VisualizingNetworkAttacks-0 4
VisualizingNetworkAttacks-0 4
Eric Conrad
http://www.ericconrad.com
April 2009
Showing weaknesses of
DES ECB mode
Left image is BMP, right image
is same BMP encrypted in ECB
mode
DAVIX
DAVIX is a live CD
for data analysis
and visualization
Available at
http://secviz.org/
Burn ISO to CD,
and boot your
laptop into a rich
visualization
environment
6
A word on tools
All tools mentioned in this paper are on
the DAVIX 1.0.1 distribution
All graphics used in this paper were
generated directly from the DAVIX live CD
You may download all scripts in this paper
at http://files.ericconrad.com/vizcurrent.tgz
All example commands in this paper will
work directly on the DAVIX live CD
9
Dot
Dot is a language used to describe
graphs
Example digraph (directed graph) in
dot language, and resulting image:
digraph directed{
A -> B -> C;
B -> D;
}
10
Afterglow
Afterglow takes CSV files as
input and creates a Dot
language file as output
Makes creating directed
graphs very easy
The graph on the right was
created with echo 1,2,3
| afterglow.pl | neato
Tpng o example.png
12
Two-column mode
Two-column
mode has 2 types
of nodes: source
and target
This graph shows
2 source nodes
connecting to
three targets
13
Afterglow two-column
example:
normal arp requests
14
15
Three-column mode
Three-column
mode adds an
event node
Source nodes
connect to
targets via
events
Example event:
protocol type
16
18
19
20
21
The players
4 systems were involved in the
attack:
22
The attack
Goal was to forge a packet from server
to xterminal
DOSed server from 130.92.6.97
Harvested TCP sequence numbers from
xterminal
Spoofed connection from server to xterminal
Attacker did not see the SYN/ACK, and had to guess the
sequence number used, and increment by 1 for the reply
24
26
Any questions?
28