Sniffing Spoofing
Sniffing Spoofing
Attacks
Physical
Dialog
Penetration
Social
Engineering
Wiretapping
Eavesdropping
Scanning
Opening
Attachment
Server
Hacking
Impersonation
Break-in
Password
Theft
Vandalism
Message
Alternation
DOS
Information
Theft
Malware
passwords
email
financial account information
confidential information
low-level protocol info to attack
hardware addresses
IP addresses
routing, etc
Spoofing
In spoofing (fooling, deceiving), an
attacker impersonates someone else.
Spoofing
In spoofing (fooling, deceiving), an attacker impersonates
someone else.
Sonny, are you still alive?
Yes Im here!
Faishal
Kevin
Sonny
Type of Spoofing
ARP Spoofing / MAC Spoofing
Attacker change MAC address client with MAC
Address Attacker
IP spoofing
Email spoofing
Web spoofing
Spoofed Reply
ARP spoofing
What is ARP? IP->MAC mapping
Make some machine think that the IP address
it is searching for is you.
How it works:
Broadcast and ask if anyone knows
Response is typically from that IP
ARP spoofing
(more)
IP Spoofing
IP spoofing is the creation of TCP/IP packets with
somebody else's IP address in the header.
Routers use the destination IP address to forward
packets, but ignore the source IP address.
The source IP address is used only by the
destination machine, when it responds back to
the source.
When an attacker spoofs someones IP address,
the victims reply goes back to that address.
Since the attacker does not receive packets back,
this is called a one-way attack or blind spoofing.
Email Spoofing
3 Basic way to perform :
Aliasing
Modify mail client
Telnet to port 25
Email Spoofing
One simple form of email spoofing is to
create a valid email account (on yahoo or
hotmail) and put someone elses name in the
alias field.
In mail relaying, an attacker uses a mail
server to send mail to someone in a different
domain
When email is sent by a user, the From:
address is not validated.
Web Spoofing
One way to lure people to a malicious site is to
give it a URL that is similar to that of a legitimate
site, e.g.,
www.paypai.com
wwwFirstNationalBank.com
Fake url
that is, sites claiming to be a particular Web site but, when clicked on, actually link to a
hacker's Web site. The URL is the Web address for any Web site
There are some clues in it that may indicate it will lead you to a fake or a phishing site.
Defence :
One of the first rules of online security is to exercise caution at all times. Try to avoid clicking on links
in pop-up ads or links in emails that seem to be phony or suspicious. A good general rule is to type
the Web site address in your address bar directly, rather than use a link in an email message,
especially if you are going to a financial site.
You can check the URL in any email or on another Web site by simply holding your mouse above the
link. The URL will appear in your browser or status bar (the bar that is usually at the bottom of your
screen) and you can see what the name of the site is before you actually click on it.
A fairly sure sign that a URL is fake is if the URL contains the "@" sign in the middle of the address. If
a URL contains the "@" sign, the browser ignores everything to the left of the link. For example, if
you go to a Web site that is www.paypal@150.44.134.189, you are not going to the Paypal site at all.
Legitimate sites and companies use a domain name as part of their name rather than the "@" sign.
A dead giveaway for a fake URL or a fake Web site is basic spelling mistakes in the Web address itself.
Some URLs look very much like the name of a well-known company, but there may be letters
transposed or left out. An example might be "mircosoft.com" instead of "microsoft.com." These
slight differences can be easy to miss, and that's what phishers are counting on.
The popular Paypal site is a common target for phishers and scammers. Even if a URL contains the
word "paypal," it may not be the authentic Paypal site. Some common URLs that will NOT lead you
to the real Paypal site are: www.paypalsecure.com and www.paypal@accounts.com.
Passive Sniffers
Passive sniffers monitors and sniffs packet
from a network having same collision domain
(i.e. network with a hub, as all packets are
broadcasted on each port of hub.)
Active Sniffers
One way of doing so is to change the default gateway of the clients
machine so that it will route its packets via the hijackers machine.
This can be done by ARP spoofing (i.e. by sending malicious ARP packets
mapping its MAC address to the default gateways IP address so as to
update the ARP cache on the client, to redirect the traffic to hijacker).
Typical Session
1: Request Connection
2: Create Session
3: Session Id
Client
(Browser)
5: Validate Session
4: Subsequent Requests
(Session id passed)
Server
6: Retrieve Session Data
7: Successful response
Session
Data
Attack Methods
Guessing Session Id
shorter length, predictable
Session Fixing
predictable, session created before authenticated
Session Sniffing
1: Request Connection
2: Create Session
3: Session Id
Client
(Browser)
5: Validate Session
4: Subsequent Requests
(Session id passed)
Server
6: Retrieve Session Data
7: Successful response
sniff
Request
(session-id)
Successful
Response
Hacker
Session
Data
Man-in-the-middle (MITM)
A hacker can also be "inline" between B and C
using a sniffing program to watch the
sequence numbers and acknowledge numbers
in the IP packets transmitted between B and C.
And then hijack the connection.
This is known as a "man-in-the-middle attack".
Send packets with commands that request the recipient not to send back
response.
2: Request HTTPS
Connection
3: Provide Server
Certificate
With public key
Client
(Browser)
5: Subsequent Requests
Hacker
Machine 1
Server
6: Forward Request
Request
(session-id)
Wait for Session to be created
Pass Session Id
Successful
Response
Hacker
Machine 2
MitM Attacks
Prevention of Sniffing
Segmentation into trustworthy segments
bridges
better yet .. switched hubs
Prevention of Sniffing
(more)
physical measures
Countermeasure
IP Spoofing
Protect against with good firewall rules keep your machines from launching a spoofed IP router filters
Limit configuration access on machines
Programs like arpwatch that keep track of IP/MAC pairings
The best way to protect against source routing spoofing is to simply disable source routing at your routers.
Email Spoofing
Most email servers today do not allow email relaying. They only allow emails to be sent to/from their range of IP addresses. They insure that the
recipients domain is the same domain as the mail server. The attacker can run his own email server, but then he is easier to trace.
Defense - Do not allow Email relaying on your STMP servers
Web Spoofing
Use a server-side certificate. Still, users should
Examine the browser location/status line
Examine links in HTML source code.
Disable active content (Java, JavaScript, Active X) in the browser.
Ensure that your browser starts on a secure page (a local HTML page)
Countermeasures - Encryption