You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
special packet to update ARP cache even without a request
it is basically an ARP_REPLY
this is used to poison cache on other machines
Active and Passive Sniffing
Passive sniffing - watching network traffic without interaction; only works for same collision domain
Active sniffing - uses methods to make a switch send traffic to you even though it isn't destined for your machine
Network tap - any kind of connection that allows to see all traffic passing by
Wiretapping
Lawful interception - legally intercepting communications between two parties
Active - interjecting something into the communication
Passive - only monitors and records the data
PRISM (Planning Tool for Resource Integration, Synchronization and Management) - system used by NSA to wiretap external data coming into US
Span port
Switch configuration that makes the switch send a copy of all frames from other ports to a specific port
Not all switches have the ability to do this
Modern switches sometimes don't allow span ports to send data - you can only listen
Port mirroring - another word for span port
MAC Flooding
Switches either flood or forward data
If a switch doesn't know what MAC address is on a port, it will flood the data until it finds out
This works by sending so many MAC addresses to the CAM table that it can't keep up
Switch port stealing - tries to update information regarding a specific port in a race condition
MAC Flooding will often destroy the switch before you get anything useful, doesn't last long and it will get you noticed. Also, most modern switches protect against this.
CAM Table
the table on a switch that stores which MAC address is on which port
If table is empty or full, everything is sent to all ports
Tools
Etherflood
Macof
ARP Poisoning
Also called ARP spoofing or gratuitous ARP
This can trigger alerts because of the constant need to keep updating the ARP cache of machines
Changes the cache of machines so that packets are sent to you instead of the intended target
Countermeasures
Dynamic ARP Inspection using DHCP snooping
XArp can also watch for this
Default gateway MAC can also be added permanently into each machine's cache
Tools
Cain and Abel
WinArpAttacker
Ufasoft
dsniff
DHCP Starvation
Attempt to exhaust all available addresses from the server
Attacker sends so many requests that the address space allocated is exhausted
Alert mode fast; log only timestamps, alert message, source IP address and port, destination IP address and port
Config
var HOME_NET 192.168.1.0/24
* sets home network (local subnet)
var EXTERNAL_NET any
* sets external network to any
var SQL_SERVERS $HOME_NET
* tells snort to watch out for SQL attacks on any device in the network defined as home
var RULE_PATH c:\etc\snort\rules
* tells snort where to find the rule sets
include $RULE_PATH/telnet.rules
* tells snort to compare packets to the rule set named telnet.rules and alert on anything it finds
var EXTERNAL_NET !$HOME_NET ignores packates generated by the home network var HTTP_SERVERS, var SMTP_SERVERS, var SQL_SERVERS and DNS_SERVERS are more options
Rule syntax
alert, log, pass (ignore packet) are snort rule actions
Rule evaluation: Pass, Drop, Alert, Log
msg: can have options like flags: (TCP flags to look for) or content: (string in payload to look for)
alert tcp !HOME_NET any -> $HOME_NET 31337 (msg : "BACKDOOR ATTEMPT-Backorifice")
This alerts about traffic coming not from my home network using any source port to my home network on port 31337.
Modes
Sniffer - watches packets in real time
Packet logger - saves packets to disk for review at a later time
NIDS - analyzes network traffic against various rule sets