E N D
1. Spoofing and Sniffing Notes from:
Internet Security Professional Reference, 2nd ed
National Computer Security Association
New Riders Publishing
2. Sniffing
3. Spoofing
4. Major Problems with Sniffing Any mischievious machine can examine any packet on a BROADCAST medium
Ethernet is BROADCAST
at least on the segments over which it travels
Getting passwords is the first step in exploiting a machine
email is plaintext and vulnerable
5. Spoofing & OSI Penetration techniques exploit any and all levels of the model
Attacks vary based upon the vulnerability at that level
6. What does one sniff? passwords
email
financial account information
confidential information
low-level protocol info to attack
hardware addresses
IP addresses
routing, etc
7. Prevention of Sniffing Segmentation into trustworthy segments
bridges
better yet .. switched hubs
Not enough not to allow sniffing
easy to add a machine on the net
may try using X-terminals vs workstations
8. Prevention of Sniffing(more) Avoid password transmission
one solution is r..family
rlogin, rcp, rsh, etc
put trusted hosts in .rhosts
many SAs dont want users to use them
Using encrypted passwords
Kerberos
PGP public keys
9. MAC level Spoofing Focus on ethernet (widespread use)
Cards have unique addresses at manufacturer
Many cards CAN be reconfigured by user
bridge has no MAC address but sends with source address of the originator
faking address has opportunity for mischief
10. Prevention MAC spoofing VERY difficult
Intelligent hubs
can be made to expect certain MACs on ports
but machines can still be swapped
physical measures
11. ARP spoofing What is ARP? IP->MAC mapping
Make some machine think that the IP address it is searching for is you.
How it works:
Broadcast and ask if anyone knows
Response is typically from that IP
12. ARP spoofing (more) If 2 machines (real and fake) respond, effect depends on OS
some OS overwrite earlier response
other OS ignore unless its current entry expires
Original can be disconnected by
Power
Wiring (connectivity)
13. Prevention of ARP spoofing Basic Premise: ARP TRUSTS RESPONSE
If the machine is one you need to trust:
make a PERMANENT entry in arp cache
arp -p ...
Use an arp server
Dont let the machine respond for itself
make administration a little more cumbersone but is probably worth it!
but.. server can be spoofed