Sniffing - Febby Dian Anggraini

advertisement
Sniffing &
Keylogger
Deff Arnaldy, M.Si
0818 0296 4763
deff_arnaldy@yahoo.com
1
•
•
•
•
•
Konsep sniffing
Capturing Live Network Data
Explorasi hasil capturing
Countermeasure sniffing
Keyloggers
Overview
2
• Sniffer adalah program yang membaca dan menganalisa setiap
protokol yang melewati mesin di mana program tersebut
diinstal
• Secara default, sebuah komputer dalam jaringan (workstation)
hanya mendengarkan dan merespon paket-paket yang
dikirimkan kepada mereka. Namun demikian, kartu jaringan
(network card) dapat diset oleh beberapa program tertentu,
sehingga dapat memonitor dan menangkap semua lalu lintas
jaringan yang lewat tanpa peduli kepada siapa paket tersebut
dikirimkan.
• Aktifitasnya biasa disebut dengan Sniffing
Konsep Sniffing
3
•
•
Targets Data Link layer of protocol stack
Sniffer – gathers traffic off network
•
•
•
This data can include userIDs passwords transmitted
by telnet, DNS queries and responses, sensitive
emails, FTP passwords, etc.
Allows attacker to read data passing a given machine
in real time.
Two types of sniffing:
•
•
Active
Passive
Sniffing
4
Passive
• Attacker must have
account on LAN
• Done over a hub
• Usually once access is
gained on one computer
attacker uses passwords to
get in other computers
Sniffing
Active
• Attacker still needs an
account
• Several different attacks:
- Parsing Packets
- Flooding
- Spoofed ARP Messages
- DNS Spoofing
- HTTPS and SSH spoofing
5
Passive Sniffing
user1
BLAH
HUB
user2
Server
- Message gets sent to all
computers on hub
Bad
guy
6
Active Sniffing
user1
BLAH
Switch
user2
Server
- Message gets sent to only
requesting computer by looking
at MAC address
Bad
guy
7
• Offers several ways around a switch
• Available for OpenBSD, Linux, Solaris, and there is a
version for Windows
• Very popular and versatile
• In conjunction with sshmitm and webmitm, conducts all
the above attacks
Dsniff
8
• Any mischievious machine can examine any packet on a
BROADCAST medium
• Ethernet is BROADCAST
• at least on the segments over which it travels
• Getting passwords is the first step in exploiting a machine
• email is plaintext and vulnerable
Major Problems with
Sniffing
9
What does one sniff?
•
•
•
•
•
passwords
email
financial account information
confidential information
low-level protocol info to attack
• hardware addresses
• IP addresses
• routing, etc
10
1. Hardware : standard network adapters .
2. Capture Filter : This is the most important part . It captures
the network traffic from the wire, filters it for the particular
traffic you want, then stores the data in a buffer.
3. Buffers : used to store the frames captured by the Capture
Filter .
What are the components
of a packet sniffer?
11
4. Real-time analyzer: a module in the packet sniffer
program used for traffic analysis and to shift the traffic
for intrusion detection.
5. Decoder : "Protocol Analysis" .
What are the components
of a packet sniffer?
12
Sniffers also work differently depending on the type of
network they are in.
1. Shared Ethernet
2. Switched Ethernet
How does a Sniffer Work?
13
How can I detect a packet
sniffer?
• Ping method
• ARP method
• DNS method
14
Packet Sniffer Mitigation
Host A

Router A
Router B
Host B
The following techniques and tools can be used to mitigate sniffers:
 Authentication—Using strong authentication, such as one-time
passwords, is a first option for defense against packet sniffers.
 Switched infrastructure—Deploy a switched infrastructure to counter
the use of packet sniffers in your environment.
 Antisniffer tools—Use these tools to employ software and hardware
designed to detect the use of sniffers on a network.
 Cryptography—The most effective method for countering packet
15
sniffers does not prevent or detect packet sniffers, but rather renders
them irrelevant.
•
•
•
•
•
•
•
•
•
•
•
Wireshark
Kismet
Tcpdump
Cain and Abel
Ettercap
Dsniff
NetStumbler
Ntop
Ngrep
EtherApe
KisMAC
Top 11 Packet Sniffers
16
Working of Cain & Abel
17
• Detection of clear-text passwords and usernames from
the network.
• Conversion of data to human readable format so that
people can read the traffic.
• Performance analysis to discover network bottlenecks.
• Network intrusion detection in order to discover hackers.
What are sniffers used
for?
18
• Segmentation into trustworthy segments
• bridges
• better yet .. switched hubs
• Not enough “not to allow sniffing”
• easy to add a machine on the net
• may try using X-terminals vs workstations
Prevention of Sniffing
19
• Avoid password transmission
• one solution is r..family
• rlogin, rcp, rsh, etc
• put trusted hosts in .rhosts
• many SAs don’t want users to use them
• Using encrypted passwords
• Kerberos
• PGP public keys
Prevention of Sniffing
(more)
20
• If all other attempts to gather passwords fail, then a
keystroke logger is the tool of choice for hackers
• Keystroke loggers (keyloggers) can be implemented
either using hardware or software
Keylogger
21
• Hardware keyloggers are small hardware devices that
connect the keyboard to the PC and save every keystroke
into a file or in the memory of the hardware device
• In order to install a hardware keylogger, a hacker must
have physical access to the system
22
• Software keyloggers are pieces of stealth software that sit
between the keyboard hardware and the operating system
so that they can record every keystroke.
• Software keyloggers can be deployed on a system by
Trojans or viruses
23
References
• http://netsecurity.about.com/cs/hackertools/a/aa121403.htm
• http://e-articles.info/e/a/title/Packet-Sniffing:-Sniffing-ToolsDetection-Prevention-Methods/
• http://sectools.org/sniffers.html
• http://en.wikipedia.org/wiki/Cain_and_Abel_(software)
• http://www.authorstream.com/Presentation/chinmayzen-79529packet-sniffers-education-ppt-powerpoint/
• http://www.youtube.com/watch?v=O00LENbtiIw
24
Download