EECS3482 1 Introduction Winter2023 Part8 Posted
EECS3482 1 Introduction Winter2023 Part8 Posted
)
d) Spoofing
insertion of forged Internet identification data in order to
gain an illegitimate advantage (in packets, web-requests,
emails)
types of spoofing
IP Spoofing – creation of IP packets with a forged source IP
address, e.g. for the purpose of ‘passing through a firewall’
Firewall rule:
Hacker’s IP: block all packets coming
192.168.0.25 from: 192.168.0.25
Threat Events: Software Attacks (cont.)
types of spoofing (cont.)
Email Address Spoofing – creation of email messages with
a forged sender address, e.g. for the purposes of social
engineering and data phishing
Threat Events: Software Attacks (cont.)
types of spoofing (cont.)
Referrer or User Agent Spoofing – creation of HTTP requests
with forged fields in order to gain access to a protected web-site
* some sites allow access to their material only from certain
approved (login) pages and/or only to humans
Threat Events: Software Attacks (cont.)
e) Sniffing
use of a program or device that can monitor data
traveling over a network
unauthorized sniffers can be very
dangerous – they cannot be detected,
yet they can sniff/extract critical
information from the packets traveling
over the network
wireless sniffing is particularly simple,
due to the ‘open’ nature of the
wireless medium
popular sniffers:
Wireshark – wired medium
Cain & Abel – wireless medium
Kismet – wireless medium
Threat Events: Software Attacks (cont.)
f) Man-in-the-Middle Attacks
gives an illusion that two computers are communicating
with each other, when actually they are sending and
receiving data with a computer between them
spoofing and/or sniffing can be involved
examples:
passive – attacker records &
resends data at a later time
(acts as a signal/packet
repeater)
192.168.1.23
http://hackingplayground.blogspot.ca/2012/01/hacking-facebookgmailhotmail-using-set.html
Threat Events: Software Attacks (cont.)
Social Engineering
process of using social skills to manipulate people into
revealing vulnerable information
either by believing that an email came from a legitimate person
or believing that a web-site is the real web-site, or both!
http://www.itknowingness.com/page/2/
Threat Events: Software Attacks (cont.)
http://www.informacija.rs/Clanci/Phishing-Obmanjivanje-korisnika.html
Threat Events: Software Attacks (cont.)
i) Pharming – involves a fake Web-site (remember Lab 1)
phishing is accomplished by getting users to type in or
click on a bogus URL
pharming redirects users to false website without them
even knowing it – typed in or clicked on URL looks OK
performed through DNS
poisoning – user’s local
DNS Cache or DNS server
are ‘poisoned’ by a virus
http://www.itmatrix.com/FraudManagement/AntiPharming.html
poisoned
DNS server
Threat Events: Software Attacks (cont.)
• Biggest Challenge of – How much security?!
Information Security
Information security should balance protection & access
- a completely secure information system would not allow
anyone access!