Week 2
Week 2
Week 2
NETWORKING FOUNDATION
The User Datagram Protocol (UDP) was developed for use by appli-
cation protocols that do not require reliability, acknowledgment or
flow control features at the transport layer. It is designed to be
simple and fact, providing only transport layer addressing in the
form of UDP ports and an optional checksum capability.
UDP's task is to take data from higher-layer protocols and place it in
UDP messages, which are then passed down to the Internet Protocol
for transmission.
UDP
The basic steps for transmission using UDP are:
1. Higher-Layer Data Transfer: An application sends a message to
the UDP software.
2. UDP Message Encapsulation: The higher-layer message is
encapsulated into the Data field of a UDP message. The headers of
the UDP message are filled in, including the Source Port of the
application that sent the data to UDP, and the Destination Port of the
intended recipient. The checksum value may also be calculated.
3. Transfer Message To IP: The UDP message is passed to IP for
transmission.
UDP
UDP Message
Format
UDP
Internet Protocol (IP) is the foundation upon which the other protocols
of the suite are built.
TCP (Transmission Control Protocol) provides to applications a
method of easily making use of IP, while filling in the capabilities
that IP lacks. It allows TCP/IP devices to establish and manage
connections and send data reliably, and for applications, TCP could
be considered a nice user interface to the rudimentary capabilities
of IP.
TCP
The TCP/IP protocol suite is named for the two main protocols that provides
these capabilities, allowing software to run on a network: the Transmission
Control Protocol (TCP) and the Internet Protocol (IP). IP deals with network
datagram delivery and routing, while TCP handles connections and provides
reliability.
TCP is a full-featured transport layer protocol that provides all the functions
needed by a typical application for the reliable transportation of data across
an arbitrary internetwork. It provides transport-layer addressing for application
processes in the form of TCP ports, and allows these ports to be used in
establishing connections between machines. Once connections have been
created, data can be passed bidirectionally between two devices.
TCP
The primary transport layer protocol in the TCP/IP suite is the Transmission
Control Protocol (TCP). TCP is a connection-oriented, acknowledged,
reliable, fully-featured protocol designed to provide applications with a
reliable way to send data using the unreliable Internet Protocol. It allows
applications to send bytes of data as a stream of bytes, and
automatically packages them into appropriately-sized segments for
transmission. It uses a special sliding window acknowledgment system to
ensure that all data is received by its recipient, to handle necessary
retransmissions, and to provide flow control so each device in a connection
can manage the rate at which it is sent data.
TCP
Six main tasks that TCP performs:
1.Addressing/Multiplexing: multiplexing the data received from these different
processes so they can be sent out using the underlying network-layer protocol.
At the same time, these higher-layer application processes are identified using
TCP ports.
2.Connection Establishment, Management and Termination: TCP provides a set
of procedures that devices follow to negotiate and establish a TCP connection
over which data can travel. Once opened, TCP includes logic for managing
connections and handling problems that may result with them. When a device is
done with a TCP connection, a special process is followed to terminate it.
TCP
Data Handling and Packaging: TCP defines a mechanism by which
applications send data to it from higher layers. This data is then
packaged into messages to be sent to the destination TCP software. The
destination software unpackages the data and gives it to the application
on the destination machine.
Data Transfer: Conceptually, the TCP implementation on a transmitting
device is responsible for the transfer of packaged data to the TCP
process on the other device. Following the principle of layering, this is
done by having the TCP software on the sending machine pass the data
packets to the underlying network-layer protocol, which again normally
means IP.
TCP
Providing Reliability and Transmission Quality Services: TCP includes a set of
services and features that allow an application to consider the sending of data
using the protocol to be "reliable". This means that normally, a TCP application
doesn't have to worry about data being sent and never showing up, or arriving
in the wrong order. It also means other common problems that might arise if IP
were used directly are avoided.
Providing Flow Control and Congestion Avoidance Features: TCP allows the flow
of data between two devices to be controlled and managed. It also includes
features to deal with congestion that may be experienced during communication
between devices.
TCP
Enhanced Positive
Acknowledgment With
Retransmission
TCP
Common ports:
20/21 FTP – Control
22 SSH Remote Login Protocol
23 Telnet
25 Simple Mail Transfer Protocol (SMTP)
53 Domain Name System (DNS)
80 HTTP
110 POP3 – Post office Protocol
143 IMAP – Internet Message Access Protocol
389 Lightweight Directory Access Protocol (LDAP)
443 HTTPS
DNS
Domain Name Server - DNS - is the TCP/IP facility that lets you use names
rather than numbers to refer to host computers. DNS uses a hierarchical naming
system that’s how folders are organized hierarchically on a Windows computer.
DNS
Nobody knows the number of unique domains that have ever existed. The full
set of ever-existent domains is the sum of historic information held respectively
at all TLD (Top Level Domains) Registries worldwide.
Specifics:
• DNS names are not case sensitive
• The name of each DNS node can be up to 63 characters long (not
including the dot) and can include letters, numbers, and hyphens.
• A subdomain is a domain that’s beneath an existing domain.
• DNS is a hierarchical naming system that’s similar to the hierarchical folder
system used by Windows.
• The DNS tree can be up to 127 levels deep
DNS
The administration of the Domain Name System (DNS) is structured in a hierarchy
using different managed areas or “zones”, with the root zone at the very top of
that hierarchy. Root servers are DNS nameservers that operate in the root zone.
These servers can directly answer queries for records stored or cached within the
root zone, and they can also refer other requests to the appropriate Top Level
Domain (TLD) server. A common misconception is that there are only 13 root
servers in the world. There are many more, but still only 13 IP addresses used to
query the different root server networks. Limitations in the original architecture
of DNS require there to be a maximum of 13 server addresses in the root zone.
Ultimate authority over the root zone belongs to the National Telecommunications
and Information Administration (NTIA), which is a part of the US Department of
Commerce.
DNS
Geographical:
DNS
Hosts File
Hosts file listed the name and IP address of every host on the network. Each
computer had its own copy of the Hosts file. Precursor for DNS and it is still used
Windows c:\windows\system32\drivers\etc
Unix/Linux /etc/hosts
DNS SERVERS AND ZONES
A DNS server is a computer that runs DNS server software, helps to maintain the
DNS database, and responds to DNS name resolution requests from other
computers.
The entire DNS namespace is divided into zones, and the responsibility for each
zone is delegated to a particular DNS server. The subdomains that make up a
domain can be divided out to separate zones.
DNS
Primary and secondary servers
A primary zone is the master copy of a zone. The data for a primary
zone is stored in the local database of the DNS server that hosts the
primary zone.
A secondary zone is a read-only copy of a zone, it obtains its copy
of the zone from the zone’s primary server by using a process called
zone transfer.
DNS
DNS query
DNS
Zone Files and Resource Records
Each DNS zone is defined by a zone file (also known as a DNS database or a
master file). For Windows DNS servers, the name of the zone file is domain.zone.
A zone file consists of one or more resource records.
Owner TTL Class Type RDATA
Owner: The name of the DNS domain or the host that the record applies to
TTL: Also known as Time to Live; the number of seconds that the record should be
retained in a server’s cache before it’s invalidated.
Class: Defines the protocol to which the record applies IN, for the Internet protocol
Type: The resource record type
RDATA: Resource record data that is specific to each record type
DNS
Common Resource Record Types
SOA Start of Authority Identifies a zone
NS Name Server Identifies a name server that is authoritative for the zone
A Address Maps a fully qualified domain name to an IP address
CNAME Canonical Name Creates an alias for a fully qualified domain name
MX Mail Exchange Identifies the mail server for a domain
PTR Pointer Maps an IP address to a fully qualified domain name for reverse
lookups
DNS
SOA records
Every zone must begin with an SOA record, which names the zone and
provides default information for the zone.
MNAME The domain name of the name server that is authoritative for the
zone.
RNAME An email address (specified in domain name format; not regular
email format) of the person responsible for this zone.
SERIAL The serial number of the zone. Secondary zones use this value to
determine whether they need to initiate a zone transfer to update their
copy of the zone.
DNS
REFRESH A time interval that specifies how often a secondary server should
check whether the zone needs to be refreshed. A typical value is 3600 (one
hour).
RETRY A time interval that specifies how long a secondary server should wait
after requesting a zone transfer before trying again. A typical value is 600 (ten
minutes).
EXPIRE A time interval that specifies how long a secondary server should keep
the zone data before discarding it. A typical value is 86400 (one day).
MINIMUM A time interval that specifies the TTL value to use for zone resource
records that omit the TTL field. A typical value is 3600 (one hour).
DNS
bcit.ca. IN SOA (
ns1.bcit.ca ; authoritative name server
webmaster.bcit.ca ; responsible person
17645 ; version number
3600 ; refresh (1 hour)
600 ; retry (10 minutes)
86400 ; expire (1 day)
3600 ) ; minimum TTL (1 hour)
DNS
NS records
Name server (NS) records identify the name servers that are authoritative for the zone.
Every zone must have at least one NS record. Using two or more NS records is better
so that if the first name server is unavailable, the zone will still be accessible.
bcit.ca. IN NS ns1.bcit.ca.
bcit.ca. IN NS ns2.bcit.ca.
A records
Address (A) records are the meat of the zone file: They provide the IP addresses for
each of the hosts that you want to make accessible via DNS.
printer1 IN A 192.168.168.203
router1 IN A 207.126.127.129
www IN A 64.71.129.102
DNS
CNAME records
A Canonical Name (CNAME) record creates an alias for a fully qualified
domain name.
ftp.bcit.ca. IN A 207.126.127.132
files.bcit.ca. IN CNAME ftp.bcit.ca.
PTR records
A Pointer (PTR) record is the opposite of an address record: It provides the fully
qualified domain name for a given address.
102.129.71.64.in-addr.arpa. IN PTR www.bcit.ca
DNS
MX records
Mail Exchange (MX) records identify the mail server for a domain. The owner
field provides the domain name that users address mail to.
bcit.ca. IN MX 0 mail1.bcit.ca.
bcit.ca. IN MX 10 mail2.bcit.ca.
Reverse Lookup Zones
Normal DNS queries ask a name server to provide the IP address that
corresponds to a fully qualified domain name. A reverse lookup is the opposite
of a forward lookup: it returns the fully qualified domain name of a host based
on its IP address. To enable a reverse lookup for a particular IP address, you
have to create a PTR record in a reverse lookup zone. The PTR record maps the
in-addr.arpa domain name for the address to the host’s actual domain name.
NSLOOKUP
The nslookup command is a powerful tool for diagnosing DNS problems
name Queries the current name server for the specified name.
server name Sets the current name server to the server you specify.
root Sets the root server as the current server.
set type=x Specifies the type of records to be displayed, such as A, CNAME, MX,
NS, PTR, or SOA. Specify ANY to display all records.
set debug Turns on Debug mode, which displays detailed information about each
query.
set nodebug Turns off Debug mode.
set recurse Enables recursive searches.
set norecurse Disables recursive searches.
exit Exits the nslookup program and returns you to a command prompt.
PING
Ping Command
ping is probably the most basic TCP/IP command line tool. Its main
purpose is to determine whether you can reach another computer
from your computer. It uses Internet Control Message Protocol (ICMP)
to send mandatory ECHO_REQUEST datagrams to the specified host
computer. When the reply is received back from the host, the ping
command displays how long it took to receive the response.
PING
Ping Command
The ping command sends four packets to the specified host. It displays the result
of each packet sent. Then it displays summary statistics: how many packets were
sent, how many replies were received, the error loss rate, and the approximate
round-trip time.
PING
A Ping of Death attack is a denial-of-service (DoS) attack, in which the attacker
aims to disrupt a targeted machine by sending a packet larger than the
maximum allowable size, causing the target machine to freeze or crash. The
original Ping of Death attack is less common today. While some ping packets
are very small, IP4 ping packets are much larger, and can be as large as the
maximum allowable packet size of 65,535 bytes. Some TCP/IP systems were
never designed to handle packets larger than the maximum, making them
vulnerable to packets above that size.
PING
When a maliciously large packet is transmitted from the attacker to the target,
the packet becomes fragmented into segments, each of which is below the
maximum size limit. When the target machine attempts to put the pieces back
together, the total exceeds the size limit and a buffer overflow can occur,
causing the target machine to freeze, crash or reboot.
One solution to stop an attack is to add checks to the reassembly process to
make sure the maximum packet size constraint will not be exceeded after
packet recombination. Another solution is to create a memory buffer with
enough space to handle packets which exceed the guideline maximum.
A new Ping of Death attack for IPv6 packets for Microsoft Windows was
discovered more recently, and it was patched in mid 2013.
TRACERT
tracert Command
The tracert command (traceroute in Unix/Linux implementations) is one of the
key diagnostic tools for TCP/IP. It displays a list of all the routers that a packet
must go through to get from the computer where tracert is run to any other
computer on the Internet. Each one of these routers is called a hop. If you can’t
connect to another computer, you can use tracert to find out exactly where the
problem is occurring.
IPCONFIG
A mail server can have many names: mail relay, mail router, Internet mailer. But
the most common alias is an MTA. This may refer to a mail transfer agent, a
message transfer agent, or a mail transport agent. No matter which name you
use, MTAs play an essential role in the Internet message handling system. They
transfer electronic mail messages between users.
A mail/message transfer agent (MTA) is a software that transfers emails
between the computers of a sender and a recipient.
WHAT IS MTA
An MTA is just an element of the email delivery process. It receives an email
from the mail/message submission agent (MSA), which, in turn, receives it from
the mail user agent (MUA). The MUA is commonly known as an email client – an
app you use to handle the email-related operations. Once the MTA gets the
email, relaying comes into play. That’s why mail transfer agents are often called
mail relays.
WHAT IS MTA
The email can be forwarded to other MTAs if the recipient is not hosted locally.
Then it hits the mail delivery agent (MDA). This is the email’s last stopover
before it will be delivered to the recipient’s mailbox.
The email sending is carried out using SMTP (or extended SMTP), and for the
final stage (MDA to MUA), POP3 or IMAP4 is used.
MTAs do the following:
accept emails sent from mail user agents
query the MX records and select a mail server to transfer emails
send auto-response messages if an email has failed to reach the
destination
WHAT IS MTA
Mail queueing in MTAs
Usually, MTAs use a store-and-forward model of mail handling. This means that
outgoing mail is put into a queue and waits for the recipient’s server response. An MTA
will recurrently try to send emails. If the mail fails to be delivered during the
established term, it will be returned to the mail client.
There are three major factors that email deliverability is based on:
sender’s reputation
infrastructure & authentication
content
The reputation of the domain and IP address the email is sent from is the most
important thing. When receiving mail servers identify the sender as untrustworthy, all
emails from it will end up in the spam folder, or even bounced back. MTAs can protect
and strengthen the reputation of the sender. That’s why they directly impact email
deliverability.
THE SIMPLE MAIL TRANSFER PROTOCOL (SMTP)
The Simple Mail Transfer Protocol (SMTP) is a TCP/IP protocol used in sending
and receiving e-mail.
The Mail Transfer Protocol (MTP), which was first defined in RFC 772 in
September 1980. The commands of MTP are based directly on those of the FTP
Protocol.
This protocol was first defined in RFC 788, published in November 1981: the
Simple Mail Transfer Protocol (SMTP).
The only part of the e-mail system for which SMTP is not used is the final
retrieval step by an e-mail recipient.
THE SIMPLE MAIL TRANSFER PROTOCOL (SMTP)
The TCP/IP electronic mail communication model describes the way e-mail
messages are conveyed from the sender to the recipient. In most cases, this
involves the sender's client machine sending the e-mail to its local SMTP server,
which in turn sends it to the recipient's local SMTP server, and finally to the
recipient's local host.
The creation of DNS radically changed how e-mail delivery worked. DNS
includes support for a special mail exchanger (MX) record that allows easy
mapping from the domain name in an e-mail address to the IP address of the
SMTP server that handles mail for that domain.
THE SIMPLE MAIL TRANSFER PROTOCOL (SMTP)
PGP
Pretty Good Privacy is probably the most popular encryption method and has
been around since the early 90s. It’s not only used to encrypt emails but also
files, directories, and entire disk partitions. Email-wise, the way it works is no
different than S/MIME. It also relies on the combination of private and public
keys but an encrypted data is even more difficult to crack. PGP uses the mix of
data compression, public-key cryptography and hashing to achieve a nearly
unbreakable string of characters representing the protected data. To validate
the sender, their private key is also used to certify the ownership of an account.
Since 1997, PGP is available as a non-proprietary standard called OpenPGP
and everyone is free to implement it into their software.
DOMAIN SPOOFING
Domain spoofing, a common form of phishing, occurs when an attacker appears
to use a company’s domain to impersonate a company or one of its employees.
This can be done by sending emails with false domain names which appear
legitimate, or by setting up websites with slightly altered characters that read
as correct. Commonly, a spoof website or email will use logos, or any other kind
of accurate visual design to effectively imitate the styling and branding of a
legitimate enterprise or business. Users will commonly be prompted to enter
financial details or other sensitive data, trusting that they are being sent to the
right place.
DOMAIN SPOOFING
Email Spoofing: forging of an email header so that the message seems to originate
from someone or somewhere different from the actual source. Email spoofing is a
scheme used in both phishing and spam campaigns because users don't want to open
an email if they don’t trust the legitimacy of the source. The purpose of email spoofing
is to trick recipients into opening, or even corresponding with a solicitation.
Website spoofing: Website spoofing is the act of building a fake website with the goal
of misleading users, gaining their trust, and assuming the identity of a legitimate group
or organization. The spoof website will frequently adopt the design of the target
website and sometimes mimic the URL with alternate characters. A more sophisticated
attack can involve the perpetrator building a ‘shadow’ version of the World Wide
Web by routing all of the user’s web traffic through the attackers console. This type of
attack captures all of the victims sensitive information. Another method used by domain
spoofing attackers is to use a cloaked URL. By using domain forwarding, or inserting
control characters, the URL can appear to be genuine while concealing the address of
the actual website.
DOMAIN SPOOFING
Email spoofing is possible because the Simple Mail Transfer Protocol (SMTP) does not provide a
mechanism for address authentication.
Sender Policy Framework (SPF): an email validation system, SPF allows domain
managers to authorize individual hosts to use a domain in email. This list of approved domain
names in protected and can be used to verify authenticity.
Domain-based Message Authentication, Reporting and Conformance (DMARC): is an
email authentication protocol based on reporting and enforcement components. Built on two
components, reporting and enforcement. Through reporting, DMARC can automate authenticity
verification, and alert administrators to false email domains immediately. When false domains
are used DMARC will stop the email from entering the inbox.
DomainKeys Identified Mail: (DKIM) which provides a way to validate a domain name
identity associated with a message. When a message is built, a digital signature is added to the
email to ensure authenticity. DKIM does not offer filtering capabilities but can be used to
guarantee legitimacy of the message.
Sender ID (SID): a protocol based largely on SPF and promoted by Microsoft, SID is
built into exchange servers, by reading the SMTP header. The service the queries the DNS
records to verify the sender's address.
THE SIMPLE MAIL TRANSFER PROTOCOL (SMTP)
DMARC is the most sophisticated of all three methods and it leverages the other
two methods to perform additional checks. It’s the only method that except for
running a test, can also suggest to a receiving server what to do if a message
fails a check.
THE SIMPLE MAIL TRANSFER PROTOCOL (SMTP)
Sender Policy Framework or SPF
SPF is a protocol according to which the mail servers decide whether to receive or
reject an incoming email. The decision is made using the SPF information in TXT records
as for the list of authorized IP addresses within a particular domain. If the email has
been sent from one of these addresses, it’s not forged and can be let in.
Creating an SPF record. This establishes an authentication policy and defines
mail servers authorized to send emails from a particular domain.
DNS lookup. An incoming message is being verified in the DNS. The domain
name should be listed as the “envelope from” address. Then, the inbound server checks
whether the IP address the email is sent from is authorized in the SPF record. If it
doesn’t match any address present in the record, the SPF authentication is marked as
failed.
Authentication outcome. The mail server either delivers, flags, or rejects the
message based on the rules specified in the SPF record (and a multitude of other
factors).
THE SIMPLE MAIL TRANSFER PROTOCOL (SMTP)
User
Authentication
Process
CLIENT EMAIL PROTOCOLS
IMAP (Internet Message Access Protocol) – Is a standard protocol for accessing
e-mail from your local server. IMAP is a client/server protocol in which e-mail is
received and held for you by your Internet server. As this requires only a small
data transfer this works well even over a slow connection such as a modem.
Only if you request to read a specific email message will it be downloaded
from the server. You can also create and manipulate folders or mailboxes on the
server, delete messages etc.
IMAP4 uses the Transmission Control Protocol (TCP) for communication. This
ensures that all commands and data are sent reliably and received in the
correct order. IMAP4 servers listen on well-known port number 143 for incoming
connection requests from IMAP4 clients. After a TCP connection is established,
the IMAP4 session begins
CLIENT EMAIL PROTOCOLS
This is the usual sequence for an IMAP session:
1. Not Authenticated State: The session normally begins in this state after a TCP connection is
established, unless the special IMAP pre-authentication feature has been used. The client at this
point cannot really do much aside from providing authentication information so it can move to
the next state.
2. Authenticated State: The client has completed authentication, either through an authentication
process in the prior state or through pre-authentication. The client is now allowed to perform
operations on whole mailboxes. The client must select a mailbox before individual message
operations are permitted.
3. Selected State: After a mailbox has been chosen, the client is allowed to access and
manipulate individual messages within the mailbox. When the client is done with the current
mailbox it can close it and return to the Authenticated state to select a new one to work with, or
can log out to end the session.
4. Logout State: The client may issue a Logout command from any of the other states to request
that the IMAP session be ended. The session may also enter this state if the session inactivity
timer expires. The server sends a response and the connection is terminated.
CLIENT EMAIL
PROTOCOLS
IMAP Status
CLIENT EMAIL PROTOCOLS
MAPI stands for Messaging Application Programming Interface. MAPI is a
proprietary Microsoft protocol that allows the Microsoft Outlook email client to
fully utilize all of the features of an Exchange server including email, shared
address books, calendars and public folders. When Outlook is configured as a
MAPI client, also known as an Exchange client, email is stored in the cloud on
Exchange secure mail server with a copy on your computer. Messages retained
in the cloud are accesible via webmail from any internet connected computer.
With MAPI, you can move messages from the cloud into a local file on your
computer called a .PST file, a process through which copies of messages are
deleted from the cloud and stored on your computer. This can allow for valuable
storage space and help you create backups of your business-critical emails.
CLIENT EMAIL PROTOCOLS
MAPI was designed to be used exclusively on the internal network, and it was
created even before the current Internet existed. It just defined a series of
remote procedure calls (RPC) that are also very old and did not address any
security concerns. These problems made it particularly unsafe to make it
available on the Internet.
To be able to connect to mail servers across the internet the MAPI protocol was
encapsulated in protocols that can be secured over internet.
CLIENT EMAIL PROTOCOLS
RPC over HTTP
CLIENT EMAIL PROTOCOLS
MAPI over HTTP
CLIENT EMAIL PROTOCOLS
Internet headers
In Outlook client you
select the message,
and from the top
menu select File:
CLIENT EMAIL PROTOCOLS
Hotmail
CLIENT EMAIL PROTOCOLS
Hotmail:
Select
message
source:
CLIENT EMAIL PROTOCOLS
Gmail
CLIENT EMAIL PROTOCOLS
A message send from gmail.com to shaw.ca
Local Mail Transfer Protocol (LMTP) – internal uses port 24 usually
CLIENT EMAIL PROTOCOLS
We check if the sender’s SMTP IP address is the real one:
CLIENT EMAIL PROTOCOLS
SMTP signatures
CLIENT EMAIL PROTOCOLS
This is the message:
CLIENT EMAIL PROTOCOLS
Message from Outlook client shaw.ca to gmail.com
CLIENT EMAIL PROTOCOLS
Sender information
CLIENT EMAIL PROTOCOLS
More information
CLIENT EMAIL PROTOCOLS
The message:
EMAIL HEADERS
A “Bad” email
EMAIL HEADERS
Sender
Destination
EMAIL HEADERS
Sender IP:
209.85.128.67
EMAIL HEADERS
SMTP information
between
Gmail and Hotmail
EMAIL HEADERS
Return Path:
IP address of the receiver
20.52.47.26
EMAIL HEADERS
SPAM filters
Whois.net:
EMAIL HEADERS
Sender:
Home depot
Receiving information
EMAIL HEADERS
Sender
EMAIL HEADERS
EMAIL HEADERS
Tenant Microsoft
EMAIL HEADERS
AntiSPAM
Results:
SPEAR PHISHING
Spear phishing is a personalized phishing attack that targets a specific
organization or individual. These attacks are carefully designed to elicit a
specific response from a specific target. Attackers invest time in researching
their targets and their organizations to craft a personalized message, often
impersonating a trusted entity. All this makes the message look trustworthy to
the recipient.
To increase success rates, these attacks often convey a sense of urgency to get
their victims to react. They may be asked to wire money right away, to open
malicious attachments, or to click on a link that takes them to a phishing site that
requires them to provide login credentials or other sensitive data.
The data gathered can be used to access existing business or personal accounts
with fraudulent intent.
SPEAR PHISHING
Business Email Compromise (BEC): This is also known as CEO fraud, whaling, and
wire transfer fraud. In a BEC attack, criminals impersonate an employee, usually
an executive or manager, within the organization. Using convincing details and
giving plausible reasons, they instruct their targets - who are often employees
with access to company finances or personal information - to wire money or to
send sensitive data such as financial information about customers, employees, or
partners. These attacks utilize social engineering and compromised accounts,
and they typically include no malicious attachments or links.
SPEAR PHISHING
HTTPS prevents websites from having their information broadcast in a way that’s
easily viewed by anyone snooping on the network. When information is sent
over regular HTTP, the information is broken into packets of data that can be
easily “sniffed” using free software.
With HTTPS, traffic is encrypted such that even if the packets are sniffed or
otherwise intercepted, they will come across as nonsensical characters.
Before encryption: This is a string of text that is completely readable
After encryption:
ITM0IRyiEhVpa6VnKyExMiEgNveroyWBPlgGyfkflYjDaaFf/Kn3bo3OfghBPDWo
6AfSHlNtL8N7ITEwIXc1gU5X73xMsJormz
HYPERTEXT TRANSFER PROTOCOL SECURE (HTTPS)
HTTPS is not a separate protocol from HTTP. It is simply using TLS/SSL
encryption over the HTTP protocol. HTTPS occurs based upon the
transmission of TLS/SSL certificates, which verify that a particular
provider is who they say they are.
When a user connects to a webpage, the webpage will send over its SSL
certificate which contains the public key necessary to start the secure
session. The two computers, the client and the server, then go through a
process called an SSL/TLS handshake, which is a series of back-and-forth
communications used to establish a secure connection.
HYPERTEXT TRANSFER PROTOCOL SECURE (HTTPS)
TLS Handshake
TLS is an encryption protocol designed to secure Internet communications.
A TLS handshake is the process that kicks off a communication session that
uses TLS encryption. During a TLS handshake, the two communicating sides
exchange messages to acknowledge each other, verify each other,
establish the encryption algorithms they will use, and agree on session
keys. TLS handshakes are a foundational part of how HTTPS works. SSL,
or Secure Sockets Layer, was the original encryption protocol developed
for HTTP. SSL was replaced by TLS, or Transport Layer Security, some time
ago. SSL handshakes are now called TLS handshakes, although the "SSL"
name is still in wide use.
HYPERTEXT TRANSFER PROTOCOL SECURE (HTTPS)
4. The premaster secret: The client sends one more random string of
bytes, the "premaster secret." The premaster secret is encrypted with
the public key and can only be decrypted with the private key by
the server. (The client gets the public key from the server's SSL
certificate.)
5. Private key used: The server decrypts the premaster secret.
HYPERTEXT TRANSFER PROTOCOL SECURE (HTTPS)
6. Session keys created: Both client and server generate session keys
from the client random, the server random, and the premaster
secret. They should arrive at the same results.
7. Client is ready: The client sends a "finished" message that is
encrypted with a session key.
8. Server is ready: The server sends a "finished" message encrypted
with a session key.
9. Secure symmetric encryption achieved: The handshake is
completed, and communication continues using the session keys.
HYPERTEXT TRANSFER PROTOCOL SECURE (HTTPS)
Diffie-Hellman handshake proceeds as follows:
1. Client hello: The client sends a client hello message with the protocol version,
the client random, and a list of cipher suites.
2. Server hello: The server replies with its SSL certificate, its selected cipher
suite, and the server random. In contrast to the RSA handshake described above,
in this message the server also includes the following
3. Server's digital signature: The server uses its private key to encrypt the client
random, the server random, and its DH parameter(Diffie-Hellman algorithm uses
exponential calculations to get the same premaster secret). This encrypted data
functions as the server's digital signature, establishing that the server has the
private key that matches with the public key from the SSL certificate.
HYPERTEXT TRANSFER PROTOCOL SECURE (HTTPS)
Diffie-Hellman handshake proceeds as follows: