Phase3: Gaining Access Using Network Attacks
Phase3: Gaining Access Using Network Attacks
Sniffer
Allows attacker to see everything sent across the
some exploit
Attacker installs a sniffer to capture userIDs
and passwords to take over other machines
Passive Sniffers
Sniffers that passively wait for traffic to be
sent to them
Well suited for hub environment
Snort
Sniffit
Active Sniffers
Effective in sniffing switched LANs
Injects traffic into the LAN to redirect
Dsniff
Active sniffer
http://www.monkey.org/~dugsong/dsniff
Runs on Linux, Solaris, OpenBSD
Excels at decoding a large number of
flooding or arpspoof
Dsniffs Arpspoof
Used in switched environment where MAC
Dsniffs DNSspoof
redirects traffic by sending false DNS
information to victim
Attacker initially activates arpspoof and
dnsspoof
When victim tries to browse a web site, a
DNS query is sent but the attacker sends a
poisoned DNS response
Victim unknowingly communicates with
another web server
public keys
Dsniffs Webmitm
Program used to proxy all HTTP and
HTTPS traffic
acting as an SSL proxy, webmitm can
establish two separate SSL connections
One connection between victim and attacker
One connection between attacker and web
server
victim
Figure 8.12 Webmitms output shows entire content of SSLencrypted session, including the userID and password
Dsniffs sshmitm
Allows attacker to view data sent across an
SSH session
Supports sniffing of SSH protocol version 1
Sniffing Defenses
Use HTTPS for encrypted web traffic
Use SSH for encrypted login sessions
Avoid using Telnet
Use S/MIME or PGP for encrypted email
Pay attention to warning messages on your
IP Address Spoofing
Changing or disguising the source IP
address
used by Nmap in decoy mode
Used by Dsniff in dnsspoof attack
DNS response sent by Dsniff contains source
address of the DNS server
1.
2.
3.
4.
5.
6.
IP Spoofing Defenses
authentication
and firewalls
Innocent user thinks that his session was lost, not stolen
returned to victim
Message is sent to victim to type certain number of keys to
increment victims sequence number
Netcat
Network version of cat utility
Allows user to move data across a network using
Vulnerability Scanning
using Netcat
Finds RPC vulnerabilities
Finds NFS exports whose file systems can
be viewed by everyone
finds machines with weak trust relationship
Finds machines with very weak passwords
Finds buggy FTP servers
Vulnerability scanning is limited compared
to Nessus
Netcat Defenses
Configure firewall to limit