networking network attacks
play

Networking & Network Attacks Engineering Secure Software Last - PowerPoint PPT Presentation

Networking & Network Attacks Engineering Secure Software Last Revised: August 28, 2020 SWEN-331: Engineering Secure Software Benjamin S Meyers 1 Why Do We Study Networks? Networks scans are the most prevalent method of understanding


  1. Networking & Network Attacks Engineering Secure Software Last Revised: August 28, 2020 SWEN-331: Engineering Secure Software Benjamin S Meyers 1

  2. Why Do We Study Networks? Networks scans are the most prevalent method of ● understanding an environment, with the intent to use that information to run exploits To understand how to protect your system, you have to ● understand how the system works! Note: In a future lecture, we’ll learn about MITRE ATT&CK, a ● taxonomy of tactics/techniques for general pentesting knowledge Discovery: The adversary is trying to figure out your environment ○ SWEN-331: Engineering Secure Software Benjamin S Meyers 2

  3. How Do Computers Communicate? The 7 layers of the classic OSI model Source: https://www.electronicdesign.com/unused/article/21800810/whats-the-difference-between-the-osi-sevenlayer-network-model-and-tcpip SWEN-331: Engineering Secure Software Benjamin S Meyers 3

  4. OSI Model: Physical Layer Responsible for transmission of unstructured raw data ● between physical device and transmission medium Converts digital data to electrical/radio/optical signals ○ Defines characteristics of voltage levels, data transmission ● rates, physical connectors (pin layouts, signal frequency) Defines specifications for Bluetooth, Ethernet, and USB ● standards Controlled Area Network (CAN) ● Jaguar speed controllers in FIRST Robotics ○ SWEN-331: Engineering Secure Software Benjamin S Meyers 4

  5. OSI Model: DataLink Layer Defines protocols for establishing/terminating physical ● connections and controls how data flows between physically connected devices Two sublayers ● Medium Access Control (MAC) -- controls hardware responsible ○ for interaction with wired/optical/wireless transmission mediums Error control (e.g. collisions) ■ MAC addresses for individual network interfaces ■ Logical Link Control (LLC) -- interface between MAC and OSI ○ Network Layer SWEN-331: Engineering Secure Software Benjamin S Meyers 5

  6. OSI Model: Network Layer Responsible for transferring packets between nodes in ● different networks Routing packets through intermediate nodes ● IPv4 (32bit) and IPv6 (128bit) ○ Path determination ○ IP communication is connectionless (no response necessary) ● SWEN-331: Engineering Secure Software Benjamin S Meyers 6

  7. OSI Model: Transport Layer Responsible for quality of service and data integrity ● e.g. packet loss, bit rate, throughput, transmission delay, ○ availability, jitter Transmission rates (e.g. phone vs. server) ● Packet splitting (segmentation & desegmentation) ● Retransmission ● User Datagram Protocol (UDP) is faster than TCP, but not as ● reliable e.g. post office inspections ● SWEN-331: Engineering Secure Software Benjamin S Meyers 7

  8. OSI Model: Session Layer Responsible for establishing/managing/terminating ● connections between local and remote devices Remote Procedure Calls (RPC) ● One form of Inter-Process Communication (IPC) ○ Authentication and authorization happen here ● Transmission Control Protocol (TCP) spans the Transport and ● Session Layers API’s (e.g. NETBIOS) ● SWEN-331: Engineering Secure Software Benjamin S Meyers 8

  9. OSI Model: Presentation Layer Translates between application-specific data formats and ● network packet formats e.g. conversion from packet to XML (and vice versa) ○ Sometimes called the “syntax” layer ● Some data compression functionality ● Data encoding ● ASCII (7-8 bits per character) vs. EBCDIC (8 bits per character) ○ EBCDIC is non-linear ○ Unicode (UTF8, UTF16) ○ SSL/TLS ● SWEN-331: Engineering Secure Software Benjamin S Meyers 9

  10. OSI Model: Application Layer Interacts with applications that implement communication ● Responsible for displaying received data to the user and ● sending data from the user to the presentation layer (which then gets sent through the other OSI layers) Defines specifications for shared communication protocols ● e.g. HTTP, FTP, SMTP, DNS ○ Application specific protocols (e.g. RDP, LDAP) ○ SWEN-331: Engineering Secure Software Benjamin S Meyers 10 10

  11. Crash Course in Network Communication Classic Model 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 DataLink 1 Physical OSI 7-Layer Model vs. Modern Network/Internet Model SWEN-331: Engineering Secure Software Benjamin S Meyers 11 11

  12. Crash Course in Network Communication Classic Model 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 DataLink 1 Physical Physical connection, data rates, bit level handling OSI 7-Layer Model vs. Modern Network/Internet Model SWEN-331: Engineering Secure Software Benjamin S Meyers 12 12

  13. Crash Course in Network Communication Classic Model 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 DataLink Pack/unpack data frame (MAC source/dest) -- unique identifier 1 Physical Physical connection, data rates, bit level handling OSI 7-Layer Model vs. Modern Network/Internet Model SWEN-331: Engineering Secure Software Benjamin S Meyers 13 13

  14. Crash Course in Network Communication Classic Model 7 Application 6 Presentation 5 Session 4 Transport 3 Network Packet routing (IP Address source/dest and port) to socket 2 DataLink Pack/unpack data frame (MAC source/dest) -- unique identifier 1 Physical Physical connection, data rates, bit level handling OSI 7-Layer Model vs. Modern Network/Internet Model SWEN-331: Engineering Secure Software Benjamin S Meyers 14 14

  15. Crash Course in Network Communication Classic Model 7 Application 6 Presentation 5 Session 4 Transport Responsible for quality of service and data integrity 3 Network Packet routing (IP Address source/dest and port) to socket 2 DataLink Pack/unpack data frame (MAC source/dest) -- unique identifier 1 Physical Physical connection, data rates, bit level handling OSI 7-Layer Model vs. Modern Network/Internet Model SWEN-331: Engineering Secure Software Benjamin S Meyers 15 15

  16. Crash Course in Network Communication Classic Model 7 Application 6 Presentation 5 Session Establishes connection between devices (also maintains, authenticates, etc.) 4 Transport Responsible for quality of service and data integrity 3 Network Packet routing (IP Address source/dest and port) to socket 2 DataLink Pack/unpack data frame (MAC source/dest) -- unique identifier 1 Physical Physical connection, data rates, bit level handling OSI 7-Layer Model vs. Modern Network/Internet Model SWEN-331: Engineering Secure Software Benjamin S Meyers 16 16

  17. Crash Course in Network Communication Classic Model 7 Application 6 Presentation Ensures compatibility between the data formats from lower to upper layers 5 Session Establishes connection between devices (also maintains, authenticates, etc.) 4 Transport Responsible for quality of service and data integrity 3 Network Packet routing (IP Address source/dest and port) to socket 2 DataLink Pack/unpack data frame (MAC source/dest) -- unique identifier 1 Physical Physical connection, data rates, bit level handling OSI 7-Layer Model vs. Modern Network/Internet Model SWEN-331: Engineering Secure Software Benjamin S Meyers 17 17

  18. Crash Course in Network Communication Classic Model 7 Application Works with applications to provide communications & functions 6 Presentation Ensures compatibility between the data formats from lower to upper layers 5 Session Establishes connection between devices (also maintains, authenticates, etc.) 4 Transport Responsible for quality of service and data integrity 3 Network Packet routing (IP Address source/dest and port) to socket 2 DataLink Pack/unpack data frame (MAC source/dest) -- unique identifier 1 Physical Physical connection, data rates, bit level handling OSI 7-Layer Model vs. Modern Network/Internet Model SWEN-331: Engineering Secure Software Benjamin S Meyers 18 18

  19. Crash Course in Network Communication Classic Model Modern Model 7 Application Works with applications to provide communications & functions Applications (FTP, 6 Presentation Ensures compatibility between the data formats from lower to upper layers HTTP, SMTP, etc.) 5 Session Establishes connection between devices (also maintains, authenticates, etc.) 4 Transport TCP Responsible for quality of service and data integrity 3 Network IP Packet routing (IP Address source/dest and port) to socket 2 DataLink Pack/unpack data frame (MAC source/dest) -- unique identifier Ethernet 1 Physical Physical connection, data rates, bit level handling OSI 7-Layer Model vs. Modern Network/Internet Model SWEN-331: Engineering Secure Software Benjamin S Meyers 19 19

  20. TCP/IP Communications Application Application Transport Transport Router Router Source Destination Network Network Network Network Computer Computer DataLink DataLink DataLink DataLink In a typical network, computers are on subnets; routers transmit between subnets SWEN-331: Engineering Secure Software Benjamin S Meyers 20 20

  21. TCP/IP Communications Client Server TCP Packet SEQ=1, LEN=700 TCP Packet ACK=1 TCP Packet SEQ=2, LEN=1000 ⋮ TCP Packet ACK=2 TCP Packet ⋮ SEQ=20, LEN=250 TCP Packet ACK=20 SWEN-331: Engineering Secure Software Benjamin S Meyers 21 21

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend