--- tags: 48-INS --- 5 weeks Coursework 100%, released in wk5, deadline in wk9 # 1: Genral Concepts and Attacks <img src='https://i.imgur.com/JgiNnMg.jpg' width='90%'> --- ## Tools 1. OpenNebula 2. Wireshark 3. Scapy 4. Snort 5. OpenSSL ## Networks are insecure by default ## Key Reinstallation Attacks on WPA2 ## Attack Types (I) - Passive eavesdrops **Countermeasures**: end-to-end encryption ## Attack Types (II) - Active modify messages, inject new messages, replay sent messages **Countermeasures:** sender/receiver authentication ## MITM Attacks - Spoofing atk Masquerade as another entity - DoS atk ## TCP/IP Stack | Column 2 | Protocols | Attacks | |:----------------- |:---------------------------- |:--------------------------------------------------------- | | Application Layer | HTTP, DNS, FTP, Telent, SMTP | XSS, CSRF, SQL inj., ... | | Transport Layer | **TCP**, UDP | **SYN flooding**, **TCP spoofing**, **session hijecking** | | Internet Layer | **IPv4/6** | **IP spoofing**, **ICMP DoS Atk**, **Fragmentation Atk** | | Link Layer | **ARP**, NDP, MAC | jamming, **ARP spoogfing/poisoning**, **ARP mitm atk**, MAC flooding, packet sniffing | ## A man-in-the-middle atk is active atk True ## Can an adversary mount a man in the middle attack via ARP poisoning? Yes ## Can an adversary mount a DoS attack by abusing ARP? Yes ## DoS Mac flooding content addressable memory table ## Attacks on ARP ### ARP Protocol IP/MAC mapping ### ARP Spoofing/Poisoning # Lab 1: ARP Spoofing | | IP Addr. | HW Addr. | |:----- |:------------ |:----------------- | | Eve | 192.168.5.12 | 02:00:c0:a8:05:0c | | Alice | 192.168.5.10 | 02:00:c0:a8:05:0a | | Bob | 192.168.5.11 | 02:00:c0:a8:05:0b | ```python >>> arp_L3=ARP() >>> arp_L3.hwsrc= "<Eve’s HW address>" >>> arp_L3.psrc= "<Eve’s IP address>" >>> arp_L3.pdst= "<Alice’s IP address>" >>> pp=IP(dst="<Alice’s IP address>")/ICMP() ``` ![](https://i.imgur.com/krGXQqR.png) ![](https://i.imgur.com/AGFtdjs.png) ![](https://i.imgur.com/4avT13z.png) ![](https://i.imgur.com/1DjWtRL.png)