+ All Categories
Home > Documents > Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by [email protected] Denial Of...

Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by [email protected] Denial Of...

Date post: 11-Oct-2020
Category:
Upload: others
View: 5 times
Download: 0 times
Share this document with a friend
25
© Gabriel Verdejo Alvarez ([email protected] ) Barcelona FIST Conference October 2004 Denial Of Service Attacks Denial Of Service Attacks
Transcript
Page 1: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

© Gabriel Verdejo Alvarez ([email protected])

Barcelona

FIST Conference October 2004

Denial Of Service AttacksDenial Of Service Attacks

Page 2: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 22Denial Of service attacksDenial Of service attacks

INDEXINDEX

Speaker’s introduction.Speaker’s introduction.Denial Of Service attacks (DOS).Denial Of Service attacks (DOS).

Examples.Examples.

Distributed Denial of Service attacks (DDOS).Distributed Denial of Service attacks (DDOS).

DDOS tools analysis.DDOS tools analysis.Reflection DDOS Attack.Reflection DDOS Attack.Countermeasures.Countermeasures.What the future brings.What the future brings.

Questions.Questions.Bibliography.Bibliography.

Page 3: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 33Denial Of service attacksDenial Of service attacks

Speaker’s IntroductionSpeaker’s Introduction

Gabriel Verdejo Gabriel Verdejo AlvarezAlvarez, Barcelona 19, Barcelona 1973.73.

Computer science engineer at UAB.Computer science engineer at UAB.PhD studies (DEA) at CCD department, UAB. PhD studies (DEA) at CCD department, UAB.

Senior consultant over 5 years experience.Senior consultant over 5 years experience.Cisco Certified teacher (CNAP).Cisco Certified teacher (CNAP).

Since 2002 working at LSI department located at UPC.Since 2002 working at LSI department located at UPC.

Page 4: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 44Denial Of service attacksDenial Of service attacks

Denial Of service attacks IDenial Of service attacks I

Historical context:Historical context:

90’s decade90’s decade became the Internet age (WWW).became the Internet age (WWW).Massive deployment of partMassive deployment of part--time connections (modem).time connections (modem).Bandwidth increase Bandwidth increase →→ IInteraction, pictures…nteraction, pictures…A new mass media has born!A new mass media has born!

Hackers context:Hackers context:

Simple attacks techniques (console VT, dialSimple attacks techniques (console VT, dial--out War games…)out War games…)Almost inexistent networks attacks (IRC Wars).Almost inexistent networks attacks (IRC Wars).

Page 5: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 55Denial Of service attacksDenial Of service attacks

Denial Of service attacks IIDenial Of service attacks II

A brief chronology:A brief chronology:

Until 1996 naive attacks. No worldwide connection available.Until 1996 naive attacks. No worldwide connection available.

191997 TRIN00 tool became the starting point of Denial Of Service 97 TRIN00 tool became the starting point of Denial Of Service attacks.attacks.

1988 TFN tool improve DOS attacks.1988 TFN tool improve DOS attacks.

1998 1998 EbayEbay, Yahoo, Microsoft were the favorite targets for this kind , Yahoo, Microsoft were the favorite targets for this kind of attacks.of attacks.

1999 TFN2K the new generation for denial attacks.1999 TFN2K the new generation for denial attacks.

Page 6: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 66Denial Of service attacksDenial Of service attacks

Denial Of service attacks IIIDenial Of service attacks III

Definitions:Definitions:

Denial Of ServiceDenial Of Service (DOS) means the impossibility of getting (DOS) means the impossibility of getting access to a resource or service by the legitimate user.access to a resource or service by the legitimate user.

Denial Of Service attackDenial Of Service attack is when the resource or the service is is when the resource or the service is monopolized intentionally to prevent access from other users.monopolized intentionally to prevent access from other users.

This definition also includes the attempts to collapse the serviThis definition also includes the attempts to collapse the service or ce or resource to deny access to anyone.resource to deny access to anyone.

Page 7: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 77Denial Of service attacksDenial Of service attacks

Denial Of service attacks IVDenial Of service attacks IV

DOS attack example 1: DOS attack example 1: IP FloodingIP Flooding

Used Used in locain local networks l networks →→ Consumes great amount of bandwidth.Consumes great amount of bandwidth.

The attacker creates spurious traffic over the network:The attacker creates spurious traffic over the network:

RandomRandom

GuidedGuided

Traffic can be UDP, ICMP or TCP.Traffic can be UDP, ICMP or TCP.

Page 8: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 88Denial Of service attacksDenial Of service attacks

Denial Of service attacks VDenial Of service attacks V

Page 9: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 99Denial Of service attacksDenial Of service attacks

Denial Of service attacks VIDenial Of service attacks VI

DOS attack example 2: DOS attack example 2: ECHOECHO--CHARGEN / CHARGEN / SnorkSnork

UUNIX computers provides several well known services (Telnet, NIX computers provides several well known services (Telnet, FTP, ECHO…).FTP, ECHO…).

ECHO: Replies any PING request received over the network.ECHO: Replies any PING request received over the network.

CHARGEN: Replies any network request with a random CHARGEN: Replies any network request with a random character generator.character generator.

The attacker spoof the source address of the request crossing The attacker spoof the source address of the request crossing both services.both services.

Page 10: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 1010Denial Of service attacksDenial Of service attacks

Denial Of service attacks VIIDenial Of service attacks VII

Page 11: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 1111Denial Of service attacksDenial Of service attacks

Denial Of service attacks VIIIDenial Of service attacks VIII

DOS attack example 3: DOS attack example 3: Ping Of DeathPing Of Death

The most famous DOS attack.The most famous DOS attack.

Uses programming bugs and RFC791/RFC792 definitions of Uses programming bugs and RFC791/RFC792 definitions of maximum packet length of TCP/IP family:maximum packet length of TCP/IP family:

IP datagram has a maximum size of 64K (65535 bytes) with IP datagram has a maximum size of 64K (65535 bytes) with a typical header length of 20 bytes.a typical header length of 20 bytes.

ICMP packet is encapsulated into IP datagram and has a 8 ICMP packet is encapsulated into IP datagram and has a 8 bytes header.bytes header.

Page 12: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 1212Denial Of service attacksDenial Of service attacks

Denial Of service attacks IXDenial Of service attacks IX

Attacker “can” send 65510 bytes of data using ICMP protocol Attacker “can” send 65510 bytes of data using ICMP protocol because:because:

65535 65535 –– 8 (header) = 65527 bytes8 (header) = 65527 bytes

The destination computer receives the request and tries to The destination computer receives the request and tries to reassemble data:reassemble data:

But the truth is we have 65535 But the truth is we have 65535 –– 20 20 –– 8 = 8 = 6550765507 bytes free!!bytes free!!

This attack causes overflow in networks services or operative This attack causes overflow in networks services or operative system failure.system failure.

Page 13: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 1313Denial Of service attacksDenial Of service attacks

Distributed Denial Of service attacks IDistributed Denial Of service attacks I

Definitions:Definitions:

Distributed Denial Of Service AttacksDistributed Denial Of Service Attacks (DDOS) can be defined as a (DDOS) can be defined as a deny of service attack with several sources distributed along thdeny of service attack with several sources distributed along the e Internet that focuses on the same target.Internet that focuses on the same target.

Unlimited number of sources can be used.Unlimited number of sources can be used.

Worldwide distribution.Worldwide distribution.

Any computer attached on Internet can be disabled.Any computer attached on Internet can be disabled.

Page 14: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 1414Denial Of service attacksDenial Of service attacks

Distributed Denial Of service attacks IIDistributed Denial Of service attacks II

Page 15: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 1515Denial Of service attacksDenial Of service attacks

Distributed Denial Of service attacks IIIDistributed Denial Of service attacks III

DDOS tools analysis: DDOS tools analysis: TRINOO / TRIN00TRINOO / TRIN00

First DDOS tool find “in the wild”. Originally detected in SolarFirst DDOS tool find “in the wild”. Originally detected in Solaris is machines but could be used in any UNIX computer.machines but could be used in any UNIX computer.

The deployment mode follows always these guidelines:The deployment mode follows always these guidelines:

The hacker goes into the computer (bugs exploit…).The hacker goes into the computer (bugs exploit…).

Software is Software is compiledcompiled leaving a backdoor at port 1524/TCP.leaving a backdoor at port 1524/TCP.

Other machines in the same network are hacked.Other machines in the same network are hacked.

Page 16: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 1616Denial Of service attacksDenial Of service attacks

Distributed Denial Of service attacks IVDistributed Denial Of service attacks IV

Implements a hierarchical model based on a masterImplements a hierarchical model based on a master--slave schema slave schema to permit the DDOS attacks.to permit the DDOS attacks.

Page 17: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 1717Denial Of service attacksDenial Of service attacks

Distributed Denial Of service attacks VDistributed Denial Of service attacks V

A single attacker can control hundreds (even thousands) of A single attacker can control hundreds (even thousands) of machines in a very simple way.machines in a very simple way.

The attacker cannot be identified directly (the attacker computeThe attacker cannot be identified directly (the attacker computers rs are the slaves!).are the slaves!).

This tool implements IP flooding attack.This tool implements IP flooding attack.

The daemon lets the user run several commands (Telnet style) to The daemon lets the user run several commands (Telnet style) to start/stop service and to control the beginning and the end of start/stop service and to control the beginning and the end of every attack.every attack.

Page 18: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 1818Denial Of service attacksDenial Of service attacks

Distributed Denial Of service attacks VIDistributed Denial Of service attacks VI

DDOS tools analysis: DDOS tools analysis: TFN2KTFN2K

The most sophisticated tool find in the wild.The most sophisticated tool find in the wild.

Improves communication between master/slaves computers using Improves communication between master/slaves computers using TCP, UDP or ICMP packets (even all!!) to avoid firewalls / IDS.TCP, UDP or ICMP packets (even all!!) to avoid firewalls / IDS.

Implements different styles of attacks (TCP/UDP/ICMP flood, Implements different styles of attacks (TCP/UDP/ICMP flood, Smurf) that can be automatically rotated to avoid basic Smurf) that can be automatically rotated to avoid basic countermeasures.countermeasures.

Page 19: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 1919Denial Of service attacksDenial Of service attacks

Distributed Denial Of service attacks VIIDistributed Denial Of service attacks VII

Packet headers are randomly changed to prevent IDS signatures.Packet headers are randomly changed to prevent IDS signatures.

Daemons do not reply to the orders they receive. Every command Daemons do not reply to the orders they receive. Every command is resend 20 times. This method make difficult to discover is resend 20 times. This method make difficult to discover compromised computers because no outside communication compromised computers because no outside communication exists.exists.

Uses CASTUses CAST--256 as cipher method to prevent the 256 as cipher method to prevent the sniffersniffer tools over tools over the network.the network.

Page 20: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 2020Denial Of service attacksDenial Of service attacks

Distributed Denial Of service attacks VIIIDistributed Denial Of service attacks VIII

Reflection DDOS attack:Reflection DDOS attack:

This new approach is based on the use of legitimate (not hacked!This new approach is based on the use of legitimate (not hacked!) ) computers attached to the Internet.computers attached to the Internet.

The slaves machines are not quickly discovered/banned so the The slaves machines are not quickly discovered/banned so the attack can be done more time.attack can be done more time.

The attacking method can be switched automatically.The attacking method can be switched automatically.

The “attackers” computers can change without randomly make The “attackers” computers can change without randomly make more difficult the detection of the attack.more difficult the detection of the attack.

Page 21: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 2121Denial Of service attacksDenial Of service attacks

Distributed Denial Of service attacks IXDistributed Denial Of service attacks IX

Page 22: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 2222Denial Of service attacksDenial Of service attacks

Distributed Denial Of service attacks XDistributed Denial Of service attacks X

GRC.comGRC.com DDOS reflection attack:DDOS reflection attack:

On January 11 of 2002 an attack to GRC was discovered.On January 11 of 2002 an attack to GRC was discovered.

2 x T1 connection were collapsed few hours by several ISP 2 x T1 connection were collapsed few hours by several ISP computers as computers as VerioVerio or Qwest and well known places as Yahoo.or Qwest and well known places as Yahoo.

Few hours before it was detected a filter was applied and the Few hours before it was detected a filter was applied and the count of packets discarded were count of packets discarded were 1.072.519.399!!!1.072.519.399!!!

Page 23: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 2323Denial Of service attacksDenial Of service attacks

Distributed Denial Of service attacks XIDistributed Denial Of service attacks XI

Countermeasures:Countermeasures:

Ingress/Egress filtering Ingress/Egress filtering →→ Deny spoofing address attacks.Deny spoofing address attacks.

Firewalls Firewalls →→ Poor solution, increases routing overhead.Poor solution, increases routing overhead.

IDS IDS →→ Bad detection mechanism and limited response.Bad detection mechanism and limited response.

Other solutions (Other solutions (MultopsMultops, Reverse Firewall, D, Reverse Firewall, D--Ward) Ward) canotcanotinteroperate with external systems.interoperate with external systems.

Page 24: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 2424Denial Of service attacksDenial Of service attacks

Distributed Denial Of service attacks XIIDistributed Denial Of service attacks XII

What the future brings:What the future brings:

The DDOS problem is not solved and periodically we read a new The DDOS problem is not solved and periodically we read a new succefullsuccefull attack against any major company (attack against any major company (EbayEbay, SCO…)., SCO…).

The future of DDOS are changing with virus symbiosis. Now the The future of DDOS are changing with virus symbiosis. Now the hacker does not need to enter into the computer, the virus let thacker does not need to enter into the computer, the virus let the he door open. door open.

MyDoomMyDoom (2004) (2004) www.sco.comwww.sco.com →→ www.thescogroup.comwww.thescogroup.com

DDOS attacks in wireless Networks.DDOS attacks in wireless Networks.

Page 25: Denial Of Service Attacksgabriel/files/DDOSFIST2004.pdfOctober’ 2004 by gaby@tau.uab.es Denial Of service attacks 6 Denial Of service attacks III Definitions: Denial Of Service (DOS)

October’ 2004 by October’ 2004 by [email protected]@tau.uab.es 2525Denial Of service attacksDenial Of service attacks

Distributed Denial Of service attacks XIIIDistributed Denial Of service attacks XIII

BibliographyBibliography::

William R. Cheswick and Steven M. William R. Cheswick and Steven M. BellovinBellovin, , ““Firewalls and Internet Security: Firewalls and Internet Security: Repelling the Wily Hacker", AddisonRepelling the Wily Hacker", Addison--Wesley Publishing, 1994.Wesley Publishing, 1994.W. Richard Stevens, W. Richard Stevens, ““TCP/IP Illustrated Volume 1: The protocolsTCP/IP Illustrated Volume 1: The protocols””, Addison, Addison--WessleyWessley, 1998., 1998.David David DittrichDittrich, , ““The TRIBE FLOOD NETWORK distributed denial of service The TRIBE FLOOD NETWORK distributed denial of service attack toolattack tool””, 1999., 1999.David David HoelzerHoelzer, , ““IntrussionIntrussion Detection FAQ: Why Egress Filtering Can Benefit Detection FAQ: Why Egress Filtering Can Benefit Your OrganizationYour Organization””, 2000., 2000.T. M. Gil, M. T. M. Gil, M. PolettoPoletto, , ””MULTOPS: a dataMULTOPS: a data--structure for bandwidth attack structure for bandwidth attack detectiondetection””, 10th , 10th UsenixUsenix Security Symposium, 2001.Security Symposium, 2001.

http://tau.uab.es/~gabyhttp://tau.uab.es/~gaby [email protected]@tau.uab.es


Recommended