TCP/IP Transport Layer Attack Vector #2

4 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$69.99
List Price:  $99.99
You save:  $30
€65.24
List Price:  €93.20
You save:  €27.96
£55.93
List Price:  £79.91
You save:  £23.97
CA$95.58
List Price:  CA$136.56
You save:  CA$40.97
A$107.13
List Price:  A$153.05
You save:  A$45.92
S$95.25
List Price:  S$136.08
You save:  S$40.82
HK$547.90
List Price:  HK$782.75
You save:  HK$234.85
CHF 63.85
List Price:  CHF 91.21
You save:  CHF 27.36
NOK kr770.13
List Price:  NOK kr1,100.23
You save:  NOK kr330.10
DKK kr486.51
List Price:  DKK kr695.05
You save:  DKK kr208.53
NZ$117.65
List Price:  NZ$168.07
You save:  NZ$50.42
د.إ257.06
List Price:  د.إ367.25
You save:  د.إ110.18
৳7,679.19
List Price:  ৳10,970.75
You save:  ৳3,291.55
₹5,834.32
List Price:  ₹8,335.10
You save:  ₹2,500.78
RM333.81
List Price:  RM476.90
You save:  RM143.08
₦91,422.33
List Price:  ₦130,608.93
You save:  ₦39,186.60
₨19,487.31
List Price:  ₨27,840.21
You save:  ₨8,352.89
฿2,585.90
List Price:  ฿3,694.31
You save:  ฿1,108.40
₺2,277.50
List Price:  ₺3,253.72
You save:  ₺976.21
B$361.10
List Price:  B$515.88
You save:  B$154.78
R1,320.17
List Price:  R1,886.05
You save:  R565.87
Лв127.48
List Price:  Лв182.13
You save:  Лв54.64
₩96,293.43
List Price:  ₩137,567.94
You save:  ₩41,274.51
₪266.53
List Price:  ₪380.78
You save:  ₪114.24
₱4,038.21
List Price:  ₱5,769.12
You save:  ₱1,730.90
¥10,975.59
List Price:  ¥15,680.08
You save:  ¥4,704.49
MX$1,206.90
List Price:  MX$1,724.22
You save:  MX$517.31
QR255.26
List Price:  QR364.68
You save:  QR109.41
P965.80
List Price:  P1,379.77
You save:  P413.97
KSh9,448.65
List Price:  KSh13,498.65
You save:  KSh4,050
E£3,352.63
List Price:  E£4,789.68
You save:  E£1,437.04
ብር3,985.10
List Price:  ብር5,693.24
You save:  ብር1,708.14
Kz58,489.70
List Price:  Kz83,560.30
You save:  Kz25,070.60
CLP$66,385.51
List Price:  CLP$94,840.51
You save:  CLP$28,455
CN¥507.19
List Price:  CN¥724.59
You save:  CN¥217.40
RD$4,111.01
List Price:  RD$5,873.12
You save:  RD$1,762.11
DA9,398.61
List Price:  DA13,427.17
You save:  DA4,028.55
FJ$158.17
List Price:  FJ$225.97
You save:  FJ$67.79
Q544.39
List Price:  Q777.73
You save:  Q233.34
GY$14,639.41
List Price:  GY$20,914.34
You save:  GY$6,274.92
ISK kr9,791.60
List Price:  ISK kr13,988.60
You save:  ISK kr4,197
DH708.11
List Price:  DH1,011.63
You save:  DH303.52
L1,243.72
List Price:  L1,776.81
You save:  L533.09
ден4,016.98
List Price:  ден5,738.79
You save:  ден1,721.81
MOP$563.94
List Price:  MOP$805.67
You save:  MOP$241.72
N$1,340.22
List Price:  N$1,914.68
You save:  N$574.46
C$2,575.16
List Price:  C$3,678.96
You save:  C$1,103.79
रु9,316.74
List Price:  रु13,310.19
You save:  रु3,993.45
S/261.07
List Price:  S/372.97
You save:  S/111.90
K269.52
List Price:  K385.04
You save:  K115.52
SAR262.50
List Price:  SAR375.02
You save:  SAR112.51
ZK1,842.03
List Price:  ZK2,631.59
You save:  ZK789.55
L324.63
List Price:  L463.78
You save:  L139.14
Kč1,640.70
List Price:  Kč2,343.96
You save:  Kč703.26
Ft25,605.88
List Price:  Ft36,581.40
You save:  Ft10,975.51
SEK kr762.91
List Price:  SEK kr1,089.92
You save:  SEK kr327.01
ARS$61,153.48
List Price:  ARS$87,365.86
You save:  ARS$26,212.38
Bs484.56
List Price:  Bs692.26
You save:  Bs207.70
COP$275,828.59
List Price:  COP$394,057.74
You save:  COP$118,229.14
₡35,172.98
List Price:  ₡50,249.28
You save:  ₡15,076.29
L1,727.65
List Price:  L2,468.18
You save:  L740.53
₲519,796.34
List Price:  ₲742,598.03
You save:  ₲222,801.68
$U2,684.12
List Price:  $U3,834.62
You save:  $U1,150.50
zł281.95
List Price:  zł402.81
You save:  zł120.85
Already have an account? Log In

Transcript

Now let's talk a little bit about ACC float. In fact, in the way it's implemented, it is not that different than Simplot. The difference is it uses another flag in the TCP header, which is as you can see the ACC flag. And the methodology is quite similar to SYN floods. Here, instead of first sending SYN packets, the attacker just sends constantly ack packets, obviously, all those ack packets are out of band. Now what they mean by out of band here, as you can see, this act packet, for instance, is in the band, because it is part of a proper three way handshake, meaning first sentence, then synack receipt, and then I get sent.

And this procedure is tracked by what is called the sequence numbers and acknowledge numbers in the TCP header. If you don't know what these are If you don't know what a sequence number is, or what an acknowledged number is, I encourage you to go back and review your knowledge on TCP. Here in case of a neck flood, neither of those numbers are followed in order. Basically, the attacker keeps sending x with some random acknowledge number and sequence number. And when it comes to detection, this is more or less what you would see on Wireshark. As you can see, you will encounter multiple entries for the same TCP packets.

And when you investigate the packets, you will find out that as per the flex on the ACC is set. Meanwhile, I would like to also mention that this methodology this attack methodology can be implemented with SYN ack packets as well. In other words, in this example, in the screenshot, you see only act flood, but same attack could be performed or your synack float as well in Case The only difference would be under the flags sin would be also set. And when it comes to the proper filters, the most straightforward one is basically setting the x equals one. Although this would include all the packets with AK. In other words, it would include, for example, Phoenix or sin x as well.

Another thing you could try, although the efficiency is not always guaranteed, is using this filter, meaning TCP analysis applique tech, that will work if the attacker is using exactly the same act packets basically. However, if the attacker is clever enough to send different act packets with different sequence numbers and different IDs, then this filter will not work. Now as per the mitigation, it's hard to actually apply in the challenges because these packets are out of band anyway. So So you cannot challenge a packet knowing that you know, it is an illegitimate traffic anyway. Instead, what you need to do is on firewall check out of the state tech and SYN ack packets. And actually, although it's not stated here, you can also include FinEx and other packets, which include that.

Basically, what you need to do is ensure that at your firewall, you configure it in such a way that all the packets all the ack packets which are out of the band are blocked, before reaching to the server. In the following lectures, I will also talk about the combination of the flex that we discussed. In fact, it's not only limited to ACC, as you can imagine, there are so many flags in TCP and attackers can and they usually do exploit all of them as well as their combinations. In the following lectures, I will be talking about these combinations and basically how to make To get them

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.