33
Intrusion Detection and Hackers Exploits Intrusion Detection and Hackers Exploits WEB Spoofing Attack WEB Spoofing Attack A SEMINAR A SEMINAR PRESENTED BY PRESENTED BY NIDHI KUMARI NIDHI KUMARI IT 6 IT 6 th th Sem Sem Roll No 0214IT081032 Roll No 0214IT081032 SUBMITTED TO SUBMITTED TO Mr. ARVIND SIR Mr. ARVIND SIR LECT. VITS ,JBP LECT. VITS ,JBP

SEMINAR ON SPOOFING

Embed Size (px)

Citation preview

Page 1: SEMINAR ON SPOOFING

Intrusion Detection and Hackers ExploitsIntrusion Detection and Hackers Exploits WEB Spoofing Attack WEB Spoofing Attack

A SEMINAR A SEMINAR PRESENTED BYPRESENTED BY

NIDHI KUMARINIDHI KUMARIIT 6IT 6thth Sem Sem

Roll No 0214IT081032Roll No 0214IT081032SUBMITTED TOSUBMITTED TOMr. ARVIND SIRMr. ARVIND SIRLECT. VITS ,JBPLECT. VITS ,JBP

SUBMITTED TOSUBMITTED TOMr. ARVIND SIRMr. ARVIND SIR

LECT VITSLECT VITS

Page 2: SEMINAR ON SPOOFING

Web Spoofing:

Page 3: SEMINAR ON SPOOFING

What is Spoofing ? is a situation in which one person or

program successfully masquerades as another by falsifying information and thereby gaining an illegitimate advantage.

Page 4: SEMINAR ON SPOOFING

Type of spoofing :

IP Spoof Web Spoof E-mail Spoof Non Technical Spoof

Page 5: SEMINAR ON SPOOFING

Wanna know about IP Spoofing ?

The creation of IP packets with a forged source.

The purpose of it is to conceal the identity of the sender or impersonating another computing system.

Page 6: SEMINAR ON SPOOFING

trusted host

A B

Intruder

Three-way handshake

SYN(A)

ACK(A+1) SYN(B)

ACK(B+1)

Page 7: SEMINAR ON SPOOFING

Basic Concept of IP SpoofingBasic Concept of IP Spoofing

A10.10.10.1

www.carleton.ca134.117.1.60

http://www.carleton.ca

10.10.10.1

Src_IP

134.117.1.60

dst_IP

Any (>1024)

Src_port

80

dst_port

11.11.11.1

Src_IP

134.117.1.60

dst_IP

Any (>1024)

Src_port

80

dst_port

spoofed

Page 8: SEMINAR ON SPOOFING

Types of IP Spoofing :

1. Denial-of-service attack : The goal is to flood the victim with

overwhelming amounts of traffic. This prevents an internet site or service from functioning efficiently or at all, temporarily or indefinitely.

Page 9: SEMINAR ON SPOOFING

Spoofing Attacks:

sender

victim

ip spoofed packetdst: victim

src: random

Oops, many packets are coming. But, who

is the real source?

flooding attack

Page 10: SEMINAR ON SPOOFING

2. Impersonation :

senderip spoofed packet

victim

partner

dst: victim

src: partner

Oh, my partner sent me a packet. I’ll

process this.

impersonation

Page 11: SEMINAR ON SPOOFING

3.Man in the Middle Attack :

This is also called connection hijacking. In this attacks, a malicious party intercepts a legitimate communication between two hosts to controls the flow of communication and to eliminate or alter the information sent by one of the original participants without their knowledge.

Page 12: SEMINAR ON SPOOFING

Man in the middle attack:

Session hijacking

Page 13: SEMINAR ON SPOOFING

Who is this freak ?

None of u know who is spying on u ? Isn`t is amusing..?

Page 14: SEMINAR ON SPOOFING

Uses of IP Spoofing :

To defeat networks security : > Such as authentication based on IP addresses. This type of attack is most effective where trust

relationships exist between machines. >For example, some corporate networks have internal

systems trust each other, a user can login without a username or password as long he is connecting from another machine on the internal network. By spoofing a connection from a trusted machine, an attacker may be able to access the target machine without authenticating.

Page 15: SEMINAR ON SPOOFING

Fallout of IP based authentication:

Page 16: SEMINAR ON SPOOFING

Defense against IP spoofing:

Packet filtering- one defense against IP spoofing› Ingress filtering- blocking of packets from

outside the network with a source address inside the network

› Egress filtering –blocking outgoing packets from inside the network source address.

Page 17: SEMINAR ON SPOOFING

Filtering:

Internet

B

IDS

Router Firewall10.10.10.0

10.10.0.0

if src_addr is from 10.10.0.0then forwardelse drop

if src_addr is from 10.10.0.0then dropelse forward

Page 18: SEMINAR ON SPOOFING

Defense against IP spoofing:

Upper Layers : Some upper layer protocols provide their own

defense against IP spoofing. For example, TCP uses sequence numbers

negotiated with the remote machine to ensure that the arriving packets are part of an established connection. Since the attacker normally cant see any reply packets, he has to guess the sequence number in order to hijack the connection.

Page 19: SEMINAR ON SPOOFING

Web Spoofing : It’s a security attack that allows an

adversary to observe and modify all web pages sent to the victim’s machine and observe all information entered into forms by the victim.

Page 20: SEMINAR ON SPOOFING

Guess what ? I hv spoofed ur web browser . Rn’t fealing

queasy.?

Page 21: SEMINAR ON SPOOFING

Web Spoofing :

The attack is initiated when a victim visits a malicious web page, or receives a malicious email message.

The attack is implemented using JavaScript and Web serves plug-ins.

Page 22: SEMINAR ON SPOOFING

Can`t u imbecile see this is a hoax ?

Page 23: SEMINAR ON SPOOFING

Dangers of Web Spoofing:

After your browser has been fooled, the spoofed web server can send you fake web pages or prompt you to provide personal information such as login Id, password, or even credit card or bank account numbers.

Page 24: SEMINAR ON SPOOFING

How to prevent it : Don’t click links in emails instead always copy and

paste, or even better manually type the URL in. When entering personal or sensitive information,

verify the URL is as you expect, and the site’s SSL certificate matches that URL.

Understand why you’re providing the information-does it make sense? Does the site need to know your SSN?

Page 25: SEMINAR ON SPOOFING

Email Spoofing : E-mail spoofing is the forgery of an

e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.

Page 26: SEMINAR ON SPOOFING

Email Spoof Protection:

Double check the email you are replying to, make sure that the letters are what they truly seem. For example, l(lower case L) is not the same as I(upper case i).

Look at the IP information of the email header. If an email originated from inside your network, the sender should have very similar IP address.

Page 27: SEMINAR ON SPOOFING

Non-Technical Spoofing:

These non-computer based techniques are commonly referred to as social engineering. With social engineering, an attacker tries to convince someone that he is someone else.

This can be as simple as the attacker calling someone on the phone saying that he is a certain person.

Page 28: SEMINAR ON SPOOFING

Aren`t u smelling some foul..? “Trust ur

intuition”

Page 29: SEMINAR ON SPOOFING

Example of Non-Technical Spoofing :

An attacker calls the help desk to request a new account to be set up. The attacker pretends to be a new employee.

A “technician” walks into a building saying that he has been called to fix a broken computer. What business does not have a broken computer?

Page 30: SEMINAR ON SPOOFING

Why does Non-Technical Spoof

Works : The main reason is that it exploits attributes of

human behavior: trust is good and people love to talk. Most people assume that if someone is nice and pleasant, he must be honest. If an attacker can sound sincere and listen, you would be amazed at what people will tell him.

Lessons learnt trust the good old lore about strangers that they r seldom good keep a distance from them

Page 31: SEMINAR ON SPOOFING

Non-Technical Spoof protection :

Educate your users:› The help desk› Receptionist› Administrators

Have proper policies:› Password policy› Security policy

Page 32: SEMINAR ON SPOOFING
Page 33: SEMINAR ON SPOOFING

Queries