31
1 Chapter 6 Network Security Threats

1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

Embed Size (px)

Citation preview

Page 1: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

1

Chapter 6

Network Security Threats

Page 2: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

2

Objectives

In this chapter, you will:

• Learn how to defend against packet sniffers

• Understand the TCP, UDP, and IP protocols and their weaknesses

• Identify other protocols within the TCP/IP Protocol suite and their weaknesses

• Understand the threats to wireless networks

Page 3: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

3

Packet Sniffers

• Capture network traffic• Can view unencrypted traffic• Can be installed on compromised systems as

software utility• Can only capture network traffic passed on the

same network segment

Page 4: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

4

Packet Sniffers

• Security solutions– Restrict physical access to network inputs

– Protect systems to ensure sniffers cannot be installed

– Use switches instead of hubs

– Use encryption

Page 5: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

5

TCP/IP Revisited – TCP Communication Processes

Page 6: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

6

TCP/IP Revisited – TCP Communication Processes

Page 7: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

7

TCP/IP Revisited – TCP Communication Processes

• Immediate termination (without handshake)• TCP reset• RST message

Page 8: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

8

Attacks on TCP, UDP, and IP – Spoofing

Page 9: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

9

Attacks on TCP, UDP, and IP – Spoofing

• Security solutions• Secure proxies• Ingress filtering• Apply latest patches to systems and network

devices

Page 10: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

10

Attacks on TCP, UDP, and IP – Teardrop

Page 11: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

11

Attacks on TCP, UDP, and IP – Teardrop

• Security solutions• Apply the latest patches to systems and

network devices

Page 12: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

12

Attacks on TCP, UDP, and IP – DoS Attacks

• SYN flood• Uses SYN packets to initiate connections• Source addresses spoofed as another

address• Land

• Uses SYN packets to initiate connections• Source addresses spoofed as specific target

system

Page 13: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

13

Attacks on TCP, UDP, and IP – DoS Attacks

• Fraggle• UDP echo requests• Source addresses spoofed as specific target

system• FIN flood

• Uses SYN packets to initiate connections• Source addresses spoofed as another

address

Page 14: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

14

Attacks on TCP, UDP, and IP – DoS Attacks

Page 15: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

15

Attacks on TCP, UDP, and IP – DoS Attacks

• Security solution• Configure network devices to drop SYN

connections after a certain amount of time• Configure network devices to drop FIN

connections after a certain amount of time• Disable UDP echo• Disable unnecessary services

Page 16: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

16

TCP/IP Protocol Suite

Page 17: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

17

TCP/IP Protocol Suite

Page 18: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

18

TCP/IP Protocol Suite

Page 19: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

19

TCP/IP Protocol Suite

Page 20: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

20

TCP/IP Protocol Suite – Security Solutions

• HTTP• Apply security patches• Check scripts and other input on Web

applications• Use SSL encryption

• SMTP and POP3• Apply security patches• Disable open mail relays

Page 21: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

21

TCP/IP Protocol Suite – Security Solutions

• FTP communication processes

Page 22: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

22

TCP/IP Protocol Suite – Security Solutions

• FTP communication processes

Page 23: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

23

TCP/IP Protocol Suite – Security Solutions

• FTP and TFTP• Apply security patches• Use SCP instead• Disallow anonymous FTP or heavily restrict

access to anonymous users• Disable TFTP on all systems

Page 24: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

24

TCP/IP Protocol Suite – Security Solutions

• Telnet• Apply security patches• Use SSH instead• Restrict commands available to Telnet users• Disable Telnet on critical systems

Page 25: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

25

TCP/IP Protocol Suite – Security Solutions

• DNS• Apply security patches• Block incoming DNS traffic

• NetBT• Apply security patches• Disable NetBT on any systems facing the

Internet

Page 26: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

26

TCP/IP Protocol Suite – Security Solutions

• SNMP • Apply security patches• Upgrade to v3• Change SNMP community strings

• LDAP• Apply security patches• Disable LDAP on Internet-facing systems

Page 27: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

27

TCP/IP Protocol Suite – Security Solutions

• Finger• Disable

• NNTP• Apply security patches

• ICMP• Disable incoming ICMP• Disable broadcasts

Page 28: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

28

TCP/IP Protocol Suite – Security Solutions

• ARP and RARP• Use static ARP tables

• Encryption options• IPSec

• Tunnel• Transport

• PPTP – is a modification of PPP (Point-to-Point Protocol)

• L2TP – is a combination of PPTP and Cisco Systems’ Layer 2 Forwarding Protocol

Page 29: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

29

Wireless Networks

• Wireless access point (WAP) – provides both the transmitter and receiver for wireless network communications

• Wireless Encryption Protocol (WEP) – is a Data Link layer protocol that was developed to add encryption to the 802.11b wireless network standard

• Security solutions• VPN server• MAC authentication

Page 30: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

30

Summary

• Sniffers can listen to network traffic sent over a network. In the wrong hands, a sniffer can capture user IDs, passwords, or other sensitive information.

• TCP has several handshake processes that establish, reset, and close network communications.

• The TCP/IP protocol suite is the most popular set of network protocols in use today. The popularity of the suite is due, in large part, to its scalability, universality, and interoperability.

Page 31: 1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and

31

Summary• The foundation of the TCP/IP protocol suite comprises the TCP,

UDP, and IP protocols. Many other protocols are included: HTTP, HTTPS, SMTP, POP3, FTP, TFTP, Telnet, DNS, NetBT, LDAP, Finger, NNTP, ICMP, ARP, and RARP.

• All protocols have a variety of weaknesses, so it is important to develop security solutions that protect data while in transit over networks.

• Wireless networks are becoming more popular in the IT environment but have some inherent vulnerabilities. These weaknesses should be addressed in order to securely transmit data and protect wired networks.