Demonstrate how the icmp redirect attack works

Assignment Help Computer Networking
Reference no: EM131786784

Attacks on TCP/IP Protocols

Lab Overview

The learning objective of this lab is for students to gain the first-hand experience on the vulnerabilities of TCP/IP protocols, as well as on attacks against these vulnerabilities. The vulnerabilities in the TCP/IP protocols represent a special genre of vulnerabilities in protocol designs and implementations; they provide an invaluable lesson as to why security should be designed in from the beginning, rather than being added as an afterthought. Moreover, studying these vulnerabilities help students understand the challenges of network security and why many network security measures are needed. Vulnerabilities of the TCP/IP protocols occur at several layers.

Lab Environment

Environment Setup

Network Setup. To conduct this lab, students need to have at least 3 machines. One computer is used for attacking, the second computer is used as the victim, and the third computer is used as the observer. Students can set up 3 virtual machines on the same host computer, or they can set up 2 virtual machines, and then use the host computer as the third computer.

Lab Tasks

In this lab, students need to conduct attacks on the TCP/IP protocols. They can use the Netwox tools and/or other tools in the attacks. All the attacks are performed on Linux operating systems. However, instructors can require students to also conduct the same attacks on other operating systems and compare the observations.

To simplify the "guess" of TCP sequence numbers and source port numbers, we assume that attacks are on the same physical network as the victims. Therefore, you can use sniffer tools to get that information. The following is the list of attacks that need to be implemented.

Task (1) : ARP cache poisoning
The ARP cache is an important part of the ARP protocol. Once a mapping between a MAC address and an IP address is resolved as the result of executing the ARP protocol, the mapping will be cached. Therefore, there is no need to repeat the ARP protocol if the mapping is already in the cache. However, because the ARP protocol is stateless, the cache can be easily poisoned by maliciously crafted ARP messages. Such an attack is called the ARP cache poisoning attack.

In such an attack, attackers use spoofed ARP messages to trick the victim to accept an invalid MAC-to- IP mapping, and store the mapping in its cache. There can be various types of consequences depending on the motives of the attackers. For example, attackers can launch a DoS attack against a victim by associating a nonexistent MAC address to the IP address of the victim's default gateway; attackers can also redirect the traffic to and from the victim to another machine, etc.

In this task, you need to demonstrate how the ARP cache poisoning attack work. Several commands can be useful in this task. In Linux we can use command arp to check the current mapping between IP address and MAC.

Task (2) : ICMP Redirect Attack

The ICMP redirect message is used by routers to provide the up-to-date routing information to hosts, which initially have minimal routing information. When a host receives an ICMP redirect message, it will modify its routing table according to the message. Because of the lack of validation, if attackers want the victim to set its routing information in a particular way, they can send spoofed ICMP redirect messages to the victim, and trick the victim to modify its routing table.

In this task, you should demonstrate how the ICMP redirect attack works, and describe the observed consequence. To check the routing information in Linux, you can use the command route.

Task (3) : SYN Flooding Attack

SYN flood is a form of DoS attack in which attackers send many SYN requests to a victim's TCP port, but the attackers have no intention to finish the 3-way handshake procedure. Attackers either use spoofed IP address or do not continue the procedure. Through this attack, attackers can flood the victim's queue that is used for half-opened connections, i.e. the connections that has finished SYN, SYN-ACK, but has not yet got a final ACK back. When this queue is full, the victim cannot take any more connection. Figure ?? illustrates the attack.
The size of the queue has a system-wide setting. In Linux, we can check the system queue size setting using the following command:
# sysctl -q net.ipv4.tcp_max_syn_backlog

We can use command "netstat -na" to check the usage of the queue, i.e., the number of half- opened connection associated with a listening port. The state for such connections is SYN-RECV. If the 3-way handshake is finished, the state of the connections will be ESTABLISHED.

In this task, you need to demonstrate the SYN flooding attack. You can use the Netwox tool to conduct the attack, and then use a sniffer tool to capture the attacking packets. While the attack is ongoing, run the "netstat -na" command on the victim machine, and compare the result with that before the attack. Please also describe how you know whether the attack is successful or not.

Task (4) : TCP RST Attacks on telnet and ssh Connections

The TCP RST Attack can terminate an established TCP connection between two victims. For example, if there is an established telnet connection (TCP) between two users A and B, attackers can spoof a RST packet from A to B, breaking this existing connection. To succeed in this attack, attackers need to correctly construct the TCP RST packet.

In this task, you need to launch an TCP RST attack to break an existing telnet connection between A and B. After that, try the same attack on an ssh connection. Please describe your observations. To simply the lab, we assume that the attackers and the victims are on the same LAN, i.e., attackers can observe the TCP traffic between A and B.

Task (5) : TCP RST Attacks on Video Streaming Applications

Let us make the TCP RST attack more interesting by experimenting it on the applications that are widely used in nowadays. We choose the video streaming application in this task. For this task, you can choose a video streaming web site that you are familiar with (we will not name any specific web site here). Most of video sharing websites establish a TCP connection with the client for streaming the video content. The attacker's goal is to disrupt the TCP session established between the victim and video streaming machine. To simplify the lab, we assume that the attacker and the victim are on the same LAN. In the following, we describe the common interaction between a user (the victim) and some video-streaming web site:

The victim browses for a video content in the video-streaming web site, and selects one of the videos for streaming.

Normally video contents are hosted by a different machine, where all the video contents are located. After the victim selects a video, a TCP session will be established between the victim machine and the content server for the video streaming. The victim can then view the video he/she has selected.

Your task is to disrupt the video streaming by breaking the TCP connection between the victim and the content server. You can let the victim user browse the video-streaming site from another (virtual) machine or from the same (virtual) machine as the attacker. Please be noted that, to avoid liability issues, any attacking packets should be targeted at the vitim machine (which is the machine run by yourself), not the content server machine (which does not belong to you).

Task (6) : ICMP Blind Connection-Reset and Source-Quench Attacks

ICMP messages can also be used achieve the connection-reseting attack. To do this, attackers send an ICMP error message that indicates a "hard error" to either of the two endpoints of a TCP connection. The connection can be immediately torn down as RFC 1122 states that a host should abort the corresponding connection when receiving such an ICMP error message. RFC 1122 defines "hard errors" as ICMP error messages of type 3 (Destination Unreachable) with code 2 (protocol unreachable), 3 (port unreachable), or 4 (fragmentation needed and DF bit set).

The ICMP source quench message is used by the congested routers to tell the TCP senders to slow down.

Attackers can forge such messages to conduct the denial of services attacks on TCP senders.

In this task, you need to launch the ICMP blind connect-reset attacks and the ICMP source quench attacks. You need to be noted that some systems may reasonably ignore this type of ICMP errors in certain TCP state. You need to describe your observations in the lab report.

Task (7) : TCP Session Hijacking

The objective of the TCP Session Hijacking attack is to hijack an existing TCP connection (session) between two victims by injecting malicious contents into this session. If this connection is a telnet session, attackers can inject malicious commands into this session, causing the victims to execute the malicious commands. We will use telnet in this task. We also assume that the attackers and the victims are on the same LAN.

4 Lab Report

You should submit a lab report. The report should cover the following sections:

Design: The design of your attacks, including the attacking strategies, the packets that you use in your attacks, the tools that you used, etc.

Observation: Is your attack successful? How do you know whether it has succeeded or not? What do you expect to see? What have you observed? Is the observation a surprise to you?

Explanation: Some of the attacks might fail. If so, you need to find out what makes them fail. You can find the explanations from your own experiments (preferred) or from the Internet. If you get the explanation from the Internet, you still need to find ways to verify those explanations through your own experiments. You need to convince us that the explanations you get from the Internet can indeed explain your observations.

Attachment:- Attack Lab.pdf

Reference no: EM131786784

Questions Cloud

Prepare the journal entries for myers : Myers CCo. acquired a 60% interest in Gannon Corp on Dec. 31, 2010 for $945,000. Prepare the journal entries for Myers Co. for 12/31/2010
Calculate the present value of the cash inflows : Thecompany's required rate of return is8%. Using the factors in thetable, calculate the present value of the cash inflows.
Identify nine different risks at financial statement level : Identify nine different risks at the financial statement level. For each risk, identify a relevant substantive audit procedure and the specific audit assertion
How must mary beth treat this on her tax return : During 2010 she incurred a loss, for tax purposes, of 30,000 on the office building. How must Mary Beth treat this on her 2010 tax return
Demonstrate how the icmp redirect attack works : Demonstrate how the ICMP redirect attack works, and describe the observed consequence. To check the routing information in Linux, you can use the command route
Review problem on stock valuation and pe ratio : Stock Valuation and PE Ratio. The Sleeping Flower Co. has earnings of $2.65 per share. The benchmark PE for the company is 18.
Prepare a single-step pro forma income statement : Prepare a single-step pro forma income statement for Calcor Company for the year ended November 30, 2009
Which of the reasons are promises to the purchaser : Find two advertisements that give reasons for purchasing the products they are selling. Which of the reasons are promises to the purchaser?
Discuss leos occupation is a photographer : LEO Doe is divorced and has the following tax information

Reviews

Write a Review

Computer Networking Questions & Answers

  The topic computer securityintroductioni will discuss

the topic computer securityintroductioni will discuss computer security in this paper as well as aspects in ethical

  Network design and analysis

Genome4U is a scientific research project at a large university in the United States. Genome4U has recently started a large-scale project to sequence the genomes of 250,000 volunteers with a goal of creating a set of publicly accessible databases wit..

  Create three subnets for organisation

Create 3 subnets for this organisation with the first subblock of 250 addresses, the second subblock of 60 addresses and the third subblock of 12 addresses.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Identify the source port number

Identify the source port number and identify the destination port number and what is the length of the data?

  Find the most challenging crimes

Find the most challenging crimes that could be based on P2P networks and write a report on how to do forensic investigations on these crimes.

  Create a short essay that describes an ethernet frame

Create a short essay (1 to 3 pages) that describes an Ethernet frame. You will need to do some research to understand the construction of an Ethernet frame.

  Explain how to troubleshoot a network

You have been hired to aid troubleshoot a network. Users in this customer site have being experiencing intermittent problems.

  Maximum value of l-tcp sequence number are not exhausted

Consider transferring an enormous file of L bytes. What is the maximum value of L such that TCP sequence numbers are not exhausted? Give proper justification?

  Summarize pros of using either a purely cellular network

Summarize the pros and cons of using either a purely cellular network or a purely fixed line network in a 2-4 page paper. At the end of your paper, write 1-2 paragraphs making a recommendation for a new company.

  Create and connect to a shared printer

Creating and Connecting to a Shared Printer Time Required: 10 minutes Objective: Create and connect to a shared printer.

  Accessing remote desktop in a networked computer

MN504 Networked Applications Group Assignment. Explore by reviewing the underlying mechanism, middleware, protocols, and flow chart based software interaction processes for accessing remote desktop and resources in a networked computer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd