Cyops1.1 Chp07-Dts Oa
Cyops1.1 Chp07-Dts Oa
Cyops1.1 Chp07-Dts Oa
(Cyber Ops)
Digital Talent Scholarship – Online Academy
TIM INSTRUKTUR
Luhur Bayuaji
Sri Suning Kusumawardani
Viddi Mardiansyah
Prihadi Yogaswara
Chapter 7: Network Attacks:
A Deeper Look
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
7.1 Network Monitoring and
Tools
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Introduction to Network Monitoring
Network Security Topology
All networks are targets and
need to be secured using a
defense-in-depth approach.
Security analysts must be
intimately familiar with normal
network behavior because
abnormal network behavior
typically indicates a problem.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Introduction to Network Monitoring
Network Monitoring Methods
Tools used to help discover
normal network behavior include
IDS, packet analyzers, SNMP,
NetFlow, and others.
Traffic information capture
methods:
• Network TAPs – Network test
access points that forward all traffic
including physical layer errors to an
analysis device.
• Port mirroring – enables a switch
to copy frames of one or more ports
to a Switch Port Analyzer (SPAN)
port connected to an analysis
device.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Introduction to Network Monitoring
Network Taps
A network tap is typically a passive
splitting device implemented inline
between a device of interest and the
network. A tap forwards all traffic
including physical layer errors to an
analysis device.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Introduction to Network Monitoring
Traffic Mirroring and SPAN
Port mirroring enables the switch to copy frames of
one or more ports to a Switch Port Analyzer (SPAN)
port connected to an analysis device.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Introduction to Network Monitoring Tools
Network Security Monitoring Tools
Monitoring Tools:
• Protocol Analyzers – Are programs used to capture traffic.
Ex. Wireshark and Tcpdump.
• NetFlow – Provides a complete audit trail of basic
information about every IP flow forwarded on a device.
• SIEM – Security Information Event Management systems
provide real time reporting and long-term analysis of security
events.
• SNMP – Simple Network Management Protocol provides the
ability to request and passively collect information across all
network devices.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Introduction to Network Monitoring Tools
Network Protocol Analyzers
Analysts can use protocol analyzers such as Wireshark and tcpdump to see network exchanges
down to the packet level.
Network protocol analyzers are also very useful for network troubleshooting, software and protocol
development, and education. In security forensics, a security analyst may reconstruct an incident
from relevant packet captures.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Introduction to Network Monitoring Tools
NetFlow NetFlow is a Cisco IOS technology that
provides 24x7 statistics on packets flowing
through a Cisco router or multilayer switch.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Introduction to Network Monitoring Tools
SIEM
Security Information Event Management (SIEM) systems provide real time reporting and long-
term analysis of security events.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Introduction to Network Monitoring Tools
SIEM Systems
Splunk is one of the more popular proprietary
SIEM systems used by Security Operation
Centers.
As an open source option, this course uses the
ELK suite for SIEM functionality. ELK is an
acronym for three open source products from
Elastic:
Elasticsearch - Document oriented full text
search engine
Logstash - Pipeline processing system that
connects "inputs" to "outputs" with optional "filters"
in between
Kibana - Browser based analytics and search
dashboard for Elasticsearch
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Introduction to Network Monitoring Tools
Packet Tracer – Logging Network Activity
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
7.2 Attacking the Foundation
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
IP Vulnerabilities and Threats
IPv4 and IPv6
It is important for security analysts to
understand the different fields in both the
IPv4 and IPv6 headers because threat
actors can tamper with packet information.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
IP Vulnerabilities and Threats
The IPv4 Packet Header
There are 10 fields in the IPv4 packet
header:
• Version
• Internet Header length
• Differentiated Services or DiffServ (DS)
• Total length
• Identification, Flag, and Fragment offset
• Time-to-Live (TTL)
• Protocol
• Header checksum
• Source IPv4 Address
• Destination IPv4 Address
• Options and Padding
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
IP Vulnerabilities and Threats
The IPv6 Packet Header
There are 8 fields in the IPv4 packet
header:
• Version
• Traffic Class
• Flow Label
• Payload Length
• Next Header
• Hop Limit
• Source IPv6 Address
• Destination IPv6 Address
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
IP Vulnerabilities and Threats
IP Vulnerabilities
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
IP Vulnerabilities and Threats
ICMP Attacks
ICMP was developed to carry diagnostic
messages and to report error conditions when
routes, hosts, and ports are unavailable. ICMP
messages are generated by devices when a
network error or outage occurs.
Common ICMP messages of interest to threat
actors include:
• ICMP echo request and echo reply – This is
used to perform host verification and DoS
attacks.
• ICMP unreachable – This is used to perform
network reconnaissance and scanning attacks.
• ICMP mask reply – This is used to map an
internal IP network.
• ICMP redirects – This is used to lure a target
host into sending all traffic through a
compromised device and create a MITM attack.
• ICMP router discovery – This is used to inject
bogus route entries into the routing table of a
target host.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
IP Vulnerabilities and Threats
DoS Attacks
The goal of a Denial of Service (DoS)
attack is to prevent legitimate users from
gaining access to websites, email, online
accounts, and other services.
There are two major sources of DoS
attacks:
• Maliciously Formatted Packets – Threat
actors craft a maliciously formatted packet
and forward it to a susceptible host, causing
the host to crash or become extremely
slow.
• Overwhelming Quantity of Traffic –
Threat actors overwhelm a target network,
host, or application, causing them to crash
or become extremely slow.
A distributed DoS (DDoS) attack combines
multiple DoS attacks.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
IP Vulnerabilities and Threats
Amplification and Reflection Attacks
Threat actors often use
amplification and reflection
techniques to create DoS attacks.
The example in the figure illustrates
how an amplification and reflection
technique called a Smurf attack is
used to overwhelm a target host:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
TCP and UDP Vulnerabilities
TCP
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
TCP and UDP Vulnerabilities
UDP and UDP Attacks
UDP is a simple protocol that provides the basic transport layer functions. UDP is commonly used
by DNS, TFTP, NFS, and SNMP. It is also used with real-time applications such as media streaming
or VoIP. UDP is a connectionless transport layer protocol.
By default, UDP is not protected by any encryption. The lack of encryption allows anyone to look at
the traffic, change it, and send it on to its destination.
UDP protocol attacks target the lack of protocol behaviors (UDP):
• UDP checksum attack
• UDP flood attack
• UDP DoS attacks
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
7.3 Attacking What We Do
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
IP Services
ARP Vulnerabilities
Hosts broadcast an ARP
Request to other hosts on the
segment to determine the MAC
address of a host with a
particular IP address.
All hosts on the subnet receive
and process the ARP Request.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
IP Services
ARP Cache Poisoning
ARP cache poisoning attacks deliberately poison the cache of another computer with spoofed
IP address to MAC address mappings.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
IP Services
DNS Attacks
DNS servers resolve names to IP
addresses and are a major target of
attackers. Some DNS exploits are:
• DNS Open Resolvers (public name
servers)
• DNS Stealth Attacks
• DNS Shadowing Attacks – hijacked
domains are used to create subdomains
which are used to resolve to malicious
web sites
• DNS Tunneling Attacks - hides
malicious instructions inside DNS
queries and responses
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
IP Services
DNS Tunneling
Threat actors who use DNS
tunneling place non-DNS
traffic within DNS traffic. This
method often circumvents
security solutions. For the
threat actor to use DNS
tunneling, the different types
of DNS records such as TXT,
MX, SRV, NULL, A, or
CNAME are altered.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
IP Services
DHCP
A DHCP attack could result in every host on the network communicating with malicious DNS servers and gateways. A DHCP spoofing
attack creates a rogue DHCP server to serve falsified information.
1 3
2 4
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
IP Services
Lab – Exploring DNS Traffic
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Enterprise Services
HTTP and HTTPS
Browsing the Web is possibly the largest vector of attack. Security analysts should have in depth
knowledge of how web attacks work.
• Malicious iFrames – an iFrame allows a page from a different domain to be opened inline within the
current page. The iFrame can be used to launch malicious code.
• HTTP 302 cushioning – allows a web page to redirect and open in a different URL. Can be used to
redirect to malicious code.
• Domain shadowing – malicious web sites are created from subdomains created from a hijacked
domain.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Enterprise Services
Email
Email messages are accessed from many different devices
that are often not protected by the company’s firewall.
• Attachment-based attacks – email with malicious
executable files attached.
• Email spoofing – phishing attack where the message
appears to come from a legitimate source.
• Spam email – unsolicited email with advertisements or
malicious content.
• Open mail relay server – massive amount of spam and
worms can be sent by misconfigured email servers.
• Homoglyphs – phishing scheme where text characters
(hyperlinks) look similar to real text and links.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Enterprise Services
Web-Exposed Databases
Web applications commonly connect to a relational database. Because relational databases often
contain sensitive data, databases are a frequent target for attacks.
• Command injection attacks – insecure code and web application allows OS commands to be injected
into form fields or the address bar.
• XSS Cross-site scripting attacks – insecure server-side scripting where the input is not validated
allows scripting commands to be inserted into user generated forms fields, like web page comments.
This results in visitors being redirected to a malicious website
with malware code.
• SQL injection attacks – insecure server-side scripting allows
SQL commands to be inserted into form fields where the input
is not validated.
• HTTP injection attacks – manipulation of html allows
executable code to be injected through HTML div tags, etc.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Enterprise Services
Lab – Attacking a mySQL Database
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Enterprise Services
Lab – Reading Server Logs
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
7.4 Chapter Summary
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Chapter Summary
Summary
All networks are targets and need to be secured using a defense-in-depth approach.
Tools used to help discover normal network behavior include IDS, packet analyzers,
SNMP, NetFlow, and others.
A network tap forwards all traffic including physical layer errors to an analysis device.
Port mirroring enables the switch to copy frames of one or more ports to a Switch Port
Analyzer (SPAN) port connected to an analysis device.
Analysts can use protocol analyzers such as Wireshark and tcpdump to see network
exchanges down to the packet level.
NetFlow can be used for network and security monitoring, network planning, and traffic
analysis; however, it does not capture the content.
Security Information Event Management (SIEM) systems provide real time reporting
and long-term analysis of security events.
Splunk and ELK are two proprietary SIEM systems used by Security Operation
Centers. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Chapter Summary
Summary (Cont.)
Security analysts must understand the different fields in both the IPv4 and IPv6 headers
because threat actors can tamper with packet information.
There are 10 fields in the IPv4 packet header: Version, Internet header length,
Differentiated Services or DiffServ (DS), Total length, Identification, Flag, and Fragment
offset, Time-to-Live (TTL), Protocol, Header checksum, Source IPv4 Address,
Destination IPv4 Address, Options and Padding.
There are 8 fields in the IPv4 packet header: Version, Traffic Class, Flow Label,
Payload Length, Next Header, Hop Limit, Source IPv6 Address, Destination IPv6
Address
IP vulnerabilities include ICMP attacks, DoS and DDoS attacks, address spoofing,
MITM attacks, and session hijacking.
ICMP was developed to carry diagnostic messages and to report error conditions when
routes, hosts, and ports are unavailable. ICMP messages are generated by devices
when a network error or outage occurs.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Chapter Summary
Summary (Cont.)
The goal of a Denial of Service (DoS) attack is to prevent legitimate users from gaining access to
websites, email, online accounts, and other services.
Threat actors often use amplification and reflection techniques to create DoS attacks.
A DDoS attack is larger than a DoS attack because it originates from multiple sources. DDoS
attacks introduced terms such as botnet, handler systems, and zombie computers.
IP address spoofing attacks occur when a threat actor creates packets with false source IP address
information to either hide the identity of the sender or to pose as another legitimate user.
TCP provides the following services: reliable delivery, flow control, stateful communication.
Although the TCP protocol is a connection-oriented and reliable protocol, there are still
vulnerabilities that can be exploited.
UDP is a simple protocol that provides the basic transport layer functions. UDP is commonly used
by DNS, TFTP, NFS, and SNMP. It is also used with real-time applications such as media streaming
or VoIP. UDP is a connectionless transport layer protocol.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Chapter Summary
Summary (Cont.)
Hosts broadcast an ARP Request to other hosts on the segment to determine the MAC
address of a host with a particular IP address.
ARP cache poisoning attacks deliberately poison the cache of another computer with
spoofed IP address to MAC address mappings.
DNS servers resolve names to IP addresses and are a major target of attackers.
Threat actors who use DNS tunneling place non-DNS traffic within DNS traffic.
A DHCP spoofing attack creates a rogue DHCP server to serve falsified information.
Browsing the Web (http and https) is possibly the largest vector of attack. Security
analysts should have in depth knowledge of how web attacks work.
Email messages are accessed from many different devices that are often not protected
by the company’s firewall.
Web applications commonly connect to a relational database. Because relational
databases often contain sensitive data, databases are a frequent target for attacks.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Chapter 7
New Terms
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Cybersecurity Operations Certification
This chapter covers the following areas in the Cybersecurity Operations Certification:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Cybersecurity Operations Certification (Cont.)
This chapter covers the following areas in the Cybersecurity Operations Certification:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Cybersecurity Operations Certification (Cont.)
This chapter covers the following areas in the Cybersecurity Operations Certification:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56