Lectures 7 - To - 9 - Attacks Attackers Threat Environment
Lectures 7 - To - 9 - Attacks Attackers Threat Environment
Lecture-7/8/9
Attacks & Their Types_Part-II
Eavesdropping
• Guessing
• Social engineering
• Dictionary attacks
• Password sniffing
Man-in-the-middle attacks
Message replays
Defense Mechanisms
Attach a random number to the message. This number is referred to as
nonce
Attach a time stamp to the message
The best method is to use a nonce and a time stamp together
Identity Spoofing (Cont..)
Network Spoofing
IP spoofing is one of the major network spoofing techniques
SYN flooding
The attacker fills the target computer’s TCP buffer with many crafted SYN packets;
purpose: Make the target computer unable to establish connection (i.e., to
silent/mute the computer). How it works:
1. Attacker sends to victim many crafted SYN packets
2. The victim’s computer is obliged to send an ACK packet to the crafted source
IP address contained in the SYN packet
3. Because the source IP address is crafted and unreachable, the victim computer
will never receive the ACK packet it is waiting for, allowing the crafted SYN
packet to remain in the TCP buffer
4. The TCP buffer is completely occupied by the crafted SYN packets
Identity Spoofing (Cont..)
TCP Hijacking
• It is like Message Replays
• Let, V is a company computer. Alice, an employee of the company, is going
to remote login to V.
1. Alice sends a SYN packet to V
2. The attacker intercepts this packet, and uses SYN flooding to mute V so that V
can’t complete the three-way handshake
3. The attacker predicts the correct TCP sequence number for the ACK supposed to be
sent from V to Alice. The attacker then crafts an ACK packet with the sequence
number and V’s IP address and sends it to Alice
4. Alice verifies the ACK packet and sends an ACK packet to the attacker to complete
this handshake
5. The TCP connection is established between Alice and the attacker, instead of
between Alice and V.
Repudiation
In some situations the owner of the data may not want to admit ownership
of the data to evade legal consequences
He may argue that he has never sent or received the data in question
Defense method
Use stronger encryption and authentication algorithms
Intrusion
An illegitimate user gains access to someone else’s computer systems.
Configuration loopholes, protocol flaws, and software side effects may
all be exploited by intruders
IP scans and Port scans are common hacking tools. However, it can also
help users to identify in their own systems which ports are open and which
ports may be vulnerable.
Traffic Analysis
The purpose is to determine who is talking to whom by analyzing IP packets.
Even if the payload of the IP packet is encrypted, the attacker may still obtain
useful information from analyzing IP headers
Defense method
Encrypt IP headers. But an IP packet with an encrypted IP header cannot be
routed to destination. Thus, network gateways are needed
Network gateway also protects internal network topology
Denial of Service Attacks
Thegoal is to block legitimate users from getting services
they can normally get from servers