcasts at your router • Additionally, router vendors have added or are currently adding options to turn off the ability to spoof IP source addresses by checking the source address of a packet against the routing table to ensure the return path of the packet is through the interface it was received on.

  14. Configure your operating system to prevent the machine from responding to ICMP packets sent to IP broadcast addresses. • If an intruder compromises a machine on your network, the intruder may try to launch a smurf attack from your network using you as an intermediary. In this case, the intruder would use the compromised machine to send the ICMP echo request packet to the IP broadcast address of the local network. Since this traffic does not travel through a router to reach the machines on the local network, disabling IP-directed broadcasts on your routers is not sufficient to prevent this attack.

  15. Some operating systems can be configured to prevent the machine from responding to ICMP packets sent to IP broadcast addresses. Configuring machines so that they do not respond to these packets can prevent your machines from being used as intermediaries in this type of attack.

  16. Information for victims and how to suppress attacks • Filtering ICMP echo reply packets destined for your high-profile machines at the ingress interfaces of the network border routers will then permit the packets to be dropped at the earliest possible point. However, it does not mean that the network access pipes won't fill, as the packets will still come down the pipe to be dropped at the router. It will, however, take the load off the system being attacked. Keep in mind that this also denies others from being able to ping from that machine (the replies will never reach the machine).

  17. Distributed DoS attack by compromising others’ host • Intruders will frequently use compromised computers as launching pads for attacking other systems. An example of this is how distributed denial-of-service (DDoS) tools are used. The intruders install an "agent" (frequently through a Trojan horse program) that runs on the compromised computer awaiting further instructions. Then, when a number of agents are running on different computers, a single "handler" can instruct all of them to launch a denial-of-service attack on another system. Thus, the end target of the attack is not your own computer, but someone else’s -- your computer is just a convenient tool in a larger attack

  18. Installing Handler and Zombie Computers • Before initiating the denial-of-service attack, the attacker first installs attack programs on the other computers. Zombie programs actually carry out the attack on the victim. • Handler Programs tell the Zombie programs when to carry out attacks.

  19. Implementing the Attack • Once the handler and zombie programs are in place, the attacker sends messages to the handler computers, telling them to carry out the attack. The handlers in turn tell the zombie programs under their control to carry out the attack.

  20. Difficulty in Identification • The attacker’s computer, which is two steps removed from the attack, is very difficult to identify. In addition, because zombies can be spread all over the internet, the attack messages come from many different sources, making them difficult to filter out at border firewalls. Example (Mafiaboy).

  21. Distributed Denial-of-Service (DDoS) Attack Zombie Handler Attack Command Attack Command Attack Packet Victim 60.168.47.47 Attacker 1.34.150.37 Attack Packet Attack Command Attack Command Zombie Attack Packet Attack Command Handler Zombie

  22. How to avoid your host of being Compromised by attackers • Use anti-virus software • Use firewall protection • Do not open unknown e-mail attachment • Disable Hidden File Extensions • Keep your system updated • Disable "Mobile Code“ • Backups and start-up disk • Consult the Experts

  23. References • Books: • Corporate Computer and Network Security By: Raymond R. Panko • Websites: • http://www.cert.org/tech_tips/home_networks.html#III-B-4 • http://www.cert.org/advisories/CA-1998-01.html • www.hp.com/rnd/support/manuals/pdf/release_06628_07110/Bk2_ApixB_DoS_Protection.pdf • http://www.strategic.gr/publications/InternetObservatory2001/Makris.htm • http://www.pentics.net/denial-of-service/white-papers/smurf.cgi

More Related