SlideShare a Scribd company logo
1 of 23
IP Spoofing, CS265 1
IP Spoofing
Bao Ho
ToanTai Vu
CS 265 - Security Engineering
Spring 2003
San Jose State University
IP Spoofing, CS265 2
Presentation Outline
 Introduction, Background
 Attacks with IP Spoofing
 Counter Measures
 Summary
IP Spoofing, CS265 3
IP Spoofing
 IP Spoofing is a technique used to gain unauthorized
access to computers.
– IP: Internet Protocol
– Spoofing: using somebdody else’s information
 Exploits the trust relationships
 Intruder sends messages to a computer with an IP
address of a trusted host.
IP Spoofing, CS265 4
IP / TCP
 IP is connectionless, unreliable
 TCP connection-oriented
TCP/IP handshake
A  B: SYN; my number is X
B  A: ACK; now X+1
SYN; my number is Y
A B: ACK; now Y+1
IP Spoofing, CS265 5
A blind Attack
Host I cannot see what Host V send back
IP Spoofing, CS265 6
IP Spoofing Steps
 Selecting a target host (the victim)
 Identify a host that the target “trust”
 Disable the trusted host, sampled the target’s TCP
sequence
 The trusted host is impersonated and the ISN forged.
 Connection attempt to a service that only requires
address-based authentication.
 If successfully connected, executes a simple
command to leave a backdoor.
IP Spoofing, CS265 7
IP Spoofing Attacks
 Man in the middle
 Routing
 Flooding / Smurfing
IP Spoofing, CS265 8
Attacks
Man - in - the - middle:
Packet sniffs on link between the two endpoints, and
therefore can pretend to be one end of the
connection.
IP Spoofing, CS265 9
Attacks
 Routing re-direct: redirects routing information
from the original host to the attacker’s host.
 Source routing: The attacker redirects individual
packets by the hacker’s host.
IP Spoofing, CS265 10
Attacks
 Flooding: SYN flood fills up the receive queue from
random source addresses.
 Smurfing: ICMP packet spoofed to originate from the
victim, destined for the broadcast address, causing all
hosts on the network to respond to the victim at
once.
IP Spoofing, CS265 11
IP-Spoofing Facts
 IP protocol is inherently weak
 Makes no assumption about sender/recipient
 Nodes on path do not check sender’s identity
 There is no way to completely eliminate IP spoofing
 Can only reduce the possibility of attack
IP Spoofing, CS265 12
IP-Spoofing
Counter-measures
 No insecure authenticated services
 Disable commands like ping
 Use encryption
 Strengthen TCP/IP protocol
 Firewall
 IP traceback
IP Spoofing, CS265 13
No insecure authenticated
services
 r* services are hostname-based or IP-based
 Other more secure alternatives, i.e., ssh
 Remove binary files
 Disable in inet, xinet
 Clean up .rhost files and /etc/host.equiv
 No application with hostname/IP-based
authentication, if possible
IP Spoofing, CS265 14
Disable ping command
 ping command has rare use
 Can be used to trigger a DOS attack by flooding the
victim with ICMP packets
 This attack does not crash victim, but consume
network bandwidth and system resources
 Victim fails to provide other services, and halts if runs
out of memory
IP Spoofing, CS265 15
DOS using Ping
IP Spoofing, CS265 16
Use Encryption
 Encrypt traffic, especially TCP/IP packets and Initial
Sequence Numbers
 Kerberos is free, and is built-in with OS
 Limit session time
 Digital signature can be used to identify the sender of
the TCP/IP packet.
IP Spoofing, CS265 17
Strengthen TCP/IP protocol
 Use good random number generators to generate
ISN
 Shorten time-out value in TCP/IP request
 Increase request queue size
 Cannot completely prevent TCP/IP half-open-
connection attack
 Can only buy more time, in hope that the attack will
be noticed.
IP Spoofing, CS265 18
Firewall
 Limit traffic to services that are offered
 Control access from within the network
 Free software: ipchains, iptables
 Commercial firewall software
 Packet filters: router with firewall built-in
 Multiple layer of firewall
IP Spoofing, CS265 19
Network layout with Firewall
IP Spoofing, CS265 20
IP Trace-back
 To trace back as close to the attacker’s location as
possible
 Limited in reliability and efficiency
 Require cooperation of many other network operators
along the routing path
 Generally does not receive much attention from
network operators
IP Spoofing, CS265 21
Summary/Conclusion
 IP spoofing attacks is unavoidable.
 Understanding how and why spoofing attacks are
used, combined with a few simple prevention
methods, can help protect your network from these
malicious cloaking and cracking techniques.
IP Spoofing, CS265 22
References
 IP-spoofing Demystified (Trust-Relationship Exploitation), Phrack Magazine Review, Vol. 7, No. 48, pp. 48-
14, www.networkcommand.com/docs/ipspoof.txt
 Security Enginerring: A Guide to Building Dependable Distributed Systems, Ross Anderson, pp. 371
 Introduction to IP Spoofing, Victor Velasco, November 21, 2000,
www.sans.org/rr/threats/intro_spoofing.php
 A Large-scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis, Ming-Yuh
Huang, Thomas M. Wicks, Applied Research and Technology, The Boeing Company
 Internet Vulnerabilities Related to TCP/IP and T/TCP, ACM SIGCOMM, Computer Communication Review
 IP Spoofing, www.linuxgazette.com/issue63/sharma.html
 Distributed System: Concepts and Design, Chapter 7, by Coulouris, Dollimore, and Kindberg
 FreeBSD IP Spoofing, www.securityfocus.com/advisories/2703
 IP Spoofing Attacks and Hijacked Terminal Connections, www.cert.org/advisories/CA-1995-01.html
 Network support for IP trace-back, IEEE/ACM Transactions on Networking, Vol. 9, No. 3, June 2001
 An Algebraic Approach to IP Trace-back, ACM Transactions on Information and System Security, Vol. 5, No.
2, May 2002
 Web Spoofing. An Internet Con Game, http://bau2.uibk.ac.at/matic/spoofing.htm
IP Spoofing, CS265 23
Questions / Answers

More Related Content

Similar to poofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdj

Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing pptAnushakp9
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco routerIT Tech
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Mumbai Academisc
 
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days
 
342_IP_Spoofing.pptx
342_IP_Spoofing.pptx342_IP_Spoofing.pptx
342_IP_Spoofing.pptxRajeshArora97
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasuresdkaya
 
Attacks and their mitigations
Attacks and their mitigationsAttacks and their mitigations
Attacks and their mitigationsMukesh Chaudhari
 
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...ClaraZara1
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using itRajesh Porwal
 
Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaHanaysha
 
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...phanleson
 

Similar to poofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdj (20)

Ipspoofing
IpspoofingIpspoofing
Ipspoofing
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Presentation1
Presentation1Presentation1
Presentation1
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco router
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
Preventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP addressPreventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP address
 
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
 
342_IP_Spoofing.pptx
342_IP_Spoofing.pptx342_IP_Spoofing.pptx
342_IP_Spoofing.pptx
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasures
 
Network Security
Network SecurityNetwork Security
Network Security
 
Attacks and their mitigations
Attacks and their mitigationsAttacks and their mitigations
Attacks and their mitigations
 
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
3.Network
3.Network3.Network
3.Network
 
Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using it
 
I P S P O O F I N G
I P  S P O O F I N GI P  S P O O F I N G
I P S P O O F I N G
 
Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq Hanaysha
 
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...
 

Recently uploaded

(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service
(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service
(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一zul5vf0pq
 
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,Pooja Nehwal
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...anilsa9823
 
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...ranjana rawat
 
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一ga6c6bdl
 
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查awo24iot
 
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Pooja Nehwal
 
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...Pooja Nehwal
 
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service SaharanpurVIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service SaharanpurSuhani Kapoor
 
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311  Call Girls in Thane , Independent Escort Service ThanePallawi 9167673311  Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service ThanePooja Nehwal
 
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /WhatsappsBeautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsappssapnasaifi408
 
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一ga6c6bdl
 
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...nagunakhan
 
Gaya Call Girls #9907093804 Contact Number Escorts Service Gaya
Gaya Call Girls #9907093804 Contact Number Escorts Service GayaGaya Call Girls #9907093804 Contact Number Escorts Service Gaya
Gaya Call Girls #9907093804 Contact Number Escorts Service Gayasrsj9000
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...Pooja Nehwal
 
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service
(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service
(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service
 
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
 
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
 
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
 
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
 
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
 
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
 
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
 
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service SaharanpurVIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
 
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311  Call Girls in Thane , Independent Escort Service ThanePallawi 9167673311  Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service Thane
 
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /WhatsappsBeautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
 
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
 
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
 
Gaya Call Girls #9907093804 Contact Number Escorts Service Gaya
Gaya Call Girls #9907093804 Contact Number Escorts Service GayaGaya Call Girls #9907093804 Contact Number Escorts Service Gaya
Gaya Call Girls #9907093804 Contact Number Escorts Service Gaya
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
 
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
 
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
 

poofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdj

  • 1. IP Spoofing, CS265 1 IP Spoofing Bao Ho ToanTai Vu CS 265 - Security Engineering Spring 2003 San Jose State University
  • 2. IP Spoofing, CS265 2 Presentation Outline  Introduction, Background  Attacks with IP Spoofing  Counter Measures  Summary
  • 3. IP Spoofing, CS265 3 IP Spoofing  IP Spoofing is a technique used to gain unauthorized access to computers. – IP: Internet Protocol – Spoofing: using somebdody else’s information  Exploits the trust relationships  Intruder sends messages to a computer with an IP address of a trusted host.
  • 4. IP Spoofing, CS265 4 IP / TCP  IP is connectionless, unreliable  TCP connection-oriented TCP/IP handshake A  B: SYN; my number is X B  A: ACK; now X+1 SYN; my number is Y A B: ACK; now Y+1
  • 5. IP Spoofing, CS265 5 A blind Attack Host I cannot see what Host V send back
  • 6. IP Spoofing, CS265 6 IP Spoofing Steps  Selecting a target host (the victim)  Identify a host that the target “trust”  Disable the trusted host, sampled the target’s TCP sequence  The trusted host is impersonated and the ISN forged.  Connection attempt to a service that only requires address-based authentication.  If successfully connected, executes a simple command to leave a backdoor.
  • 7. IP Spoofing, CS265 7 IP Spoofing Attacks  Man in the middle  Routing  Flooding / Smurfing
  • 8. IP Spoofing, CS265 8 Attacks Man - in - the - middle: Packet sniffs on link between the two endpoints, and therefore can pretend to be one end of the connection.
  • 9. IP Spoofing, CS265 9 Attacks  Routing re-direct: redirects routing information from the original host to the attacker’s host.  Source routing: The attacker redirects individual packets by the hacker’s host.
  • 10. IP Spoofing, CS265 10 Attacks  Flooding: SYN flood fills up the receive queue from random source addresses.  Smurfing: ICMP packet spoofed to originate from the victim, destined for the broadcast address, causing all hosts on the network to respond to the victim at once.
  • 11. IP Spoofing, CS265 11 IP-Spoofing Facts  IP protocol is inherently weak  Makes no assumption about sender/recipient  Nodes on path do not check sender’s identity  There is no way to completely eliminate IP spoofing  Can only reduce the possibility of attack
  • 12. IP Spoofing, CS265 12 IP-Spoofing Counter-measures  No insecure authenticated services  Disable commands like ping  Use encryption  Strengthen TCP/IP protocol  Firewall  IP traceback
  • 13. IP Spoofing, CS265 13 No insecure authenticated services  r* services are hostname-based or IP-based  Other more secure alternatives, i.e., ssh  Remove binary files  Disable in inet, xinet  Clean up .rhost files and /etc/host.equiv  No application with hostname/IP-based authentication, if possible
  • 14. IP Spoofing, CS265 14 Disable ping command  ping command has rare use  Can be used to trigger a DOS attack by flooding the victim with ICMP packets  This attack does not crash victim, but consume network bandwidth and system resources  Victim fails to provide other services, and halts if runs out of memory
  • 15. IP Spoofing, CS265 15 DOS using Ping
  • 16. IP Spoofing, CS265 16 Use Encryption  Encrypt traffic, especially TCP/IP packets and Initial Sequence Numbers  Kerberos is free, and is built-in with OS  Limit session time  Digital signature can be used to identify the sender of the TCP/IP packet.
  • 17. IP Spoofing, CS265 17 Strengthen TCP/IP protocol  Use good random number generators to generate ISN  Shorten time-out value in TCP/IP request  Increase request queue size  Cannot completely prevent TCP/IP half-open- connection attack  Can only buy more time, in hope that the attack will be noticed.
  • 18. IP Spoofing, CS265 18 Firewall  Limit traffic to services that are offered  Control access from within the network  Free software: ipchains, iptables  Commercial firewall software  Packet filters: router with firewall built-in  Multiple layer of firewall
  • 19. IP Spoofing, CS265 19 Network layout with Firewall
  • 20. IP Spoofing, CS265 20 IP Trace-back  To trace back as close to the attacker’s location as possible  Limited in reliability and efficiency  Require cooperation of many other network operators along the routing path  Generally does not receive much attention from network operators
  • 21. IP Spoofing, CS265 21 Summary/Conclusion  IP spoofing attacks is unavoidable.  Understanding how and why spoofing attacks are used, combined with a few simple prevention methods, can help protect your network from these malicious cloaking and cracking techniques.
  • 22. IP Spoofing, CS265 22 References  IP-spoofing Demystified (Trust-Relationship Exploitation), Phrack Magazine Review, Vol. 7, No. 48, pp. 48- 14, www.networkcommand.com/docs/ipspoof.txt  Security Enginerring: A Guide to Building Dependable Distributed Systems, Ross Anderson, pp. 371  Introduction to IP Spoofing, Victor Velasco, November 21, 2000, www.sans.org/rr/threats/intro_spoofing.php  A Large-scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis, Ming-Yuh Huang, Thomas M. Wicks, Applied Research and Technology, The Boeing Company  Internet Vulnerabilities Related to TCP/IP and T/TCP, ACM SIGCOMM, Computer Communication Review  IP Spoofing, www.linuxgazette.com/issue63/sharma.html  Distributed System: Concepts and Design, Chapter 7, by Coulouris, Dollimore, and Kindberg  FreeBSD IP Spoofing, www.securityfocus.com/advisories/2703  IP Spoofing Attacks and Hijacked Terminal Connections, www.cert.org/advisories/CA-1995-01.html  Network support for IP trace-back, IEEE/ACM Transactions on Networking, Vol. 9, No. 3, June 2001  An Algebraic Approach to IP Trace-back, ACM Transactions on Information and System Security, Vol. 5, No. 2, May 2002  Web Spoofing. An Internet Con Game, http://bau2.uibk.ac.at/matic/spoofing.htm
  • 23. IP Spoofing, CS265 23 Questions / Answers