Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
10 views
Week 9
b
Uploaded by
Madhushree S G
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save week 9 For Later
Download
Save
Save week 9 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
10 views
Week 9
b
Uploaded by
Madhushree S G
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save week 9 For Later
Carousel Previous
Carousel Next
Save
Save week 9 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 11
Search
Fullscreen
week 9What is Sniffing? + What is network analysis or Sniffing? + laa pean of anaying network act by capturing network ale + Sniferiss progam thet montor he data trveng around the network, + ample ols: Wieshar, Slain, Ks; burps and many others + Features ofa network analyzer or sniffer: 12) oppor for mute preted 1) Graphs userimertace Stu repert generation What is Wireshark? + Itis an open source tool for profiling network trafic and analyzing packets + Often eet ta as network ana, netwerk pote nae rst + can be downloaded Kom: bp /ynewdresharong + What i does really? * captures network ota and slays them in a readable format + Lopnetwak atte erlerenses and evidence + Andy network aff generated by varlous applets. How Packet Sniffer works? + Ethernet is the most widely used protocol used ina LAN. + athe atastekayer ee + While running Wireshark the machine's network interface card (NIC) ls put In ‘promiscuous mode. + Inthe mede, he ser cn red al traftc an the network segment to which the NCI ann ected respective of the sender andthe recelve) + Reques et prego Sette Cte promiscuous mode, + ithe LAN uses sth, then caches ram ther network sgment can captured Packet Capture using WiresharkDemonstration: Password Capture Sniffing Countermeasure + Restrict the physical access to the network media to ensure that a packet sniffer cannot be installed. + Use encryption to protect confidential information. + Permanently add the MAC address of the gateway to the ARP cache. + Use static IP addresses and static ARP tables to prevent attackers from adding the spoofed ARP entries for machines in the network. * Use IPv6 instead of IPva protocol Sniffing Countermeasure (contd.) “+ Use encrypted sessions such as SSH instead of Telnet, Secure Copy (SCP) instead Cf FTP, SSL for email connection, etc. to protect wireless network users against sniffing attacks. + Use HTTPS instead of HTTP to protect user names and passwords. + Use switch instead of hub as switch delivers data only to the intended recipient. + Use SFTP, instead of FTP for secure transfer of files. * Use PGP and s/MIPE, VPN, IPSec, SSL/TLS, Secure Shell SSH) and One-time passwords (OTP). Sniffing Detection ‘+ Nmap's NSE scrip allows us to check ifa target on a local Ethernet has its network card in promiscuous mode. + Command to detect NICin promiscuous mode: ‘nmap ~-script=snifierdetect [Target (P Address/Range of P add]Ettercap Sniffing Tools + Ettercap isa free and open source network security tool for man-in-the-middle attacks on LAN. + Itean be used for computer network protocol analysis and security aucitng, It ‘uns on various Unix-like operating systems including Linus, Mac OS X, BSD and, Solaris, and on Microsoft Windows. + ttis capable of intercepting traffic on a network segment, capturing passwords, and conducting active eavesdropping against a number of common protocols. + Ettercap has plugin support so that the features can be extended by addi plugins. Features of Ettercap + l-based Filtering: We can filter packets based on IP source and destination. ‘+ MAC-based Filtering: packets can be filtered based on MAC address, useful for sniffing connections through a gateway. * Character injection into an established connection: characters can be injected Into a server {emulating commands) orto a cient (emulating replies) while ‘maintaining alive connection. + SSH suppor: the sniffing ofa username and password, and even the data of ‘SSH connection. Ettercap isthe first software capable of sniffing an SSH connection in full duplex. Features of Ettercap ‘+ HTTPS support: the sniffing of HTTP SSL secured data—even when the connection is made through a proxy. + Plug-in support: creation of custom plugins using Ettercap's APL + Packet filtering/dropping: setting up a filter that searches fora particular string {orhexadecimal sequence) in the TCP of UDP payload and replaces it with a custom string/sequence of choice, or drops the entire packet. + TCP/IP stack fingerprinting: determine the OS of the victim host and its networ adapter. + And many more features available. BurpSuite Sniffing Tools + Burpsuit is an integrated platform for performing security testing of web applications. * The tool is written in ava and developed by PortSwigger Security. + Itcan be used for computer network protocol analysis and security auditing. It thas two versions free version and a professional version,applications. * The tool is written in Java and developed by PortSwigger Security. + It'can be used for computer network protocol analysis and security auditing. It hhas two versions free version and a professional version. ——E—( its Various Modules of BurpSuite + Target: The target tool glves an overview of target applications content and functionality. + Proxy: Gives direct view of how target applications works by working as proxy server or as a man-in-the-middle between you and your server such that you can intercept, inspect and modify the raw traffic. + Spider: Used for automotive crawling web applic ions. * Scanner: Used for finding vulnerabilities in web applications. + Intruder: itis used for automating customized attacks against web applicay + Repeater: Is used for manipulating and reissuing HTTP requests and Demonstration: Sniffing using Burpsuit ® sat) © NPTEL ONLINE CERTIFICATION COURSES ThankOe De Social Engineering Attack * Social engineering is the art of convincing people to reveal confidential Information. + Social engineers ure targets to provide information by promising someting for noting (greedines). * Common targets of social engineering + Help desk personnel + Technical support executives + System administrators + Frustrated employees etc. Phases in a Social Engineering Attack ‘a)_ Research on Target Company: + Dumpster diving, websites, employees, tour company, ee b) Select Victim: * Select most vulnerable victim suchas greedy employee. ©). Develop Relationship: g + Develop relationship wih the selected victim. 4) Exploit the Relationship: + Collet sensitive information such as financial information, current technologies ete Types of Social Engineering Attack a) Human-based Social Engineering: + Collect sensitive information by direct interaction with victims. bb). Computer-based Social Engineering + Social engineering i carried out withthe Delp of computers. ©). Mobile-based Social Engineering: + Social engineering i cared outwith the help of mobile applications. (a) Human Based Social Engineering + Impersonation: + The attacker pretends tobe Someone legitimate or authored erin ~ ost conn. + Reverse Socal Engineering: + Asiuation in whch a attacker retention authority and the age seks is advice offering the Information hate needs. + Plggybacking: i + An authored prion allows teins or unintertionay) an nauthoaed erin to pss tirougha secure door. “orgot my 10 badge at home. Peas help me(a) Human Based Social Engineering (contd.) + Tailgating: + An unauthorized person, wearing a fake IO badge, enters secured area by closely following an authoried person though a door requiring key access. + Eavesdropping: + interception of au, video, or written communication. can be done using communication channels suchas telephone nes, mal Instant messaging, et + Shoulder Surfing: + Uses direct observation techniques such as looking over Someone's shoulder to get Information suchas password, PINs, account numbers, et. (b) Computer-based Social Engineering + Pop-up Windows: + Windows that suddenly appears while suring the Intemet and ask for users information to Jogi. or sinn or fr prowling help. * Chain Letters: + Chain eters are mals that offer free gis suchas money and sofware on the condition ‘that the user has to forward the malo thessid numberof persons. + Instant Chat Messenger: + Gathering personal information by chating with a selected online user to get iformation such as bith dats, malden ames, ema comtact information et. {b) Computer-based Social Engineering (contd.) + Phishing: + Anillgtimate email falsely claiming tobe from alegimate ste attempts to acquire the ‘users personal or account information. Pishing emails or pop-ups redirect users to fake webpages of miicking trustworthy sites that as them to submatthelr personal information. * Spear Phishing +A direct, targeted phishing attack aimed at Speci indviduals within an organization. ‘Attackers senda message wth spedalzed, socal engineering content avec ata specie person ora smal group of people. {c) Mobile-based Social Engineering + Publishing Malicious Apps, Fake Security Applications: + srackers create malicious apps with attractive features and sinor names to that of popular apps, and publish them on major app stores. Unaware users download these apps and get infected by maiware that sends credentials to attackers, + Using SMS: E + Send messages which loos like very important message frm bank/company etc and need urgent cal inthe gven number. + Viti calito check account then attacker asks for information such as ereit/deit card numbers ec.Demonstration: Phishing using SEToolkit Social Engineering Countermeasures + Good policies and procedures are ineffective if they are not taught and reinforced by the employees. + Password Policies: + Pesodc password change, Avoiding guessabe passwords, Account blocking afer faled attempts. se + Physical Security Policies: + entiation of employees by issuing IO card, uniforms, ete Escorting the vistors, Access area restrictions Social Engineering Countermeasures (contd.) «Training: + lnclude at ecurty poles and methods to Increase awareness on social engineering. + Access privileges: + There should be administrator, user, and quest accounts with proper authorization. + Classification of information: S + Categorize the information s top secret, proprietary, for Internal use, for public use, ee + Background Check and Proper Termination Process: «+ lnsiders with a criminal background and terminated employees are easy targets Social Engineering Countermeasures (contd.) + Anti-Virus/Antl-Phishing Defenses: + Use multiple layer of anrus defenses at end-user and mall gateway levels to minimize socal engineering attack. + Two-Factor Authentication: + instead of ined passwords, use two-factor Suhentication for high-risk metwork services such {38 VPNs and modem poo!Denial-of-Service Attack + tis an attack on a computer or network that reduces, restricts or prevents accessibility of system resources to its legitimate users. + na D0S attack attackers flood a vitim system with nor-leitimate service requests or traffic to overioad its resourees. + ieastounaroobty of parulr webs dnd show network performance * Adistributed denial-of-service (DDoS) attack involves a multitude of compromised systems attacking a single target, thereby causing denial of service for users ofthe targeted system. DoS / DDoS Attack Techniques + Bandwidth Attacks: * Overwhelm network equipment + Tteannot be done using single system, an attacker uses several computersto flood victim + SYN Attack: +The attacker sends large umber of SYN request to ici server with foe source IP adresses. + The target machine sends back 2 SYN/ACK In response othe request and wats forthe ACK. te compete the sesion setup. + The target machine doesnot get the response because the source address fake, DoS / DDoS Attack Techniques (contd.) aw i how most hots implement the TCP tvee-way handshake, + When Host 8 receives the SYN request fom A, I must kep trac ofthe partially opened onnertion in a "isten queve" for atleast 75 seconds. + Amalicous host can exploit the small ie ofthe fsten queue by sending multiple SYN ‘request the a host, but never rephying tothe SYN/ACK. ‘+ TEMP Flood attack: + The attacer senda large numberof ICMP packets directly or through refetion networks ta victims causing Ito be overwhelmed and subsequently stop responding testa Tepe eequests DoS/DDoS Attack Techniques (cont.) + Application-Level Flood Attacks: ‘+ Ths results in the loss of services of a particular network, suchas emals, network resources, the temporary ceasing of applications and services, and more. +The attackers exploit weaknesses in programming source code to prevent the application {rom processing eptimate request. + Using application evel food attacks, attackers attempt to: a) Food web applications to legitimate user afc, (b) Disrupt sevice toa speci system or person for example, Docking a user’ access by repeating imalid login attemptsBotnets * Bots are software applications that run automated tasks over the Internet and perform simple repetitive tasks, such as web spidering and search engine indexing * Abotnet is a huge network of the compromised systems and can be used by an attacker to launch denial-of-service attacks. DoS / DDoS Attack Tools: Slowloris * This s the most effective tool for DDoS attack. It works by opening thousands of ‘connections to the targeted web server and holding them open for a long time. + This s achieved by sending partial HTTP requests, and none of them will be completed ever. It requires minimal bandwidth to target web server and no after effects DoS / DDoS Attack Tools: Low Orbit lon Cannon (LOIC) 1 open source network stress testing and Dos attack software writen in CH. + This too performs a DOS attack by sending UDP, TCR. or HTTP on the target with the intention ‘of carving its services + 1s mainly used for DoS attack on small serv. It is avalible on Linus, Windows, and Ane as wel, * LOIC basically turns computer's network connection into a firehose of garbage requests, directed towards a target web server. DoS / DDoS Attack Tools: RUDY (R U Dead Yet ?) + RU.OY. is 2 popular low and slow attack tool that is designed to crash a web server by submitting long form fields. + The attack browses the target website and detects embedded web forms. Once the forms ae dentifed, it sends a legitimate HTTP POST request with an abnormally lng ‘content-length’| header eld and then starts ilectig the form with information, one bye-sed packet at 2 time. ‘+ Many more tools are available.Demonstration: LOIC Tool Countermeasures * Shut down all the services until the attack has subsided. * Install anti-virus and anti-Trojan software and keep these up-to-date. * Increase awareness of security issues and prevention techniques. * Disable unnecessary services, uninstall unused applications, and scan all the files received from external sources. : * Increase bandwidth on critical connections to absorb additional traffic generated by an attack. * Replicate servers to provide additional failsafe protection.
You might also like
Certified Ethical Hacker (CEH) v12 Outline
PDF
100% (1)
Certified Ethical Hacker (CEH) v12 Outline
8 pages
SYCS TimeTable
PDF
No ratings yet
SYCS TimeTable
3 pages
TYPES OF HACKING
PDF
No ratings yet
TYPES OF HACKING
73 pages
Week 9
PDF
No ratings yet
Week 9
57 pages
Cyber Security
PDF
No ratings yet
Cyber Security
17 pages
The Absolute Beginners Guide To Cyber Security Hand Book
PDF
No ratings yet
The Absolute Beginners Guide To Cyber Security Hand Book
14 pages
Study Material
PDF
No ratings yet
Study Material
54 pages
Network Attacks
PDF
No ratings yet
Network Attacks
6 pages
CYBER SECURITY
PDF
No ratings yet
CYBER SECURITY
22 pages
cybersecurity model1
PDF
No ratings yet
cybersecurity model1
80 pages
Ethical Hacking and Prevention: Course Contents
PDF
No ratings yet
Ethical Hacking and Prevention: Course Contents
4 pages
EH
PDF
No ratings yet
EH
2 pages
CSDS Lecture Week 7
PDF
No ratings yet
CSDS Lecture Week 7
6 pages
LAPINIG
PDF
No ratings yet
LAPINIG
10 pages
Ethical Hacking and Prevention Course Details in PDF
PDF
No ratings yet
Ethical Hacking and Prevention Course Details in PDF
24 pages
What Is Security?: Some Differences Between Traditional Security and Information Security
PDF
No ratings yet
What Is Security?: Some Differences Between Traditional Security and Information Security
8 pages
Ceh Session 3
PDF
No ratings yet
Ceh Session 3
5 pages
CompTIA-Security-notes - CompTIA Security+ SY0-601 Notes (Passed 788 Points)
PDF
100% (1)
CompTIA-Security-notes - CompTIA Security+ SY0-601 Notes (Passed 788 Points)
36 pages
Network Security Threats and Mitigation Strategies
PDF
No ratings yet
Network Security Threats and Mitigation Strategies
36 pages
Certified Information Security Expert (CISE Level 1 v2) Detailed Course Module
PDF
100% (1)
Certified Information Security Expert (CISE Level 1 v2) Detailed Course Module
18 pages
Certified Information Security Expert (CISE Level 1 v2) Detailed Course Module
PDF
No ratings yet
Certified Information Security Expert (CISE Level 1 v2) Detailed Course Module
18 pages
Ethical: Hacking and
PDF
No ratings yet
Ethical: Hacking and
4 pages
Enhanced Presentation1
PDF
No ratings yet
Enhanced Presentation1
25 pages
Merabi Takashvili MC650 Chapter4 Detailed Assignment
PDF
No ratings yet
Merabi Takashvili MC650 Chapter4 Detailed Assignment
3 pages
MTC_Module 9-IAS101
PDF
No ratings yet
MTC_Module 9-IAS101
9 pages
Unit 1
PDF
No ratings yet
Unit 1
59 pages
Ethical Hackingpptx
PDF
No ratings yet
Ethical Hackingpptx
46 pages
Foot Printing:: Footprinting Means Gathering Information About A Target System Which Can
PDF
No ratings yet
Foot Printing:: Footprinting Means Gathering Information About A Target System Which Can
18 pages
Chap 6 ETI Types of Hacking
PDF
100% (1)
Chap 6 ETI Types of Hacking
67 pages
Ethical Hacking Training
PDF
No ratings yet
Ethical Hacking Training
31 pages
Lecture 03 Network Security
PDF
No ratings yet
Lecture 03 Network Security
18 pages
Computer Security (Chapter-2)
PDF
No ratings yet
Computer Security (Chapter-2)
43 pages
Domain-5 Notes PDF
PDF
No ratings yet
Domain-5 Notes PDF
20 pages
Curriculum Ethical Hacking
PDF
No ratings yet
Curriculum Ethical Hacking
4 pages
CSE 477: Introduction To Computer Security
PDF
No ratings yet
CSE 477: Introduction To Computer Security
37 pages
Module 1_EHDF
PDF
No ratings yet
Module 1_EHDF
66 pages
System Hacking and Sniffing
PDF
No ratings yet
System Hacking and Sniffing
8 pages
EHDF Module 1 to 3
PDF
No ratings yet
EHDF Module 1 to 3
209 pages
Packet Sniffing and Sniffing Detection: Ruchi Tuli
PDF
No ratings yet
Packet Sniffing and Sniffing Detection: Ruchi Tuli
11 pages
4.hacking (Autosaved)
PDF
No ratings yet
4.hacking (Autosaved)
91 pages
ETHICAL HACKING Root Kits Sniffers and DDOs
PDF
No ratings yet
ETHICAL HACKING Root Kits Sniffers and DDOs
35 pages
Software System Security Tool: Submitted by
PDF
No ratings yet
Software System Security Tool: Submitted by
17 pages
System Security Tool: Submitted By: Ravi Kumar Amitesh Kumar Vaibhav Gomber Amit Giri
PDF
No ratings yet
System Security Tool: Submitted By: Ravi Kumar Amitesh Kumar Vaibhav Gomber Amit Giri
17 pages
Ceh Quizlet
PDF
No ratings yet
Ceh Quizlet
13 pages
Packet Sniffing SKJ
PDF
100% (1)
Packet Sniffing SKJ
33 pages
2095 ALI SHAFQAT SHAFQAT SAGHIR - Final 9890 982598084
PDF
No ratings yet
2095 ALI SHAFQAT SHAFQAT SAGHIR - Final 9890 982598084
12 pages
0 - Muc Luc
PDF
No ratings yet
0 - Muc Luc
3 pages
CEH Module 8
PDF
No ratings yet
CEH Module 8
76 pages
1713442552250ethecial Hacking V12
PDF
No ratings yet
1713442552250ethecial Hacking V12
5 pages
Introduction To Cibercrimes - Ethical Hacking
PDF
No ratings yet
Introduction To Cibercrimes - Ethical Hacking
22 pages
Ethical Hacking
PDF
83% (6)
Ethical Hacking
51 pages
Ethical Hacking: College Presentation
PDF
100% (1)
Ethical Hacking: College Presentation
32 pages
Organisational Systems Security: TOPIC 1: Potential Threats To ICT Systems and Organization
PDF
No ratings yet
Organisational Systems Security: TOPIC 1: Potential Threats To ICT Systems and Organization
46 pages
CompTIA Security+
PDF
No ratings yet
CompTIA Security+
75 pages
TCP IP Hijacking
PDF
100% (1)
TCP IP Hijacking
4 pages
Class 2 - Network Security Threats, Vulnerabilities and Attacks
PDF
No ratings yet
Class 2 - Network Security Threats, Vulnerabilities and Attacks
42 pages
Mini project front pages
PDF
No ratings yet
Mini project front pages
7 pages
Mca No
PDF
No ratings yet
Mca No
5 pages
Devops Syllabus
PDF
No ratings yet
Devops Syllabus
4 pages
SQL Basic Commands
PDF
No ratings yet
SQL Basic Commands
5 pages
Unit - 1 Summary CPRGM
PDF
No ratings yet
Unit - 1 Summary CPRGM
11 pages
45 - Event Management System-Synopsis
PDF
No ratings yet
45 - Event Management System-Synopsis
6 pages