SlideShare a Scribd company logo
1 of 25
0Document Title
NTP in Amplification Inferno
Sriram Krishnan
1Document Title
To Introduce Myself...
 Sriram Krishnan
 Senior Manager, Security Solutions, Group Information Security - Scope International
Pvt. Ltd. (A wholly owned subsidiary of Standard Chartered Bank)
 Over 9 years of experience in Information Security
2Document Title
Agenda
 Why NTP Amplification?
 Demystifying DDoS
 Time to Deep Dive
 NTP Amplification Attack – Demo
 Challenges & Countermeasures
3Document Title
Why NTP Amplification?
4Document Title
A Background
5Document Title
Why NTP?
 Why NTP is targeted
 Ease of attack:
 Small request may lead to relatively large response
 Evade Detection:
 Spoofing of IP Address due to lack of handshake process– as
it is a UDP based protocol
 Availability:
 Essential service with large clusters of public timeservers
available in internet
 Traffic Volume:
 Potential to generate from 200 to 400Gbps of traffic that will
shutdown a network
Targeted Industries
 Internet Service
Providers,
 Banks and
Financial Services,
 Managed Services
(Including SaaS),
 Critical
Infrastructure of
countries
 e-Commerce
6Document Title
Demystifying DDoS
7Document Title
Understanding DDoS Terminology
 Master / Handler
Compromised system in the interest used by the attacker to launch attacks.
 Slave / Agent:
System that responds to the instructions of Master which are controlled by the attacker. Slave
serves as the amplifiers for DDos attacks.
 Daemon:
Process running the Slave, executing the commands for amplification.
 Reflector
Systems that respond to instructions of Master, without the awareness of participating in DRDoS
attack.
 Victim
Target host or network for the DDoS attack.
8Document Title
DDoS Categorized Based on Attack Method
Conventional DDoS Attack:
 Attacker takes control of master system to send instructions to slaves running the affected
daemon.
 The slaves will execute the command and amplify the traffic to finally send it to victims.
Compromised Systems
Fig 1: Distributed Denial of Service (DDOS) Attack
9Document Title
DDoS Categorized Based on Attack Method
Distributed Reflective Denial of Service Attack
 Attacker takes control of the master system and sends instruction to reflector running the
vulnerable daemon.
 Reflectors executes the command and amplifies the traffic to finally send it to victims.
 Host of both categories (Master and Slave) are compromised in DDoS, but in DRDoS attack the
reflector is not compromised.
Compromised Systems
Fig 2: Distributed Reflective Denial of Service (DRDOS) Attack
10Document Title
DDoS Categorized Based on Impact
 Volume / Bandwidth Based Attacks
 Chokes victim’s network bandwidth
 Measured in bits per second (Bps)
 Example: UDP Flood, ICMP Flood
 Protocol Based Attacks
 Exhaust the system / network device resources and shutdown the service or systems
 Measured as packets per second
 Example: SYN Flood, Ping of Death, Smurf DDoS
 Application Layer Based Attacks
 Shutdown application layer resources / services
 Example: Slowloris, HTTP Flood.
11Document Title
Time to Deep Dive
12Document Title
Vulnerability Details
 NTP allows administrators to monitor service via ntpd daemon – by executing remote commands
 Affected command is monlist
 monlist command operates in mode 7 – private use (which allows remote administration).
 Purpose of this command is to obtain details about NTP Associations (up to 600) from NTP server
 NTP Associations are formed when two peers exchange messages, and this transaction is
maintained in the Most Recently Used (MRU) list.
 NTP Associations details are stored in ntp.conf file. Example, in unix-based OS this file is stored in
</etc/ntp.conf>
 Attacker sends a request (get_monlist ) to public NTP Server (in internet) with spoofed IP of the
victim
 Response to this request generates enormous traffic towards the victim’s network
13Document Title
Monlist Command – Understanding the Details
14Document Title
Examining the Source Code
Let’s examine the source code that defines the structure and executes the monlist command
 ntp_request.c - respond to information requests
 ntp_monitor.c - monitor who is using the ntpd server
ntp_request.c
 mon_getlist_1 function obtains MRU list from the NTP server.
 Arrow indicates structure of mon_data that defines the maximum number of NTP associations.
 The keyword “extern” is used as this variable has already been defined in ntp_monitor.c.
15Document Title
Examining the Source Code (Contd..)
ntp_monitor.c
 First arrow - defines the number of structure to be allocated - 600
 Second arrow - declares and defines the mon_data that updates the statistics of the monitoring data.
16Document Title
NTP Amplification Attack
Spoofed IP Address of Victim
monlist
NTP Associations
MRU List
17Document Title
Demo
18Document Title
Challenges & Countermeasures
19Document Title
Challenges in Defence
 Arresting Help
 DDoS attack floods victim’s network / systems with malicious packets.
 Traffic flow increases rapidly within a quick span of time and without any prior warning or alert.
 This prevents systems to send SoS and are arrested from the attack.
 Filtering of Traffic
 Any attempts made to filter the traffic, hampers service rendered
 All legitimate traffic may be filtered / rejected thus denying service
 Evade Detection
 Generally attackers spoof the IP address of the attack packets.
 Attack triggered from distributed compromised systems
 Heterogeneous Environment:
 Systems with multiple software and diverse architecture are deployed.
20Document Title
Countermeasures
So what is required?
Robust & effective defensive mechanism
How?
Enhancing the protocol design
21Document Title
Countermeasures – NTP Amplification Attacks
 Upgrade the ntpd version to 4.2.7
 If the ntpd version cannot be updated, add the “noquery” directive to the “restrict default”
line in the ntp.conf file.
22Document Title
Countermeasures - DDoS Attacks
 Response Rate Limitation (RRL)
 Limits number of packets issued to a target at a given time interval
 Excess data over the limit is truncated
 Works best when the attack source is limited
 Already implemented in DNS protocol
 Protocol Harding
 Session handling mechanism - requests to be processed only post session initiation
 For example, DTLS (RFC 4347), a UDP-variant of TLS, implements a stateless cookie exchange
mechanism in order to avoid DDoS attacks.
 Response Size Limitation
 Protocol to be designed to:
 Limit the output (packet size) for every request, and
 Demand session initiation before releasing the rest of the output
23Document Title
To Sum Up!
 UDP based network services - easy target for attackers
 Other UDP based services such as SNMP, SSDP, NetBIOS targeted
 Pressing need to harden such protocol design
 Need for investments in preventive defence mechanism pertinent
24Document Title
Thankyou

More Related Content

What's hot

Low Rate DDoS attack using Improved Robust Random Early Detection
Low Rate DDoS attack using Improved Robust Random Early DetectionLow Rate DDoS attack using Improved Robust Random Early Detection
Low Rate DDoS attack using Improved Robust Random Early DetectionShreeya Shah
 
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in CloudDFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in CloudIRJET Journal
 
A Comparative Approach to Handle Ddos Attacks
A Comparative Approach to Handle Ddos AttacksA Comparative Approach to Handle Ddos Attacks
A Comparative Approach to Handle Ddos AttacksIOSR Journals
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...IJMER
 
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSPROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSNexgen Technology
 
A Statistical Approach to Adaptive Playout Scheduling in Voice Over Internet ...
A Statistical Approach to Adaptive Playout Scheduling in Voice Over Internet ...A Statistical Approach to Adaptive Playout Scheduling in Voice Over Internet ...
A Statistical Approach to Adaptive Playout Scheduling in Voice Over Internet ...IJECEIAES
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...eSAT Publishing House
 
Securing cloud computing environment against d do s attacks
Securing cloud computing environment against d do s attacksSecuring cloud computing environment against d do s attacks
Securing cloud computing environment against d do s attacksSampatkumar Satyamurti
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...eSAT Journals
 
DETECTION OF ALGORITHMICALLYGENERATED MALICIOUS DOMAIN USING FREQUENCY ANALYSIS
DETECTION OF ALGORITHMICALLYGENERATED MALICIOUS DOMAIN USING FREQUENCY ANALYSISDETECTION OF ALGORITHMICALLYGENERATED MALICIOUS DOMAIN USING FREQUENCY ANALYSIS
DETECTION OF ALGORITHMICALLYGENERATED MALICIOUS DOMAIN USING FREQUENCY ANALYSISijcsit
 
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLINGAN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLINGSreelekshmi S
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 

What's hot (15)

Low Rate DDoS attack using Improved Robust Random Early Detection
Low Rate DDoS attack using Improved Robust Random Early DetectionLow Rate DDoS attack using Improved Robust Random Early Detection
Low Rate DDoS attack using Improved Robust Random Early Detection
 
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in CloudDFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
 
Thesis11
Thesis11Thesis11
Thesis11
 
A Comparative Approach to Handle Ddos Attacks
A Comparative Approach to Handle Ddos AttacksA Comparative Approach to Handle Ddos Attacks
A Comparative Approach to Handle Ddos Attacks
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSPROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
 
Irm 4-ddos
Irm 4-ddosIrm 4-ddos
Irm 4-ddos
 
DepenDNS Analysis
DepenDNS AnalysisDepenDNS Analysis
DepenDNS Analysis
 
A Statistical Approach to Adaptive Playout Scheduling in Voice Over Internet ...
A Statistical Approach to Adaptive Playout Scheduling in Voice Over Internet ...A Statistical Approach to Adaptive Playout Scheduling in Voice Over Internet ...
A Statistical Approach to Adaptive Playout Scheduling in Voice Over Internet ...
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
 
Securing cloud computing environment against d do s attacks
Securing cloud computing environment against d do s attacksSecuring cloud computing environment against d do s attacks
Securing cloud computing environment against d do s attacks
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
 
DETECTION OF ALGORITHMICALLYGENERATED MALICIOUS DOMAIN USING FREQUENCY ANALYSIS
DETECTION OF ALGORITHMICALLYGENERATED MALICIOUS DOMAIN USING FREQUENCY ANALYSISDETECTION OF ALGORITHMICALLYGENERATED MALICIOUS DOMAIN USING FREQUENCY ANALYSIS
DETECTION OF ALGORITHMICALLYGENERATED MALICIOUS DOMAIN USING FREQUENCY ANALYSIS
 
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLINGAN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 

Similar to Ntp in Amplification Inferno

Azure DDoS Protection Standard
Azure DDoS Protection StandardAzure DDoS Protection Standard
Azure DDoS Protection Standardarnaudlh
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in ManetIRJET Journal
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...IJNSA Journal
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments IJITCA Journal
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS IJITCA Journal
 
Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...IJECEIAES
 
A Survey: DDOS Attack on Internet of Things
A Survey: DDOS Attack on Internet of ThingsA Survey: DDOS Attack on Internet of Things
A Survey: DDOS Attack on Internet of ThingsIJERD Editor
 
I034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdfI034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdfDevesh Pawar
 
Denial of service attacks and mitigation
Denial of service attacks and mitigationDenial of service attacks and mitigation
Denial of service attacks and mitigationAmeya Vashishth
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacksHaltdos
 
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERSENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERSIJNSA Journal
 
Enhancing the impregnability of linux servers
Enhancing the impregnability of linux serversEnhancing the impregnability of linux servers
Enhancing the impregnability of linux serversIJNSA Journal
 
cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year projectAmeya Vashishth
 
Presentation1 shweta
Presentation1 shweta Presentation1 shweta
Presentation1 shweta swet4
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attackHTS Hosting
 

Similar to Ntp in Amplification Inferno (20)

D do s
D do sD do s
D do s
 
Azure DDoS Protection Standard
Azure DDoS Protection StandardAzure DDoS Protection Standard
Azure DDoS Protection Standard
 
DDoS-bdNOG
DDoS-bdNOGDDoS-bdNOG
DDoS-bdNOG
 
DDoS.ppt
DDoS.pptDDoS.ppt
DDoS.ppt
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
 
Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...
 
A Survey: DDOS Attack on Internet of Things
A Survey: DDOS Attack on Internet of ThingsA Survey: DDOS Attack on Internet of Things
A Survey: DDOS Attack on Internet of Things
 
I034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdfI034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdf
 
Denial of service attacks and mitigation
Denial of service attacks and mitigationDenial of service attacks and mitigation
Denial of service attacks and mitigation
 
1766 1770
1766 17701766 1770
1766 1770
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
 
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERSENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
 
Enhancing the impregnability of linux servers
Enhancing the impregnability of linux serversEnhancing the impregnability of linux servers
Enhancing the impregnability of linux servers
 
L1803046876
L1803046876L1803046876
L1803046876
 
cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year project
 
Presentation1 shweta
Presentation1 shweta Presentation1 shweta
Presentation1 shweta
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attack
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Ntp in Amplification Inferno

  • 1. 0Document Title NTP in Amplification Inferno Sriram Krishnan
  • 2. 1Document Title To Introduce Myself...  Sriram Krishnan  Senior Manager, Security Solutions, Group Information Security - Scope International Pvt. Ltd. (A wholly owned subsidiary of Standard Chartered Bank)  Over 9 years of experience in Information Security
  • 3. 2Document Title Agenda  Why NTP Amplification?  Demystifying DDoS  Time to Deep Dive  NTP Amplification Attack – Demo  Challenges & Countermeasures
  • 4. 3Document Title Why NTP Amplification?
  • 6. 5Document Title Why NTP?  Why NTP is targeted  Ease of attack:  Small request may lead to relatively large response  Evade Detection:  Spoofing of IP Address due to lack of handshake process– as it is a UDP based protocol  Availability:  Essential service with large clusters of public timeservers available in internet  Traffic Volume:  Potential to generate from 200 to 400Gbps of traffic that will shutdown a network Targeted Industries  Internet Service Providers,  Banks and Financial Services,  Managed Services (Including SaaS),  Critical Infrastructure of countries  e-Commerce
  • 8. 7Document Title Understanding DDoS Terminology  Master / Handler Compromised system in the interest used by the attacker to launch attacks.  Slave / Agent: System that responds to the instructions of Master which are controlled by the attacker. Slave serves as the amplifiers for DDos attacks.  Daemon: Process running the Slave, executing the commands for amplification.  Reflector Systems that respond to instructions of Master, without the awareness of participating in DRDoS attack.  Victim Target host or network for the DDoS attack.
  • 9. 8Document Title DDoS Categorized Based on Attack Method Conventional DDoS Attack:  Attacker takes control of master system to send instructions to slaves running the affected daemon.  The slaves will execute the command and amplify the traffic to finally send it to victims. Compromised Systems Fig 1: Distributed Denial of Service (DDOS) Attack
  • 10. 9Document Title DDoS Categorized Based on Attack Method Distributed Reflective Denial of Service Attack  Attacker takes control of the master system and sends instruction to reflector running the vulnerable daemon.  Reflectors executes the command and amplifies the traffic to finally send it to victims.  Host of both categories (Master and Slave) are compromised in DDoS, but in DRDoS attack the reflector is not compromised. Compromised Systems Fig 2: Distributed Reflective Denial of Service (DRDOS) Attack
  • 11. 10Document Title DDoS Categorized Based on Impact  Volume / Bandwidth Based Attacks  Chokes victim’s network bandwidth  Measured in bits per second (Bps)  Example: UDP Flood, ICMP Flood  Protocol Based Attacks  Exhaust the system / network device resources and shutdown the service or systems  Measured as packets per second  Example: SYN Flood, Ping of Death, Smurf DDoS  Application Layer Based Attacks  Shutdown application layer resources / services  Example: Slowloris, HTTP Flood.
  • 13. 12Document Title Vulnerability Details  NTP allows administrators to monitor service via ntpd daemon – by executing remote commands  Affected command is monlist  monlist command operates in mode 7 – private use (which allows remote administration).  Purpose of this command is to obtain details about NTP Associations (up to 600) from NTP server  NTP Associations are formed when two peers exchange messages, and this transaction is maintained in the Most Recently Used (MRU) list.  NTP Associations details are stored in ntp.conf file. Example, in unix-based OS this file is stored in </etc/ntp.conf>  Attacker sends a request (get_monlist ) to public NTP Server (in internet) with spoofed IP of the victim  Response to this request generates enormous traffic towards the victim’s network
  • 14. 13Document Title Monlist Command – Understanding the Details
  • 15. 14Document Title Examining the Source Code Let’s examine the source code that defines the structure and executes the monlist command  ntp_request.c - respond to information requests  ntp_monitor.c - monitor who is using the ntpd server ntp_request.c  mon_getlist_1 function obtains MRU list from the NTP server.  Arrow indicates structure of mon_data that defines the maximum number of NTP associations.  The keyword “extern” is used as this variable has already been defined in ntp_monitor.c.
  • 16. 15Document Title Examining the Source Code (Contd..) ntp_monitor.c  First arrow - defines the number of structure to be allocated - 600  Second arrow - declares and defines the mon_data that updates the statistics of the monitoring data.
  • 17. 16Document Title NTP Amplification Attack Spoofed IP Address of Victim monlist NTP Associations MRU List
  • 19. 18Document Title Challenges & Countermeasures
  • 20. 19Document Title Challenges in Defence  Arresting Help  DDoS attack floods victim’s network / systems with malicious packets.  Traffic flow increases rapidly within a quick span of time and without any prior warning or alert.  This prevents systems to send SoS and are arrested from the attack.  Filtering of Traffic  Any attempts made to filter the traffic, hampers service rendered  All legitimate traffic may be filtered / rejected thus denying service  Evade Detection  Generally attackers spoof the IP address of the attack packets.  Attack triggered from distributed compromised systems  Heterogeneous Environment:  Systems with multiple software and diverse architecture are deployed.
  • 21. 20Document Title Countermeasures So what is required? Robust & effective defensive mechanism How? Enhancing the protocol design
  • 22. 21Document Title Countermeasures – NTP Amplification Attacks  Upgrade the ntpd version to 4.2.7  If the ntpd version cannot be updated, add the “noquery” directive to the “restrict default” line in the ntp.conf file.
  • 23. 22Document Title Countermeasures - DDoS Attacks  Response Rate Limitation (RRL)  Limits number of packets issued to a target at a given time interval  Excess data over the limit is truncated  Works best when the attack source is limited  Already implemented in DNS protocol  Protocol Harding  Session handling mechanism - requests to be processed only post session initiation  For example, DTLS (RFC 4347), a UDP-variant of TLS, implements a stateless cookie exchange mechanism in order to avoid DDoS attacks.  Response Size Limitation  Protocol to be designed to:  Limit the output (packet size) for every request, and  Demand session initiation before releasing the rest of the output
  • 24. 23Document Title To Sum Up!  UDP based network services - easy target for attackers  Other UDP based services such as SNMP, SSDP, NetBIOS targeted  Pressing need to harden such protocol design  Need for investments in preventive defence mechanism pertinent