MODULE 5 SESSION HIJACKING
Objective <ul><li>Session Hijacking </li></ul><ul><li>Difference between Spoofing and Hijacking </li></ul><ul><li>Steps to...
What is Session Hijacking? <ul><li>TCP session hijacking is when a hacker takes over a TCP session between two machines </...
Spoofing vs. Hijacking <ul><li>In a spoofing attack, an attacker does not actively take another user offline to perform th...
Spoofing vs. Hijacking (cont’d) <ul><li>With a hijacking, an attacker takes over an existing session, which means he relie...
Steps in Session Hijacking <ul><li>Place yourself between the victim and the target (you must be able to sniff the network...
Types of Session Hijacking
The 3-Way Handshake
TCP Concepts 3-Way Handshake <ul><li>Bob initiates a connection with the server. Bob sends a packet to the server with the...
Sequence Numbers <ul><li>Sequence numbers are important in providing a reliable communication and are also crucial for  hi...
Sequence Number Prediction <ul><li>After a client sends a connection request (SYN) packet to the server, the server will r...
TCP/IP Hijacking
TCP/IP Hijacking
RST Hijacking
Programs for  Session Hijacking <ul><li>There are several programs available that perform session hijacking </li></ul><ul>...
Hacking Tool: Juggernaut <ul><li>Juggernaut is a network sniffer that can be used to hijack TCP sessions. It runs on Linux...
Hacking Tool: Hunt <ul><li>Hunt is a program that can be used to listen, intercept, and hijack active sessions on a networ...
Hacking Tool: IP Watcher <ul><li>http://engarde.com </li></ul><ul><li>IP watcher is a commercial session hijacking tool th...
Session Hijacking Tool: T-Sight <ul><li>http://engarde.com </li></ul><ul><li>T-Sight is a session hijacking tool for Windo...
Session Hijacking Tool: T-Sight Session Hijacking is simple by clicking  this button
Remote TCP Session Reset Utility
Paros HTTP Session Hijacking Tool <ul><li>Paros is a man-in-the-middle proxy and application vulnerability scanner </li></...
Paros Untitled Session
Paros HTTP Session Hijacking Tool
Protecting against Session Hijacking <ul><li>Use encryption </li></ul><ul><li>Use a secure protocol </li></ul><ul><li>Limi...
Countermeasure: IP Security
Upcoming SlideShare
Loading in...5
×

Module 6 Session Hijacking

22,670

Published on

Published in: Technology
4 Comments
6 Likes
Statistics
Notes
No Downloads
Views
Total Views
22,670
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
760
Comments
4
Likes
6
Embeds 0
No embeds

No notes for slide

Module 6 Session Hijacking

  1. 1. MODULE 5 SESSION HIJACKING
  2. 2. Objective <ul><li>Session Hijacking </li></ul><ul><li>Difference between Spoofing and Hijacking </li></ul><ul><li>Steps to Conduct a Session Hijacking Attack </li></ul><ul><li>Types of Session Hijacking </li></ul><ul><li>Performing Sequence Number Prediction </li></ul><ul><li>TCP/IP Hijacking </li></ul><ul><li>Session Hijacking Tools </li></ul><ul><li>Countermeasures to Session Hijacking </li></ul>
  3. 3. What is Session Hijacking? <ul><li>TCP session hijacking is when a hacker takes over a TCP session between two machines </li></ul><ul><li>Since most authentication only occurs at the start of a TCP session, this allows the hacker to gain access to a machine </li></ul>
  4. 4. Spoofing vs. Hijacking <ul><li>In a spoofing attack, an attacker does not actively take another user offline to perform the attack </li></ul><ul><li>He pretends to be another user, or machine to gain access </li></ul>
  5. 5. Spoofing vs. Hijacking (cont’d) <ul><li>With a hijacking, an attacker takes over an existing session, which means he relies on the legitimate user to make a connection and authenticate </li></ul><ul><li>Subsequently, the attacker takes over the session </li></ul>
  6. 6. Steps in Session Hijacking <ul><li>Place yourself between the victim and the target (you must be able to sniff the network) </li></ul><ul><li>Monitor the flow of packets </li></ul><ul><li>Predict the sequence number </li></ul><ul><li>Kill the connection to the victim’s machine </li></ul><ul><li>Take over the session </li></ul><ul><li>Start injecting packets to the target server </li></ul>
  7. 7. Types of Session Hijacking
  8. 8. The 3-Way Handshake
  9. 9. TCP Concepts 3-Way Handshake <ul><li>Bob initiates a connection with the server. Bob sends a packet to the server with the SYN bit set </li></ul><ul><li>The server receives this packet and sends back a packet with the SYN bit and an ISN (Initial Sequence Number) for the server </li></ul><ul><li>Bob sets the ACK bit acknowledging the receipt of the packet and increments the sequence number by 1 </li></ul><ul><li>The two machines have successfully established a session </li></ul>
  10. 10. Sequence Numbers <ul><li>Sequence numbers are important in providing a reliable communication and are also crucial for hijacking a session </li></ul><ul><li>Sequence numbers are a 32-bit counter. Therefore, the possible combinations can be over 4 billion </li></ul><ul><li>Sequence numbers are used to tell the receiving machine what order the packets should go in, when they are received </li></ul><ul><li>Therefore, an attacker must successfully guess the sequence numbers in order to hijack a session </li></ul>
  11. 11. Sequence Number Prediction <ul><li>After a client sends a connection request (SYN) packet to the server, the server will respond (SYN-ACK) with a sequence number of choosing, which then must be acknowledged (ACK) by the client </li></ul><ul><li>This sequence number is predictable; the attack connects to a server first with its own IP address, records the sequence number chosen, then opens a second connection from a forged IP address </li></ul><ul><li>The attack doesn't see the SYN-ACK (or any other packet) from the server, but can guess the correct response </li></ul><ul><li>If the source IP address is used for authentication, then the attacker can use the one-sided communication to break into the server </li></ul>
  12. 12. TCP/IP Hijacking
  13. 13. TCP/IP Hijacking
  14. 14. RST Hijacking
  15. 15. Programs for Session Hijacking <ul><li>There are several programs available that perform session hijacking </li></ul><ul><li>The following are a few that belong in this category: </li></ul><ul><ul><li>Juggernaut </li></ul></ul><ul><ul><li>Hunt </li></ul></ul><ul><ul><li>TTY Watcher </li></ul></ul><ul><ul><li>IP Watcher </li></ul></ul><ul><ul><li>T-Sight </li></ul></ul><ul><ul><li>Paros HTTP Hijacker </li></ul></ul>
  16. 16. Hacking Tool: Juggernaut <ul><li>Juggernaut is a network sniffer that can be used to hijack TCP sessions. It runs on Linux operating systems </li></ul><ul><li>Juggernaut can be set to watch for all network traffic, or it can be given a keyword (e.g. a password ) to look out for </li></ul><ul><li>The objective of this program is to provide information about ongoing network sessions </li></ul><ul><li>The attacker can see all of the sessions and choose a session to hijack </li></ul>
  17. 17. Hacking Tool: Hunt <ul><li>Hunt is a program that can be used to listen, intercept, and hijack active sessions on a network </li></ul><ul><li>Hunt offers: </li></ul><ul><ul><li>Connection management </li></ul></ul><ul><ul><li>ARP spoofing </li></ul></ul><ul><ul><li>Resetting connection </li></ul></ul><ul><ul><li>Watching connection </li></ul></ul><ul><ul><li>MAC address discovery </li></ul></ul><ul><ul><li>Sniffing TCP traffic </li></ul></ul>
  18. 18. Hacking Tool: IP Watcher <ul><li>http://engarde.com </li></ul><ul><li>IP watcher is a commercial session hijacking tool that allows you to monitor connections and has active facilities for taking over a session </li></ul><ul><li>The program can monitor all connections on a network, allowing an attacker to display an exact copy of a session in real-time, just as the user of the session sees the data </li></ul>
  19. 19. Session Hijacking Tool: T-Sight <ul><li>http://engarde.com </li></ul><ul><li>T-Sight is a session hijacking tool for Windows </li></ul><ul><li>With T-Sight, you can monitor all of your network connections (i.e. traffic) in real-time, and observe the composition of any suspicious activity that takes place </li></ul><ul><li>T-Sight has the capability to hijack any TCP sessions on the network </li></ul><ul><li>Due to security reasons, Engarde Systems licenses this software to pre-determined IP addresses </li></ul>
  20. 20. Session Hijacking Tool: T-Sight Session Hijacking is simple by clicking this button
  21. 21. Remote TCP Session Reset Utility
  22. 22. Paros HTTP Session Hijacking Tool <ul><li>Paros is a man-in-the-middle proxy and application vulnerability scanner </li></ul><ul><li>It allows users to intercept, modify, and debug HTTP and HTTPS data on-the-fly between a web server and a client browser </li></ul><ul><li>It also supports spidering, proxy-chaining, filtering, and application vulnerability scanning </li></ul>
  23. 23. Paros Untitled Session
  24. 24. Paros HTTP Session Hijacking Tool
  25. 25. Protecting against Session Hijacking <ul><li>Use encryption </li></ul><ul><li>Use a secure protocol </li></ul><ul><li>Limit incoming connections </li></ul><ul><li>Minimize remote access </li></ul><ul><li>Educate the employees </li></ul>
  26. 26. Countermeasure: IP Security
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×