Module4.1
Module4.1
Network Forensics
Part 1
1. Introduction to Network Forensics
Network Forensics is a branch of digital forensics that mainly deals with
the investigation of events and activities related to digital networks.
To collect evidence.
To analyse network traffic data, which is collected from different sites and
different network equipment such as firewalls and intrusion detection
systems (IDS).
1
3. Password Cracking
Maximum time individuals use name and password to gain access to any system.
Passwords are very easy to be cracked by the hacker and then the hacker can use
that password to imitate the genuine user.
4. Social Engineering
1. Dictionary Attack: An attack that takes advantage of the fact people tends to
use common words and short passwords. The hacker uses a list of common
words, the dictionary and tries them, often with numbers before and/or after
the words, against accounts in a company for each username. (Usernames are
generally pretty easy to determine as they are almost universally based on the
names of the employees.)
2
4. Key Logger Attack: A cybercriminal manages to install software that tracks the
user’s keystrokes, enabling the criminal to gather not only the username and
password for an account but exactly which website or app the user was logging
into with the credentials. This type of attack generally relies on the user first
falling prey to another attack that installs the malicious key logger software on
their machine.
5. Social Engineering Attacks: This attack refers to the broad range of methods to
obtain information from the user. The methods which are used here:
Phishing: Emails, text etc. sent to fool users into providing their credentials,
clicking a link that installs malicious software or going to a fake website.
Spear Phishing: Similar to phishing but with better crafted, tailored
emails/texts which rely on information already gathered about the users.
For example, a hacker may know that the user has a particular type of
insurance account and reference it in the email or use the company’s logo
and layout to make the email seem more legitimate.
Baiting: Attackers leave infected USBs or other devices in public or
employer locations in the hopes that these will be picked up and used by
the employees.
3
7. Deactivate LAN Manager authentication on windows network.
8. Confirm that passwords are never sent across the network in plain text
format.
9. Use anti sniffer software and sniffer detection techniques to protect against
hackers who try to capture passwords travelling across the network.
4. Technical Exploit:-
Some popular technical exploit hackers use to gain access or interrupt
communication on networks. Some of those are:
1. Protocol Exploits:
Protocol exploits use the features of a protocol, like the handshake
method TCP uses to create a communication session, to attain a result that was
never planned, for example, overpowering the targeted system to the point
where it is unable to communicate with genuine users.
a. DOS Attacks that exploit TCP/IP: DOS attacks are one of the most widespread
collections of internet attackers who want to disrupt a network’s actions. In
February 2000, DOS attacks brought down several of the world’s biggest
websites, together with Yahoo.com and Buy.com.
4
DOS attack types include:
The source path is choice in the IP header that allows the sender to overrule
routing decisions that are normally made by the router between the source and
destination machines. Network administrators use source routing to map the
network or for troubleshooting routing and communication problems. It can also
be used to force traffic through a route that will provide the best performance.
Unfortunately, source routing can be exploited by hackers.
c. Other Protocol Exploits: The attacks we have discussed so far involve exploiting
some feature or weakness of the TCP/IP protocols. Hackers can also exploit
vulnerabilities of other common protocols such as HTTP, DNS, Common Gateway
Interface (CGI) and other commonly used protocols.
5
2. Application Exploits:
Application software exploits are those that take benefit of the flaws of
b. Mail Bombs:
A mail bomb is a means of overwhelming a mail server, causing it to stop
functioning and thus denying service to users.
A mail bomb is a relatively simple form of attack, accomplished by
sending a massive quantity of email to a specific user or system.
Programs available on hacking sites on the internet allow a user to easily
launch a mail bomb attack, automatically sending floods of email to a
specified address while protecting the attacker’s identity.
The solution to repeated mail bomb attacks is to block traffic from the
originating network using packet filters.
c. Browser Exploits:
Web browsers are customer software programs like Chrome, Netscape and
Opera that attach to servers running web server software like IIS or Apache
and request web pages via URL, which is a responsive address that indicates
an IP address and specific files on the server at that address. The browser
receives files that are encoded and must understand the code that governs
6
how the page will be displayed on the user’s display screen. Browsers are
open to a number of types of attack.
3. We Server Exploits: Web server host web pages that are made
reachable and manageable to others across the internet or an intranet.
7
3. Operating System Exploits:
Some exploits are unique to a particular operating system or family of
operating systems. These hacks exploit specific characteristics of the operating
system code to carry out the attack. All operating systems have their own
vulnerabilities.
i. A TCP/IP connection is established with the target IP address, using port 139
(the NETBIOS port).
ii. Then the program sends data using a flag called MSG_OOB (or urgent) in the
packet header.
iii. This flag instructs the computer’s Winsock to send data called out-of-band
data.
iv. Upon receipt of this flag, the targeted windows server expects a pointer to the
position in the packet where the urgent data ends, with normal data following,
but the OOB pointer in the packet created by WinNuke points to the end of the
frame, with no data following.
b. Router Exploits:
Many of the new cheap routers intended for broadband connections come
with default administrator passwords that can be used on any of the vendor’s
devices, if the administrator does not change the password. This means the
hacker with the knowledge of the default password could log on and make
changes to the routing table or router configuration.
8
5. Network Attacks: -
i. Passive Attack:
A passive attack is a type of attack where the attacker simply monitor the
network activity as a part of reconnaissance. A Passive attack is difficult to
detect, because the attacker is not actively attacking any target machine or
participating in network traffic. An example of an passive attack is an attacker
capturing packets from the network.
Prevention: Potential threats from passive attacks can be eliminated by
implementing good network encryption.
9
v.Distribution Attack:
Distribution attacks are the attacks using backdoors introduced to
hardware or software systems at the time of manufacture. Once the hardware
or software became functional, attacker can leverage the backdoor to attack
the target devices.
Prevention: Trusted hardware/software vendors and integrity checks can
prevent distribution attacks.
10
7. Intrusion Detection System (IDS): -
An Intrusion Detection System (IDS) maintains network traffic looks for unusual
activity and sends alerts when it occurs. The main duties of an Intrusion Detection
System (IDS) are anomaly detection and reporting; however, certain Intrusion
Detection Systems can take action when malicious activity or unusual traffic is
discovered.
11
A) Features of IDS: -
6. IDS detects error in system configuration and it also detects and cautions if
the system is in danger.
12
B) Offerings of IDS: -
The IDS will offer the following:
1. Add a superior degree of integrity to the remainder of your infrastructure.
4. Automate a task of observation the net finding out the most recent attacks.
8. Guide system supervisor within the important step of building a policy for
your computing assets.
13
7. Analyse all the traffic on a busy network.
C) Types of IDS: -
Intrusion Detection system can be classified into different ways. Those are:
1. Active IDS
2. Passive IDS
1. Active IDS:
It is also called Intrusion Detection and Prevention System (IDPS). Systems
that are configured to automatically block mistrusted attacks in progress without
any interference required by an operator, are called active IDS. IDPS has the
advantage of providing real-time corrective action in reaction to an attack, but
has many disadvantages also.
2. Passive IDS:
The system that is configured only to observe and analyse network traffic
activity and alert an operator to potential vulnerabilities and attacks is called
passive IDS. It cannot perform any protective or corrective functions on it’s own.
It only detects and alerts the user about it.
14
Network intrusion detection systems (NIDS) are set up at a planned point
within the network to examine traffic from all devices on the network.
The advantage of Network based IDS is that, it can be deployed easily and
at low cost, without having to be loaded for each system.
The agents monitor the operating system directly and write data to log files
and/or trigger alarms. A Host Intrusion Detection system (HIDS) can only
monitor the individual workstations on which the agents are installed and it
15
cannot monitor the entire network. Host based IDS systems are used to
monitor any intrusion attempts on critical servers.
The advantage of this system is, it can accurately monitor the whole system
and does not require installation of any other hardware.
16
An advantage of this system is, it has more accuracy and standard alarms
understood by user.
Higher false alarms are often related with behaviour-based intrusion detection
system.
An advantage of this system is they can detect new and unique attacks.
Examine packet headers and entire Does not see packet headers.
packet.
17
No overload. Overload.
Slow down the networks that have IDs Slow down the hosts that have IDS
clients installed. clients installed.
Detects network attacks, as payload is Detects local attacks before they hit
analyzed. the network.
Does not perform normally detection Powerful tool for analyzing a possible
of complex attacks. attack because of relevant information
in database.
18
An Intrusion Prevention System (IPS) is a network security technology that
examines network traffic for signs of potential security threats and takes
action to prevent them.
IPS uses a combination of signature-based and anomaly-based
detection methods to identify potential threats. Signature-based detection
involves comparing network traffic to a database of known signatures or
patterns of malicious activity. Anomaly-based detection, on the other hand,
involves identifying deviations from normal network behavior.
IPS works by monitoring network traffic in real-time and analyzing it for
potential security threats. When IPS detects a potential threat, it takes
action to prevent it. The action taken by IPS depends on the configuration
and the severity of the threat.
IPS also provides valuable information about the nature of the attack,
including the source IP address, the type of attack, and the affected
devices. This information can be used to analyze the attack and develop
countermeasures to prevent future attacks.
1. IP Spoofing
2. ARP Spoofing
3. DNS Spoofing
1. IP Spoofing:
The simple procedure for sending data over the internet and many other
computer networks is the Internet Protocol. It also contains the usage of a
reliable IP address that can be used by network invaders to overcome network
security measures, like authentication based on IP addresses. To insist on, that it
came from an IP address other than the genuine source IP spoofing deals with
varying the packet headers of the message.
2. ARP Spoofing:
The ARP cache is preserved and maintained by the Address Resolution
Protocol (ARP). This is the table that maps IP addresses to MAC (physical)
addresses of computers on the network. The MAC address is used at the physical
level to locate the destination computer to which the message should be
delivered, this is the reason why this cache is necessary. A broadcast message
sent by ARP to all the computers on the subnet, if there is no cache entry for a
particular IP address requesting that the machine with the IP address in question
respond with it’s MAC address. This mapping then gets added to the ARP cache.
21
The method of sending forged replies that result in incorrect entries in the cache
is also called ARP poisoning or ARP spoofing.
3. DNS Spoofing:
DNS Spoofing, also called as DNS cache poisoning. It is a form of hacking in
which unethical domain name system data is familiarized into a DNS resolver’s
cache, triggering the name server to yield an incorrect IP address, distracting
the traffic to the invader’s computer. Spoofing attacks can cause severe safety
difficulties for DNS servers susceptible to such attacks.
2. Using the recursive mechanism of DNS to expect the request that a DNS
server will send and responding with counterfeit information.
This technique can even be used to fraud the victim into providing personal
information through web forms.
22