IP Spoofing

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 23

IP Spoofing

Bao Ho
ToanTai Vu

CS 265 - Security Engineering


Spring 2003
San Jose State University

IP Spoofing, CS265 1
Presentation Outline
 Introduction, Background
 Attacks with IP Spoofing
 Counter Measures
 Summary

IP Spoofing, CS265 2
IP Spoofing
 IP Spoofing is a technique used to gain unauthorized
access to computers.
– IP: Internet Protocol
– Spoofing: using somebdody else’s information
 Exploits the trust relationships
 Intruder sends messages to a computer with an IP
address of a trusted host.

IP Spoofing, CS265 3
IP / TCP
 IP is connectionless, unreliable

 TCP connection-oriented

TCP/IP handshake

A  B: SYN; my number is X
B  A: ACK; now X+1
SYN; my number is Y
A B: ACK; now Y+1

IP Spoofing, CS265 4
A blind Attack
Host I cannot see what Host V send back

IP Spoofing, CS265 5
IP Spoofing Steps
 Selecting a target host (the victim)
 Identify a host that the target “trust”
 Disable the trusted host, sampled the target’s TCP
sequence
 The trusted host is impersonated and the ISN forged.
 Connection attempt to a service that only requires
address-based authentication.
 If successfully connected, executes a simple
command to leave a backdoor.

IP Spoofing, CS265 6
IP Spoofing Attacks

 Man in the middle

 Routing

 Flooding / Smurfing

IP Spoofing, CS265 7
Attacks
Man - in - the - middle:
Packet sniffs on link between the two endpoints, and
therefore can pretend to be one end of the
connection.

IP Spoofing, CS265 8
Attacks

 Routing re-direct: redirects routing information


from the original host to the attacker’s host.

 Source routing: The attacker redirects individual


packets by the hacker’s host.

IP Spoofing, CS265 9
Attacks

 Flooding: SYN flood fills up the receive queue from


random source addresses.

 Smurfing: ICMP packet spoofed to originate from the


victim, destined for the broadcast address, causing
all hosts on the network to respond to the victim at
once.

IP Spoofing, CS265 10
IP-Spoofing Facts
 IP protocol is inherently weak
 Makes no assumption about sender/recipient
 Nodes on path do not check sender’s identity
 There is no way to completely eliminate IP spoofing
 Can only reduce the possibility of attack

IP Spoofing, CS265 11
IP-Spoofing
Counter-measures
 No insecure authenticated services
 Disable commands like ping
 Use encryption
 Strengthen TCP/IP protocol
 Firewall
 IP traceback

IP Spoofing, CS265 12
No insecure authenticated
services
 r* services are hostname-based or IP-based
 Other more secure alternatives, i.e., ssh
 Remove binary files
 Disable in inet, xinet
 Clean up .rhost files and /etc/host.equiv
 No application with hostname/IP-based
authentication, if possible

IP Spoofing, CS265 13
Disable ping command
 ping command has rare use
 Can be used to trigger a DOS attack by flooding the
victim with ICMP packets
 This attack does not crash victim, but consume
network bandwidth and system resources
 Victim fails to provide other services, and halts if runs
out of memory

IP Spoofing, CS265 14
DOS using Ping

IP Spoofing, CS265 15
Use Encryption
 Encrypt traffic, especially TCP/IP packets and Initial
Sequence Numbers

 Kerberos is free, and is built-in with OS

 Limit session time

 Digital signature can be used to identify the sender


of the TCP/IP packet.

IP Spoofing, CS265 16
Strengthen TCP/IP protocol
 Use good random number generators to generate
ISN
 Shorten time-out value in TCP/IP request
 Increase request queue size
 Cannot completely prevent TCP/IP half-open-
connection attack
 Can only buy more time, in hope that the attack will
be noticed.

IP Spoofing, CS265 17
Firewall
 Limit traffic to services that are offered
 Control access from within the network
 Free software: ipchains, iptables
 Commercial firewall software
 Packet filters: router with firewall built-in
 Multiple layer of firewall

IP Spoofing, CS265 18
Network layout with Firewall

IP Spoofing, CS265 19
IP Trace-back
 To trace back as close to the attacker’s location as
possible
 Limited in reliability and efficiency
 Require cooperation of many other network
operators along the routing path
 Generally does not receive much attention from
network operators

IP Spoofing, CS265 20
Summary/Conclusion

 IP spoofing attacks is unavoidable.

 Understanding how and why spoofing attacks are


used, combined with a few simple prevention
methods, can help protect your network from these
malicious cloaking and cracking techniques.

IP Spoofing, CS265 21
References
 IP-spoofing Demystified (Trust-Relationship Exploitation), Phrack Magazine Review, Vol. 7, No. 48, pp. 48-
14, www.networkcommand.com/docs/ipspoof.txt
 Security Enginerring: A Guide to Building Dependable Distributed Systems , Ross Anderson, pp. 371
 Introduction to IP Spoofing, Victor Velasco, November 21, 2000,
www.sans.org/rr/threats/intro_spoofing.php
 A Large-scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis, Ming-Yuh
Huang, Thomas M. Wicks, Applied Research and Technology, The Boeing Company
 Internet Vulnerabilities Related to TCP/IP and T/TCP, ACM SIGCOMM, Computer Communication Review
 IP Spoofing, www.linuxgazette.com/issue63/sharma.html
 Distributed System: Concepts and Design , Chapter 7, by Coulouris, Dollimore, and Kindberg
 FreeBSD IP Spoofing, www.securityfocus.com/advisories/2703
 IP Spoofing Attacks and Hijacked Terminal Connections, www.cert.org/advisories/CA-1995-01.html
 Network support for IP trace-back, IEEE/ACM Transactions on Networking, Vol. 9, No. 3, June 2001
 An Algebraic Approach to IP Trace-back, ACM Transactions on Information and System Security , Vol. 5, No.
2, May 2002
 Web Spoofing. An Internet Con Game, http://bau2.uibk.ac.at/matic/spoofing.htm

IP Spoofing, CS265 22
Questions / Answers

IP Spoofing, CS265 23

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy