Network reconnaissance and IDS



Similar documents
CIT 380: Securing Computer Systems

Firewalls and Intrusion Detection

Network and Services Discovery

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

How To Understand A Network Attack

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

Remote Network Analysis

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Linux Network Security

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Lecture 5: Network Attacks I. Course Admin

Protecting Mobile Devices From TCP Flooding Attacks

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Chapter 8 Security Pt 2

Attack and Defense Techniques

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Divide and Conquer Real World Distributed Port Scanning

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Security: Attack and Defense

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Network Security CS 192

CS 356 Lecture 16 Denial of Service. Spring 2013

CSCE 465 Computer & Network Security

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Firewalls & Intrusion Detection

An Introduction to Nmap with a Focus on Information Gathering. Ionuț Ambrosie

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Coimbatore-47, India. Keywords: intrusion detection,honeypots,networksecurity,monitoring

Security of IPv6 and DNSSEC for penetration testers

Intrusion Detection Systems

Network Attacks and Defenses

Network Intrusion Detection Systems. Beyond packet filtering

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

Cloud security CS642: Computer Security Professor Ristenpart h9p:// rist at cs dot wisc dot edu University of Wisconsin CS 642

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Network Security Controls. CSC 482: Computer Security

Chapter 8 Network Security

CS Computer and Network Security: Firewalls

Host Fingerprinting and Firewalking With hping

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Denial of Service Attacks

Network Access Security. Lesson 10

A Very Incomplete Diagram of Network Attacks

Introduction of Intrusion Detection Systems

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

CS Computer and Network Security: Firewalls

Firewall implementation and testing

IDS / IPS. James E. Thiel S.W.A.T.

Chapter 6: Network Access Control

Attack and Defense Techniques 2

Detecting Forged TCP Reset Packets

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Secure Software Programming and Vulnerability Analysis

Solution of Exercise Sheet 5

Payment Card Industry (PCI) Executive Report 08/04/2014

Firewall Firewall August, 2003

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

nmap, nessus, and snort Vulnerability Analysis & Intrusion Detection

CSE543 - Computer and Network Security Module: Firewalls

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Payment Card Industry (PCI) Data Security Standard

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Intrusion Detection Systems. Darren R. Davis Student Computing Labs

Survey on DDoS Attack Detection and Prevention in Cloud

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka


Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security Toolsets for ISP Defense

CSC574 - Computer and Network Security Module: Firewalls

Cryptography and network security

10 Configuring Packet Filtering and Routing Rules

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Network Security Management

Host Discovery with nmap

Network attack and defense

CIS 433/533 - Computer and Network Security Firewalls

Ignoring the Great Firewall of China

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

CMPT 471 Networking II

Stop that Big Hack Attack Protecting Your Network from Hackers.

Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Course Content: Session 1. Ethics & Hacking

Attacks and Defense. Phase 1: Reconnaissance

Computer forensics

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Transcription:

Network reconnaissance and IDS CS642: Computer Security Professor Ristenpart h9p://www.cs.wisc.edu/~rist/ rist at cs dot wisc dot edu University of Wisconsin CS 642

Let s play over the network Target acquisinon Port scanning Host fingerprinnng, NMAP Network IDS basics Avoiding IDS University of Wisconsin CS 642

Target acquisinon OrganizaNon X ISP backbone How do we find vulnerable server(s) within a target organizanon? StarNng point: one or more publicly routable IP addresses - WHOIS queries are good way to find them - Can be used to idennfy blocks of IP addresses owned

WHOIS fun

We ve idennfied target (range of) IPs, now what? Host discovery Narrow broad swath of potennal IPs to ones that have hosts associated with them Service discovery For a parncular host, idennfy running services E.g., is it accepnng SSH connecnons (22) or HTTP (80)? OS fingerprinnng IdenNfy the OS so_ware version running E.g., Windows vs Linux? ApplicaNon fingerprinnng same at higher level Apache version 1.3 or 2.0+?

NMAP Network map tool De- facto standard for network reconnaissance, tesnng Numerous built in scanning methods

nmap PN st p 22 192.168.1.0/24

Some of the NMAP status messages open host is accepnng connecnons on that port closed host responds to NMAP probes on port, but does not accept connecnons filtered NMAP couldn t get packets through to host on that port. Firewall?

Port scan of host

Service discovery

nmap PN st p 22 192.168.1.0/24

Port scan of host

Service discovery

OS fingerprinnng

Another example

Network DMZ Web server Internet Customer databases Inner firewall IDS Outer firewall DMZ (demilitarized zone) helps isolate public network components from private network components Firewall rules to disallow traffic from Internet to internal services

Idle scans We want to avoid sending any non- spoofed packets to the target, but snll want to port scan it Salvatore (AnNrez) Sanfilippo 1998 So- called idle scan can enable this 1) Determine IPID of a zombie via SYN/ACK 2) Send SYN spoofed from zombie 3) Determine new IPID of zombie via SYN/ACK

Idle scans From h9p://nmap.org/book/idlescan.html

Idle scan From h9p://nmap.org/book/idlescan.html

PrevenNng idle scans How can we prevent our system from being a zombie?

Other idle scan type methods? Ensafi et al. Idle Port Scanning and Non- Interference Analysis of Network Protocol Stacks Using Model Checking, USENIX Security 2010 IPID is a side channel maybe there are others? RST rate SYN cache size

Idle scan: RST rate limit From Ensafi et al. 2010

SYN caches and SYN cookies SYN cache maintains state for outstanding TCP SYN requests received Finite amount of memory SYN cookie is mechanism for dealing with DoS When SYN cache is full, calculate response s ISN 5 bits Nmestamp t mod 32 3 bits Max Seg Size encoding 24 bits MD5(serverIP,serverPort,clientIP,clientPort,t)

Idle scan: SYN cache From Ensafi et al. 2010

Port scanning: legality United States Computer Fraud and Abuse Act (CFAA) Computer system access must be authorized Moulton v VC3 (2000). port scanning, by itself, does not create a damages claim (direct harm must be shown to establish damages under the CFAA). O. Kerr. Cybercrime s scope: InterpreNng access and authorizanon in computer misuse statutes. NYU Law Review, Vol. 78, No. 5, pp. 1596 1668, November 2003.

Network DMZ Web server Internet Customer databases Inner firewall IDS Outer firewall DMZ (demilitarized zone) helps isolate public network components from private network components Firewall rules to disallow traffic from Internet to internal services

CIDF (Common intrusion detecnon framework) Event generators (E- box) Analysis engine (A- box) From h9p://insecure.org/so/secnet_ids/secnet_ids.html

Two broad classes Anomaly detecnon What does normal traffic look like? Flag abnormal traffic Signature based Define some explicit traffic pa9erns as bad Flag them E.g., regular expressions

Basic NIDS setup From h9p://insecure.org/so/secnet_ids/secnet_ids.html

Some examples Snort (MarNn Roesch) Bro (Vern Paxson) 1999: 27,000 lines of C++ code

A9acking or bypassing NIDS How do we circumvent a NIDS? Web server Internet Customer databases Inner firewall IDS Outer firewall Overload a9acks, crash a9acks, subterfuge a9acks

Subterfuge a9ack example ttl=20 Attacker seq= 6... 9 USER ttl=12 ttl=20 10.. 13 nice 10.. 13 root Monitor (10 hops) ttl expires USER nice USER root?? (18 hops) Victim USER root Figure 2: A TTL-based evasion attack on an intrusion detection system memory any ti nection; these like to discard the associated blocks above a nity to scan the the block. But discard in-sequ Here we can controls only o stream of inter tacker controls data packets in the data once i nity to analyze from our assum correct functio spoofing filters purportedly co From Paxson, quence Bro: numbers A System 6 through for DetecNng 9 in the Network TCP data Intruders stream. in It Real- Time, is 1999

Anomalous, non- a9ack traffic Storms of 10,000s of FIN or RST packets due to protocol implementanon error Storms due to foggy days Fog in SF bay area killed a connecnon, causing rounng flaps and in turn rounng loops SYN packet with URG flag set Flags == SYN fails

Honeypots Systems that should have no leginmate traffic Isolated and monitored Any traffic routed to it is spurious High interacnon (e.g., a full system) Low interacnon (e.g., Honeyd) Honeynets, honeyfarms lots of honeypots Honeytoken email address credit card number

Honeypots and spam Feed Feed Received Distinct Name Description URLs Domains Feed A MX honeypot 32,548,304 100,631 Feed B Seeded honey accounts 73,614,895 35,506 Feed C MX honeypot 451,603,575 1,315,292 Feed D Seeded honey accounts 30,991,248 79,040 Feed X MX honeypot 198,871,030 2,127,164 Feed Y Human identified 10,733,231 1,051,211 Feed Z MX honeypot 12,517,244 67,856 Cutwail Bot 3,267,575 65 Grum Bot 11,920,449 348 MegaD Bot 1,221,253 4 Rustock Bot 141,621,731 13,612,815 Other bots Bot 7,768 4 Total 968,918,303 17,813,952 Table I: Feeds of spam-advertised URLs used in this study. We collected feed data from August 1, 2010 through October 31, 2010. From Levchenko et al., Click Trajectories: End- to- End Analysis of the Spam Value obtained Chain, IEEE seven Symposium distinct URL on Security feeds from and Privacy, third-party 2011 partners

From Levchenko et al., Click Trajectories: End- to- End Analysis of the Spam Value Chain, IEEE Symposium on Security and Privacy, 2011