Thursday, August 9, 2012

[Hacking techniques and response] ③ seupeuping attacks (spoofing attack)




We spy spy hero in the film does not expose his identity to others if you are disguised as can be seen frequently. Mainly how to use the Social Security card, driver's license, fake identification, or a physical characteristic, such as face, fingerprint, voice, and is modulated. All of these people how to recognize a particular passage is a way to bypass.

Likewise, even on malicious network activity or secret you want to try their own people first thought is how to cover. Just over a network, the user (or the host) information that identifies the IP address, DNS name, Mac address, email address, etc. are used.

Seupeuping attack (Spoofing Attack) the right to deceive his own identity is a technique to attack a different target systems. An attacker on the network, TCP / IP protocol is based on the vulnerability of their systems when trying to hack information (IP address, DNS name, Mac address, etc.) makes it difficult to disguise by hiding backtracking. These seupeuping packet sniffer attacks or denial of service attacks, session hijacking (Session Hijacking)
Perform such an attack makes it possible for other things.

In this installment, find out what kind of seupeuping attack, the attack is what I'll explain briefly. Seupeuping kind of attack might try are as follows: Depending on what information can be classified cheat.

Seupeuping kind of attack
① IP seupeuping
② APR seupeuping
③ seupeuping email
④ DNS seupeuping


① IP seupeuping

Soup Ping IP IP information literally trick is to attack other systems. Denial of service attack via ping IP Soup (TCP Syn flooding, UDP flooding, ICMP flooding) can also perform, and the attack is connected between the computer and the server is also possible to disconnect the session for session. TCP / IP protocol on the 1985 Robert T. vulnerability Morris's paper "A Weakness in the 4.2 BSD Unix TCP / IP Software" in the eopgeupyi, and a notorious hacker Kevin Mitnick, especially in the real hacking attacks through IP seupeuping Motorola, Sun Microsystems, NEC, Novell computer network computer, such as penetrate, software and other materials in 1995 was arrested and charged with stealing.

Kevin Mitnick exactly the TCP Syn flooding + TCP sequence number prediction (TCP Sequence Nubmer Guessing)
+ IP Soup Ping was used. Between the client and server communicate with the computer hackers interrupted the client TCP Syn flooding denial of service attack prevents any reaction, then the hacker that this client is a technique to communicate with the server. These attacks on TCP / IP protocol, which is a problem of creation of TCP sequence numbers per second that a monotonically increasing as the host city for the authentication of the IP source address that only because that was possible.

Connection-oriented protocol, TCP sequence numbers in protocol packet delivery between two hosts without the loss of one kind have been made to check for is a ticket packet. A hacker with a client, TCP Syn flooding attack is blocked. Predict the sequence number of the server after the IP seupeupingdoen by sending forged packets to trick the server is to penetrate. IP-based authentication, providing only the Unix rlogin, rsh, and these IP seupeuping r family services is not only vulnerable to attacks.

② APR seupeuping

48bit 32bit IP address ARP protocol address of the network card (Mac Address) is a protocol that by correspondence. We actually try to connect to the network via an IP address, the TCP / IP for their IP address and connect to the network card will be. The response of the IP address and network card address switches or other network equipment, tables and table arp cache on your computer that will be located.

The information in this table, a hacker attack when forging the traffic between computers and servers, hackers can bypass their computers. Diverted traffic information such as passwords from a hacker can obtain useful information freely.

③ seupeuping email

When sending e-mail address of the sender is forged. From e-mail senders simple method in the field alias (alias) field can be used. When sending e-mail alias to an alias address if you set your e-mail is sent. In these cases, the actual e-mail received by the sender, not the beholder Alias ​​field if only for the sender of the e-mail alias is found to have come from the field.

Nowadays, large amounts of polar-mail spam and virus infection, the sender's address, e-mail address does not exist at all is used. It also sent the mail server, e-mail also sent direct mail relay server than the server is not easy to trace who sent the mail.

④ DNS seupeuping

Domain Name System (DNS) protocol to connect the Internet domain address by matching the actual IP address is a protocol. Internet connection to use the DNS server IP address when it receives a request chatahdalra, to an address other than their own domain from the DNS server for higher-stage recursive (recursive)
Find a way that tells you the IP address.

What if a hacker to take control of your domain's DNS computer controlled and finally obtained an IP address if the original user who want to go home will be connected to other than the homepage. This request was sent to the DNS and DNS response sniff the traffic between the hackers by a hacker with a value of Query ID IP address of the site is to pass the final response.

If you wish to use the shopping mall site engineered by hackers, and their identity within the field, your credit card information to steal your personal information by writing can be. Seupeuping these attacks actually been released on the Internet as a tool, and like many other complex attacks can be used.

However, each method of attack in the two constraints and assumptions, so all is not fully successful. Seupeuping attack packet filtering based on IP authentication, access control and access control, and elimination of vulnerabilities using the service, through the use of cryptographic protocols can be defensive. Information floating around on the internet is not always to be safe at any time through the same thing seupeuping attacks and also may have been forged that you should not be overlooked.

No comments:

Post a Comment