Unverified Fields - A Problem with Firewalls & Firewall Technology Today
|
|
|
- Chrystal Marsh
- 10 years ago
- Views:
Transcription
1 Unverified Fields - A Problem with Firewalls & Firewall Technology Today Ofir Arkin The Sys-Security Group [email protected] October
2 Introduction The following problem (as discussed in this paper) has not yet been identified. Certain firewalls today, will not authenticate the validity of certain protocol fields, within the packet they are processing. The risk is exposure of information. What kind of information can be exposed? Mainly it will be unique patterns of behavior produced by the probed machines answering our crafted queries (or other kind of network traffic initiated in order to elicit a reply). In my research paper ICMP Usage In Scanning 1 I have introduced new operating system fingerprinting methods based on changing values inside certain fields of the ICMP datagram. Using some of these methods I will demonstrate the risk. It is important to understand that I am using the ICMP protocol as an example. Other protocols can be used as well for this task. 1 ICMP Usage In Scanning, by Ofir Arkin. Available from. 2
3 The Tests Performed bit Version 4 bit Header Length 8-bit ty pe of serv ice (TOS)=0 16-bit total length ( in by tes ) 16-bit identif ication 3 bit Flags 13-bit Fragment Of f set 8-bit time to live ( TTL ) 8-bit protocol=1 (ICMP) 16-bit header checksum 20 bytes 32-bit source IP address 32-bit destination IP address Options ( if any ) Ty pe Code Checksum 4 by tes IP Data Field Identif ier ICMP data (depending on the ty pe of message) Sequence Number Figure 1: ICMP Echo Request Datagram The following tests were performed against a machine protected by a Check Point Firewall-1, version 4.1 sp2 (versions 3.0b and 4.0 were also checked). We have allowed ICMP Echo Request traffic to reach the tested machine, and ICMP Echo Replies to be sent back to the Internet. All other traffic was blocked. ICMP Echo Requests Boarder Router ICMP Echo Replies Probed Machine Figure 2: Initial setup Using Wrong Code Field Values The first method to be tested was Using wrong code values with ICMP Echo Requests. With this method, a code field value different than the normal (0) is sent with the ICMP Echo request. Typically, Microsoft Windows operating systems will zero out this field in their ICMP Echo replies. UNIX and UNIX-like operating systems will leave this value intact in their ICMP Echo replies. [root@godfather /root]# sing 2 -x 38 -c 5 Host_Address SINGing to Host_Address (IP_Address): 16 data bytes 16 bytes from IP_Address: seq=0 ttl=232 TOS=0 time= ms 16 bytes from IP_Address: seq=1 ttl=232 TOS=0 time= ms 16 bytes from IP_Address: seq=2 ttl=232 TOS=0 time= ms 16 bytes from IP_Address: seq=3 ttl=232 TOS=0 time= ms 2 SING, written by Alfredo Andres Omella, can be downloaded from 3
4 16 bytes from IP_Address: seq=4 ttl=232 TOS=0 time= ms --- Host_Address sing statistics packets transmitted, 5 packets received, 0% packet loss round-trip min/avg/max = / / ms [root@godfather /root]# The tcpdump trace: 16:07: ppp0 > x.x.x.x > y.y.y.y: icmp: echo request (ttl 255, id 13170) ff xxxx xxxx yyyy yyyy e c5a e839 0b33 0a00 16:07: ppp0 < y.y.y.y > x.x.x.x: icmp: echo reply (ttl 232, id 20802) e801 fb66 yyyy yyyy xxxx xxxx e c5a e839 0b33 0a00 The forged code field was echoed back. The operating system in question is probably a UNIX or a UNIX-like operating system. Using the Unused We can set the unused bit with our ICMP Echo Requests. HPUX 11.0 and Sun Solaris will echo back the unused bit, when generating an ICMP Echo reply. Other operating systems will set the value of this field according to the RFC zero. [root@godfather bin]#./sing -echo -U host_address SINGing to host_address (IP_Address): 16 data bytes 16 bytes from IP_Address: seq=1 RF! ttl=234 TOS=0 time= ms 16 bytes from IP_Address: seq=2 RF! ttl=234 TOS=0 time= ms 16 bytes from IP_Address: seq=3 RF! ttl=234 TOS=0 time= ms 16 bytes from IP_Address: seq=4 RF! ttl=234 TOS=0 time= ms 16 bytes from IP_Address: seq=5 RF! ttl=234 TOS=0 time= ms --- host_address sing statistics packets transmitted, 5 packets received, 16% packet loss round-trip min/avg/max = / / ms [root@godfather bin]# The tcpdump trace: 11:25: ppp0 > x.x.x.x > y.y.y.y: icmp: echo request (ttl 255, id 13170) ff01 88c1 xxxx xxxx yyyy yyyy af f c dd a00 11:25: ppp0 < y.y.y.y > x.x.x.x: icmp: echo reply (ttl 234, id 50096) c3b ea01 0d83 yyyy yyyy xxxx xxxx af f c dd a00 The Unused bit is echoed with the ICMP Echo reply. Who echos back the Unused Bit? 4
5 Sun Solaris, HP-UX 11.0 (probably version as well). The DF Bit Echoing Test With this test, we set the DF Bit with our probes. Some operating systems will not echo back this bit with their ICMP Echo replies. This will help us limit the range of operating systems on the target machine we are trying to identify. bin]#./sing -echo -G host_address SINGing to host_address (IP_Address): 16 data bytes 16 bytes from IP_Address: seq=0 DF! ttl=234 TOS=0 time= ms 16 bytes from IP_Address: seq=1 DF! ttl=234 TOS=0 time= ms 16 bytes from IP_Address: seq=2 DF! ttl=234 TOS=0 time= ms 16 bytes from IP_Address: seq=3 DF! ttl=234 TOS=0 time= ms 16 bytes from IP_Address: seq=4 DF! ttl=234 TOS=0 time= ms 16 bytes from IP_Address: seq=6 DF! ttl=234 TOS=0 time= ms --- host_address sing statistics packets transmitted, 6 packets received, 14% packet loss round-trip min/avg/max = / / ms [root@godfather bin]# The tcpdump trace: 11:26: ppp0 > x.x.x.x > y.y.y.y: icmp: echo request (DF) (ttl 255, id 13170) ff01 c8c1 xxxx xxxx yyyy yyyy 0800 f661 ff aa8c dd39 73d :26: ppp0 < y.y.y.y > x.x.x.x: icmp: echo reply (DF) (ttl 234, id 50102) c3b ea01 4d7d yyyy yyyy xxxx xxxx 0000 fe61 ff aa8c dd39 73d The DF bit was echoed back. This rule out LINUX machines based on Kernel 2.2.x and 2.4.x, Ultrix, Novell Netware, and Microsoft Windows 2000 family of operating systems from being used by the probed machine. The TOS Echoing Test The last test that was performed used the TOS field. Usually an ICMP Echo request will use the TOS default value of 0x00. Another value may be used. An ICMP Echo reply responding to this request should use the same TOS value as with the request. [root@godfather bin]#./sing -echo -TOS 8 host_address SINGing to host_address (IP_Address): 16 data bytes 16 bytes from IP_Address: seq=1 ttl=234 TOS=8 time= ms 16 bytes from IP_Address: seq=2 ttl=234 TOS=8 time= ms 16 bytes from IP_Address: seq=3 ttl=234 TOS=8 time= ms 16 bytes from IP_Address: seq=4 ttl=234 TOS=8 time= ms 16 bytes from IP_Address: seq=5 ttl=234 TOS=8 time= ms --- host_address sing statistics packets transmitted, 5 packets received, 16% packet loss round-trip min/avg/max = / / ms 5
6 bin]# The tcpdump trace: 11:28: ppp0 > x.x.x.x > y.y.y.y: icmp: echo request [tos 0x8] (ttl 255, id 13170) ff01 08ba xxxx xxxx yyyy yyyy 0800 e c8d dd39 f5cf 0c00 11:28: ppp0 < y.y.y.y > x.x.x.x: icmp: echo reply [tos 0x8] (ttl 234, id 15779) da ea yyyy yyyy xxxx xxxx 0000 ed c8d dd39 f5cf 0c00 As shown in the tcpdump, the TOS field value was echoed back. This behavior rules out the following operating systems, which do not echo back the TOS field value with their ICMP Echo replies: Microsoft Windows 2000 operating system family, Novell Netware, and Ultrix. 6
7 Conclusion The various tests outlined that the system in question is probably a SUN Solaris machine or an HPUX 11.0 machine. We could not differentiate between the two, because ICMP Echo requests initiated from the probed machine were blocked by the Firewall. If we had been seeing those, it would give us an indication about the usage of ICMP Echo requests in the PMTU discovery process HPUX 11.0 & machines take. We know for certain that the queried machine is not a LINUX operating system based on Kernel 2.2.x or 2.4; A Microsoft Windows 2000 based machine; an Ultrix machine; or a Novel Netware based machine. The fields within the ICMP datagram that we have used were: ICMP Code Field The Unused Bit (IP Header) The DF Bit (IP Header) The TOS field (IP Header) The tests we ve made did not take into consideration the default behavior taken by several operating systems. For example, setting the DF bit in replies for any ICMP Query message by Sun Solaris as its global PMTU discovery process (and maintenance). And we have limited ourselves only to the usage of ICMP Echo request. The firewall in this case was used as a tunnel. It verified the fields it needs for checking the datagram against the firewall s rule base, and did not verify the integrity of the other fields of the datagram. We gave extra meaning for a simple ICMP Echo request, and the firewall failed to cope with it. Why this is a bit different from other methods? Other methods might use legitimate parameters in order to try to fingerprint the operating system used on the machine probed. One example might be using the TCP Options. With the method I have introduced in this paper, fields, which have to have a default (some fields should be predefined) value, were used for the same purpose. This highlights the problem with firewalls today too much is not taken into consideration. The number of probing methods for a malicious computer attacker to use against machines hidden by a firewall still allows him to get a clear indication of the operating systems and give him crucial information (if those machines are accessible to the Internet). Sure, there are other methods we can use to learn about one-machine operating systems. I can name banner grabbing for example. But what would happen if some of those methods will fail or be blocked? Than the idea I have presented in this paper will allow a malicious computer attacker to get the same results. I did expect that I would not able to use those fields. My initial assumption was that firewalls verify those fields as their standard behavior. Obviously I was wrong. 7
8 Why will this work with other types of firewalls as well? Reverse Proxies, Dynamic firewalls, Packet Filtering Firewalls, they all verify the fields they need in order to match the packets characteristics (SOCKETS pair) to their ACL s (or tables). This is done to determine if the traffic examined is allowed through the firewall (or not). Most of them look at the destination IP Address, destination Port, Source IP Address, Source Port to decide the packet s future routing. Taking proxies for example, some of them will not use brand new parameters for their connection with the target. They will change the Sockets pair information, and will be used as a tunnel for the probing. The information the reply will carry will not be harmed. It will be intact, just the sockets pair will change. A simple tunnel for our probes. Some might question the solution checking and validating those fields values; in saying it will slow down firewalls and other filtering devices activities. I say for them Why do we have firewalls / filtering devices in the first place? Is it just to protect my ports, or just to introduce a barrier for the hacker? Stop and think for a minute. Could I have the same defense with a host facing the Internet and no commercial firewall s protection? Of course I can. The firewall devices presented in today s market simply do not supply us with the solution. Will a very strict filtering rule base help me? It may help you. But all of your machines connected by an Internet host will be in danger for this probing method. Bare In mind: This is not only limited to the ICMP protocol only. Other protocols could be used easily as well. 8
ICMP Usage in Scanning 1
ICMP Usage in Scanning 1 Or Understanding some of the ICMP Protocol s Hazards Ofir Arkin The Sys-Security Group Founder ITCon Information Technology Consultants 2 Senior Security Analyst [email protected]
IPv6 Security from point of view firewalls
IPv6 Security from point of view firewalls János Mohácsi 09/June/2004 János Mohácsi, Research Associate, Network Engineer NIIF/HUNGARNET Contents Requirements IPv6 firewall architectures Firewalls and
Firewalking. A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Access Control Lists
Firewalking A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Access Control Lists Cambridge Technology Partners Enterprise Security Services David Goldsmith Senior Security Architect
Homework 3 TCP/IP Network Monitoring and Management
Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report
Host Fingerprinting and Firewalking With hping
Host Fingerprinting and Firewalking With hping Naveed Afzal National University Of Computer and Emerging Sciences, Lahore, Pakistan Email: [email protected] Naveedafzal gmail.com Abstract: The purpose
Subnetting,Supernetting, VLSM & CIDR
Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space
Network Scanning. What is a Network scanner? Why are scanners needed? How do scanners do? Which scanner does the market provide?
Network Scanning What is a Network scanner? Why are scanners needed? How do scanners do? Which scanner does the market provide? Where will our research go? Page : 1 Function - attacker view What hosts
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Innominate mguard Version 6
Innominate mguard Version 6 Application Note: Firewall Logging mguard smart mguard PCI mguard blade mguard industrial RS EAGLE mguard mguard delta Innominate Security Technologies AG Albert-Einstein-Str.
Firewall Implementation
CS425: Computer Networks Firewall Implementation Ankit Kumar Y8088 Akshay Mittal Y8056 Ashish Gupta Y8410 Sayandeep Ghosh Y8465 October 31, 2010 under the guidance of Prof. Dheeraj Sanghi Department of
Network and Services Discovery
A quick theorical introduction to network scanning January 8, 2016 Disclaimer/Intro Disclaimer/Intro Network scanning is not exact science When an information system is able to interact over the network
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
Internet Architecture and Philosophy
Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying
Lecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
What is a DoS attack?
CprE 592-YG Computer and Network Forensics Log-based Signature Analysis Denial of Service Attacks - from analyst s point of view Yong Guan 3216 Coover Tel: (515) 294-8378 Email: [email protected] October
Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
FIREWALL AND NAT Lecture 7a
FIREWALL AND NAT Lecture 7a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 3, 2015 Source of most of slides: University of Twente FIREWALL An integrated collection of security
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
Stateful Firewalls. Hank and Foo
Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation
allow all such packets? While outgoing communications request information from a
FIREWALL RULES Firewalls operate by examining a data packet and performing a comparison with some predetermined logical rules. The logic is based on a set of guidelines programmed in by a firewall administrator,
Instructor Notes for Lab 3
Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Quick Note 15. Quality of Service (QoS) on a TransPort router
Quick Note 15 Quality of Service (QoS) on a TransPort router UK Support August 2012 Contents 1 Introduction... 4 1.1 Outline... 4 1.2 Assumptions... 4 1.3 Version... 4 2 Scenario... 5 3 Configuration...
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
Looking for Trouble: ICMP and IP Statistics to Watch
Looking for Trouble: ICMP and IP Statistics to Watch Laura Chappell, Senior Protocol Analyst Protocol Analysis Institute [[email protected]] www.packet-level.com www.podbooks.com HTCIA Member,
Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks
Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks Document ID: 13634 Contents Introduction Understanding the Basics of DDoS Attacks Characteristics of Common Programs Used to Facilitate
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers
Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers So, what is path discovery and why is it important? Path discovery
EE984 Laboratory Experiment 2: Protocol Analysis
EE984 Laboratory Experiment 2: Protocol Analysis Abstract This experiment provides an introduction to protocols used in computer communications. The equipment used comprises of four PCs connected via a
Network Forensics: Log Analysis
Network Forensics: Analysis Richard Baskerville Agenda P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Two Important Terms PPromiscuous Mode
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC 192.168.0.25
NAT & IP Masquerade Page 1 of 5 INTRODUCTION Pre-requisites TCP/IP IP Address Space NAT & IP Masquerade Protocol version 4 uses a 32 bit IP address. In theory, a 32 bit address space should provide addresses
Firewalls und IPv6 worauf Sie achten müssen!
Firewalls und IPv6 worauf Sie achten müssen! Pascal Raemy CTO Asecus AG [email protected] Asecus AG Asecus AG Security (Firewall, Web-Gateway, Mail-Gateway) Application Delivery (F5 Neworks with BIGIP)
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm, Network IDS devices use passive network monitoring extensively to detect possible threats. Through passive
Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005
Firewall Testing Cameron Kerr Telecommunications Programme University of Otago May 16, 2005 Abstract Writing a custom firewall is a complex task, and is something that requires a significant amount of
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
04 Internet Protocol (IP)
SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
NETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Vulnerability Analysis 1 Roadmap Why vulnerability analysis? Example: TCP/IP related vulnerabilities
Network Layer: and Multicasting. 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 21-1 ADDRESS MAPPING The delivery
Lecture 5: Network Attacks I. Course Admin
Lecture 5: Network Attacks I CS 336/536: Computer Network Security Fall 2013 Nitesh Saxena Adopted from previous lectures by Keith Ross Course Admin HW/Lab 1 Due Coming Monday 11am Lab sessions are active
CSE 127: Computer Security. Network Security. Kirill Levchenko
CSE 127: Computer Security Network Security Kirill Levchenko December 4, 2014 Network Security Original TCP/IP design: Trusted network and hosts Hosts and networks administered by mutually trusted parties
FortKnox Personal Firewall
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
OS/390 Firewall Technology Overview
OS/390 Firewall Technology Overview Washington System Center Mary Sweat E - Mail: [email protected] Agenda Basic Firewall strategies and design Hardware requirements Software requirements Components of
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Yunfeng Fei, John Jones, Kyriakos Lakkas, Yuhong Zheng Abstract: In recent years many common applications have been modified
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
Firewall Stateful Inspection of ICMP
The feature categorizes Internet Control Management Protocol Version 4 (ICMPv4) messages as either malicious or benign. The firewall uses stateful inspection to trust benign ICMPv4 messages that are generated
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Algorithms and Techniques Used for Auto-discovery of Network Topology, Assets and Services
Algorithms and Techniques Used for Auto-discovery of Network Topology, Assets and Services CS4983 Senior Technical Report Brian Chown 0254624 Faculty of Computer Science University of New Brunswick Canada
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
IPV6 FRAGMENTATION. The Case For Deprecation. Ron Bonica NANOG58
IPV6 FRAGMENTATION The Case For Deprecation Ron Bonica NANOG58 BACKGROUND 2 Copyright 2013 Juniper Networks, Inc. www.juniper.net STATUS QUO In order to send a packet larger than the PMTU, an IPv6 node
Attack Lab: Attacks on TCP/IP Protocols
Laboratory for Computer Security Education 1 Attack Lab: Attacks on TCP/IP Protocols Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science
VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION
VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION copyright 2003 securitymetrics Security Vulnerabilities of Computers & Servers Security Risks Change Daily New
+ iptables. packet filtering && firewall
+ iptables packet filtering && firewall + what is iptables? iptables is the userspace command line program used to configure the linux packet filtering ruleset + a.k.a. firewall + iptable flow chart what?
Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
CSCI 7000-001 Firewalls and Packet Filtering
CSCI 7000-001 Firewalls and Packet Filtering November 1, 2001 Firewalls are the wrong approach. They don t solve the general problem, and they make it very difficult or impossible to do many things. On
P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis
Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for
Firewalls. Ahmad Almulhem March 10, 2012
Firewalls Ahmad Almulhem March 10, 2012 1 Outline Firewalls The Need for Firewalls Firewall Characteristics Types of Firewalls Firewall Basing Firewall Configurations Firewall Policies and Anomalies 2
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
How to protect your home/office network?
How to protect your home/office network? Using IPTables and Building a Firewall - Background, Motivation and Concepts Adir Abraham [email protected] Do you think that you are alone, connected from
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Linux Routers and Community Networks
Summer Course at Mekelle Institute of Technology. July, 2015. Linux Routers and Community Networks Llorenç Cerdà-Alabern http://personals.ac.upc.edu/llorenc [email protected] Universitat Politènica de
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes
Dynamic Host Configuration Protocol (DHCP) 1 1 Dynamic Assignment of IP addresses Dynamic assignment of IP addresses is desirable for several reasons: IP addresses are assigned on-demand Avoid manual IP
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
ECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Answers to Sample Questions on Network Layer
Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
Remote Network Analysis
Remote Network Analysis Torsten Hoefler [email protected] (DMZ), mostly between two packet filters and application gateways. The different possibilities to connect DMZ-hosts are also shown in Figure
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
netkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s)
netkit lab MPLS VPNs with overlapping address spaces Version Author(s) 1.0 S.Filippi, L.Ricci, F.Antonini E-mail Web Description [email protected] http://www.kaksonetworks.it/ A lab showing
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
Detection of illegal gateways in protected networks
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia [email protected] 1. Introduction In this
Denial Of Service. Types of attacks
Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Chapter 15. Firewalls, IDS and IPS
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
