attack methods chapter 4 corporate it security copyright 2002 prentice-hall

13
Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall

Upload: miles-gilmore

Post on 30-Dec-2015

217 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall

Attack Methods

Chapter 4

Corporate IT SecurityCopyright 2002 Prentice-Hall

Page 2: Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall

2

Figure 4-1: Targeted System Penetration (Break-In Attacks)

Unobtrusive Information Collection

Do research before sending any packets into the network Use in social engineering attacks Use as background for packet attacks

Corporate website

Trade press (often online and searchable)

Securities and Exchange Commission (SEC) web-enabled Internet financial database (Figure 4-2)

Page 3: Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall

3

Figure 4-2: Securities and Exchange Commission's Edgar Service

Page 4: Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall

4

Figure 4-1: Targeted System Penetration (Break-In Attacks)

Unobtrusive Information Collection Whois database (Figure 4-3)

Information about responsible person

Information about IP addresses of DNS servers, to find firm’s IP address block

Easy if assigned a classful address block (Figure 4-4)

Difficult is CIDR address block or a block of ISP addresses

Page 5: Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall

5

Registrant: Panko, Ray (PUKANUI-DOM) 1000 Pukanui St. Honolulu, HI 96821 US

Domain Name: PUKANUI.COM

Administrative Contact: Panko, Ray (RP17477) [email protected] 1000 Pukanui St. Honolulu, HI 96821 US (808) 956-8111

Figure 4-3: Whois Entry for Pukanui.Com (from www.netsol.com)

Page 6: Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall

6

Registrant: Technical Contact: VeriSign, Inc. (HOST-ORG)

[email protected] VeriSign, Inc. 21355 Ridgetop Circle

Dulles, VA 20166 US 1-888-642-9675 fax: - [email protected]

Record expires on 07-Jul-2003Record created on 07-Jul-2001Database last updated on 7-Jun-2002 15:07:22 EDT.

Domain servers in listed order: NS76.WORLDNIC.COM 216.168.225.216 NS75.WORLDNIC.COM 216.168.225.215

Figure 4-3: Whois Entry for Pukanui.Com (from www.netsol.com)

DNSServers

Page 7: Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall

7

Figure 4-4: Classful IP Address Allocations

Example Suppose DNS server is 128.171.17.1 Must be a Class B address block (from table lookup) Therefore, the network part is 16 bits: 128.171 Address block must be 128.171.0.1 to 128.171.255.254

Class Initial IP Address in Class

Last IP Address in Class

Size or Network Part

Addresses in Block Allocated to Firm

A 0.0.0.1 127.255.255.254 8 16,777,214

B 128.0.0.1 191.255.255.254 16 65,534

C 192.0.0.1 223.255.255.254 24 254

Page 8: Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall

8

Figure 4-1: Targeted System Penetration (Break-In Attacks)

IP Address Spoofing (Figure 3-17)

Put false IP addresses in outgoing attack packets Attacker is blind to replies

Use series of attack platforms (Figure 4-5)

Page 9: Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall

9

Figure 4-5: Using a Chain of Attack Hosts

Attacker1.4.5.6 Victim

60.77.8.32

CompromisedHost

123.67.8.23

CompromisedHost

123.67.33.4

Attack

Replies

Allows Reading of RepliesWithout Exposing Attacker

Page 10: Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall

10

Figure 4-5: Using a Chain of Attack Hosts

Subsequent Trace Back

Successful

ConnectionBroken

ConnectionBroken

CompromisedHost

123.67.8.23

CompromisedHost

123.67.33.4

Attacker1.4.5.6

Victim60.77.8.32

Page 11: Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall

11

Figure 4-1: Targeted System Penetration (Break-In Attacks)

Host Scanning

To identify IP addresses of potential victims

Ping individual hosts (Figure 4-6)

Ping all IP addresses in block for live IP addresses (Figure 4-7)

Page 12: Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall

12

Figure 4-6: Ping at the Windows Command Prompt

Page 13: Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall

13

Figure 4-7: Ping Scanning With Ping Sweep