SlideShare a Scribd company logo
1 of 95
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 1 of 37
Contents
Topic 1: Analogy
...............................................................................................
............................... 2
Reconnaissance Strategies
...............................................................................................
.......... 2
Topic 2: Module Introduction
...............................................................................................
............ 3
Topic 3: Reconnaissance
.................................................................................. .............
................. 4
What is Reconnaissance?
...............................................................................................
............ 4
Passive Reconnaissance
...............................................................................................
.............. 5
Active Reconnaissance
...............................................................................................
................. 7
Activity: Active Reconnaissance
...............................................................................................
... 9
Topic 4: Scanning
...............................................................................................
........................... 17
What Is Scanning?
...............................................................................................
...................... 17
IP Scanning
...............................................................................................
................................. 18
Port
Scanning.................................................................................
............................................ 19
Types of Port Scans
...............................................................................................
.................... 20
Vulnerability Scanning
...............................................................................................
................ 25
Quiz
...............................................................................................
............................................. 26
Port Scanning Tool: Nmap
...............................................................................................
.......... 28
Topic 5: Enumeration
...............................................................................................
..................... 30
What Is Enumeration?
...............................................................................................
................ 30
Topic 6:
Summary.................................................................................
......................................... 34
Glossary
...............................................................................................
.......................................... 35
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 2 of 37
Topic 1: Analogy
Reconnaissance Strategies
The Preattack Phases
CSEC 640 – Module 2
Reconnaissance Strategies
Soldiers often carry out reconnaissance missions in which their
only task is to collect
facts about an enemy target. Doing so helps them prepare an
effective, customized
attack strategy. Similarly, hackers trying to break into protected
networks research their
targets to find ways to carry out an effective attack. Here is an
analogy comparing
military preattack strategies to the preattack exercises carried
out by professional
hackers and penetration testers, or “pentesters.”
Step 1
Military officers conduct scouting to collect information about
their targets before an
attack. Their goals are to make sure the enemy does not see
them coming and to collect
as much data as possible about the enemy, so that the attack is
effective.
Step 2
Reconnaissance is another word for scouting. The U.S. Army's
reconnaissance and
surveillance course trains military personnel in surveillance and
target acquisition. In
reconnaissance, the armed forces research a target to plan the
exact point of contact
with that target.
Step 3
Reconnaissance, however, is not limited to warfare. It is a tactic
used by ordinary people
in everyday life. Hackers, for instance, who want to attack a
particular network or
computer system, perform reconnaissance to learn more about
the target.
Just as soldiers might monitor enemy troops from a distance as
part of a reconnaissance
exercise, hackers might observe activity on a target Web site as
part of their
reconnaissance. The goal remains the same for both: to study
the target and move in
precisely, not randomly.
Step 4
During reconnaissance, hackers use social engineering
techniques and technical tools
to learn about the target systems’ owners, domain names, and IP
addresses, among
other necessary details. Hackers need enough data to ensure that
they are in and out of
a system long before the victim has noticed that important data
has been compromised.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 3 of 37
Topic 2: Module Introduction
Before hackers or penetration testers launch an attack against an
organization’s
network, they conduct a preattack exercise. This exercise helps
them gather
information—technical and nontechnical—about the system that
they are targeting. This
information helps attackers decide what type of attack will be
most effective against their
targets.
The first three phases of this preattack exercise are the most
critical and are called
reconnaissance, scanning, and enumeration. Understanding how
these phases work
together gives a clear indication of how attackers progress in
their study of a target and
launch an attack. This module covers active and passive
reconnaissance techniques,
types of scanning, scanning tools and techniques, and
enumeration.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 4 of 37
Topic 3: Reconnaissance
What Is Reconnaissance?
Reconnaissance
Reconnaissance is the first step in engineering an effective
attack.
Footprinting
Attackers or penetration testers use a process called footprinting
during the
reconnaissance phase. This process helps them to gather
preliminary information about
the network they are targeting. The target network can belong to
an individual, a
corporation, a government, or any public institution.
Data Collection
Though hackers aim to collect as much information as possible,
the data they collect
during this phase is not enough to draw an accurate map of the
target network.
Target
At the end of the reconnaissance phase, attackers manage to
learn about the people
they are targeting and the target network’s IP address.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 5 of 37
Topic 3: Reconnaissance
Passive Reconnaissance
There are two types of reconnaissance: passive and active.
Passive reconnaissance presents a low level of risk for hackers
because they spy on
victims who are unaware that their moves are being watched.
Through passive
reconnaissance, hackers gather data from sources that are freely
available to the public,
such as open source sites, groups and forums, social engineering
sites, vulnerability
research sites, and people-search sites.
Open Source Sites
To use open source sites to gather data about a target, the
attacker:
1. first looks for a target Web site
2. downloads the target Web site
3. uses various tools to analyze it
One of the most popular Web site downloading tools is the
freely available wget located
at www.gnu.org/software/wget.
Here the wget recursively retrieves the Web pages at
www.umuc.edu. The “-r” option of
wget enables recursive mirroring of all pages on the site.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 6 of 37
Groups and Forums
Many users share information about the vulnerabilities of their
systems and ask for
solutions or answer queries posed by other users. Hackers use
such forums to gather
information about target systems and find vulnerabilities in the
systems.
Social Engineering Techniques
Social engineering is the art of tricking people into giving out
classified data. A common
social engineering technique that hackers use is joining chat
rooms their targets might
use. In these chat rooms, hackers are able to start conversations
through which they can
extract valuable data from targets.
Vulnerability Research Sites
Hackers visit vulnerability research Web sites such as
www.securityfocus.com or
www.hackerstorm.com for the latest attack tools and techniques.
People-Search Sites
To find information such as names of a system administrator,
security engineer, or
network engineer of a target company, hackers visit people-
search Web sites such as
people.yahoo.com or www.peoplefinder.com.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 7 of 37
Topic 3: Reconnaissance
Active Reconnaissance
In active reconnaissance, attackers use technical tools to probe
the target network for
information. For example, attackers may try to connect to
different port numbers on the
target IP to see which ones are open. In this way, they
determine which software/servers
are running on that IP—some of which might be vulnerable.
Data about a network’s IP addresses is usually found through
the Domain Name System
(DNS). Hackers use several technical tools to query the target
network’s DNS to
discover this data.
During this phase, hackers use technical tools to learn more
about their target.
www.arin.net)
Whois (www.whois.net)
Hackers interrogate the Internet domain name administration
system to locate the
domain name of a target system. Whois allows hackers to query
DNS and obtain
registered information, such as the domain ownership, address,
location, and phone
number.
NSLookup
The NSLookup tool allows anyone to query a DNS server for
information such as host
names and IP addresses. Using the NSLookup tool, a hacker can
perform a DNS zone
transfer and gather a great deal of information about the target.
ARIN (www.arin.net)
The American Registry for Internet Numbers (ARIN) is one of
five worldwide regional
Internet registries (RIR). ARIN oversees public IP addresses for
North America. Hackers
query ARIN to identify the range of IP addresses their target
network uses.
ARIN allows hackers to:
-type searches on its database to locate
information about network-
related handles, subnet masks, and related points of contact
(POC).
y an IP address to help identify how IP addresses are
assigned. For example, a
hacker can enter the Web server IP address of a target network
into the ARIN Web
site, www.arin.net, using Whois to identify the number and the
range of IP addresses
in use.
DIG
Like the NSLookup tool, Domain Information Groper (DIG) is a
flexible tool that performs
DNS lookups. DIG interrogates DNS name servers and displays
the responses that it
receives from the name servers. The responses include data such
as host names, IP
addresses, and e-mail exchanges.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 8 of 37
Traceroute
Hackers use the Traceroute tool to discover the routes or paths,
devices or routers, and
Internet service providers (ISPs) that a data packet must cross
to reach its target host.
Traceroute is based on the Internet Control Message Protocol
(ICMP). This is important
because ICMP packets are blocked by many network devices
such as firewalls. By using
Traceroute or other ICMP-based tools, hackers are able to easily
discover firewalls in
the data path.
DNS and Zone Transfer
A DNS server is responsible for resolving host names to
corresponding IP addresses.
When a host name—for example, www.umuc.edu—is typed into
a Web browser, the
DNS server converts it into an IP address. This is because the
systems running on the
Internet recognize only IP addresses. Every DNS server has a
name space, known as a
zone. A zone can contain one or more domain names.
There are two types of DNS servers organized in a hierarchy: a
master DNS server and
a secondary DNS server. When a DNS zone has to be updated,
the update is executed
within a primary zone on a master server. The updated records
in the database of the
master server are then transferred to the secondary DNS server.
This kind of transfer is
called a zone transfer.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 9 of 37
Topic 3: Reconnaissance
Activity: Active Reconnaissance
Introduction
Krista Le Saad is a popular gray hat hacker known for her
reconnaissance skills. She
has been given an assignment to find out the IP address of the
administrative system
managing an online bookstore called www.largobooks.com. The
assignment has been
delegated to Krista by a penetration tester, Sean Stasis.
Sean works for a leading IT security firm and needs to find the
loopholes and
vulnerabilities in www.largobooks.com's network. He often
outsources such
assignments to young aspiring hackers. Sean's team is ready to
begin fixing patches on
all vulnerabilities once he gets the results from Krista's
inquiries.
Krista has been given 24 hours to hack into
www.largobooks.com. To meet that
deadline, Krista needs your help. In this activity, you will be
asked to perform three
active reconnaissance steps. You will use tools, commands, and
Web sites, such
as FindRecord and NSLookup, to locate the DNS and IP address
and perform a
zone transfer.
Workspace
To help Krista find the IP address of www.largobooks.com’s
administrative system,
perform the following three steps:
DNS.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 10 of 37
Step 1
To query the DNS of www.largobooks.com, Krista uses a tool
similar to Whois called
FindRecord.
On typing www.largobooks.com in the Record Locator field and
searching the site, she
received the following output.
NOTE: If you use the Whois tool on a Linux OS, type the
command: whois
largobooks.com.
Domain name: largobooks.com
Registrant Contact:
n/a
Alan Carswell ()
Fax:
7704 Morningside Dr. NW
Washington, DC 20012
AF
Administrative Contact:
n/a
Alan Carswell ([email protected])
+1.2028297638
Fax: +1.5555555555
7704 Morningside Dr. NW
Washington, DC 20012
AF
Technical Contact:
n/a
Alan Carswell ([email protected])
+1.2028297638
Fax: +1.5555555555
7704 Morningside Dr. NW
Washington, DC 20012
AF
Status: Locked
Name Servers:
dns1.registrar-servers.com
dns2.registrar-servers.com
dns3.registrar-servers.com
dns4.registrar-servers.com
Creation date: 02 Jul 20XX 11:10:00
Expiration date: 02 Jul 20XX 06:10:00
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 11 of 37
Analyze the output and answer the following question.
Step 2
Question: Which of the following information is available in the
FindRecord output?
a. Technical contact
b. Administrative contact
c. Domain name
d. IP address of DNS
e. DNS
Correct answers: Options a, b, c, and e
Feedback for the correct answer:
That’s correct.
The technical contact data, the administrative contact, the
domain name, and the DNS
data showing all the name servers are available in the output.
Feedback for the incorrect or partially correct answer:
Not quite.
The IP address of the DNS is not available in these results. The
domain name,
administrative contact, technical contact, and name servers are
clearly mentioned.
Step 3
Krista can find the IP address of the DNS server by using a tool
such as NSLookup. In
this activity, use the IPAddress Locator to help her.
Activity
The following output was generated on typing largobooks.com
in the IPAddress
Locator.
Server: adedcns01.us.umuc.edu
Address: 131.171.34.194
Non-authoritative answer:
Name: largobooks.com
Address: 199.58.184.57
The IP address of www.largobooks.com DNS is 199.58.184.57.
Note: You can execute NSlookup commands at the Windows
command prompt.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 12 of 37
Step 4
In this step, you perform a zone transfer. The following
commands can be executed at
the Windows command prompt.
Activity 1
On typing nslookup and pressing the Enter key, the following
output is displayed.
The IP address is displayed.
Note: Once nslookup is typed at the Windows command prompt,
the prompt will change
to “>.” This indicates that NSLookup is in the execution mode.
Activity 2
On typing server 8.8.8.8 and pressing the Enter key, the
following output is displayed.
The default DNS has been set as Google DNS.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 13 of 37
Activity 3
On typing set type=any and pressing the Enter key, the
following output is displayed.
This command specifies all types of data.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 14 of 37
Activity 4
On typing largobooks.com and pressing the Enter key, the
following output is
displayed.
Finally, the zone transfer request is sent from your host to
largobooks.com’s DNS
server.
Going beyond the initial search results, the DNS server loads
the zone information and
replies with either a partial or full transfer of the zone to your
host.
View the command you have typed in this step and the
corresponding results. Then,
answer the question.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 15 of 37
Question 2: Which of the following data is available in the
screenshot?
a. Web server IP address
b. FTP server list
c. Domain name servers list
d. Mail exchange servers list
Correct answers: Options a, c, and d
Feedback:
In the output you cannot see the FTP server list. You can see
the Web server's IP
address—199.58.184.57, the list of www.largobooks.com's
domain name servers, and
the mail exchange server's list, which is indicated by the "MX"
that stands for mail
exchange. This list specifies mail servers for a domain.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 16 of 37
Review
A job well done! You’ve helped Krista locate the IP address and
learned to work with
DNS query tools.
While the technical tools are no doubt important and widely
used, nontechnical methods
of reconnaissance are equally important to hackers.
Nontechnical data is gathered by exploiting human
psychology—logic persuasion, need-
based persuasion, and reciprocation-based social engineering.
The infamous hacker
Kevin Mitnick was not only tech-savvy but also a master of
social engineering.
Social Engineering
Social engineering gives the age-old art of lies and
manipulation a technological twist.
Using Web-based technologies, such as chat rooms and online
forums, attackers
persuade or trick strangers into giving up personal information
such as access codes,
log-in names, and passwords.
Since face-to-face interactions are not required in online
conversations, social engineers
can make up an identity to cheat innocent victims they meet
online. This is a social
approach to getting confidential data, as opposed to cracking
system codes through
technological means.
Further Challenges
Visit the Web site www.whois.net and carry out this exercise in
real time using
NSLookup to query the DNS. Then visit www.arin.net and enter
the Web address you
found in this activity. Compare the results you get from these
sites.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 17 of 37
Topic 4: Scanning
What Is Scanning?
In the scanning phase, hackers use different techniques to
discover live systems,
devices, and open ports or services. There are various types of
scanning, such as IP
scanning, port scanning, and vulnerability scanning.
Sometimes, it is not easy to differentiate between the three
preattack phases—
reconnaissance, scanning, and enumeration. Many of the same
information-gathering
techniques are used across these phases. For example, port
scanning can be
considered a part of reconnaissance or a part of the scanning
phase.
Types of Scanning
IP scanning is a technique that can be used to identify the live
systems connected to
a network segment or IP range.
Port scanning is the process of scanning a host to determine
which Transmission
Control Protocol ports (TCPs) or User Datagram Protocol ports
(UDPs) are
accessible.
Vulnerability scanning is the process of automatically assessing
networks or
applications for vulnerabilities.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 18 of 37
Topic 4: Scanning
IP Scanning
IP scanning is used by system administrators to check the
connectivity of the hosts on
the network. The most popular tool for IP scanning is ping. Ping
sends an ICMP request
to test which target hosts are accessible across an IP network.
Target hosts that are live
return ICMP reply messages.
A technique such as ping sweep is used to identify a range of IP
addresses or live port
numbers of the target system. Based on best security practices,
system administrators
typically configure the firewalls or border-routers to block
ICMP requests originating from
outside the network. An IP scanner can be used by an inside
attacker to draw a network
map.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 19 of 37
Topic 4: Scanning
Port Scanning
Meet Philippe Posen, a freelance security analyst. He’s hard at
work performing port
scans. Philippe uses port scanning to search a network host for
open ports. The ports
can be considered open if their related service is available in
the host network. After
successful port scanning, Philippe will be able to identify which
services are provided by
the host network.
There are two different kinds of port scans: horizontal and
vertical scans.
Horizontal and Vertical Scans
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 20 of 37
Topic 4: Scanning
Types of Port Scans
Hackers can perform several different types of horizontal or
vertical scans. The type of
scan a hacker uses is based on the type of data the hacker wants.
The types of scans
include the TCP connect scan, SYN stealth scan, NULL scan,
ACK scan, FIN scan, and
Xmas tree scan.
TCP Connect Scan
Connecting via a TCP is the simplest scan technique.
Scenario 1
An attacker tries to establish a connection on a port of the target
system by a three-way
handshake.
The attacker knows the target port is open if the connection is
successfully established.
Scenario 2
The attacker knows that the target port is closed if the packet
with the reset flag (RST
flag) is sent by the target host.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 21 of 37
SYN Stealth Scan
This scan is called a half-open scan because a full TCP
connection is never established.
Scenario 1
An attacker generates an initial SYN packet to the target. If the
port is open, the target
responds with an SYN/ACK.
The attacker does not respond back with the ACK in this case.
Therefore, a full TCP
connection is never established. This is why this type of scan is
sometimes called a half-
open scan.
Scenario 2
Some firewalls only log established connections. Since no
connection is established in
an SYN stealth scan, it can pass through the firewall without
being logged. However, an
SYN stealth scan is not completely stealthy as many firewalls
and IDSs detect SYN
scans.
Scenario 3
If the port is closed, the attacker receives an RST from the
target.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 22 of 37
NULL Scan
From the attacker’s perspective, the NULL scan is not always
reliable since not all hosts
comply with RFC 793.
Scenario 1
An attacker sends a data packet without any flag set. No real
TCP/IP packet exists
without any flag set. If the port is open, the target host ignores
the packet and does not
respond.
Scenario 2
According to RFC 793, when a packet is sent to a port with no
flag set, the target
responds with an RST packet if the port is closed.
Some hosts send an RST packet in response to a null packet,
regardless of whether the
port is open or not. That’s why the NULL scan is considered
unreliable.
FIN Scan
Just like a NULL scan, the FIN scan is not reliable.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 23 of 37
Scenario 1
An attacker sends an FIN (finish) packet to the target. The FIN
packet is able to bypass
firewalls because firewalls try to avoid any errors with
legitimate FIN packets. The target
simply ignores the FIN packet if the port is open.
Scenario 2
The target responds with an RST if the port is closed. Some
hosts will send an RST
packet regardless of the port being open or closed, making the
FIN scan unreliable.
ACK Scan
Attackers use ACK scanning to learn which firewall ports are
filtered and which are
unfiltered.
Scenario 1
An attacker sends an ACK packet to the target port’s firewall.
If there is no response or an “ICMP destination unreachable”
message is returned, then
the port is considered to be filtered.
This means that the firewall is stateful. It knows that no internal
host has initiated any
SYN packet that matches the ACK packet sent by the attacker.
Scenario 2
If the target’s firewall returns an RST, then the port is
unfiltered. Because there is no
firewall rule for that port, the attacker knows that the port is
vulnerable.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 24 of 37
Xmas Tree Scan
This scan gets its name from the fact that all three flag sets that
are sent to the target—
URG, PUSH, and FIN—light up with different colors and flash
on and off like Christmas
tree lights.
Scenario 1
An attacker sends a TCP packet to the remote target with the
URG, PUSH, and FIN flag
set. Similar to the FIN scan, an open port does not respond.
Scenario 2
On the other hand, a closed port responds with an RST packet.
Some hosts send an RST packet in response to a null packet,
regardless of whether the
port is open or not.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 25 of 37
Topic 4: Scanning
Vulnerability Scanning
A vulnerability scan is a computer program that checks target
networks for weaknesses.
Attackers use vulnerability scans to identify all devices on a
network that are open to
known vulnerabilities.
The Nessus tool, located at www.nessus.org, is one of the most
well-known vulnerability
scanners. Nessus begins by probing a range of IP addresses on a
target network to find
active or live hosts. After detecting all known vulnerabilities,
the tool provides a report in
a variety of formats. This report lists services or suggested best
practices that system
administrators can employ to secure the network. Attackers can
use the Nessus tool to
identify vulnerable and weak spots in a target network.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 26 of 37
Topic 4: Scanning
Quiz
Jorge, a black hat hacker, is launching a port-scanning attack on
a Web server with an
IP address of 192.168.195.128.
Question 1: In the packets numbered 9–19, which type of port
scanning is used to
attack the Web server?
a. Xmas tree scan
b. FIN scan
c. SYN stealth scan
Reference: Wireshark product screenshot reprinted with
permission from the Wireshark Foundation.
Correct answer: Option c
Feedback:
If you look at packets 15 and 16, the SYN and SYN+ACK
packets are exchanged by the
attacker and Web server. However, no ACK is sent from the
attacker’s host. Instead, the
attacker sends a new SYN packet to the Web server. This new
SYN packet clearly
indicates that this is an SYN stealth scan.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 27 of 37
Question 2: In the packets numbered 5–15, identify the type of
port scanning used to
attack the Web server.
a. Xmas tree scan
b. NULL scan
c. SYN stealth scan
Reference: Wireshark product screenshot reprinted with
permission from the Wireshark Foundation.
Correct answer: Option b
Feedback:
The SYN packets do not set a TCP flag. “<NONE>” indicates
that no TCP flag is set.
This identifies a NULL scanning attack.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 28 of 37
Topic 4: Scanning
Port Scanning Tool: Nmap
What Is Nmap?
Nmap is a free open source network-mapping utility that
determines which hosts are
available on the network and lists the services offered by these
hosts. With Nmap, a
system administrator can perform many types of port scans.
Popular Nmap switches, options, and techniques include these:
-sT: TCP connect scan
-sS: SYN stealth scan
-sF: FIN scan
-sX: Xmas tree scan
-sN: NULL scan
-sA: ACK scan
-sI: NULL scan
-v: Verbose mode
-p: an instruction specifying the port numbers to scan
-P0 (or Pn): an instruction to not try to ping the IP addresses.
Some firewalls block
ICMP.
-O: an attempt to detect the operating system
Nmap Example
Here is an example of how Nmap can be used to carry out an
SYN stealth scan on a
Web server.
Reference: Nmap product screenshot reprinted with permission
from Gordon Lyon, the developer of Nmap.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 29 of 37
Target
A Web server with an IP address of 192.168.195.128 is running.
Command
The Nmap command: nmap –sS 192.168.195.128 is entered.
Open Ports
An attacker performs an SYN stealth scan on the Web server
using Nmap. The output
shows that ports 80, 135, 139, 443, 445, and 3306 are open.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 30 of 37
Topic 5: Enumeration
What Is Enumeration?
After performing reconnaissance and scanning, if a hacker still
has not identified the
target system, he or she would launch an enumeration attack on
the target as the final
step in the preattack exercise.
During enumeration, hackers employ a set of techniques to
extract technical information
such as user accounts, operating systems, application names,
and network resources of
target systems.
Using Nmap
A Web server with an IP address of 192.168.195.128 is running.
An attacker uses Nmap
to perform an SYN stealth scan on the Web server. The output
shows that ports 80, 135,
139, 443, 445, and 3306 are open.
1. Target
The attacker learns that the Web server running on the target
network has an IP
address of 192.168.195.128.
2. Nmap Tool
The attacker uses Nmap to fingerprint the target Web server.
The attacker enters the
Nmap command Nmap –sS –p T:1-1023 –O –v –Pn
192.168.195.128 to specify that
the TCP stealth scan is performed with a port range of 1 through
1023 on the host IP
192.168.195.128.
3. OS Switch
The attacker enables the -O switch to attempt to determine the
operating system.
4. Ping
The attacker specifies -Pn, which means that ping is not used.
5. OS Details
Note that the operating system is Microsoft Windows XP 2003
or Microsoft XP
Professional SP2.
6. Result
The results show that the host server with an IP address of
192.168.195.128 has
ports 80, 135, 139, 443, and 445 open and uses Microsoft
Windows XP 2003 as its
operating system.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 31 of 37
Reference: Nmap product screenshot reprinted with permission
from Gordon Lyon, the developer of Nmap.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 32 of 37
Using Telnet
Sometimes a hacker does not even need a sophisticated tool like
Nmap. A hacker can
simply use a Telnet command to grab the HTTP header and
identify the type of
operating system or Web server the target uses.
1. Telnet Command
The attacker types the command telnet www.umuc.edu 80 to
connect to the Web
server www.umuc.edu.
2. HEAD
Then, the attacker types HEAD / HTTP/1.0 to send an HTTP
request to the Web
server.
3. Apache X
The telnet output displays the content of the HTTP response
header received from
the UMUC Web server. The HTTP header shows that the type of
Web server is
Apache powered by PHP.
4. Malformed HTTP Packet
Using another telnet connection—telnet www.umuc.edu—the
attacker sends a
malformed HTTP packet to the Web server, which is an invalid
input as HTTP 3.0 is
not available. The attacker sends a malformed packet because
some targets do not
show any useful information if they are given a valid input.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 33 of 37
However, when the target receives a malformed input, it returns
a useful banner of
information. Therefore, attackers do not always need to send a
valid input to a target
to get useful information. They can give an invalid input and
observe an output.
5. Web Server
The invalid malformed input returns some useful information:
Apache Web server,
HTTP 1.1, and some information that is not that useful, such as
Charset.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 34 of 37
Topic 6: Summary
We have come to the end of Module 2. The key concepts
covered in this module are
listed below.
to study the target they
plan to attack. The first three phases of this preattack exercise—
reconnaissance,
scanning, and enumeration—are the most critical.
and active
reconnaissance. During passive reconnaissance, hackers
research open-source
sites and groups and forums, as well as social engineering sites
to gather
nontechnical data about their targets. During active
reconnaissance, hackers use
technical tools such as Whois, NSLookup, the American
Registry for Internet
Numbers (ARIN), Domain Information Groper (DIG), and
Traceroute to find their
targets’ IP addresses.
hackers are able to find out
the domain name, administrative contact, technical contact, and
name servers of
their target. The IP address of the domain name server is not
revealed until hackers
type the NSLookup command and perform a zone transfer.
live systems,
devices, and open ports in their network. There are three types
of scanning: IP, port,
and vulnerability scanning.
network. Port scanning is
used to find accessible Transmission Control Protocol (TCP)
and User Datagram
Protocol (UDP) ports. Vulnerability scanning is used to assess
networks for
vulnerabilities.
Port scans that help
hackers obtain data—TCP connect scans, SYN scans, NULL
scans, ACK scans, FIN
scans, and Xmas tree scans—can be performed as horizontal or
vertical scans.
-mapping utility that
determines which hosts are
available on the network and lists the services those hosts offer.
With Nmap, a
system administrator can perform many types of port scans.
enumeration attack to
identify the operating systems and user accounts of their
targets. This attack is
carried out using a set of techniques to extract technical
information such as user
accounts, operating systems, application names, and network
resources.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 35 of 37
Glossary
Term Definition
Active Reconnaissance During active reconnaissance, hackers
use technical tools
such as Whois, NSLookup, ARIN, DIG, and Traceroute to
find out their targets’ IP addresses.
ACK Scan
ACK scanning is a type of port scan that tells whether ports
on a firewall are filtered or unfiltered. If the target’s firewall
returns an RST, then the port is unfiltered and vulnerable.
American Registry for
Internet Numbers
The American Registry for Internet Numbers (ARIN) is the
IP address registry for North America. ARIN allows Whois-
type searches on its database to locate information on
networks.
Domain Information
Groper
The DIG command allows attackers to search the DNS
database and find the open name servers attached to a
domain.
Domain Name Service The Domain Name Service (DNS)
translates Internet
domain names, such as www.xyz.com, into Internet
Protocol (IP) addresses.
Domain Name System Domain Name System is an Internet
system that associates
domain names with IP addresses, allowing computers to
communicate over the World Wide Web.
Enumeration Enumeration is the third phase in a hacker’s
preattack
exercise. Hackers use enumeration techniques to learn
technical data—operating systems and user accounts—
about a network system.
FIN Scan
The FIN (finish) scan is a type of port scan that is able to
pass through firewalls. Open ports don’t respond, but
closed ports respond with an RST.
Footprinting A method of processing or gathering information
about a
target system.
Internet Control
Message Protocol
The Internet Control Message Protocol (ICMP) integrates
with the Internet Protocol (IP). It reports error, control, and
informational messages between a host and a gateway.
Nmap The Nmap security scanner is used to discover hosts and
services on a network. Based on the network conditions, it
sends packets with specific information to the target host
and evaluates the responses to create a network map.
NSLookup The NSLookup tool queries a DNS server and
performs a
DNS zone transfer to gather data on a targeted network.
NULL Scan
A NULL scan is a type of port scan in which an attacker
sends a data packet without any flag set. If the packet is
open, the target host ignores the packet.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 36 of 37
Term Definition
Passive
Reconnaissance
During passive reconnaissance, hackers research open-
source sites and groups and forums, as well as social
engineering sites, to gather nontechnical data about their
targets. To do this, hackers use social engineering.
Penetration Testers Penetration testers are security analysts that
perform
penetration tests, or pentests, to assess the security of a
network system.
Ping This utility sends an ICMP echo request (ping) to a target
system and waits for a reply (pong).
Port Scanner Port scanners identify open ports and help an
intruder
identify a target system’s weak access point.
Reconnaissance Reconnaissance is the first phase of the
preattack exercise
carried out by hackers to learn about the people who work
at the target company and the target network’s IP address.
Hackers use a process called footprinting and perform two
types of reconnaissance: passive and active.
RFC 793 RFC (Request for Comments) 793 is a document
which
describes the DoD Standard Transmission Control Protocol
(TCP).
Scanning Scanning is the second preattack phase used by
hackers to
discover live systems, devices, and open ports on a
network. Hackers perform three types of scanning: IP, port,
and vulnerability scanning.
Social Engineering Social engineering is a method of gathering
information,
seeking computer access, or committing fraud by using
manipulation and deceit to get people to reveal confidential
information about themselves or an organization.
SYN Scan
In an SYN stealth scan, the attacker sends an initial SYN
packet to the target. If the port is open, the target responds
with an SYN/ACK.
TCP/IP Transmission Control Protocol/Internet Protocol
(TCP/IP) is
the communication protocol suite for the Internet.
TCP Connect Scan
In a TCP connect scan, an attacker tries to establish a
connection on a port of the target system by a three-way
handshake. The attacker knows the target port is open if the
connection is successfully established.
User Datagram Protocol User Datagram Protocol (UDP) is a
network protocol that
allows computers to exchange messages over an Internet
network without the need for special transmission channels
or data paths.
Vulnerability Scanner Vulnerability scanners analyze, classify,
and identify flaws
and vulnerabilities in the targeted system.
Wget Located at www.gnu.org/software/wget, the wget tool is a
popular and freely available Web site downloading tool.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC
640
© UMUC 2012 Page 37 of 37
Term Definition
Whois A tool that allows hackers to query DNS to obtain
registered
information, such as the domain ownership, address,
location, and phone number.
Xmas Tree Scan
To perform the Xmas tree scan, an attacker sends a TCP
packet to the remote target with the URG, PUSH, and FIN
flag set. As in a FIN scan, open ports don’t respond, but
closed ports respond with an RST.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 1 of 34
Contents
Topic 1: Analogy
...............................................................................................
............................................ 2
Analogy: Network Traffic
...............................................................................................
............................ 2
Topic 2: Module Introduction
...............................................................................................
......................... 4
Topic 3: Layer 2 and Switch
Basics.....................................................................................
......................... 5
Layer 2 Technology: Ethernet
...............................................................................................
.................... 5
Layer 2 Switch Operation
...............................................................................................
........................... 7
Topic 4: Layer 2: MAC Attacks
...............................................................................................
.................... 10
MAC Flooding Attacks
...............................................................................................
............................. 10
MAC Spoofing Attacks
...............................................................................................
............................. 12
Activity
...............................................................................................
...................................................... 14
Mitigating MAC Attacks
...............................................................................................
............................ 15
Topic 5: Layer 2: Address Resolution Protocol Exploitation
...................................................................... 16
Address Resolution Protocol
...............................................................................................
.................... 16
ARP Spoofing Attacks
...............................................................................................
.............................. 18
Activity: Try This!
...............................................................................................
...................................... 20
Topic 6: Layer 3: Router Vulnerabilities
...............................................................................................
...... 22
Router Attacks and Vulnerabilities
...............................................................................................
........... 22
Routing Table Modification
...............................................................................................
...................... 23
Preventing Routing Table Modification
...............................................................................................
.... 24
Activity: Routing Updates and MD5 Authentication
................................................................................ 26
Topic 7:
Summary.................................................................................
...................................................... 32
Glossary
...............................................................................................
....................................................... 33
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 2 of 34
Topic 1: Analogy
Analogy: Network Traffic
Switching and Routing Vulnerabilities
CSEC 640 – Module 3
Analogy: Network Traffic
Just as we use stop signs and traffic lights to safely guide
vehicles along roads and highways,
computer networks use their own traffic guidance systems. On a
computer network, traffic is
handled using routers and switches that ensure the secure and
efficient exchange of data.
Consider an analogy comparing vehicle traffic with data traffic.
Managing Network Traffic
Slide 1
Imagine you are driving and you come to an intersection with
four stop signs. It takes a while to
cross because everyone has to take turns, and there can be
confusion.
Now imagine what the traffic would be like if there were an
overpass, where one of the roads
went over the other. That way, no one would have to stop. This
model of an overpass is a
simplified way to think of a switch.
Slide 2
A switch does the same thing as a hub and a bridge, but more
effectively.
A switch lets you add computers to your network and makes
virtual connections between
computers that need to "talk" to each other. As soon as the
computers have finished talking to
each other, the virtual connection is broken. Breaking the
connection right away eliminates
collisions in network traffic.
The only shortcoming of a switch is that it will not keep a
broadcast from tying up the
communication lines. When one computer needs to find the
address of another computer, it
sends out a broadcast over the whole network to find the
address. Each computer in the
network receives the broadcast and “looks” to see if it is the
intended recipient.
The broadcast can occupy the network because none of the other
computers can send a
message while it is taking place. Routers solve this problem.
Slide 3
Routers do everything that a switch does, but they use a
different method to address the
packets of information—they use IP addresses. A router acts
like a post office. It decides the
best route that a packet can take to get to different networks.
A router can divide your network into different subnetworks and
contain a broadcast within a
smaller area so that the whole network does not need to receive
the broadcast. The router
keeps your resources from being tied up with unnecessary
network traffic jams.
This process is like taking a city—that is, your network—and
dividing it into neighborhoods.
When the residents in one locality want to publicize a
neighborhood watch meeting, they can tell
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 3 of 34
the post office to mail fliers only within that neighborhood so
the post office does not waste
resources sending notices to distant areas.
A router can perform exactly this type of role, if it is so
programmed.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 4 of 34
Topic 2: Module Introduction
In the TCP/IP model, the higher layers such as the application
layer, TCP layer, and IP layer are
all based on the Layer 2 (data link layer) technologies.
This module provides a background on Layer 2 technologies,
such as Ethernet, followed by a
look at the operation of Layer 2 switches. The module also
discusses Media Access Control
(MAC) attacks and their mitigation, exploitation of the Address
Resolution Protocol (ARP), and
router (Layer 3) vulnerabilities.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 5 of 34
Topic 3: Layer 2 and Switch Basics
Layer 2 Technology: Ethernet
Ethernet is a group of Layer 2 protocols for local area networks
(LANs). Ethernet is the most
predominant LAN standard. Most often, the term Ethernet is
used to signify IEEE 802.3.
Introduction
The network interface card (NIC) of a host—PC, printer, or
server—is connected to a Layer 2
device, such as a switch or hub. The IEEE 802.3 protocol
specifies how a message is framed
and transmitted on the Layer 1 wire by the NIC.
Like all other hardware in the network, the NIC has a unique
address called a Media Access
Control (MAC) address. MAC addresses are 48-bit-long unique
identifiers written into hardware
devices by their manufacturers. These addresses are expressed
as 12 hexadecimal digits and
used by most Layer 2 technologies including Ethernet. An
example of a MAC address is 5C-26-
0A-35-56-8A.
A user can find the MAC address of a PC by entering the
command ipconfig/all in the Windows
command prompt.
The Ethernet Frame
The Ethernet frame is used to transmit data from a source to a
destination and ranges from 72
to 1,518 bytes in length.
Destination/Source MAC Addresses
The Destination/Source MAC Addresses field specifies the
MAC addresses of the source and
destination hosts. For instance, consider a network with a Host
A PC and a Host B PC. The
MAC addresses of Host A and Host B are 56-34-23-34-9A and
5A-45-56-23-9A, respectively. If
Host A sends a frame to Host B, the source MAC address in the
frame becomes 56-34-23-34-
9A, Host A’s MAC address. The destination MAC address
becomes 5A-45-56-23-9A, or Host
B’s MAC address. A switch routes this frame based on the
source and destination MAC
addresses.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 6 of 34
Type
The Type field indicates the Layer 3 protocol in the Data field.
For instance:
contains an IP packet.
contains an Address
Resolution Protocol (ARP) message.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 7 of 34
Topic 3: Layer 2 and Switch Basics
Layer 2 Switch Operation
Layer 2 devices, such as switches, route an Ethernet frame
based on the source and
destination MAC addresses. A switch relies on a forwarding
table to forward a frame to a
destination MAC address just as a router uses a routing table to
forward an IP packet to a
destination IP address. The forwarding table is called a MAC
address table or a content
addressable memory (CAM) table. This module uses the term
MAC table to refer to the CAM
table.
Initially, the MAC table of a switch is empty; the switch does
not know the MAC address of a
PC, printer, or any other attached device. Consider the
following example: a LAN consists of
Host A with a MAC address of AAAA, Host B with a MAC
address of BBBB, Host C with a MAC
address of CCCC, and a switch.
Note that in the real world, MAC addresses are 48 bits long; the
addresses used here are
shortened to simplify the example. Hosts A, B, and C are
connected to the first, second, and
third Ethernet ports, Fa0/1, Fa0/2, and Fa0/3, respectively.
Assume that the switch’s MAC table
can hold only two entries. In reality, MAC tables have much
larger capacities.
Example
Step 1
Initially, the MAC table is empty. A frame originating from
Host A arrives at the first Ethernet port
on the switch (Fa 0/1). Host A wants to communicate with a
host whose MAC address is BBBB,
the destination address in the frame.
The switch inspects the source MAC address to determine
whether there is already an existing
entry in the table. Since the MAC table is empty, a new entry is
made that records the source
MAC address and the port number. By recording these details in
the MAC table, the switch
specifies where to send a frame when it needs to be sent to the
source MAC address.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 8 of 34
Step 2
Since the switch does not know where the destination MAC
address BBBB is, it simply floods
the frame on all active ports. In other words, the switch sends a
copy of the frame to every port
in the LAN, hoping that the frame will reach the destination
host.
In this example, the switch floods the frame on Fa 0/2 and Fa
0/3. This process is known as
unknown unicast flooding.
Step 3
When Host B, the intended recipient of the frame, receives the
frame, it replies with a response
frame. In this frame, note that the source and destination MAC
addresses are reversed
compared to the original frame that Host A sent.
When the switch receives this frame, it tries once again to
search for a match in its MAC table.
Since there is no match, a new entry is added to the MAC table,
recording the MAC address
BBBB and the port Fa 0/2. In this example, since the MAC table
can hold only two entries, it is
at capacity.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 9 of 34
Step 4
Once the MAC table is full, Host A sends a frame whose source
address is AAAA and
destination address is BBBB. The switch receives the frame and
inspects the destination MAC
address to check for a corresponding entry in the MAC table.
Since the second entry is a match,
the switch forwards the frame to port Fa 0/2 (Host B).
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 10 of 34
Topic 4: Layer 2: MAC Attacks
MAC Flooding Attacks
What Is a MAC Flooding Attack?
When a switch’s MAC table becomes full, the switch begins to
flood frames on all active ports.
In other words, when the switch begins to flood all active ports,
any host on the same LAN can
intercept any other frame regardless of its destination MAC
address.
In a flooding attack, an attacker tries to create a permanently
full MAC table that will force the
switch to flood (broadcast) all traffic on all active ports. The
attack is launched from one of the
ports on a LAN so all communication taking place on that LAN
is visible to the attacker. This
visibility enables the attacker to monitor all frames passed
through the switch and to obtain
useful, sensitive information, including the data in the frame,
the MAC address, and the IP
address of the victim host.
Example: MAC Flooding Attack
Step 1
The attacker generates a continuous set of frames with random
source and destination MAC
addresses using tools such as MACOF, Ettercap, or Yersinia.
Since the MAC table of the switch
has limited storage, it eventually runs out of space and cannot
add new entries.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 11 of 34
Step 2
The victim host tries to communicate with another host.
Step 3
Since there is no corresponding MAC table entry for the
destination host, every frame sent by
the victim host will be flooded to all ports. The attacker can see
all the traffic sent from the victim
host.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 12 of 34
Topic 4: Layer 2: MAC Attacks
MAC Spoofing Attacks
What Is a MAC Spoofing Attack?
In a MAC spoofing attack, the attacker first identifies the MAC
address of a victim host by
launching a MAC flooding attack on a LAN. The attacker then
generates a fake frame by
entering the victim’s MAC address in the source field of the
fake frame. The switch receives the
fake frame from the attacker’s host and updates its MAC table
accordingly.
Example: MAC Spoofing Attack
Step 1
The attacker’s host performs a MAC flooding attack and obtains
useful information about its
neighboring hosts, such as MAC and IP addresses. The attacker
crafts a frame with the source
MAC address BBBB, the MAC address of Host B.
Step 2
Upon receiving the attacker’s frame, the switch accordingly
updates its MAC table with the MAC
address BBBB and its corresponding interface, Fa 0/3, which
points to the attacker.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 13 of 34
Step 3
The victim sends a frame with a destination MAC address of
BBBB. The switch finds a match in
the MAC table and forwards the frame to the attacker’s host
rather than to the intended host,
Host B.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 14 of 34
Topic 4: Layer 2: MAC Attacks
Activity
You will now be presented with a few questions based on Layer
2 and MAC attacks.
Question 1: On what basis do Layer 2 devices such as switches
route Ethernet frames?
a. Layer 2 devices route Ethernet frames based on IP addresses.
b. Layer 2 devices route Ethernet frames based on MAC
addresses.
c. Layer 2 devices route Ethernet frames based on the IP
address table.
Correct answer: Option b
Feedback:
Layer 2 devices such as switches route Ethernet frames based on
the source and destination
MAC addresses. A switch relies on a MAC table to forward a
frame to a destination MAC
address, just as a router uses a routing table to forward an IP
packet to a destination IP
address.
Question 2: Which of the following scenarios describes
unknown unicast flooding?
a. A switch flooding an Ethernet frame on all active ports when
it cannot locate a source MAC
address
b. A switch attempting to make additional entries in a MAC
table that is at capacity
c. A switch flooding an Ethernet frame on all active ports when
it cannot locate a destination
MAC address
d. Ethernet frames being sent without a destination MAC
address
Correct answer: Option c
Feedback:
In unknown unicast flooding, when a switch cannot locate a
particular destination MAC address,
it will simply flood an Ethernet frame on all active ports,
hoping that the frame will reach the
destination host.
Question 3: Which of the following statements describes a MAC
flooding attack?
a. An attacker tries to create a permanently full MAC table that
will force a switch to flood traffic
on all active ports.
b. An attacker attempts to inject fake or misleading MAC
addresses into a MAC table.
c. An attacker generates a fake frame by entering the victim’s
MAC address in the source field
of the fake frame.
Correct answer: Option a
Feedback:
In a MAC flooding attack, an attacker tries to create a
permanently full MAC table that forces the
switch to flood all traffic on all active ports. The attack is
launched from one of the ports on a
LAN so all communication taking place on that LAN is visible
to the attacker. This visibility
enables the attacker to monitor all frames passed through the
switch and obtain useful
information.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 15 of 34
Topic 4: Layer 2: MAC Attacks
Mitigating MAC Attacks
Some common ways to prevent or mitigate MAC flooding and
spoofing attacks include
implementing measures such as port security and unicast flood
protection.
Security
Port security ties a given MAC address to a port by preventing
any MAC addresses other
than the preconfigured ones from showing up on a secure port.
Upon detection of an invalid
MAC address, the switch can be configured to block only the
offending MAC or to simply
shut down the port.
For instance, in a Cisco switch, you can assign a secure MAC
address to a secure port
using the command, (config-if) switchport port-security mac-
address
001E.1345.AE32. If an attacker’s machine sends a frame with a
source MAC address other
than 001E.1345.AE32 to the securely configured port, the
switch will block or shut down the
port.
Port security prevents MAC flooding and spoofing attacks.
A switch floods an incoming frame on all active ports if it
cannot find a corresponding entry
in the MAC table or if the MAC table is full. The unicast flood
protection feature allows a
system administrator to set a limit on the number of unicast
floods. When flood protection
detects unknown unicast floods exceeding the predefined limit,
it sends an alert and shuts
down the port that is generating the floods.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 16 of 34
Topic 5: Layer 2: Address Resolution Protocol Exploitation
Address Resolution Protocol
Address Resolution Protocol (ARP) is a protocol used to find
the MAC address of a host when
the IP address of the host is known.
How Does ARP Work?
Consider an example to see how ARP works.
Assume that Host A, with the IP address 192.168.1.1/24, needs
to send a frame to a destination
host with the IP address of 192.168.1.3/24.
To send the frame, Host A needs to know the MAC address of
the destination host. By
comparing its own IP address with the destination host’s IP
address, Host A knows that the
destination host is part of the same LAN as itself.
Host A sends an Ethernet broadcast frame. Note that the
standard address for Ethernet
broadcasts is FFFF.FFFF.FFFF.
Upon receiving the broadcast frame, the switch floods the frame
on all ports in the LAN, and all
the hosts in the LAN receive this broadcast frame. This
broadcast frame is known as an ARP
request.
Host B and Host C receive the ARP request from Host A. Host
C sends a solicited ARP reply to
Host A. The ARP reply contains Host C’s MAC address and IP
address.
Upon receiving the ARP reply, Host A knows the MAC address
of the host whose corresponding
IP address is 192.168.1.3.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 17 of 34
What Is Gratuitous ARP?
Consider an example to understand Gratuitous ARP.
Sending a Gratuitous ARP means sending an ARP reply when
no ARP request has been made.
Host C sends an unsolicited ARP reply to the broadcast address
FFFF.FFFF.FFFF to tell its
neighboring hosts in the LAN that its MAC address is CCCC.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 18 of 34
Topic 5: Layer 2: Address Resolution Protocol Exploitation
ARP Spoofing Attacks
An ARP spoofing attack, also known as ARP poisoning, enables
an attacker to sniff out all IP
packets sent to the target host. Consider an example of how an
ARP spoofing attack is carried
out.
Step 1
The attack is initiated by a host with the IP address 192.168.1.2.
The attacker’s host machine
sends a fake Gratuitous ARP to Host A. The fake Gratuitous
ARP tells Host A that 192.168.1.3
is tied to the MAC address of BBBB. Note that 192.168.1.3 is
actually tied to Host C, not the
attacker. Upon receiving the ARP request, Host A adds a new
entry to its ARP table, correlating
the MAC address BBBB with the IP address 192.168.1.3.
Step 2
As seen with the frame sent by Host A, all the IP packets
intended for Host C are sent to the
attacker’s MAC address. This is because Host A believes that
Host C’s MAC address is BBBB,
which is actually the attacker’s MAC address.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 19 of 34
Step 3
As soon as the attacker receives the packet from Host A, it
masquerades as Host C by sending
an acknowledgment packet back to Host A.
Step 4
The attacker forwards the packet originally sent by Host A to
Host C. Host C believes that this
packet is from Host A. The attacker has achieved its goal, which
is to intercept and read, or
sniff, the packet originating from Host A.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 20 of 34
Topic 5: Layer 2: Address Resolution Protocol Exploitation
Activity: Try This!
Consider an example of a network with an attacker and two
hosts, as shown here in Diagram A
and Diagram B. After the attacker’s host sends a fake
Gratuitous ARP to Host A in Diagram A,
and Step 1 and Step 2 are completed in Diagram B, which of the
following options would
correctly reflect the values in the switch’s MAC table? Assume
that the MAC table is initially
empty.
Diagram A
Diagram B
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 21 of 34
a.
MAC Address Interface
1. AAAA Fa 0/1
2. BBBB Fa 0/2
b.
MAC Address Interface
1. BBBB Fa 0/2
2. AAAA Fa 0/1
c.
MAC Address Interface
1. BBBB Fa 0/2
2. CCCC Fa 0/3
Correct answer: Option b
Feedback:
The source MAC address of the Gratuitous ARP frame sent to
Host A is BBBB. This frame
originates from the attacker’s host and is forwarded to switch
port Fa0/2. Therefore, the first line
in the MAC table is filled with BBBB as the MAC address and
Fa0/2 as the interface.
When Host A sends an IP packet intended for Host C (Step1 in
Diagram B), the source MAC
address of the frame is AAAA and that frame is sent to switch
port Fa 0/1. As a result, the
second line of the MAC table contains AAAA as the MAC
address and Fa 0/1 as the interface.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 22 of 34
Topic 6: Layer 3: Router Vulnerabilities
Router Attacks and Vulnerabilities
A router is a network device that routes IP packets across
computer networks. Since a router
deals with IP packets, it is a Layer 3 device. When a packet
arrives at a router, the router
inspects the IP header of the packet. Based on the destination
and source IP addresses, the
router decides to which network device it will forward the
packet. Routers are prone to various
types of attacks.
Routing Table Modification
Routing table modification, also known as a rerouting attack, is
a common vulnerability unique
to routers. This attack involves manipulating router updates to
route traffic to unwanted
destinations.
Other Common Attacks
Other common router attacks include:
exploit known vulnerabilities in
running services such as Hypertext Transfer Protocol (HTTP),
Domain Name System
(DNS), and Dynamic Host Configuration Protocol (DHCP), or
through brute force password
guessing. An attacker may also attempt to exploit known
vulnerabilities in the router’s
operating software or protocols.
perform various types of DoS
attacks.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 23 of 34
Topic 6: Layer 3: Router Vulnerabilities
Routing Table Modification
Routers exchange information with each other to build their
own routing tables. Attackers use
this act of exchanging information as an opportunity to
destabilize or damage networks.
Introduction
Dynamic routing protocols such as Routing Information
Protocol (RIP), Open Shortest Path First
(OSPF), and Enhanced Interior Gateway Routing Protocol
(EIGRP) help determine the path of a
packet through a network without having to manually configure
it.
Routers build routing tables by exchanging routing information
with each other. When a packet
arrives at a router, it routes the packet based on this table.
Attackers try to inject bogus entries
into routing tables in an attempt to compromise network
stability. If a routing table is inaccurate,
packets could end up being dropped as they are routed to invalid
destinations. This significantly
decreases the stability of the network.
Example: Routing Table Modification
As seen in this diagram, if a router uses the RIP version 1
routing protocol that does not
implement authentication or is not correctly configured, an
attacker can send false routing
update packets to contaminate the routing table.
Without security measures in place, routers send routing
updates in clear text. This enables an
attacker to masquerade as a trusted neighbor, send a bogus
routing update, and pollute the
routing table.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 24 of 34
Topic 6: Layer 3: Router Vulnerabilities
Preventing Routing Table Modification
Introduction
Network administrators can use routing protocols with
authentication to prevent attacks based
on unauthorized routing changes. Authenticated router updates
ensure that the update
messages come from a legitimate source.
The most commonly used form of authentication for routing
protocol updates is MD5
authentication. This method is used to detect any unauthorized
or false routing messages from
unknown sources. All dynamic routing protocols except RIP
version 1 implement MD5
authentication.
Step 1
Router A uses its routing update along with the preshared key as
an input to the hash function.
Then the hash function produces a keyed hash.
Step 2
Router A sends Router B a packet containing the keyed hash
along with the routing update.
Note that the routing update is clear text.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 25 of 34
Step 3
Router B uses the routing update from Router A as an input to
the hash function and obtains a
keyed hash from the hash function.
Step 4
Router B compares the keyed hash it generated on the routing
update, using the preshared key,
with the keyed hash received from Router A. If the two hash
values match, Router B knows two
things for certain:
(authentication).
not been modified in transit
(integrity).
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 26 of 34
Topic 6: Layer 3: Router Vulnerabilities
Activity: Routing Updates and MD5 Authentication
Introduction
Consider an example of a network that contains two routers:
Router A and Router B. Both
routers are running the dynamic routing protocol RIP version 2.
Network Path Analysis
The diagram shows the routing table of Router B. As seen in the
diagram, the dynamic routing
protocol RIP version 2 is currently running on both routers. RIP
version 2 is an enhanced
version of the RIP version 1 routing protocol. As is the case
with any dynamic routing protocol, a
router needs to send and receive routing updates to and from its
neighboring routers to build a
routing table.
Routing Table Analysis
A routing table contains multiple rows. Each row contains at
least two fields: a destination
address and the name of the interface where the IP packet
should be routed, or the IP address
of another router that will carry the IP packet on its next step
through the network.
For example, consider the routing table of Router B. We can
interpret the line starting with R in
the routing table as “to reach the destination network
172.16.0.0, which is a network behind
Router A, a packet must be forwarded to the interface
10.10.10.1 of Router A.”
To build a routing table, routers must exchange their routing
information with their neighboring
routers. In this example, Router A has only one network,
172.16.0.0/24, attached to itself.
Therefore, when Router A sends its routing update to Router B,
this network address,
172.16.0.0/24, must be included in the update payload.
In addition, when RIP version 2 is configured to support MD5
authentication, a keyed hash (also
called keyed message digest) is also included in Router A’s
routing update, along with the
routing update payload, which is clear text.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 27 of 34
Reference: Cain & Abel product screenshot reprinted with
permission from Massimiliano Montoro, the
developer of Cain & Abel.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 28 of 34
Workspace
Screenshot A
Reference: Wireshark product screenshot reprinted with
permission from the Wireshark Foundation.
Screenshot B
Reference: Wireshark product screenshot reprinted with
permission from the Wireshark Foundation.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 29 of 34
Question 1: Which of these screenshots shows an MD5
authenticated routing update sent by
Router A?
a. Screenshot A
b. Screenshot B
Correct answer: Option b
Feedback:
The routing update in Screenshot B has an Authentication:
Keyed Message Digest field. This
clearly indicates that this update is sent by Router A, which
supports MD5 authentication.
Question 2: The keyed hash or message digest value used in the
routing update is
54 ee c9 71 a1 dbea 33 ba 22 15 fb 2b af 20 8a.
a. True
b. False
Correct answer: Option a
Feedback:
The keyed hash or message digest value used in the routing
update is54 ee c9 71 a1 dbea 33
ba 22 15 fb 2b af 20 8a.In Screenshot B, you can see the
Authentication: Keyed Message
Digest field. In this authentication field, you can easily observe
a long numerical hash value “54
ee c9 71 a1 dbea 33 ba 22 15 fb 2b af 20 8a”. This hash value is
included in the Authentication
Data Trailer field within the Authentication: Keyed Message
Digest field.
Review
Step 1
Once again, consider the example of Router A and Router B,
both of which are running RIP
version 2. A keyed MD5 hash can also be cracked easily if a
system administrator uses a
simple password or preshared key to generate the keyed hash.
To illustrate the point, assume
that the password "flower" was used when configuring routers A
and B for MD5 authentication.
Also, assume that a packet sniffer, Cain & Abel, is being used
to sniff out a routing update
originating from Router A.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 30 of 34
Step 2
In sniffing mode, Cain & Abel sniffs routing updates and
produces an output as shown in this
screenshot. The fields shown include Router, Version, Auth
Type, and Last Hash. The Router
field contains two IP addresses: 10.10.10.1 and 10.10.10.2,
which belong to routers A and B
respectively, as shown previously in the network diagram. A
value of 2 in the Version field
indicates that RIP version 2 is running on both routers. The
value MD5 in the Auth Type field
implies that MD5 authentication is being used for keyed
hashing. Finally, the Last Hash field
shows the actual hash value being used.
Reference: Cain & Abel product screenshot reprinted with
permission from Massimiliano Montoro, the
developer of Cain & Abel.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 31 of 34
Step 3
Cain & Abel is first used in sniffing mode and then as a
password-cracking tool. Applying a
dictionary attack, the intruder can easily identify the password
“flower.”
Reference: Cain & Abel product screenshot reprinted with
permission from Massimiliano Montoro, the
developer of Cain & Abel.
Further Challenges
Measure the performance degradation or average delay time
caused by the MD5 authenticated
routing update with respect to EIGRP, RIP version 2, and OSPF
routing protocols. Which
routing protocol will suffer most from the performance
degradation as the number of routers
participating in routing updates increases?
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 32 of 34
Topic 7: Summary
We have come to the end of Module 3. The key concepts
covered in this module are listed
below.
network (LANs). IEEE 802.3
Ethernet is the most predominant LAN standard.
source and destination IP
addresses. Layer 2 devices, such as switches, route an Ethernet
frame based on the
source and destination MAC addresses.
full MAC table that forces
the switch to flood all traffic on all active ports.
the MAC address of a victim
host by launching a MAC flooding attack on a LAN. The
attacker can then generate a
fake frame by putting the victim’s MAC address in the source
field of the fake frame. The
switch receives the fake frame from the attacker’s host and
updates its MAC table
accordingly.
the MAC address of a host,
given that its IP address is known.
e goal of an ARP spoofing attack is to enable the attacker
to sniff out all IP packets
sent to the target host.
table modification, also
known as a rerouting attack, is a common vulnerability unique
to routers. This attack
involves manipulating router updates to route traffic to
unwanted destinations.
protocol updates is MD5
authentication. This form of authentication is used to detect any
unauthorized or false
routing messages from unknown sources. All dynamic routing
protocols except RIP
version 1 implement MD5 authentication.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 33 of 34
Glossary
Term Definition
Address Resolution
Protocol (ARP)
Address Resolution Protocol (ARP) is a protocol used to
find the MAC address of a host when the IP address of the
host is known.
ARP Spoofing Attack An ARP spoofing attack is also known as
ARP poisoning.
The goal of such an attack is to enable the attacker to sniff
out all IP packets sent to the target host.
Content Addressable
Memory (CAM) Table
A switch relies on a forwarding table to forward a frame to a
destination MAC address. The forwarding table is called a
MAC address table or a content addressable memory
(CAM) table.
Denial of Service (DoS) DoS attacks flood a target site with
large volumes of traffic
using “zombie” servers. This flood of traffic consumes all of
the target site’s network or system resources and denies
access to legitimate users.
Dynamic Host
Configuration Protocol
(DHCP)
DHCP enables servers to distribute Internet Protocol (IP)
addresses and configuration data to clients in a network.
Domain Name System
(DNS)
The DNS translates Internet domain names such as
www.xyz.com into Internet Protocol (IP) addresses.
Enhanced Interior
Gateway Routing
Protocol (EIGRP)
EIGRP is an interior gateway protocol that enables efficient
exchange of routing updates between routers.
Ethernet Ethernet is a group of Layer 2 protocols for local area
network (LANs). IEEE 802.3 Ethernet is the most
predominant LAN standard. Usually, the term Ethernet is
used to signify IEEE 802.3.
Ettercap Ettercap is a network tool for carrying out man-in-the-
middle
attacks on a LAN.
Hypertext Transfer
Protocol (HTTP)
HTTP transmits Web pages to clients.
Media Access Control
(MAC) Address
A network interface card (NIC) has a unique address called
a Media Access Control (MAC) address. MAC addresses
are 48-bit long unique identifiers written into hardware
devices by their manufacturers. These addresses are
expressed as 12 hexadecimal digits and used by most
Layer 2 technologies including Ethernet.
MAC Flooding Attack In a MAC flooding attack, the attacker
creates a
permanently full MAC table that forces the switch to flood all
traffic on all active ports.
MACOF MACOF is a tool that can generate random MAC
addresses
to overload the switch of a network and access data
passing through the switch.
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
CSEC 640
© UMUC 2012 Page 34 of 34
Term Definition
MAC Spoofing Attack In a MAC spoofing attack, the attacker
first finds the MAC
address of a victim host by launching a MAC flooding attack
on a LAN. The attacker can then generate a fake frame by
putting the victim’s MAC address in the source field of the
fake frame. The switch receives the fake frame from the
attacker’s host and updates its MAC table accordingly.
MD5 Authentication The most commonly used form of
authentication for routing
protocol updates is MD5 authentication. This form of
authentication is used to detect any unauthorized or false
routing messages from unknown sources. All dynamic
routing protocols except RIP version 1 implement MD5
authentication.
Network Interface Card
(NIC)
A network interface card is a piece of hardware that is used
to connect a computer to a network.
Open Shortest Path First
(OSPF)
OSPF is a dynamic routing protocol that enables routers to
share routes with other routers.
Port Security Port security ties a given MAC address to a port
by
preventing any MAC addresses other than the
preconfigured ones from showing up on a secure port.
Routing Information
Protocol (RIP)
RIP is a dynamic routing protocol used by local area
homogenous networks to ensure that all hosts in the
network share the same routing path data.
Routing Table
Modification
Routing table modification, also known as a rerouting
attack, is a common vulnerability unique to routers. This
attack involves manipulating router updates to route traffic
to unwanted destinations.
Unicast Flood Protection The unicast flood protection feature
allows a system
administrator to set a limit on the number of unicast floods.
When flood protection detects unknown unicast floods
exceeding the predefined limit, it sends an alert and shuts
down the port that is generating the floods.
Yersinia Yersinia is a network tool designed to exploit
weaknesses in
LAN-based network protocols.
Discuss/describe one or more LAN based attacks (also known as
layer 2 attacks or lower layer attacks) which are not covered in
the Module 3, or share any additional thoughts you may have
on LAN based attacks covered in Module 3
Discuss/describe the port scanning and/or enumeration
techniques (attacks) not covered in Module 2. How can the
attacks you have described be detected and prevented?

More Related Content

Similar to UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prev.docx

61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-studyhomeworkping4
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases AIRCC Publishing Corporation
 
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASESCOMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASESijcsit
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 
Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...
Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...
Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...Boston Institute of Analytics
 
Security protection On banking systems using ethical hacking.
Security protection  On banking systems using  ethical hacking.Security protection  On banking systems using  ethical hacking.
Security protection On banking systems using ethical hacking.Rishabh Gupta
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxyoufanlimboo
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET Journal
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
MSc Dissertation 11058374 Final
MSc Dissertation 11058374 FinalMSc Dissertation 11058374 Final
MSc Dissertation 11058374 FinalJohn Dunne
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical HackingIRJET Journal
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGDrm Kapoor
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typesRishab Gupta
 

Similar to UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prev.docx (20)

61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-study
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases
 
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASESCOMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...
Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...
Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...
 
Security protection On banking systems using ethical hacking.
Security protection  On banking systems using  ethical hacking.Security protection  On banking systems using  ethical hacking.
Security protection On banking systems using ethical hacking.
 
ANS_Ch_05_Handouts.pdf
ANS_Ch_05_Handouts.pdfANS_Ch_05_Handouts.pdf
ANS_Ch_05_Handouts.pdf
 
ANS_Ch_05_Handouts.pdf
ANS_Ch_05_Handouts.pdfANS_Ch_05_Handouts.pdf
ANS_Ch_05_Handouts.pdf
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
MSc Dissertation 11058374 Final
MSc Dissertation 11058374 FinalMSc Dissertation 11058374 Final
MSc Dissertation 11058374 Final
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Ethical Hacking: A Comprehensive Cheatsheet
Ethical Hacking: A Comprehensive CheatsheetEthical Hacking: A Comprehensive Cheatsheet
Ethical Hacking: A Comprehensive Cheatsheet
 
Ethical hacking1
Ethical hacking1Ethical hacking1
Ethical hacking1
 

More from willcoxjanay

Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docxCritical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docxwillcoxjanay
 
Critical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docxCritical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docxwillcoxjanay
 
Critical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docxCritical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docxwillcoxjanay
 
Critical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docxCritical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docxwillcoxjanay
 
Critical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docxCritical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docxwillcoxjanay
 
Critical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docxCritical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docxwillcoxjanay
 
Critical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docxCritical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docxwillcoxjanay
 
Critical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docxCritical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docxwillcoxjanay
 
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docxCritical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docxwillcoxjanay
 
Critical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docxCritical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docxwillcoxjanay
 
Critical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docxCritical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docxwillcoxjanay
 
Critical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docxCritical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docxwillcoxjanay
 
Critical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docxCritical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docxwillcoxjanay
 
Critical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docxCritical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docxwillcoxjanay
 
Critical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docxCritical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docxwillcoxjanay
 
Critical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docxCritical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docxwillcoxjanay
 
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docxCritical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docxwillcoxjanay
 
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docxCriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docxwillcoxjanay
 
Critical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docxCritical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docxwillcoxjanay
 
Critical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docxCritical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docxwillcoxjanay
 

More from willcoxjanay (20)

Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docxCritical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
 
Critical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docxCritical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docx
 
Critical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docxCritical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docx
 
Critical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docxCritical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docx
 
Critical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docxCritical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docx
 
Critical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docxCritical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docx
 
Critical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docxCritical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docx
 
Critical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docxCritical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docx
 
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docxCritical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
 
Critical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docxCritical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docx
 
Critical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docxCritical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docx
 
Critical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docxCritical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docx
 
Critical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docxCritical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docx
 
Critical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docxCritical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docx
 
Critical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docxCritical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docx
 
Critical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docxCritical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docx
 
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docxCritical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
 
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docxCriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
 
Critical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docxCritical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docx
 
Critical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docxCritical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docx
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prev.docx

  • 1. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 1 of 37 Contents Topic 1: Analogy ............................................................................................... ............................... 2 Reconnaissance Strategies ............................................................................................... .......... 2 Topic 2: Module Introduction ............................................................................................... ............ 3 Topic 3: Reconnaissance .................................................................................. ............. ................. 4 What is Reconnaissance? ............................................................................................... ............ 4 Passive Reconnaissance ............................................................................................... .............. 5 Active Reconnaissance ............................................................................................... ................. 7
  • 2. Activity: Active Reconnaissance ............................................................................................... ... 9 Topic 4: Scanning ............................................................................................... ........................... 17 What Is Scanning? ............................................................................................... ...................... 17 IP Scanning ............................................................................................... ................................. 18 Port Scanning................................................................................. ............................................ 19 Types of Port Scans ............................................................................................... .................... 20 Vulnerability Scanning ............................................................................................... ................ 25 Quiz ............................................................................................... ............................................. 26 Port Scanning Tool: Nmap ............................................................................................... .......... 28 Topic 5: Enumeration ............................................................................................... ..................... 30 What Is Enumeration? ............................................................................................... ................ 30
  • 3. Topic 6: Summary................................................................................. ......................................... 34 Glossary ............................................................................................... .......................................... 35 UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 2 of 37 Topic 1: Analogy Reconnaissance Strategies The Preattack Phases CSEC 640 – Module 2 Reconnaissance Strategies Soldiers often carry out reconnaissance missions in which their only task is to collect facts about an enemy target. Doing so helps them prepare an effective, customized attack strategy. Similarly, hackers trying to break into protected networks research their targets to find ways to carry out an effective attack. Here is an analogy comparing
  • 4. military preattack strategies to the preattack exercises carried out by professional hackers and penetration testers, or “pentesters.” Step 1 Military officers conduct scouting to collect information about their targets before an attack. Their goals are to make sure the enemy does not see them coming and to collect as much data as possible about the enemy, so that the attack is effective. Step 2 Reconnaissance is another word for scouting. The U.S. Army's reconnaissance and surveillance course trains military personnel in surveillance and target acquisition. In reconnaissance, the armed forces research a target to plan the exact point of contact with that target. Step 3 Reconnaissance, however, is not limited to warfare. It is a tactic used by ordinary people in everyday life. Hackers, for instance, who want to attack a particular network or computer system, perform reconnaissance to learn more about the target. Just as soldiers might monitor enemy troops from a distance as part of a reconnaissance exercise, hackers might observe activity on a target Web site as part of their reconnaissance. The goal remains the same for both: to study the target and move in precisely, not randomly.
  • 5. Step 4 During reconnaissance, hackers use social engineering techniques and technical tools to learn about the target systems’ owners, domain names, and IP addresses, among other necessary details. Hackers need enough data to ensure that they are in and out of a system long before the victim has noticed that important data has been compromised. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 3 of 37 Topic 2: Module Introduction Before hackers or penetration testers launch an attack against an organization’s network, they conduct a preattack exercise. This exercise helps them gather information—technical and nontechnical—about the system that they are targeting. This information helps attackers decide what type of attack will be most effective against their targets.
  • 6. The first three phases of this preattack exercise are the most critical and are called reconnaissance, scanning, and enumeration. Understanding how these phases work together gives a clear indication of how attackers progress in their study of a target and launch an attack. This module covers active and passive reconnaissance techniques, types of scanning, scanning tools and techniques, and enumeration. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 4 of 37 Topic 3: Reconnaissance What Is Reconnaissance? Reconnaissance Reconnaissance is the first step in engineering an effective attack. Footprinting Attackers or penetration testers use a process called footprinting during the reconnaissance phase. This process helps them to gather
  • 7. preliminary information about the network they are targeting. The target network can belong to an individual, a corporation, a government, or any public institution. Data Collection Though hackers aim to collect as much information as possible, the data they collect during this phase is not enough to draw an accurate map of the target network. Target At the end of the reconnaissance phase, attackers manage to learn about the people they are targeting and the target network’s IP address. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 5 of 37 Topic 3: Reconnaissance Passive Reconnaissance There are two types of reconnaissance: passive and active. Passive reconnaissance presents a low level of risk for hackers
  • 8. because they spy on victims who are unaware that their moves are being watched. Through passive reconnaissance, hackers gather data from sources that are freely available to the public, such as open source sites, groups and forums, social engineering sites, vulnerability research sites, and people-search sites. Open Source Sites To use open source sites to gather data about a target, the attacker: 1. first looks for a target Web site 2. downloads the target Web site 3. uses various tools to analyze it One of the most popular Web site downloading tools is the freely available wget located at www.gnu.org/software/wget. Here the wget recursively retrieves the Web pages at www.umuc.edu. The “-r” option of wget enables recursive mirroring of all pages on the site. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 6 of 37
  • 9. Groups and Forums Many users share information about the vulnerabilities of their systems and ask for solutions or answer queries posed by other users. Hackers use such forums to gather information about target systems and find vulnerabilities in the systems. Social Engineering Techniques Social engineering is the art of tricking people into giving out classified data. A common social engineering technique that hackers use is joining chat rooms their targets might use. In these chat rooms, hackers are able to start conversations through which they can extract valuable data from targets. Vulnerability Research Sites Hackers visit vulnerability research Web sites such as www.securityfocus.com or www.hackerstorm.com for the latest attack tools and techniques. People-Search Sites To find information such as names of a system administrator, security engineer, or network engineer of a target company, hackers visit people- search Web sites such as people.yahoo.com or www.peoplefinder.com. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC
  • 10. 640 © UMUC 2012 Page 7 of 37 Topic 3: Reconnaissance Active Reconnaissance In active reconnaissance, attackers use technical tools to probe the target network for information. For example, attackers may try to connect to different port numbers on the target IP to see which ones are open. In this way, they determine which software/servers are running on that IP—some of which might be vulnerable. Data about a network’s IP addresses is usually found through the Domain Name System (DNS). Hackers use several technical tools to query the target network’s DNS to discover this data. During this phase, hackers use technical tools to learn more about their target. www.arin.net) Whois (www.whois.net) Hackers interrogate the Internet domain name administration system to locate the domain name of a target system. Whois allows hackers to query
  • 11. DNS and obtain registered information, such as the domain ownership, address, location, and phone number. NSLookup The NSLookup tool allows anyone to query a DNS server for information such as host names and IP addresses. Using the NSLookup tool, a hacker can perform a DNS zone transfer and gather a great deal of information about the target. ARIN (www.arin.net) The American Registry for Internet Numbers (ARIN) is one of five worldwide regional Internet registries (RIR). ARIN oversees public IP addresses for North America. Hackers query ARIN to identify the range of IP addresses their target network uses. ARIN allows hackers to: -type searches on its database to locate information about network- related handles, subnet masks, and related points of contact (POC). y an IP address to help identify how IP addresses are assigned. For example, a hacker can enter the Web server IP address of a target network into the ARIN Web site, www.arin.net, using Whois to identify the number and the range of IP addresses in use.
  • 12. DIG Like the NSLookup tool, Domain Information Groper (DIG) is a flexible tool that performs DNS lookups. DIG interrogates DNS name servers and displays the responses that it receives from the name servers. The responses include data such as host names, IP addresses, and e-mail exchanges. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 8 of 37 Traceroute Hackers use the Traceroute tool to discover the routes or paths, devices or routers, and Internet service providers (ISPs) that a data packet must cross to reach its target host. Traceroute is based on the Internet Control Message Protocol (ICMP). This is important because ICMP packets are blocked by many network devices such as firewalls. By using Traceroute or other ICMP-based tools, hackers are able to easily discover firewalls in the data path. DNS and Zone Transfer A DNS server is responsible for resolving host names to
  • 13. corresponding IP addresses. When a host name—for example, www.umuc.edu—is typed into a Web browser, the DNS server converts it into an IP address. This is because the systems running on the Internet recognize only IP addresses. Every DNS server has a name space, known as a zone. A zone can contain one or more domain names. There are two types of DNS servers organized in a hierarchy: a master DNS server and a secondary DNS server. When a DNS zone has to be updated, the update is executed within a primary zone on a master server. The updated records in the database of the master server are then transferred to the secondary DNS server. This kind of transfer is called a zone transfer. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 9 of 37 Topic 3: Reconnaissance Activity: Active Reconnaissance
  • 14. Introduction Krista Le Saad is a popular gray hat hacker known for her reconnaissance skills. She has been given an assignment to find out the IP address of the administrative system managing an online bookstore called www.largobooks.com. The assignment has been delegated to Krista by a penetration tester, Sean Stasis. Sean works for a leading IT security firm and needs to find the loopholes and vulnerabilities in www.largobooks.com's network. He often outsources such assignments to young aspiring hackers. Sean's team is ready to begin fixing patches on all vulnerabilities once he gets the results from Krista's inquiries. Krista has been given 24 hours to hack into www.largobooks.com. To meet that deadline, Krista needs your help. In this activity, you will be asked to perform three active reconnaissance steps. You will use tools, commands, and Web sites, such as FindRecord and NSLookup, to locate the DNS and IP address and perform a zone transfer. Workspace To help Krista find the IP address of www.largobooks.com’s administrative system, perform the following three steps: DNS.
  • 15. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 10 of 37 Step 1 To query the DNS of www.largobooks.com, Krista uses a tool similar to Whois called FindRecord. On typing www.largobooks.com in the Record Locator field and searching the site, she received the following output. NOTE: If you use the Whois tool on a Linux OS, type the command: whois largobooks.com. Domain name: largobooks.com Registrant Contact: n/a Alan Carswell () Fax:
  • 16. 7704 Morningside Dr. NW Washington, DC 20012 AF Administrative Contact: n/a Alan Carswell ([email protected]) +1.2028297638 Fax: +1.5555555555 7704 Morningside Dr. NW Washington, DC 20012 AF Technical Contact: n/a Alan Carswell ([email protected]) +1.2028297638 Fax: +1.5555555555 7704 Morningside Dr. NW Washington, DC 20012 AF Status: Locked Name Servers: dns1.registrar-servers.com dns2.registrar-servers.com dns3.registrar-servers.com dns4.registrar-servers.com Creation date: 02 Jul 20XX 11:10:00 Expiration date: 02 Jul 20XX 06:10:00
  • 17. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 11 of 37 Analyze the output and answer the following question. Step 2 Question: Which of the following information is available in the FindRecord output? a. Technical contact b. Administrative contact c. Domain name d. IP address of DNS e. DNS Correct answers: Options a, b, c, and e Feedback for the correct answer: That’s correct. The technical contact data, the administrative contact, the domain name, and the DNS data showing all the name servers are available in the output. Feedback for the incorrect or partially correct answer: Not quite. The IP address of the DNS is not available in these results. The domain name, administrative contact, technical contact, and name servers are clearly mentioned. Step 3 Krista can find the IP address of the DNS server by using a tool
  • 18. such as NSLookup. In this activity, use the IPAddress Locator to help her. Activity The following output was generated on typing largobooks.com in the IPAddress Locator. Server: adedcns01.us.umuc.edu Address: 131.171.34.194 Non-authoritative answer: Name: largobooks.com Address: 199.58.184.57 The IP address of www.largobooks.com DNS is 199.58.184.57. Note: You can execute NSlookup commands at the Windows command prompt. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 12 of 37 Step 4 In this step, you perform a zone transfer. The following commands can be executed at
  • 19. the Windows command prompt. Activity 1 On typing nslookup and pressing the Enter key, the following output is displayed. The IP address is displayed. Note: Once nslookup is typed at the Windows command prompt, the prompt will change to “>.” This indicates that NSLookup is in the execution mode. Activity 2 On typing server 8.8.8.8 and pressing the Enter key, the following output is displayed. The default DNS has been set as Google DNS. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 13 of 37
  • 20. Activity 3 On typing set type=any and pressing the Enter key, the following output is displayed. This command specifies all types of data. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 14 of 37 Activity 4 On typing largobooks.com and pressing the Enter key, the following output is displayed. Finally, the zone transfer request is sent from your host to largobooks.com’s DNS server. Going beyond the initial search results, the DNS server loads the zone information and replies with either a partial or full transfer of the zone to your host.
  • 21. View the command you have typed in this step and the corresponding results. Then, answer the question. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 15 of 37 Question 2: Which of the following data is available in the screenshot? a. Web server IP address b. FTP server list c. Domain name servers list d. Mail exchange servers list Correct answers: Options a, c, and d Feedback: In the output you cannot see the FTP server list. You can see the Web server's IP address—199.58.184.57, the list of www.largobooks.com's domain name servers, and the mail exchange server's list, which is indicated by the "MX" that stands for mail
  • 22. exchange. This list specifies mail servers for a domain. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 16 of 37 Review A job well done! You’ve helped Krista locate the IP address and learned to work with DNS query tools. While the technical tools are no doubt important and widely used, nontechnical methods of reconnaissance are equally important to hackers. Nontechnical data is gathered by exploiting human psychology—logic persuasion, need- based persuasion, and reciprocation-based social engineering. The infamous hacker Kevin Mitnick was not only tech-savvy but also a master of social engineering. Social Engineering Social engineering gives the age-old art of lies and manipulation a technological twist. Using Web-based technologies, such as chat rooms and online forums, attackers persuade or trick strangers into giving up personal information
  • 23. such as access codes, log-in names, and passwords. Since face-to-face interactions are not required in online conversations, social engineers can make up an identity to cheat innocent victims they meet online. This is a social approach to getting confidential data, as opposed to cracking system codes through technological means. Further Challenges Visit the Web site www.whois.net and carry out this exercise in real time using NSLookup to query the DNS. Then visit www.arin.net and enter the Web address you found in this activity. Compare the results you get from these sites. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 17 of 37 Topic 4: Scanning What Is Scanning? In the scanning phase, hackers use different techniques to discover live systems,
  • 24. devices, and open ports or services. There are various types of scanning, such as IP scanning, port scanning, and vulnerability scanning. Sometimes, it is not easy to differentiate between the three preattack phases— reconnaissance, scanning, and enumeration. Many of the same information-gathering techniques are used across these phases. For example, port scanning can be considered a part of reconnaissance or a part of the scanning phase. Types of Scanning IP scanning is a technique that can be used to identify the live systems connected to a network segment or IP range. Port scanning is the process of scanning a host to determine which Transmission Control Protocol ports (TCPs) or User Datagram Protocol ports (UDPs) are accessible. Vulnerability scanning is the process of automatically assessing networks or applications for vulnerabilities.
  • 25. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 18 of 37 Topic 4: Scanning IP Scanning IP scanning is used by system administrators to check the connectivity of the hosts on the network. The most popular tool for IP scanning is ping. Ping sends an ICMP request to test which target hosts are accessible across an IP network. Target hosts that are live return ICMP reply messages. A technique such as ping sweep is used to identify a range of IP addresses or live port numbers of the target system. Based on best security practices, system administrators typically configure the firewalls or border-routers to block ICMP requests originating from outside the network. An IP scanner can be used by an inside attacker to draw a network map.
  • 26. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 19 of 37 Topic 4: Scanning Port Scanning Meet Philippe Posen, a freelance security analyst. He’s hard at work performing port scans. Philippe uses port scanning to search a network host for open ports. The ports can be considered open if their related service is available in the host network. After successful port scanning, Philippe will be able to identify which services are provided by the host network. There are two different kinds of port scans: horizontal and vertical scans. Horizontal and Vertical Scans UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC
  • 27. 640 © UMUC 2012 Page 20 of 37 Topic 4: Scanning Types of Port Scans Hackers can perform several different types of horizontal or vertical scans. The type of scan a hacker uses is based on the type of data the hacker wants. The types of scans include the TCP connect scan, SYN stealth scan, NULL scan, ACK scan, FIN scan, and Xmas tree scan. TCP Connect Scan Connecting via a TCP is the simplest scan technique. Scenario 1 An attacker tries to establish a connection on a port of the target system by a three-way handshake. The attacker knows the target port is open if the connection is successfully established. Scenario 2 The attacker knows that the target port is closed if the packet with the reset flag (RST flag) is sent by the target host.
  • 28. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 21 of 37 SYN Stealth Scan This scan is called a half-open scan because a full TCP connection is never established. Scenario 1 An attacker generates an initial SYN packet to the target. If the port is open, the target responds with an SYN/ACK. The attacker does not respond back with the ACK in this case. Therefore, a full TCP connection is never established. This is why this type of scan is sometimes called a half- open scan. Scenario 2 Some firewalls only log established connections. Since no connection is established in an SYN stealth scan, it can pass through the firewall without being logged. However, an
  • 29. SYN stealth scan is not completely stealthy as many firewalls and IDSs detect SYN scans. Scenario 3 If the port is closed, the attacker receives an RST from the target. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 22 of 37 NULL Scan From the attacker’s perspective, the NULL scan is not always reliable since not all hosts comply with RFC 793. Scenario 1 An attacker sends a data packet without any flag set. No real TCP/IP packet exists without any flag set. If the port is open, the target host ignores the packet and does not respond. Scenario 2
  • 30. According to RFC 793, when a packet is sent to a port with no flag set, the target responds with an RST packet if the port is closed. Some hosts send an RST packet in response to a null packet, regardless of whether the port is open or not. That’s why the NULL scan is considered unreliable. FIN Scan Just like a NULL scan, the FIN scan is not reliable. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 23 of 37 Scenario 1 An attacker sends an FIN (finish) packet to the target. The FIN packet is able to bypass firewalls because firewalls try to avoid any errors with legitimate FIN packets. The target simply ignores the FIN packet if the port is open. Scenario 2 The target responds with an RST if the port is closed. Some hosts will send an RST packet regardless of the port being open or closed, making the
  • 31. FIN scan unreliable. ACK Scan Attackers use ACK scanning to learn which firewall ports are filtered and which are unfiltered. Scenario 1 An attacker sends an ACK packet to the target port’s firewall. If there is no response or an “ICMP destination unreachable” message is returned, then the port is considered to be filtered. This means that the firewall is stateful. It knows that no internal host has initiated any SYN packet that matches the ACK packet sent by the attacker. Scenario 2 If the target’s firewall returns an RST, then the port is unfiltered. Because there is no firewall rule for that port, the attacker knows that the port is vulnerable. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640
  • 32. © UMUC 2012 Page 24 of 37 Xmas Tree Scan This scan gets its name from the fact that all three flag sets that are sent to the target— URG, PUSH, and FIN—light up with different colors and flash on and off like Christmas tree lights. Scenario 1 An attacker sends a TCP packet to the remote target with the URG, PUSH, and FIN flag set. Similar to the FIN scan, an open port does not respond. Scenario 2 On the other hand, a closed port responds with an RST packet. Some hosts send an RST packet in response to a null packet, regardless of whether the port is open or not. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 25 of 37
  • 33. Topic 4: Scanning Vulnerability Scanning A vulnerability scan is a computer program that checks target networks for weaknesses. Attackers use vulnerability scans to identify all devices on a network that are open to known vulnerabilities. The Nessus tool, located at www.nessus.org, is one of the most well-known vulnerability scanners. Nessus begins by probing a range of IP addresses on a target network to find active or live hosts. After detecting all known vulnerabilities, the tool provides a report in a variety of formats. This report lists services or suggested best practices that system administrators can employ to secure the network. Attackers can use the Nessus tool to identify vulnerable and weak spots in a target network. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 26 of 37 Topic 4: Scanning
  • 34. Quiz Jorge, a black hat hacker, is launching a port-scanning attack on a Web server with an IP address of 192.168.195.128. Question 1: In the packets numbered 9–19, which type of port scanning is used to attack the Web server? a. Xmas tree scan b. FIN scan c. SYN stealth scan Reference: Wireshark product screenshot reprinted with permission from the Wireshark Foundation. Correct answer: Option c Feedback: If you look at packets 15 and 16, the SYN and SYN+ACK packets are exchanged by the attacker and Web server. However, no ACK is sent from the attacker’s host. Instead, the attacker sends a new SYN packet to the Web server. This new SYN packet clearly indicates that this is an SYN stealth scan.
  • 35. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 27 of 37 Question 2: In the packets numbered 5–15, identify the type of port scanning used to attack the Web server. a. Xmas tree scan b. NULL scan c. SYN stealth scan Reference: Wireshark product screenshot reprinted with permission from the Wireshark Foundation. Correct answer: Option b Feedback: The SYN packets do not set a TCP flag. “<NONE>” indicates that no TCP flag is set. This identifies a NULL scanning attack. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640
  • 36. © UMUC 2012 Page 28 of 37 Topic 4: Scanning Port Scanning Tool: Nmap What Is Nmap? Nmap is a free open source network-mapping utility that determines which hosts are available on the network and lists the services offered by these hosts. With Nmap, a system administrator can perform many types of port scans. Popular Nmap switches, options, and techniques include these: -sT: TCP connect scan -sS: SYN stealth scan -sF: FIN scan -sX: Xmas tree scan -sN: NULL scan -sA: ACK scan -sI: NULL scan -v: Verbose mode -p: an instruction specifying the port numbers to scan -P0 (or Pn): an instruction to not try to ping the IP addresses. Some firewalls block ICMP. -O: an attempt to detect the operating system Nmap Example Here is an example of how Nmap can be used to carry out an SYN stealth scan on a Web server.
  • 37. Reference: Nmap product screenshot reprinted with permission from Gordon Lyon, the developer of Nmap. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 29 of 37 Target A Web server with an IP address of 192.168.195.128 is running. Command The Nmap command: nmap –sS 192.168.195.128 is entered. Open Ports An attacker performs an SYN stealth scan on the Web server using Nmap. The output shows that ports 80, 135, 139, 443, 445, and 3306 are open. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640
  • 38. © UMUC 2012 Page 30 of 37 Topic 5: Enumeration What Is Enumeration? After performing reconnaissance and scanning, if a hacker still has not identified the target system, he or she would launch an enumeration attack on the target as the final step in the preattack exercise. During enumeration, hackers employ a set of techniques to extract technical information such as user accounts, operating systems, application names, and network resources of target systems. Using Nmap A Web server with an IP address of 192.168.195.128 is running. An attacker uses Nmap to perform an SYN stealth scan on the Web server. The output shows that ports 80, 135, 139, 443, 445, and 3306 are open. 1. Target The attacker learns that the Web server running on the target network has an IP address of 192.168.195.128. 2. Nmap Tool The attacker uses Nmap to fingerprint the target Web server.
  • 39. The attacker enters the Nmap command Nmap –sS –p T:1-1023 –O –v –Pn 192.168.195.128 to specify that the TCP stealth scan is performed with a port range of 1 through 1023 on the host IP 192.168.195.128. 3. OS Switch The attacker enables the -O switch to attempt to determine the operating system. 4. Ping The attacker specifies -Pn, which means that ping is not used. 5. OS Details Note that the operating system is Microsoft Windows XP 2003 or Microsoft XP Professional SP2. 6. Result The results show that the host server with an IP address of 192.168.195.128 has ports 80, 135, 139, 443, and 445 open and uses Microsoft Windows XP 2003 as its operating system.
  • 40. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 31 of 37 Reference: Nmap product screenshot reprinted with permission from Gordon Lyon, the developer of Nmap. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 32 of 37 Using Telnet Sometimes a hacker does not even need a sophisticated tool like Nmap. A hacker can simply use a Telnet command to grab the HTTP header and identify the type of operating system or Web server the target uses. 1. Telnet Command
  • 41. The attacker types the command telnet www.umuc.edu 80 to connect to the Web server www.umuc.edu. 2. HEAD Then, the attacker types HEAD / HTTP/1.0 to send an HTTP request to the Web server. 3. Apache X The telnet output displays the content of the HTTP response header received from the UMUC Web server. The HTTP header shows that the type of Web server is Apache powered by PHP. 4. Malformed HTTP Packet Using another telnet connection—telnet www.umuc.edu—the attacker sends a malformed HTTP packet to the Web server, which is an invalid input as HTTP 3.0 is not available. The attacker sends a malformed packet because some targets do not show any useful information if they are given a valid input. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
  • 42. Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 33 of 37 However, when the target receives a malformed input, it returns a useful banner of information. Therefore, attackers do not always need to send a valid input to a target to get useful information. They can give an invalid input and observe an output. 5. Web Server The invalid malformed input returns some useful information: Apache Web server, HTTP 1.1, and some information that is not that useful, such as Charset. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 34 of 37 Topic 6: Summary
  • 43. We have come to the end of Module 2. The key concepts covered in this module are listed below. to study the target they plan to attack. The first three phases of this preattack exercise— reconnaissance, scanning, and enumeration—are the most critical. and active reconnaissance. During passive reconnaissance, hackers research open-source sites and groups and forums, as well as social engineering sites to gather nontechnical data about their targets. During active reconnaissance, hackers use technical tools such as Whois, NSLookup, the American Registry for Internet Numbers (ARIN), Domain Information Groper (DIG), and Traceroute to find their targets’ IP addresses. hackers are able to find out the domain name, administrative contact, technical contact, and name servers of their target. The IP address of the domain name server is not revealed until hackers type the NSLookup command and perform a zone transfer.
  • 44. live systems, devices, and open ports in their network. There are three types of scanning: IP, port, and vulnerability scanning. network. Port scanning is used to find accessible Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports. Vulnerability scanning is used to assess networks for vulnerabilities. Port scans that help hackers obtain data—TCP connect scans, SYN scans, NULL scans, ACK scans, FIN scans, and Xmas tree scans—can be performed as horizontal or vertical scans. -mapping utility that determines which hosts are available on the network and lists the services those hosts offer. With Nmap, a system administrator can perform many types of port scans.
  • 45. enumeration attack to identify the operating systems and user accounts of their targets. This attack is carried out using a set of techniques to extract technical information such as user accounts, operating systems, application names, and network resources. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 35 of 37 Glossary Term Definition Active Reconnaissance During active reconnaissance, hackers use technical tools such as Whois, NSLookup, ARIN, DIG, and Traceroute to find out their targets’ IP addresses. ACK Scan
  • 46. ACK scanning is a type of port scan that tells whether ports on a firewall are filtered or unfiltered. If the target’s firewall returns an RST, then the port is unfiltered and vulnerable. American Registry for Internet Numbers The American Registry for Internet Numbers (ARIN) is the IP address registry for North America. ARIN allows Whois- type searches on its database to locate information on networks. Domain Information Groper The DIG command allows attackers to search the DNS database and find the open name servers attached to a domain. Domain Name Service The Domain Name Service (DNS) translates Internet domain names, such as www.xyz.com, into Internet Protocol (IP) addresses. Domain Name System Domain Name System is an Internet system that associates domain names with IP addresses, allowing computers to communicate over the World Wide Web. Enumeration Enumeration is the third phase in a hacker’s preattack exercise. Hackers use enumeration techniques to learn technical data—operating systems and user accounts— about a network system.
  • 47. FIN Scan The FIN (finish) scan is a type of port scan that is able to pass through firewalls. Open ports don’t respond, but closed ports respond with an RST. Footprinting A method of processing or gathering information about a target system. Internet Control Message Protocol The Internet Control Message Protocol (ICMP) integrates with the Internet Protocol (IP). It reports error, control, and informational messages between a host and a gateway. Nmap The Nmap security scanner is used to discover hosts and services on a network. Based on the network conditions, it sends packets with specific information to the target host and evaluates the responses to create a network map. NSLookup The NSLookup tool queries a DNS server and performs a DNS zone transfer to gather data on a targeted network. NULL Scan A NULL scan is a type of port scan in which an attacker sends a data packet without any flag set. If the packet is open, the target host ignores the packet.
  • 48. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 36 of 37 Term Definition Passive Reconnaissance During passive reconnaissance, hackers research open- source sites and groups and forums, as well as social engineering sites, to gather nontechnical data about their targets. To do this, hackers use social engineering. Penetration Testers Penetration testers are security analysts that perform penetration tests, or pentests, to assess the security of a network system. Ping This utility sends an ICMP echo request (ping) to a target system and waits for a reply (pong). Port Scanner Port scanners identify open ports and help an intruder identify a target system’s weak access point. Reconnaissance Reconnaissance is the first phase of the preattack exercise carried out by hackers to learn about the people who work at the target company and the target network’s IP address. Hackers use a process called footprinting and perform two types of reconnaissance: passive and active.
  • 49. RFC 793 RFC (Request for Comments) 793 is a document which describes the DoD Standard Transmission Control Protocol (TCP). Scanning Scanning is the second preattack phase used by hackers to discover live systems, devices, and open ports on a network. Hackers perform three types of scanning: IP, port, and vulnerability scanning. Social Engineering Social engineering is a method of gathering information, seeking computer access, or committing fraud by using manipulation and deceit to get people to reveal confidential information about themselves or an organization. SYN Scan In an SYN stealth scan, the attacker sends an initial SYN packet to the target. If the port is open, the target responds with an SYN/ACK. TCP/IP Transmission Control Protocol/Internet Protocol (TCP/IP) is the communication protocol suite for the Internet. TCP Connect Scan In a TCP connect scan, an attacker tries to establish a connection on a port of the target system by a three-way handshake. The attacker knows the target port is open if the connection is successfully established.
  • 50. User Datagram Protocol User Datagram Protocol (UDP) is a network protocol that allows computers to exchange messages over an Internet network without the need for special transmission channels or data paths. Vulnerability Scanner Vulnerability scanners analyze, classify, and identify flaws and vulnerabilities in the targeted system. Wget Located at www.gnu.org/software/wget, the wget tool is a popular and freely available Web site downloading tool. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 37 of 37 Term Definition Whois A tool that allows hackers to query DNS to obtain registered information, such as the domain ownership, address, location, and phone number. Xmas Tree Scan To perform the Xmas tree scan, an attacker sends a TCP packet to the remote target with the URG, PUSH, and FIN
  • 51. flag set. As in a FIN scan, open ports don’t respond, but closed ports respond with an RST. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 1 of 34 Contents Topic 1: Analogy ............................................................................................... ............................................ 2 Analogy: Network Traffic ............................................................................................... ............................ 2 Topic 2: Module Introduction ............................................................................................... ......................... 4 Topic 3: Layer 2 and Switch Basics..................................................................................... ......................... 5 Layer 2 Technology: Ethernet ............................................................................................... .................... 5 Layer 2 Switch Operation ............................................................................................... ........................... 7
  • 52. Topic 4: Layer 2: MAC Attacks ............................................................................................... .................... 10 MAC Flooding Attacks ............................................................................................... ............................. 10 MAC Spoofing Attacks ............................................................................................... ............................. 12 Activity ............................................................................................... ...................................................... 14 Mitigating MAC Attacks ............................................................................................... ............................ 15 Topic 5: Layer 2: Address Resolution Protocol Exploitation ...................................................................... 16 Address Resolution Protocol ............................................................................................... .................... 16 ARP Spoofing Attacks ............................................................................................... .............................. 18 Activity: Try This! ............................................................................................... ...................................... 20 Topic 6: Layer 3: Router Vulnerabilities ............................................................................................... ...... 22 Router Attacks and Vulnerabilities ............................................................................................... ........... 22 Routing Table Modification
  • 53. ............................................................................................... ...................... 23 Preventing Routing Table Modification ............................................................................................... .... 24 Activity: Routing Updates and MD5 Authentication ................................................................................ 26 Topic 7: Summary................................................................................. ...................................................... 32 Glossary ............................................................................................... ....................................................... 33 UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 2 of 34 Topic 1: Analogy Analogy: Network Traffic Switching and Routing Vulnerabilities CSEC 640 – Module 3 Analogy: Network Traffic Just as we use stop signs and traffic lights to safely guide
  • 54. vehicles along roads and highways, computer networks use their own traffic guidance systems. On a computer network, traffic is handled using routers and switches that ensure the secure and efficient exchange of data. Consider an analogy comparing vehicle traffic with data traffic. Managing Network Traffic Slide 1 Imagine you are driving and you come to an intersection with four stop signs. It takes a while to cross because everyone has to take turns, and there can be confusion. Now imagine what the traffic would be like if there were an overpass, where one of the roads went over the other. That way, no one would have to stop. This model of an overpass is a simplified way to think of a switch. Slide 2 A switch does the same thing as a hub and a bridge, but more effectively. A switch lets you add computers to your network and makes virtual connections between computers that need to "talk" to each other. As soon as the computers have finished talking to each other, the virtual connection is broken. Breaking the connection right away eliminates collisions in network traffic. The only shortcoming of a switch is that it will not keep a broadcast from tying up the communication lines. When one computer needs to find the
  • 55. address of another computer, it sends out a broadcast over the whole network to find the address. Each computer in the network receives the broadcast and “looks” to see if it is the intended recipient. The broadcast can occupy the network because none of the other computers can send a message while it is taking place. Routers solve this problem. Slide 3 Routers do everything that a switch does, but they use a different method to address the packets of information—they use IP addresses. A router acts like a post office. It decides the best route that a packet can take to get to different networks. A router can divide your network into different subnetworks and contain a broadcast within a smaller area so that the whole network does not need to receive the broadcast. The router keeps your resources from being tied up with unnecessary network traffic jams. This process is like taking a city—that is, your network—and dividing it into neighborhoods. When the residents in one locality want to publicize a neighborhood watch meeting, they can tell UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640
  • 56. © UMUC 2012 Page 3 of 34 the post office to mail fliers only within that neighborhood so the post office does not waste resources sending notices to distant areas. A router can perform exactly this type of role, if it is so programmed. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 4 of 34 Topic 2: Module Introduction In the TCP/IP model, the higher layers such as the application layer, TCP layer, and IP layer are all based on the Layer 2 (data link layer) technologies. This module provides a background on Layer 2 technologies, such as Ethernet, followed by a look at the operation of Layer 2 switches. The module also discusses Media Access Control (MAC) attacks and their mitigation, exploitation of the Address Resolution Protocol (ARP), and router (Layer 3) vulnerabilities.
  • 57. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 5 of 34 Topic 3: Layer 2 and Switch Basics Layer 2 Technology: Ethernet Ethernet is a group of Layer 2 protocols for local area networks (LANs). Ethernet is the most predominant LAN standard. Most often, the term Ethernet is used to signify IEEE 802.3. Introduction The network interface card (NIC) of a host—PC, printer, or server—is connected to a Layer 2 device, such as a switch or hub. The IEEE 802.3 protocol specifies how a message is framed and transmitted on the Layer 1 wire by the NIC. Like all other hardware in the network, the NIC has a unique address called a Media Access Control (MAC) address. MAC addresses are 48-bit-long unique identifiers written into hardware devices by their manufacturers. These addresses are expressed as 12 hexadecimal digits and used by most Layer 2 technologies including Ethernet. An example of a MAC address is 5C-26- 0A-35-56-8A. A user can find the MAC address of a PC by entering the command ipconfig/all in the Windows
  • 58. command prompt. The Ethernet Frame The Ethernet frame is used to transmit data from a source to a destination and ranges from 72 to 1,518 bytes in length. Destination/Source MAC Addresses The Destination/Source MAC Addresses field specifies the MAC addresses of the source and destination hosts. For instance, consider a network with a Host A PC and a Host B PC. The MAC addresses of Host A and Host B are 56-34-23-34-9A and 5A-45-56-23-9A, respectively. If Host A sends a frame to Host B, the source MAC address in the frame becomes 56-34-23-34- 9A, Host A’s MAC address. The destination MAC address becomes 5A-45-56-23-9A, or Host B’s MAC address. A switch routes this frame based on the source and destination MAC addresses. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 6 of 34 Type
  • 59. The Type field indicates the Layer 3 protocol in the Data field. For instance: contains an IP packet. contains an Address Resolution Protocol (ARP) message. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 7 of 34 Topic 3: Layer 2 and Switch Basics Layer 2 Switch Operation Layer 2 devices, such as switches, route an Ethernet frame based on the source and destination MAC addresses. A switch relies on a forwarding table to forward a frame to a destination MAC address just as a router uses a routing table to forward an IP packet to a destination IP address. The forwarding table is called a MAC address table or a content addressable memory (CAM) table. This module uses the term MAC table to refer to the CAM table.
  • 60. Initially, the MAC table of a switch is empty; the switch does not know the MAC address of a PC, printer, or any other attached device. Consider the following example: a LAN consists of Host A with a MAC address of AAAA, Host B with a MAC address of BBBB, Host C with a MAC address of CCCC, and a switch. Note that in the real world, MAC addresses are 48 bits long; the addresses used here are shortened to simplify the example. Hosts A, B, and C are connected to the first, second, and third Ethernet ports, Fa0/1, Fa0/2, and Fa0/3, respectively. Assume that the switch’s MAC table can hold only two entries. In reality, MAC tables have much larger capacities. Example Step 1 Initially, the MAC table is empty. A frame originating from Host A arrives at the first Ethernet port on the switch (Fa 0/1). Host A wants to communicate with a host whose MAC address is BBBB, the destination address in the frame. The switch inspects the source MAC address to determine whether there is already an existing entry in the table. Since the MAC table is empty, a new entry is made that records the source MAC address and the port number. By recording these details in the MAC table, the switch specifies where to send a frame when it needs to be sent to the source MAC address.
  • 61. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 8 of 34 Step 2 Since the switch does not know where the destination MAC address BBBB is, it simply floods the frame on all active ports. In other words, the switch sends a copy of the frame to every port in the LAN, hoping that the frame will reach the destination host. In this example, the switch floods the frame on Fa 0/2 and Fa 0/3. This process is known as unknown unicast flooding. Step 3 When Host B, the intended recipient of the frame, receives the frame, it replies with a response frame. In this frame, note that the source and destination MAC addresses are reversed compared to the original frame that Host A sent. When the switch receives this frame, it tries once again to search for a match in its MAC table.
  • 62. Since there is no match, a new entry is added to the MAC table, recording the MAC address BBBB and the port Fa 0/2. In this example, since the MAC table can hold only two entries, it is at capacity. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 9 of 34 Step 4 Once the MAC table is full, Host A sends a frame whose source address is AAAA and destination address is BBBB. The switch receives the frame and inspects the destination MAC address to check for a corresponding entry in the MAC table. Since the second entry is a match, the switch forwards the frame to port Fa 0/2 (Host B). UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing
  • 63. CSEC 640 © UMUC 2012 Page 10 of 34 Topic 4: Layer 2: MAC Attacks MAC Flooding Attacks What Is a MAC Flooding Attack? When a switch’s MAC table becomes full, the switch begins to flood frames on all active ports. In other words, when the switch begins to flood all active ports, any host on the same LAN can intercept any other frame regardless of its destination MAC address. In a flooding attack, an attacker tries to create a permanently full MAC table that will force the switch to flood (broadcast) all traffic on all active ports. The attack is launched from one of the ports on a LAN so all communication taking place on that LAN is visible to the attacker. This visibility enables the attacker to monitor all frames passed through the switch and to obtain useful, sensitive information, including the data in the frame, the MAC address, and the IP address of the victim host. Example: MAC Flooding Attack Step 1 The attacker generates a continuous set of frames with random source and destination MAC addresses using tools such as MACOF, Ettercap, or Yersinia. Since the MAC table of the switch
  • 64. has limited storage, it eventually runs out of space and cannot add new entries. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 11 of 34 Step 2 The victim host tries to communicate with another host. Step 3 Since there is no corresponding MAC table entry for the destination host, every frame sent by the victim host will be flooded to all ports. The attacker can see all the traffic sent from the victim host. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion
  • 65. Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 12 of 34 Topic 4: Layer 2: MAC Attacks MAC Spoofing Attacks What Is a MAC Spoofing Attack? In a MAC spoofing attack, the attacker first identifies the MAC address of a victim host by launching a MAC flooding attack on a LAN. The attacker then generates a fake frame by entering the victim’s MAC address in the source field of the fake frame. The switch receives the fake frame from the attacker’s host and updates its MAC table accordingly. Example: MAC Spoofing Attack Step 1 The attacker’s host performs a MAC flooding attack and obtains useful information about its neighboring hosts, such as MAC and IP addresses. The attacker crafts a frame with the source MAC address BBBB, the MAC address of Host B. Step 2 Upon receiving the attacker’s frame, the switch accordingly updates its MAC table with the MAC
  • 66. address BBBB and its corresponding interface, Fa 0/3, which points to the attacker. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 13 of 34 Step 3 The victim sends a frame with a destination MAC address of BBBB. The switch finds a match in the MAC table and forwards the frame to the attacker’s host rather than to the intended host, Host B. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 14 of 34 Topic 4: Layer 2: MAC Attacks
  • 67. Activity You will now be presented with a few questions based on Layer 2 and MAC attacks. Question 1: On what basis do Layer 2 devices such as switches route Ethernet frames? a. Layer 2 devices route Ethernet frames based on IP addresses. b. Layer 2 devices route Ethernet frames based on MAC addresses. c. Layer 2 devices route Ethernet frames based on the IP address table. Correct answer: Option b Feedback: Layer 2 devices such as switches route Ethernet frames based on the source and destination MAC addresses. A switch relies on a MAC table to forward a frame to a destination MAC address, just as a router uses a routing table to forward an IP packet to a destination IP address. Question 2: Which of the following scenarios describes unknown unicast flooding? a. A switch flooding an Ethernet frame on all active ports when it cannot locate a source MAC address b. A switch attempting to make additional entries in a MAC table that is at capacity c. A switch flooding an Ethernet frame on all active ports when it cannot locate a destination
  • 68. MAC address d. Ethernet frames being sent without a destination MAC address Correct answer: Option c Feedback: In unknown unicast flooding, when a switch cannot locate a particular destination MAC address, it will simply flood an Ethernet frame on all active ports, hoping that the frame will reach the destination host. Question 3: Which of the following statements describes a MAC flooding attack? a. An attacker tries to create a permanently full MAC table that will force a switch to flood traffic on all active ports. b. An attacker attempts to inject fake or misleading MAC addresses into a MAC table. c. An attacker generates a fake frame by entering the victim’s MAC address in the source field of the fake frame. Correct answer: Option a Feedback: In a MAC flooding attack, an attacker tries to create a permanently full MAC table that forces the switch to flood all traffic on all active ports. The attack is launched from one of the ports on a LAN so all communication taking place on that LAN is visible to the attacker. This visibility enables the attacker to monitor all frames passed through the
  • 69. switch and obtain useful information. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 15 of 34 Topic 4: Layer 2: MAC Attacks Mitigating MAC Attacks Some common ways to prevent or mitigate MAC flooding and spoofing attacks include implementing measures such as port security and unicast flood protection. Security Port security ties a given MAC address to a port by preventing any MAC addresses other than the preconfigured ones from showing up on a secure port. Upon detection of an invalid MAC address, the switch can be configured to block only the offending MAC or to simply shut down the port. For instance, in a Cisco switch, you can assign a secure MAC address to a secure port
  • 70. using the command, (config-if) switchport port-security mac- address 001E.1345.AE32. If an attacker’s machine sends a frame with a source MAC address other than 001E.1345.AE32 to the securely configured port, the switch will block or shut down the port. Port security prevents MAC flooding and spoofing attacks. A switch floods an incoming frame on all active ports if it cannot find a corresponding entry in the MAC table or if the MAC table is full. The unicast flood protection feature allows a system administrator to set a limit on the number of unicast floods. When flood protection detects unknown unicast floods exceeding the predefined limit, it sends an alert and shuts down the port that is generating the floods. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 16 of 34 Topic 5: Layer 2: Address Resolution Protocol Exploitation
  • 71. Address Resolution Protocol Address Resolution Protocol (ARP) is a protocol used to find the MAC address of a host when the IP address of the host is known. How Does ARP Work? Consider an example to see how ARP works. Assume that Host A, with the IP address 192.168.1.1/24, needs to send a frame to a destination host with the IP address of 192.168.1.3/24. To send the frame, Host A needs to know the MAC address of the destination host. By comparing its own IP address with the destination host’s IP address, Host A knows that the destination host is part of the same LAN as itself. Host A sends an Ethernet broadcast frame. Note that the standard address for Ethernet broadcasts is FFFF.FFFF.FFFF. Upon receiving the broadcast frame, the switch floods the frame on all ports in the LAN, and all the hosts in the LAN receive this broadcast frame. This broadcast frame is known as an ARP request. Host B and Host C receive the ARP request from Host A. Host C sends a solicited ARP reply to Host A. The ARP reply contains Host C’s MAC address and IP address.
  • 72. Upon receiving the ARP reply, Host A knows the MAC address of the host whose corresponding IP address is 192.168.1.3. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 17 of 34 What Is Gratuitous ARP? Consider an example to understand Gratuitous ARP. Sending a Gratuitous ARP means sending an ARP reply when no ARP request has been made. Host C sends an unsolicited ARP reply to the broadcast address FFFF.FFFF.FFFF to tell its neighboring hosts in the LAN that its MAC address is CCCC. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 18 of 34
  • 73. Topic 5: Layer 2: Address Resolution Protocol Exploitation ARP Spoofing Attacks An ARP spoofing attack, also known as ARP poisoning, enables an attacker to sniff out all IP packets sent to the target host. Consider an example of how an ARP spoofing attack is carried out. Step 1 The attack is initiated by a host with the IP address 192.168.1.2. The attacker’s host machine sends a fake Gratuitous ARP to Host A. The fake Gratuitous ARP tells Host A that 192.168.1.3 is tied to the MAC address of BBBB. Note that 192.168.1.3 is actually tied to Host C, not the attacker. Upon receiving the ARP request, Host A adds a new entry to its ARP table, correlating the MAC address BBBB with the IP address 192.168.1.3. Step 2 As seen with the frame sent by Host A, all the IP packets intended for Host C are sent to the attacker’s MAC address. This is because Host A believes that Host C’s MAC address is BBBB, which is actually the attacker’s MAC address.
  • 74. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 19 of 34 Step 3 As soon as the attacker receives the packet from Host A, it masquerades as Host C by sending an acknowledgment packet back to Host A. Step 4 The attacker forwards the packet originally sent by Host A to Host C. Host C believes that this packet is from Host A. The attacker has achieved its goal, which is to intercept and read, or sniff, the packet originating from Host A. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 20 of 34
  • 75. Topic 5: Layer 2: Address Resolution Protocol Exploitation Activity: Try This! Consider an example of a network with an attacker and two hosts, as shown here in Diagram A and Diagram B. After the attacker’s host sends a fake Gratuitous ARP to Host A in Diagram A, and Step 1 and Step 2 are completed in Diagram B, which of the following options would correctly reflect the values in the switch’s MAC table? Assume that the MAC table is initially empty. Diagram A Diagram B UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 21 of 34 a. MAC Address Interface
  • 76. 1. AAAA Fa 0/1 2. BBBB Fa 0/2 b. MAC Address Interface 1. BBBB Fa 0/2 2. AAAA Fa 0/1 c. MAC Address Interface 1. BBBB Fa 0/2 2. CCCC Fa 0/3 Correct answer: Option b Feedback: The source MAC address of the Gratuitous ARP frame sent to Host A is BBBB. This frame originates from the attacker’s host and is forwarded to switch port Fa0/2. Therefore, the first line in the MAC table is filled with BBBB as the MAC address and Fa0/2 as the interface. When Host A sends an IP packet intended for Host C (Step1 in Diagram B), the source MAC address of the frame is AAAA and that frame is sent to switch port Fa 0/1. As a result, the second line of the MAC table contains AAAA as the MAC address and Fa 0/1 as the interface.
  • 77. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 22 of 34 Topic 6: Layer 3: Router Vulnerabilities Router Attacks and Vulnerabilities A router is a network device that routes IP packets across computer networks. Since a router deals with IP packets, it is a Layer 3 device. When a packet arrives at a router, the router inspects the IP header of the packet. Based on the destination and source IP addresses, the router decides to which network device it will forward the packet. Routers are prone to various types of attacks. Routing Table Modification Routing table modification, also known as a rerouting attack, is a common vulnerability unique to routers. This attack involves manipulating router updates to route traffic to unwanted destinations. Other Common Attacks Other common router attacks include:
  • 78. exploit known vulnerabilities in running services such as Hypertext Transfer Protocol (HTTP), Domain Name System (DNS), and Dynamic Host Configuration Protocol (DHCP), or through brute force password guessing. An attacker may also attempt to exploit known vulnerabilities in the router’s operating software or protocols. perform various types of DoS attacks. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 23 of 34 Topic 6: Layer 3: Router Vulnerabilities Routing Table Modification Routers exchange information with each other to build their own routing tables. Attackers use this act of exchanging information as an opportunity to destabilize or damage networks.
  • 79. Introduction Dynamic routing protocols such as Routing Information Protocol (RIP), Open Shortest Path First (OSPF), and Enhanced Interior Gateway Routing Protocol (EIGRP) help determine the path of a packet through a network without having to manually configure it. Routers build routing tables by exchanging routing information with each other. When a packet arrives at a router, it routes the packet based on this table. Attackers try to inject bogus entries into routing tables in an attempt to compromise network stability. If a routing table is inaccurate, packets could end up being dropped as they are routed to invalid destinations. This significantly decreases the stability of the network. Example: Routing Table Modification As seen in this diagram, if a router uses the RIP version 1 routing protocol that does not implement authentication or is not correctly configured, an attacker can send false routing update packets to contaminate the routing table. Without security measures in place, routers send routing updates in clear text. This enables an attacker to masquerade as a trusted neighbor, send a bogus routing update, and pollute the routing table.
  • 80. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 24 of 34 Topic 6: Layer 3: Router Vulnerabilities Preventing Routing Table Modification Introduction Network administrators can use routing protocols with authentication to prevent attacks based on unauthorized routing changes. Authenticated router updates ensure that the update messages come from a legitimate source. The most commonly used form of authentication for routing protocol updates is MD5 authentication. This method is used to detect any unauthorized or false routing messages from unknown sources. All dynamic routing protocols except RIP version 1 implement MD5 authentication. Step 1 Router A uses its routing update along with the preshared key as an input to the hash function. Then the hash function produces a keyed hash.
  • 81. Step 2 Router A sends Router B a packet containing the keyed hash along with the routing update. Note that the routing update is clear text. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 25 of 34 Step 3 Router B uses the routing update from Router A as an input to the hash function and obtains a keyed hash from the hash function. Step 4 Router B compares the keyed hash it generated on the routing update, using the preshared key, with the keyed hash received from Router A. If the two hash values match, Router B knows two things for certain: (authentication). not been modified in transit (integrity).
  • 82. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 26 of 34 Topic 6: Layer 3: Router Vulnerabilities Activity: Routing Updates and MD5 Authentication Introduction Consider an example of a network that contains two routers: Router A and Router B. Both routers are running the dynamic routing protocol RIP version 2. Network Path Analysis The diagram shows the routing table of Router B. As seen in the diagram, the dynamic routing protocol RIP version 2 is currently running on both routers. RIP version 2 is an enhanced version of the RIP version 1 routing protocol. As is the case with any dynamic routing protocol, a router needs to send and receive routing updates to and from its neighboring routers to build a routing table.
  • 83. Routing Table Analysis A routing table contains multiple rows. Each row contains at least two fields: a destination address and the name of the interface where the IP packet should be routed, or the IP address of another router that will carry the IP packet on its next step through the network. For example, consider the routing table of Router B. We can interpret the line starting with R in the routing table as “to reach the destination network 172.16.0.0, which is a network behind Router A, a packet must be forwarded to the interface 10.10.10.1 of Router A.” To build a routing table, routers must exchange their routing information with their neighboring routers. In this example, Router A has only one network, 172.16.0.0/24, attached to itself. Therefore, when Router A sends its routing update to Router B, this network address, 172.16.0.0/24, must be included in the update payload. In addition, when RIP version 2 is configured to support MD5 authentication, a keyed hash (also called keyed message digest) is also included in Router A’s routing update, along with the routing update payload, which is clear text. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640
  • 84. © UMUC 2012 Page 27 of 34 Reference: Cain & Abel product screenshot reprinted with permission from Massimiliano Montoro, the developer of Cain & Abel. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 28 of 34 Workspace Screenshot A Reference: Wireshark product screenshot reprinted with permission from the Wireshark Foundation. Screenshot B Reference: Wireshark product screenshot reprinted with permission from the Wireshark Foundation.
  • 85. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 29 of 34 Question 1: Which of these screenshots shows an MD5 authenticated routing update sent by Router A? a. Screenshot A b. Screenshot B Correct answer: Option b Feedback: The routing update in Screenshot B has an Authentication: Keyed Message Digest field. This clearly indicates that this update is sent by Router A, which supports MD5 authentication. Question 2: The keyed hash or message digest value used in the routing update is 54 ee c9 71 a1 dbea 33 ba 22 15 fb 2b af 20 8a. a. True b. False Correct answer: Option a Feedback: The keyed hash or message digest value used in the routing update is54 ee c9 71 a1 dbea 33 ba 22 15 fb 2b af 20 8a.In Screenshot B, you can see the
  • 86. Authentication: Keyed Message Digest field. In this authentication field, you can easily observe a long numerical hash value “54 ee c9 71 a1 dbea 33 ba 22 15 fb 2b af 20 8a”. This hash value is included in the Authentication Data Trailer field within the Authentication: Keyed Message Digest field. Review Step 1 Once again, consider the example of Router A and Router B, both of which are running RIP version 2. A keyed MD5 hash can also be cracked easily if a system administrator uses a simple password or preshared key to generate the keyed hash. To illustrate the point, assume that the password "flower" was used when configuring routers A and B for MD5 authentication. Also, assume that a packet sniffer, Cain & Abel, is being used to sniff out a routing update originating from Router A. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 30 of 34 Step 2
  • 87. In sniffing mode, Cain & Abel sniffs routing updates and produces an output as shown in this screenshot. The fields shown include Router, Version, Auth Type, and Last Hash. The Router field contains two IP addresses: 10.10.10.1 and 10.10.10.2, which belong to routers A and B respectively, as shown previously in the network diagram. A value of 2 in the Version field indicates that RIP version 2 is running on both routers. The value MD5 in the Auth Type field implies that MD5 authentication is being used for keyed hashing. Finally, the Last Hash field shows the actual hash value being used. Reference: Cain & Abel product screenshot reprinted with permission from Massimiliano Montoro, the developer of Cain & Abel. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 31 of 34 Step 3 Cain & Abel is first used in sniffing mode and then as a password-cracking tool. Applying a dictionary attack, the intruder can easily identify the password
  • 88. “flower.” Reference: Cain & Abel product screenshot reprinted with permission from Massimiliano Montoro, the developer of Cain & Abel. Further Challenges Measure the performance degradation or average delay time caused by the MD5 authenticated routing update with respect to EIGRP, RIP version 2, and OSPF routing protocols. Which routing protocol will suffer most from the performance degradation as the number of routers participating in routing updates increases? UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 32 of 34 Topic 7: Summary We have come to the end of Module 3. The key concepts
  • 89. covered in this module are listed below. network (LANs). IEEE 802.3 Ethernet is the most predominant LAN standard. source and destination IP addresses. Layer 2 devices, such as switches, route an Ethernet frame based on the source and destination MAC addresses. full MAC table that forces the switch to flood all traffic on all active ports. the MAC address of a victim host by launching a MAC flooding attack on a LAN. The attacker can then generate a fake frame by putting the victim’s MAC address in the source field of the fake frame. The switch receives the fake frame from the attacker’s host and updates its MAC table accordingly. the MAC address of a host, given that its IP address is known.
  • 90. e goal of an ARP spoofing attack is to enable the attacker to sniff out all IP packets sent to the target host. table modification, also known as a rerouting attack, is a common vulnerability unique to routers. This attack involves manipulating router updates to route traffic to unwanted destinations. protocol updates is MD5 authentication. This form of authentication is used to detect any unauthorized or false routing messages from unknown sources. All dynamic routing protocols except RIP version 1 implement MD5 authentication. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 33 of 34 Glossary
  • 91. Term Definition Address Resolution Protocol (ARP) Address Resolution Protocol (ARP) is a protocol used to find the MAC address of a host when the IP address of the host is known. ARP Spoofing Attack An ARP spoofing attack is also known as ARP poisoning. The goal of such an attack is to enable the attacker to sniff out all IP packets sent to the target host. Content Addressable Memory (CAM) Table A switch relies on a forwarding table to forward a frame to a destination MAC address. The forwarding table is called a MAC address table or a content addressable memory (CAM) table. Denial of Service (DoS) DoS attacks flood a target site with large volumes of traffic using “zombie” servers. This flood of traffic consumes all of the target site’s network or system resources and denies access to legitimate users. Dynamic Host Configuration Protocol (DHCP) DHCP enables servers to distribute Internet Protocol (IP) addresses and configuration data to clients in a network.
  • 92. Domain Name System (DNS) The DNS translates Internet domain names such as www.xyz.com into Internet Protocol (IP) addresses. Enhanced Interior Gateway Routing Protocol (EIGRP) EIGRP is an interior gateway protocol that enables efficient exchange of routing updates between routers. Ethernet Ethernet is a group of Layer 2 protocols for local area network (LANs). IEEE 802.3 Ethernet is the most predominant LAN standard. Usually, the term Ethernet is used to signify IEEE 802.3. Ettercap Ettercap is a network tool for carrying out man-in-the- middle attacks on a LAN. Hypertext Transfer Protocol (HTTP) HTTP transmits Web pages to clients. Media Access Control (MAC) Address A network interface card (NIC) has a unique address called a Media Access Control (MAC) address. MAC addresses are 48-bit long unique identifiers written into hardware devices by their manufacturers. These addresses are
  • 93. expressed as 12 hexadecimal digits and used by most Layer 2 technologies including Ethernet. MAC Flooding Attack In a MAC flooding attack, the attacker creates a permanently full MAC table that forces the switch to flood all traffic on all active ports. MACOF MACOF is a tool that can generate random MAC addresses to overload the switch of a network and access data passing through the switch. UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing CSEC 640 © UMUC 2012 Page 34 of 34 Term Definition MAC Spoofing Attack In a MAC spoofing attack, the attacker first finds the MAC address of a victim host by launching a MAC flooding attack on a LAN. The attacker can then generate a fake frame by putting the victim’s MAC address in the source field of the fake frame. The switch receives the fake frame from the attacker’s host and updates its MAC table accordingly. MD5 Authentication The most commonly used form of authentication for routing protocol updates is MD5 authentication. This form of authentication is used to detect any unauthorized or false
  • 94. routing messages from unknown sources. All dynamic routing protocols except RIP version 1 implement MD5 authentication. Network Interface Card (NIC) A network interface card is a piece of hardware that is used to connect a computer to a network. Open Shortest Path First (OSPF) OSPF is a dynamic routing protocol that enables routers to share routes with other routers. Port Security Port security ties a given MAC address to a port by preventing any MAC addresses other than the preconfigured ones from showing up on a secure port. Routing Information Protocol (RIP) RIP is a dynamic routing protocol used by local area homogenous networks to ensure that all hosts in the network share the same routing path data. Routing Table Modification Routing table modification, also known as a rerouting attack, is a common vulnerability unique to routers. This attack involves manipulating router updates to route traffic to unwanted destinations.
  • 95. Unicast Flood Protection The unicast flood protection feature allows a system administrator to set a limit on the number of unicast floods. When flood protection detects unknown unicast floods exceeding the predefined limit, it sends an alert and shuts down the port that is generating the floods. Yersinia Yersinia is a network tool designed to exploit weaknesses in LAN-based network protocols. Discuss/describe one or more LAN based attacks (also known as layer 2 attacks or lower layer attacks) which are not covered in the Module 3, or share any additional thoughts you may have on LAN based attacks covered in Module 3 Discuss/describe the port scanning and/or enumeration techniques (attacks) not covered in Module 2. How can the attacks you have described be detected and prevented?