Network and IoT Security Part 1 - Damola O.
Network and IoT Security Part 1 - Damola O.
DAMOLA O.
CISSP
To be covered…
What is a Network?
How does the Internet work?
OSI Model and TCP/IP Model
IP Addressing and Subnetting
Common Network Attacks
Wireless Vulnerability
Benefits of wired over wireless
How to secure your Network
Unsecure and Secure Protocols
Ports and Interfaces
Bluetooth Security
Quick Review – Authentication Types
Something you know
Type 1
E.g., password, memorable information, PIN
Type 1 is the cheapest and easiest to replace | Type 3 is the most expensive to implement and almost impossible to replace if something happens
A Typical Network on the surface level
Access Point
Google.com
Google.com
Internet
{or any other resources}
Many APs perform a lot of duties including: Routing, DHCP, DNS, Firewall services.
Manages LAN traffic by forwarding data only to
Switch the intended device, improving network
efficiency.
Switches DNS
Resolves domain names to IP addresses, allowing
devices to locate and connect to remote servers
or websites.
MAC addresses are unique to devices and theoretically should not be changeable | However we will see how this is possible in the lab
OSI
Application HTTP, Telnet, SNMP, FTP, TFTP, SNMP, POP3, DNS, DNSSec, DHCP,
Transport Layer
◦ TCP, UDP
Internet Layer
◦ IP, ICMP
Network Layer
◦ Undefined in TCP/IP – Frames/MAC addresses
IP
▪Best effort protocol
▪Logical 32-bit address
▪Routing
▪Performs fragmentation
▪Attacks:
◦ Smurf - ICMP attack using broadcast address
◦ Teardrop – fragmented IP packets
◦ Land – source and destination IP the same
◦ Address Spoofing – faking source address
IP attempts to deliver packets to the best of its abilities but does not make commitments about the delivery time or reliability of the data.
IP Fragmentation
IP (Internet Protocol) performs fragmentation when it needs to transmit an IP packet that is
larger than the Maximum Transmission Unit (MTU) of the underlying network. The MTU
represents the maximum size of a packet that a particular network can handle. When an IP
packet is too large to fit within the MTU of a network, IP fragmentation is used to break the
packet into smaller fragments, allowing it to traverse the network and be reassembled at the
destination.
IP
IPv4 – 32 bit
IPv6 – 128 bit Class Range A 1-126
address, written in
address, written in Number of
dotted decimal
hexadecimal hosts 16,777,214
octets
IP Classes Class B
B.B.X.X
255.255.0.0
C.C.C.X
Class C
255.255.255.0
Here are the 3 main classes of IP Addresses and their default subnets. Other classes include D and E.
Subnetting is a method used in networking to
divide a large IP address space into smaller, more
manageable segments.
Basic
Subnetting – B.B.X.X
172.16.200.10/16
255.255.0.0
Class Exercise
C.C.C.X
192.168.10.14/24
255.255.255.0
192.168.10.14/28 ?
Basic
Subnetting –
192.16.10.2/ 30 ?
up a notch!
192.168.10.14/18 ?
10.0.0.0
Private address 172.16.0.0 –
space 172.31.0.0
192.168.0.0
APIPA is mainly used in scenarios where a device can’t obtain a valid IP from a DHCP server, often due to network issues/unavailability of a DHCP server
ICMP –layer 3
◦ Low level network diagnostics
ICMP ◦ PING
◦ Traceroute
◦ ICMP Redirect
•Reliable, connection-oriented protocol
•Retransmits lost or damaged segments
•TCP header contains port and sequence numbers
•Three-way handshake
◦ Syn
TCP ◦ Syn/Ack
◦ Ack
•Attacks
◦ Session hijacking
◦ Syn flood
◦ Fraggle attack – UDP against broadcast address
TCP
An SA defines how IPsec should protect the communication between two endpoints
SSL
•Protocol used to secure HTTP connections
•Provides
◦ Data confidentiality
◦ Integrity control
◦ Server authentication
◦ Client authentication – optional
#netstat
Netstat –t {active internet connections}
Netstat –l {display listening server sockers}
Netstat –m {display masqueraded connections}
Netstat -a
Why would an attacker
want to change MAC
Addresses?
[email protected]
@L_damola_
Wireless & IoT Security