+ All Categories
Home > Documents > 181 Web Spoofing

181 Web Spoofing

Date post: 07-Apr-2018
Category:
Upload: vj-tauruz
View: 234 times
Download: 1 times
Share this document with a friend

of 34

Transcript
  • 8/6/2019 181 Web Spoofing

    1/34

    www.seminarcollections.com IP & WEB SPOOFING

    1.0 INTRODUCTION

    This paper describes an Internet security attack that could endanger the

    privacy of World Wide Web users and the integrity of their data. The attack can

    be carried out on today's systems, endangering users of the most common Web

    browsers, including Netscape Navigator and Microsoft Internet Explorer.

    1.1HISTORY

    The concept of IP spoofing was initially discussed in academic circles in

    the 1980's. It was primarily theoretical until Robert Morris, whose son wrote the

    first Internet Worm, discovered a security weakness in the TCP protocol known

    as sequence prediction. Another infamous attack, Kevin Mitnick's Christmas

    day, crack of Tsutomu Shimomura's machine, employed the IP spoofing and

    TCP sequence prediction techniques. While the popularity of such cracks has

    decreased due to the demise of the services they exploited, spoofing can still be

    used and needs to be addressed by all security administrators.

    1.2WHAT IS SPOOFING?

    Spoofing means pretending to be something you are not. In Internet

    terms it means pretending to be a different Internet address from the one you

    really have in order to gain something. That might be information like credit

    card numbers, passwords, personal information or the ability to carry out

    actions using someone elses identity.

    IP spoofing attack involves forging one's source address. It is the act of

    using one machine to impersonate another. Most of the applications and tools in

    web rely on the source IP address authentication. Many developers have used

    Dept. of CSE www.seminarcollections.com1

  • 8/6/2019 181 Web Spoofing

    2/34

    www.seminarcollections.com IP & WEB SPOOFING

    the host based access controls to secure their networks. Source IP address is a

    unique identifier but not a reliable one. It can easily be spoofed.

    Web spoofing allows an attacker to create a "shadow copy" of the entire

    World Wide Web. Accesses to the shadow Web are funneled through the

    attacker's machine, allowing the attacker to monitor the all of the victim's

    activities including any passwords or account numbers the victim enters. The

    attacker can also cause false or misleading data to be sent to Web servers in the

    victim's name, or to the victim in the name of any Web server. In short, the

    attacker observes and controls everything the victim does on the Web.

    The various types of spoofing techniques that we discuss include TCP

    Flooding, DNS Server Spoofing Attempts, web site names, email ids and link

    redirection.

    Dept. of CSE www.seminarcollections.com2

  • 8/6/2019 181 Web Spoofing

    3/34

    www.seminarcollections.com IP & WEB SPOOFING

    2.0 WEB SPOOFING

    2.1 INTRODUCTION

    Web spoofing allows an attacker to create a "shadow copy" of the entire

    World Wide Web. Accesses to the shadow Web are funneled through the

    attacker's machine, allowing the attacker to monitor the all of the victim's

    activities including any passwords or account numbers the victim enters. The

    attacker can also cause false or misleading data to be sent to Web servers in the

    victim's name, or to the victim in the name of any Web server. In short, the

    attacker observes and controls everything the victim does on the Web.

    2.2 SPOOFING ATTACKS

    In a spoofing attack, the attacker creates misleading context in order to

    trick the victim into making an inappropriate security-relevant decision. A

    spoofing attack is like a con game: the attacker sets up a false but convincing

    world around the victim. The victim does something that would be appropriate

    if the false world were real. Unfortunately, activities that seem reasonable in the

    false world may have disastrous effects in the real world.

    Spoofing attacks are possible in the physical world as well as the

    electronic one. For example, there have been several incidents in which

    criminals set up bogus automated-teller machines, typically in the public areas

    of shopping malls. The machines would accept ATM cards and ask the person

    to enter their PIN code. Once the machine had the victim's PIN, it could either

    eat the card or "malfunction" and return the card. In either case, the criminals

    had enough information to copy the victim's card and use the duplicate. In these

    Dept. of CSE www.seminarcollections.com3

  • 8/6/2019 181 Web Spoofing

    4/34

    www.seminarcollections.com IP & WEB SPOOFING

    attacks, people were fooled by the context they saw: the location of the

    machines, their size and weight, the way they were decorated, and the

    appearance of their electronic displays.

    People using computer systems often make security-relevant decisions

    based on contextual cues they see. For example, one might decide to type in

    your bank account number because he/she believes you are visiting your bank's

    Web page. This belief might arise because the page has a familiar look, because

    the bank's URL appears in the browser's location line, or for some other reason.

    To appreciate the range and severity of possible spoofing attacks, we

    must look more deeply into two parts of the definition of spoofing: security-

    relevant decisions and context.

    2.2.1 Security-relevant Decisions

    By "security-relevant decision," we mean any decision a person makes

    that might lead to undesirable results such as a breach of privacy or

    unauthorized tampering with data. Deciding to divulge sensitive information,

    for example by typing in a password or account number, is one example of a

    security-relevant decision. Choosing to accept a downloaded document is a

    security-relevant decision, since in many cases a downloaded document is

    capable of containing malicious elements that harm the person receiving the

    document.

    Even the decision to accept the accuracy of information displayed by

    ones computer can be security-relevant. For example, if one decide to buy a

    stock based on information one get from an online stock ticker, he/she is

    trusting that the information provided by the ticker is correct. If somebody

    Dept. of CSE www.seminarcollections.com4

  • 8/6/2019 181 Web Spoofing

    5/34

    www.seminarcollections.com IP & WEB SPOOFING

    could present some incorrect stock prices, they might cause the victim to

    engage in a transaction that the person would not have otherwise made.

    2.2.2 Context

    A browser presents many types of context that users might rely on to

    make decisions. The text and pictures on a Web page might give some

    impression about where the page came from; for example, the presence of a

    corporate logo implies that the page originated at a certain corporation.

    The names of objects can convey context. People often deduce what is in

    a file by its name. Is manual.doc the text of a user manual? (It might be another

    kind of document, or it might not be a document at all.) URLs are another

    example. Is MICR0S0FT.COM the address of a large software company? (For

    a while that address pointed to someone else entirely. By the way, the round

    symbols in MICR0S0FT here are the number zero, not the letter O.).

    People often get context from the timing of events. If two things happen

    at the same time, you naturally think they are related. If you click over to your

    bank's page and a username/password dialog box appears, you naturally assume

    that you should type the name and password that you use for the bank. If you

    click on a link and a document immediately starts downloading, you assume

    that the document came from the site whose link you clicked on. Either

    assumption could be wrong.

    If you only see one browser window when an event occurs, you might

    not realize that the event was caused by another window hiding behind the

    visible one.

    Modern user-interface designers spend their time trying to devise

    contextual cues that will guide people to behave appropriately, even if they do

    Dept. of CSE www.seminarcollections.com5

  • 8/6/2019 181 Web Spoofing

    6/34

    www.seminarcollections.com IP & WEB SPOOFING

    not explicitly notice the cues. While this is usually beneficial, it can become

    dangerous when people are accustomed to relying on context that is not always

    correct.

    2.3 WEB SPOOFING

    Web spoofing is a kind of electronic con game in which the attacker

    creates a convincing but false copy of the entire World Wide Web. The false

    Web looks just like the real one: it has all the same pages and links. However,

    the attacker controls the false Web, so that all network traffic between the

    victim's browser and the Web goes through the attacker.

    Consequences Since the attacker can observe or modify any data going from

    the victim to Web servers, as well as controlling all return traffic from

    Web servers to the victim, the attacker has many possibilities. These

    includesurveillance and tampering.

    Surveillance The attacker can passively watch the traffic, recording which

    pages the victim visits and the contents of those pages. When the victim fills

    out a form, the entered data is transmitted to a Web server, so the attacker can

    record that too, along with the response sent back by the server. Since most on-

    line commerce is done via forms, this means the attacker can observe any

    account numbers or passwords the victim enters.

    The attacker can carry out surveillance even if the victim has a "secure"

    connection (usually via Secure Sockets Layer) to the server, that is, even if the

    victim's browser shows the secure-connection icon (usually an image of a lock

    or a key).

    Dept. of CSE www.seminarcollections.com6

  • 8/6/2019 181 Web Spoofing

    7/34

    www.seminarcollections.com IP & WEB SPOOFING

    Tampering The attacker is also free to modify any of the data traveling in

    either direction between the victim and the Web. The attacker can modify form

    data submitted by the victim. For example, if the victim is ordering a product

    on-line, the attacker can change the product number, the quantity, or the ship-to

    address.

    The attacker can also modify the data returned by a Web server, for

    example by inserting misleading or offensive material in order to trick the

    victim or to cause antagonism between the victim and the server.

    2.3.1 Spoofing the Whole Web

    You may think it is difficult for the attacker to spoof the entire World

    Wide Web, but it is not. The attacker need not store the entire contents of the

    Web. The whole Web is available on-line; the attacker's server can just fetch a

    page from the real Web when it needs to provide a copy of the page on the false

    Web.

    2.3.2 How the Attack Works

    The key to this attack is for the attacker's Web server to sit between the

    victim and the rest of the Web. This kind of arrangement is called a "man in the

    middle attack" in the security literature.

    2.3.3 URL Rewriting

    The attacker's first trick is to rewrite all of the URLs on some Web page

    so that they point to the attacker's server rather than to some real server.

    Assuming the attacker's server is on the machine www.attacker.org, the attacker

    rewrites a URL by adding http://www.attacker.org to the front of the URL. For

    Dept. of CSE www.seminarcollections.com7

  • 8/6/2019 181 Web Spoofing

    8/34

    www.seminarcollections.com IP & WEB SPOOFING

    example, http://home.netscape.com becomes

    http://www.attacker.org/http://home.netscape.com.

    The victim's browser requests the page from www.attacker.org, since the

    URL starts with http://www.attacker.org. The remainder of the URL tells the

    attacker's server where on the Web to go to get the real document.

    Once the attacker's server has fetched the real document needed to

    satisfy the request, the attacker rewrites all of the URLs in the document into

    the same special form by splicing http://www.attacker.org/ onto the front. Then

    the attacker's server provides the rewritten page to the victim's browser.

    Since all of the URLs in the rewritten page now point to

    www.attacker.org, if the victim follows a link on the new page, the page will

    again be fetched through the attacker's server. The victim remains trapped in the

    attacker's false Web, and can follow links forever without leaving it.

    Dept. of CSE www.seminarcollections.com8

  • 8/6/2019 181 Web Spoofing

    9/34

    www.seminarcollections.com IP & WEB SPOOFING

    2.3.4 Forms

    If the victim fills out a form on a page in a false Web, the result appears

    to be handled properly. Spoofing of forms works naturally because forms are

    integrated closely into the basic Web protocols: form submissions are encoded

    in URLs and the replies are ordinary HTML. Since any URL can be spoofed,

    forms can also be spoofed.

    When the victim submits a form, the submitted data goes to the attacker's

    server. The attacker's server can observe and even modify the submitted data,

    doing whatever malicious editing desired, before passing it on to the real server.

    The attacker's server can also modify the data returned in response to the form

    submission.

    2.3.5 "Secure" connections don't help

    One distressing property of this attack is that it works even when the

    victim requests a page via a "secure" connection. If the victim does a "secure"

    Web access (a Web access using the Secure Sockets Layer) in a false Web,

    everything will appear normal: the page will be delivered, and the secure

    connection indicator (usually an image of a lock or key) will be turned on.

    Dept. of CSE www.seminarcollections.com9

  • 8/6/2019 181 Web Spoofing

    10/34

    www.seminarcollections.com IP & WEB SPOOFING

    What is SSL?

    SSL stands for Secure Sockets Layer. This protocol, designed by

    Netscape Communications Corp., is used to send encrypted HTTP (Web)

    transactions.

    Seeing "https" in the URL box on your browser means SSL is being used

    to encrypt data as it travels from your browser to the server. This helps protect

    sensitive information--social security and credit card numbers, bank account

    balances, and other personal information--as it is sent.

    The victim's browser says it has a secure connection because it does have

    one. Unfortunately the secure connection is to www.attacker.org and not to the

    place the victim thinks it is. The victim's browser thinks everything is fine: it

    was told to access a URL at www.attacker.org so it made a secure connection to

    www.attacker.org. The secure-connection indicator only gives the victim a false

    sense of security.

    2.3.5 Starting the Attack

    To start an attack, the attacker must somehow lure the victim into the

    attacker's false Web. There are several ways to do this.

    1) An attacker could put a link to a false Web onto a popular Web page.

    2) If the victim is using Web-enabled email, the attacker could email the

    victim a pointer to a false Web, or even the contents of a page in a

    false Web.

    3) Finally, the attacker could trick a Web search engine into indexing

    part of a false Web.

    2.3.6 An example from real life

    Dept. of CSE www.seminarcollections.com10

  • 8/6/2019 181 Web Spoofing

    11/34

  • 8/6/2019 181 Web Spoofing

    12/34

    www.seminarcollections.com IP & WEB SPOOFING

    attack is going on. However, it is possible for the attacker to eliminate virtually

    all of the remaining clues of the attack's existence.

    Such evidence is not too hard to eliminate because browsers are very

    customizable. The ability of a Web page to control browser behavior is often

    desirable, but when the page is hostile it can be dangerous.

    Another artifact of this kind of attack is that the pages returned by the

    hacker intercept are stored in the users browser cache, and based on the

    additional actions taken by the user; the spoofed pages may live on long after

    the session is terminated.

    2.4.1 The Status Line

    The status line is a single line of text at the bottom of the browser

    window that displays various messages, typically about the status of pending

    Web transfers.

    The attack as described so far leaves two kinds of evidence on the status

    line. First, when the mouse is held over a Web link, the status line displays the

    URL the link points to. Thus, the victim might notice that a URL has been

    rewritten. Second, when a page is being fetched, the status line briefly displays

    the name of the server being contacted. Thus, the victim might notice that

    www.attacker.org is displayed when some other name was expected.

    The attacker can cover up both of these cues by adding a JavaScript

    program to every rewritten page. Since JavaScript programs can write to the

    status line, and since it is possible to bind JavaScript actions to the relevant

    events, the attacker can arrange things so that the status line participates in the

    Dept. of CSE www.seminarcollections.com12

  • 8/6/2019 181 Web Spoofing

    13/34

    www.seminarcollections.com IP & WEB SPOOFING

    con game, always showing the victim what would have been on the status line

    in the real Web. Thus the spoofed context becomes even more convincing.

    2.4.2 The Location Line

    The browser's location line displays the URL of the page currently being

    shown. The victim can also type a URL into the location line, sending the

    browser to that URL. The attack as described so far causes a rewritten URL to

    appear in the location line, giving the victim a possible indication that an attack

    is in progress.

    This clue can be hidden using JavaScript. A JavaScript program can hide

    the real location line and replace it by a fake location line which looks right and

    is in the expected place. The fake location line can show the URL the victim

    expects to see. The fake location line can also accept keyboard input, allowing

    the victim to type in URLs normally. Typed-in URLs can be rewritten by the

    JavaScript program before being accessed.

    Dept. of CSE www.seminarcollections.com13

  • 8/6/2019 181 Web Spoofing

    14/34

    www.seminarcollections.com IP & WEB SPOOFING

    2.4.3 Viewing the Document Source

    There is one clue that the attacker cannot eliminate, but it is veryunlikely to be noticed.

    By using the browser's "view source"feature, the victim can look at the

    HTML source for the currently displayed page. By looking for rewritten URLs

    in the HTML source, the victim can spot the attack. Unfortunately, HTML

    source is hard for novice users to read, and very few Web surfers bother to look

    at the HTML source for documents they are visiting, so this provides very little

    protection.

    A related clue is available if the victim chooses the browser's "view

    document information"menu item. This will display information including the

    document's real URL, possibly allowing the victim to notice the attack. As

    above, this option is almost never used so it is very unlikely that it will provide

    much protection.

    2.4.4 Bookmarks

    There are several ways the victim might accidentally leave the attacker's

    false Web during the attack. Accessing a bookmark or jumping to a URL by

    using the browser's "Open location" menu item might lead the victim back into

    the real Web. The victim might then reenter the false Web by clicking the

    "Back" button. We can imagine that the victim might wander in and out of one

    or more false Webs. Of course, bookmarks can also work against the victim,

    since it is possible to bookmark a page in a false Web. Jumping to such a

    bookmark would lead the victim into a false Web again.

    2.5 WEB SPOOFING DEMONSTRATION

    Dept. of CSE www.seminarcollections.com14

  • 8/6/2019 181 Web Spoofing

    15/34

    www.seminarcollections.com IP & WEB SPOOFING

    The HTML Source Code

    Web Spoofing Demonstration

    Spoofing

    In both the cases below, if you mouse-over the link below, you'll see

    http://basement.dartmouth.edu" in the status line at the bottom of your screen.

    If you click on it, and you're not susceptible, then you'll actually go

    there.

    If you click on it, and you are susceptible, then we'll pop open a new

    window for you.

    Click here to see a spoof, if you're

    configured correctly.

    Click here to see the real basement

    site

    Dept. of CSE www.seminarcollections.com15

  • 8/6/2019 181 Web Spoofing

    16/34

    www.seminarcollections.com IP & WEB SPOOFING

    The HTML Page as seen

    Spoofing

    In both the cases below, if you mouse-over the link below, you'll see

    "http://basement.dartmouth.edu" in the status line at the bottom of your screen.

    If you click on it, and you're not susceptible, then you'll actually go there.

    If you click on it, and you are susceptible, then we'll pop open a new window

    for you.

    Click here to see a spoof, if you're configured correctly.

    Click here to see the real basement site

    2.6 TRACING THE ATTACKER

    Some people have suggested that this attack can be deterred by finding

    and punishing the attacker. It is true that the attacker's server must reveal its

    location in order to carry out the attack, and that evidence of that location will

    almost certainly be available after an attack is detected.

    Unfortunately, this will not help much in practice because attackers will

    break into the machine of some innocent person and launch the attack there.

    Stolen machines will be used in these attacks.

    2.6.1 Remedies

    Web spoofing is a dangerous and nearly undetectable security attack that

    can be carried out on today's Internet. Fortunately there are some protective

    measures you can take.

    Dept. of CSE www.seminarcollections.com16

    http://basement.dartmouth.edu/http://basement.dartmouth.edu/http://basement.dartmouth.edu/http://basement.dartmouth.edu/
  • 8/6/2019 181 Web Spoofing

    17/34

    www.seminarcollections.com IP & WEB SPOOFING

    2.6.2 Short-term Solution

    In the short run, the best defense is to follow a three-part strategy:

    1. disable JavaScript in your browser so the attacker will be unable to hide

    the evidence of the attack;

    2. make sure your browser's location line is always visible;

    3. pay attention to the URLs displayed on your browser's location line,

    making sure they always point to the server you think you're connected

    to.

    This strategy will significantly lower the risk of attack, though you could

    still be victimized if you are not conscientious about watching the location line.

    At present, JavaScript, ActiveX, and Java all tend to facilitate spoofing and

    other security attacks, so we recommend that you disable them. Doing so will

    cause you to lose some useful functionality, but you can recoup much of this

    loss by selectively turning on these features when you visit a trusted site that

    requires them.

    2.6.3 Long-term Solution

    We do not know of a fully satisfactory long-term solution to this

    problem. Changing browsers so they always display the location line would

    help, although users would still have to be vigilant and know how to recognize

    rewritten URLs.

    For pages that are not fetched via a secure connection, there is not much

    more that can be done.

    For pages fetched via a secure connection, an improved secure-

    connection indicator could help. Rather than simply indicating a secure

    Dept. of CSE www.seminarcollections.com17

  • 8/6/2019 181 Web Spoofing

    18/34

    www.seminarcollections.com IP & WEB SPOOFING

    connection, browsers should clearly say who is at the other end of the

    connection. This information should be displayed in plain language, in a

    manner intelligible to novice users; it should say something like "Microsoft

    Inc." rather than "www.microsoft.com."

    Every approach to this problem seems to rely on the vigilance of Web

    users. Whether we can realistically expect everyone to be vigilant all of the time

    is debatable.

    3.0 IP SPOOFING

    3.1 TCP FLOODING

    3.1.1 Introduction

    When a system (called the client) attempts to establish a TCP connection

    to a system providing a service (the server), the client and server exchange a set

    sequence of messages. This connection technique applies to all TCP connec-

    tions-telnet, Web, email, etc.

    Examining the IP header, we can see that the first 12 bytes (or the top 3

    rows of the header) contain various information about the packet. The next 8

    Dept. of CSE www.seminarcollections.com18

  • 8/6/2019 181 Web Spoofing

    19/34

    www.seminarcollections.com IP & WEB SPOOFING

    bytes (the next 2 rows), however, contains the source and destination IP

    addresses. Using one of several tools, an attacker can easily modify these

    addresses specifically the source address field. It's important to note that

    each datagram is sent independent of all others due to the stateless nature of IP.

    The client system begins by sending a SYN message to the server. The

    server then acknowledges the SYN message by sending SYN-ACK message to

    the client. The client then finishes establishing the connection by responding

    with an ACK message. The connection between the client and the server is then

    open, and the service-specific data can be exchanged between the client and the

    server.

    Here is a view of this message flow:

    Client Server

    ------ ------

    SYN-------------------->

    Client and server can now send service-specific data

    TCP uses sequence numbers. When a virtual circuit establishes

    between two hosts, then TCP assigns each packet a number as an identifying

    index. Both hosts use this number for error checking and reporting. Rik Farrow,

    in his article "Sequence Number Attacks", explains the sequence number

    system as follows:

    "The sequence number is used to acknowledge receipt of data. At the beginning

    of a TCP connection, the client sends a TCP packet with an initial sequence

    number, but no acknowledgment. If there is a server application running at the

    other end of the connection, the server sends back a TCP packet with its own

    initial sequence number, and an acknowledgment; the initial number from the

    Dept. of CSE www.seminarcollections.com19

  • 8/6/2019 181 Web Spoofing

    20/34

    www.seminarcollections.com IP & WEB SPOOFING

    client's packet plus one. When the client system receives this packet, it must

    send back its own acknowledgment; the server's initial sequence number plus

    one."

    Thus an attacker has two problems:

    1) He must forge the source address.

    2) He must maintain a sequence number with the target.

    The second task is the most complicated task because when target sets

    the initial sequence number, the attacker must response with the correct

    response. Once the attacker correctly guesses the sequence number, he can then

    synchronize with the target and establish a valid session.

    3.1.2 Services vulnerable to IP Spoofing:

    Configuration and services that are vulnerable to IP spoofing:

    RPC (Remote Procedure Call services)

    Any service that uses IP address authentication

    The X Window system

    The R services suite (rlogin, rsh, etc.)

    3.1.3 TCP and IP spoofing Tools:

    1) Mendax for Linux

    Mendax is an easy-to-use tool for TCP sequence number prediction and rshd

    spoofing.

    2)spoofit.h

    spoofit.h is a nicely commented library for including IP spoofing functionality

    into your programs. [Current URL unknown. -Ed.]

    Dept. of CSE www.seminarcollections.com20

    http://rootshell.com/archive-j457nxiqi3gq59dv/199711/mendax_linux.tgzhttp://air.csc.ncsu.edu/xzhao/docs/DogPack/spoofers/sp/spoofit.hhttp://rootshell.com/archive-j457nxiqi3gq59dv/199711/mendax_linux.tgzhttp://air.csc.ncsu.edu/xzhao/docs/DogPack/spoofers/sp/spoofit.h
  • 8/6/2019 181 Web Spoofing

    21/34

    www.seminarcollections.com IP & WEB SPOOFING

    3) ipspoof

    ipspoofis a TCP and IP spoofing utility.

    4) hunt

    hunt is a sniffer which also offers many spoofing functions.

    5) dsniff

    dsniff is a collection of tools for network auditing and penetration testing.

    dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a

    network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof,

    and macof facilitate the interception of network traffic.

    3.2 DESCRIPTION

    3.2.1 TCP Flags

    Flags are used to manage the establishment and shutdown of a virtual

    circuit

    o SYN: request for the synchronization of syn/ack numbers (used in

    connection setup)

    o ACK: states that the acknowledgment number is valid (all segments in a

    virtual circuit have this flag set, except for the first one)

    o FIN: request to shutdown one stream

    o RST: request to immediately reset the virtual circuit.

    3.2.2 TCP Virtual Circuit: Setup

    Aserver, listening to a specificport, receives a connection request from

    a client: The segment containing the request is marked with the SYN flag

    and contains a random initial sequence numbersc

    The server answers with a segment marked with both the SYNandACK

    flags and containing

    Dept. of CSE www.seminarcollections.com21

    http://www.ryanspc.com/spoof/ipspoof.chttp://www.ryanspc.com/sniffers/hunt-1.3.tgzhttp://www.monkey.org/~dugsong/dsniff/http://www.ryanspc.com/spoof/ipspoof.chttp://www.ryanspc.com/sniffers/hunt-1.3.tgzhttp://www.monkey.org/~dugsong/dsniff/
  • 8/6/2019 181 Web Spoofing

    22/34

    www.seminarcollections.com IP & WEB SPOOFING

    o an initial random sequence numberss

    o sc + 1 as the acknowledgment number

    The client sends a segment with the ACK flag set and with

    sequence numbersc+ 1 and acknowledgment numberss+ 1.

    3.2.3 TCP Virtual Circuit: Data Exchange

    A partner sends in each packet the acknowledgment of the previous

    segment and its own sequence number increased by the number of

    transmitted bytes

    A partner accepts a segment from the other partner only if the numbers

    match the expected ones

    An empty segment may be used to acknowledge the received data.

    Dept. of CSE www.seminarcollections.com22

  • 8/6/2019 181 Web Spoofing

    23/34

    www.seminarcollections.com IP & WEB SPOOFING

    The potential for abuse arises at the point where the server system has

    sent an acknowledgment (SYN-ACK) back to client but has not yet received the

    ACK message. This is what we mean by half-open connection. The server has

    built in its system memory a data structure describing all pending connections.

    This data structure is of finite size, and it can be made to overflow by

    intentionally creating too many partially-open connections.

    Creating half-open connections is easily accomplished with IP spoofing.

    The attacking system sends SYN messages to the victim server system; these

    appear to be legitimate but in fact reference a client system that is unable to

    Dept. of CSE www.seminarcollections.com23

  • 8/6/2019 181 Web Spoofing

    24/34

    www.seminarcollections.com IP & WEB SPOOFING

    respond to the SYN-ACK messages. This means that the final ACK message

    will never be sent to the victim server system.

    The half-open connections data structure on the victim server system

    will eventually fill; then the system will be unable to accept any new incoming

    connections until the table is emptied out. Normally there is a timeout

    associated with a pending connection, so the half-open connections will

    eventually expire and the victim server system will recover. However, the

    attacking system can simply continue sending IP-spoofed packets requesting

    new connections faster than the victim system can expire the pending

    connections.

    In most cases, the victim of such an attack will have difficulty in

    accepting any new incoming network connection. In these cases, the attack does

    not affect existing incoming connections nor the ability to originate outgoing

    network connections. However, in some cases, the system may exhaust

    memory, crash, or be rendered otherwise inoperative.

    Dept. of CSE www.seminarcollections.com24

  • 8/6/2019 181 Web Spoofing

    25/34

    www.seminarcollections.com IP & WEB SPOOFING

    The location of the attacking system is obscured because the source

    addresses in the SYN packets are often implausible. When the packet arrives at

    the victim server system, there is no way to determine its true source. Since the

    network forwards packets based on destination address, the only way to validate

    the source of a packet is to use input source filtering.

    3.3 IMPACT

    Systems providing TCP-based services to the Internet community may

    be unable to provide those services while under attack and for some time after

    the attack ceases. The service itself is not harmed by the attack; usually only the

    ability to provide the service is impaired.

    In some cases, the system may exhaust memory, crash, or be rendered

    otherwise inoperative.

    3.3.1 TCP Virtual Circuit: Shutdown

    Dept. of CSE www.seminarcollections.com25

  • 8/6/2019 181 Web Spoofing

    26/34

    www.seminarcollections.com IP & WEB SPOOFING

    One of the partners, say A, can terminate its stream by sending a

    segment with the FIN flag set

    The other partner, say B, answers with an ACK segment

    From that point on, A will not send any data to B: it will just

    acknowledge data sent by B

    When B shutdowns its stream the virtual circuit is considered closed.

    3.3.2 TCP Spoofing

    Node A trusts node B (e.g., login with no password)

    Node C wants to impersonate B with respect to A in opening a

    TCP connection

    C kills B (flooding, crashing, redirecting) so that B does not send

    annoying RST segments

    C sends A a TCP SYN segment in a spoofed IP packet with Bs address

    as the source IP andsc as the sequence number

    A replies with a TCP SYN/ACK segment to B with ss as the sequence

    number. B ignores the segment: dead or too busy

    Dept. of CSE www.seminarcollections.com26

  • 8/6/2019 181 Web Spoofing

    27/34

    www.seminarcollections.com IP & WEB SPOOFING

    C does not receive this segment but to finish the handshake it has to send

    an ACK segment withss + 1 as the acknowledgment number

    o C eavesdrops the SYN/ACK segment

    o C guesses the correct sequence number

    3.4 REDUCING IP SPOOFED PACKETS

    3.4.1 Be Un-trusting and Un-trustworthy

    One easy solution to prevent this attack is not to rely on address-based

    authentication. Disable all the r* commands, remove all .rhosts files and empty

    out the /etc/hosts.equiv file. This will force all users to use other means of

    remote access (telnet, ssh, skey, etc).

    3.4.2 Packet Filtering

    With the current IP protocol technology, it is impossible to eliminate IP-

    spoofed packets. However, you can take steps to reduce the number of IP-

    spoofed packets entering and exiting your network.

    Currently, the best method is to install a filtering router that restricts the

    input to your external interface (known as an input filter) by not allowing a

    packet through if it has a source address from your internal network. In

    addition, you should filter outgoing packets that have a source address different

    from your internal network to prevent a source IP spoofing attack from

    originating from your site.

    Dept. of CSE www.seminarcollections.com27

  • 8/6/2019 181 Web Spoofing

    28/34

    www.seminarcollections.com IP & WEB SPOOFING

    The combination of these two filters would prevent outside attackers

    from sending you packets pretending to be from your internal network. It

    would also prevent packets originating within your network from

    pretending to be from outside your network. These filters will *not*

    stop all TCP SYN attacks, since outside attackers can spoof packets from

    *any* outside network, and internal attackers can still send attacks

    spoofing internal addresses.

    3.4.3 Cryptographic Methods

    An obvious method to deter IP-spoofing is to require all network traffic

    to be encrypted and/or authenticated. While several solutions exist, it will be a

    while before such measures are deployed as defacto standards.

    3.4.4 Initial Sequence Number Randomizing

    Since the sequence numbers are not chosen randomly (or incremented

    randomly) this attack works. Bellovin describes a fix for TCP that involves

    partitioning the sequence number space. Each connection would have its own

    separate sequence number space. The sequence numbers would still be

    incremented as before, however, there would be no obvious or implied

    relationship between the numbering in these spaces. Suggested is the following

    formula:

    ISN=M+F(localhost,localport,remotehost,remoteport)

    Where M is the 4 microsecond timer and F is a cryptographic hash. F

    must not be computable from the outside or the attacker could still guess

    sequence numbers. Bellovin suggests F be a hash of the connection-id and a

    secret vector (a random number, or a host related secret combined with the

    machine's boot time).

    Dept. of CSE www.seminarcollections.com28

  • 8/6/2019 181 Web Spoofing

    29/34

    www.seminarcollections.com IP & WEB SPOOFING

    Dept. of CSE www.seminarcollections.com29

  • 8/6/2019 181 Web Spoofing

    30/34

  • 8/6/2019 181 Web Spoofing

    31/34

    www.seminarcollections.com IP & WEB SPOOFING

    5.0 CONCLUSION

    When the world has started calling this era as the era of Internet A

    World Wide Web that connects the every nook and corner of the globe we

    should never be let behind because of some pestering security problems.

    Spoofing of the Web and IP has over the years proved to be annoying as

    well as dangerous. In this tense scenario it is mandatory that we stick onto the

    various solutions so far available and at the same time spend our sincere efforts

    in devising better plans to solve this menace. Indeed techniques like Packet

    Filtering and Cryptographic techniques help to some extend but their efficiency

    is limited. We still rely on manual security checks of the status line, location

    line etc. which indeed are quite ineffective and practical.

    The whole problem basically exists in that most of the web applications

    and tools rely on the source IP address authentication. Alternatives are to be

    derived and a better safer Internet should solve the problem of Spoofing.

    ---------------------------------

    Dept. of CSE www.seminarcollections.com31

  • 8/6/2019 181 Web Spoofing

    32/34

    www.seminarcollections.com IP & WEB SPOOFING

    6.0 REFERENCES

    IP Spoofing

    1. www.cert.org

    2. www.securityfocus.com

    3. www.webopedia.com

    4. www.linuxgazatte.com

    5. www.networkice.com

    Web Spoofing

    1. www.cs.princeton.edu

    2. www.cs.dartmouth.edu

    3. www.fbi.gov

    4. www.systemexperts.com

    5. www.spoonybard.nu

    Dept. of CSE www.seminarcollections.com32

  • 8/6/2019 181 Web Spoofing

    33/34

    www.seminarcollections.com IP & WEB SPOOFING

    ABSTRACT

    This paper describes an Internet security attack that could endanger the

    privacy of World Wide Web users and the integrity of their data. The attack can

    be carried out on today's systems, endangering users of the most common Web

    browsers, including Netscape Navigator and Microsoft Internet Explorer.

    Spoofing means pretending to be something you are not. In Internet

    terms it means pretending to be a different Internet address from the one you

    really have in order to gain something. That might be information like credit

    card numbers, passwords, personal information or the ability to carry out

    actions using someone elses identity. IP spoofing attack involves forging one's

    source address. It is the act of using one machine to impersonate another.

    Web spoofing allows an attacker to create a "shadow copy" of the entire

    World Wide Web. Accesses to the shadow Web are funneled through the

    attacker's machine, allowing the attacker to monitor the all of the victim's

    activities including any passwords or account numbers the victim enters. The

    attacker can also cause false or misleading data to be sent to Web servers in the

    victim's name, or to the victim in the name of any Web server. In short, the

    attacker observes and controls everything the victim does on the Web.

    Dept. of CSE www.seminarcollections.com33

  • 8/6/2019 181 Web Spoofing

    34/34

    www.seminarcollections.com IP & WEB SPOOFING

    CONTENTS

    1.0INTRODUCTION

    1.1HISTORY

    1.2WHAT IS SPOOFING?

    2.0WEB SPOOFING

    2.1INRTODUCTION

    2.2SPOOFING ATTACKS

    2.3WEB SPOOFING

    2.4COMPLETING THE ILLUSION

    2.5WEB SPOOFING DEMONSTRATION

    2.6TRACING THE ATTACKER

    3.0IP SPOOFING

    3.1TCP FLOODING

    3.2DESCRIPTION

    3.3IMPACT

    3.4REDUCING IP SPOOFED PACKETS

    4.0DNS SPOOFING ATTACKS

    5.0CONCLUSION

    6.0REFERENCES


Recommended