Cyber Attacks & Hacking: S. R. Shinde
Cyber Attacks & Hacking: S. R. Shinde
S. R. Shinde
Definitions
• Computer Security - generic name for the collection
of tools designed to protect data from hackers
• damaging rename and hide your files, keep the filename and
path but overwrite the data, deleted files cannot be retrieved
once being overwritten.
• easy to create
what worms do?
• replicate themselves.
• If they had payload (a destructive sequence actived on a certain trigger; the trigger
may be the arrival of a particular data or an action by the user), they may display
text mesage to warn you or they even rename and overwrite all the files on your
hard drive.
• consume system resources (e.g. change file sizes, report incorrect RAM)
– Related to phishing
Vulnerability Types (contd.)
• Protocol Vulnerabilities
– Attacks on commonly used networking protocols such as
TCP, IP, ARP, ICMP and DNS
switch
Spoofed ARP reply
MAC:cc:cc:cc:cc
IP:10.0.0.2
A B Hacker
IP:10.0.0.1 IP:10.0.0.2 IP:10.0.0.3
MAC:aa:aa:aa:aa MAC:bb:bb:bb:bb MAC:cc:cc:cc:cc
A B Hacker
IP:10.0.0.1 IP:10.0.0.2 IP:10.0.0.3
MAC:aa:aa:aa:aa MAC:bb:bb:bb:bb MAC:cc:cc:cc:cc
switch
MAC:aa:aa:aa:aa
IP:1.2.3.4
A B Hacker
IP:10.0.0.1 IP:10.0.0.2 IP:10.0.0.3
MAC:aa:aa:aa:aa MAC:bb:bb:bb:bb MAC:cc:cc:cc:cc
Demonstration
• Experiment
– Use Ethereal to capture the forged ARP reply.
– Use the command “arp –a” to show that the target
machine will accept the reply and updates its ARP
cache.
– We can also show that the table in the switch can be
changed.
• We can also modify the program, so that it can
forge ARP request.
– Show that some machines will also accept the MAC
address appeared in the ARP request.
Man-in-the-Middle Attack
• A hacker inserts his computer between the
communications path of two target
computers.
• The hacker will forward frames between the
two target computers so communications are
not interrupted.
• E.g., Hunt, Ettercap etc.
– Can be obtained easily in many web archives.
• The attack is performed as follows:
– Suppose X is the hacker’s computer
– T1 and T2 are the targets
1. X poisons the ARP cache of T1 and T2.
2. T1 associates T2’s IP with X’s MAC.
3. T2 associates T1’s IP with X’s MAC.
4. All of T1 and T2’s traffic will then go to X first,
instead of directly to each other.
Spoofed ARP reply Spoofed ARP reply
IP:10.0.0.2 IP:10.0.0.2
MAC:cc:cc:cc:cc MAC:cc:cc:cc:cc
switch
Spoofed ARP reply
MAC:cc:cc:cc:cc
IP:10.0.0.2
T1 T2 Hacker
IP:10.0.0.1 IP:10.0.0.2 IP:10.0.0.3
MAC:aa:aa:aa:aa MAC:bb:bb:bb:bb MAC:cc:cc:cc:cc
T1 T2 Hacker
IP:10.0.0.1 IP:10.0.0.2 IP:10.0.0.3
MAC:aa:aa:aa:aa MAC:bb:bb:bb:bb MAC:cc:cc:cc:cc
switch
MAC:cc:cc:cc:cc
IP:10.0.0.1
T1 T2 Hacker
IP:10.0.0.1 IP:10.0.0.2 IP:10.0.0.3
MAC:aa:aa:aa:aa MAC:bb:bb:bb:bb MAC:cc:cc:cc:cc
T1 T2 Hacker
IP:10.0.0.1 IP:10.0.0.2 IP:10.0.0.3
MAC:aa:aa:aa:aa MAC:bb:bb:bb:bb MAC:cc:cc:cc:cc
switch
Hacker will
relay the
message
T1 T2 Hacker
IP:10.0.0.1 IP:10.0.0.2 IP:10.0.0.3
MAC:aa:aa:aa:aa MAC:bb:bb:bb:bb MAC:cc:cc:cc:cc
switch
Message
intended to
send to T1
T1 T2 Hacker
IP:10.0.0.1 IP:10.0.0.2 IP:10.0.0.3
MAC:aa:aa:aa:aa MAC:bb:bb:bb:bb MAC:cc:cc:cc:cc