TCP/IP Internet Layer Attack Vector #1

4 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$69.99
List Price:  $99.99
You save:  $30
€65.44
List Price:  €93.49
You save:  €28.05
£56.04
List Price:  £80.06
You save:  £24.02
CA$95.74
List Price:  CA$136.79
You save:  CA$41.04
A$107.11
List Price:  A$153.03
You save:  A$45.91
S$95.36
List Price:  S$136.24
You save:  S$40.87
HK$547.90
List Price:  HK$782.75
You save:  HK$234.85
CHF 64.03
List Price:  CHF 91.47
You save:  CHF 27.44
NOK kr772.60
List Price:  NOK kr1,103.76
You save:  NOK kr331.16
DKK kr487.88
List Price:  DKK kr697.01
You save:  DKK kr209.12
NZ$117.84
List Price:  NZ$168.36
You save:  NZ$50.51
د.إ257.06
List Price:  د.إ367.25
You save:  د.إ110.18
৳7,700.43
List Price:  ৳11,001.09
You save:  ৳3,300.65
₹5,837.33
List Price:  ₹8,339.41
You save:  ₹2,502.07
RM333.81
List Price:  RM476.90
You save:  RM143.08
₦92,489.99
List Price:  ₦132,134.22
You save:  ₦39,644.23
₨19,474.37
List Price:  ₨27,821.72
You save:  ₨8,347.35
฿2,588.61
List Price:  ฿3,698.17
You save:  ฿1,109.56
₺2,275.23
List Price:  ₺3,250.47
You save:  ₺975.23
B$358.08
List Price:  B$511.57
You save:  B$153.48
R1,312.98
List Price:  R1,875.77
You save:  R562.78
Лв127.91
List Price:  Лв182.73
You save:  Лв54.82
₩96,452.39
List Price:  ₩137,795.03
You save:  ₩41,342.64
₪267.73
List Price:  ₪382.49
You save:  ₪114.75
₱4,034.64
List Price:  ₱5,764.02
You save:  ₱1,729.38
¥11,065.06
List Price:  ¥15,807.91
You save:  ¥4,742.85
MX$1,201.03
List Price:  MX$1,715.83
You save:  MX$514.80
QR255.05
List Price:  QR364.38
You save:  QR109.32
P965.79
List Price:  P1,379.76
You save:  P413.97
KSh9,296.24
List Price:  KSh13,280.92
You save:  KSh3,984.67
E£3,349.82
List Price:  E£4,785.67
You save:  E£1,435.84
ብር3,985.10
List Price:  ብር5,693.24
You save:  ብር1,708.14
Kz58,375.85
List Price:  Kz83,397.65
You save:  Kz25,021.80
CLP$66,375.71
List Price:  CLP$94,826.51
You save:  CLP$28,450.80
CN¥507.11
List Price:  CN¥724.48
You save:  CN¥217.36
RD$4,113.13
List Price:  RD$5,876.15
You save:  RD$1,763.02
DA9,392.53
List Price:  DA13,418.47
You save:  DA4,025.94
FJ$158.35
List Price:  FJ$226.22
You save:  FJ$67.87
Q544.06
List Price:  Q777.27
You save:  Q233.20
GY$14,678.83
List Price:  GY$20,970.66
You save:  GY$6,291.82
ISK kr9,837.79
List Price:  ISK kr14,054.59
You save:  ISK kr4,216.80
DH708.72
List Price:  DH1,012.51
You save:  DH303.78
L1,246.75
List Price:  L1,781.16
You save:  L534.40
ден4,025.16
List Price:  ден5,750.48
You save:  ден1,725.31
MOP$565.76
List Price:  MOP$808.27
You save:  MOP$242.50
N$1,340.22
List Price:  N$1,914.68
You save:  N$574.46
C$2,582.07
List Price:  C$3,688.83
You save:  C$1,106.76
रु9,353.99
List Price:  रु13,363.42
You save:  रु4,009.42
S/263.57
List Price:  S/376.55
You save:  S/112.97
K270.82
List Price:  K386.91
You save:  K116.08
SAR262.50
List Price:  SAR375.01
You save:  SAR112.51
ZK1,859.31
List Price:  ZK2,656.27
You save:  ZK796.96
L325.94
List Price:  L465.65
You save:  L139.71
Kč1,644.39
List Price:  Kč2,349.23
You save:  Kč704.84
Ft25,720.62
List Price:  Ft36,745.32
You save:  Ft11,024.70
SEK kr762.14
List Price:  SEK kr1,088.81
You save:  SEK kr326.67
ARS$61,174.36
List Price:  ARS$87,395.69
You save:  ARS$26,221.33
Bs486.59
List Price:  Bs695.16
You save:  Bs208.56
COP$277,528.94
List Price:  COP$396,486.91
You save:  COP$118,957.97
₡35,172.98
List Price:  ₡50,249.28
You save:  ₡15,076.29
L1,732.56
List Price:  L2,475.19
You save:  L742.63
₲520,857.74
List Price:  ₲744,114.38
You save:  ₲223,256.64
$U2,703.34
List Price:  $U3,862.08
You save:  $U1,158.74
zł282.38
List Price:  zł403.41
You save:  zł121.03
Already have an account? Log In

Transcript

Let's start with TCP IP internet layer ICMP flood. In this lecture, I will be talking about actually two varieties of the same attack. The first one is going to be as mentioned ICMP flood, which is a DoS attack, and the second one is going to be Smurf attack, which is nothing but a distributed version of ICMP flood. Simply plot is a Pink Floyd, which creates a denial of service where the attacker overwhelms the victim with ICMP echo requests. Let me just show you in the following slide here. I'm not going to go through all of them since this is actually a purity those course but in case you don't know them, I highly recommend to you to go back and review your knowledge.

So as the definition says, this attack exploits the request type, which is type eight actually, by sending requests from the client to the host excessively as I depict you one after many times. In other words, as the client sends all those requests, the host tries to reply to all of them back, which overwhelms the server and therefore, it becomes unavailable for delivering it serves. Long story short, it's a wall based attack, which exploits to ICMP type bait, which is the request type, and why it's called the DoS attack rather than a DDoS attack? Well, it's simple, because in this scenario, there's only one attacker, one attacker is trying to take down the host, that is the server. And the reason why only one attacker as a client can achieve that is simply because in such a case, attackers bandwidth is much bigger than the host bandwidth, since the attacker sends the ICMP requests without even expecting in the responses.

And this thanks to the bigger bandwidth can overwhelm the host and therefore make it on their way. And now the question is, can you do it in a DDoS fashion? And the answer is yes, you can and this is actually called the Smurf attack. This scenario, attacker by the help of a controller under his control sends this ICMP requests to multiple servers or multiple routers, and spokes his own IP. And if those routers are not configured properly to protect themselves against IP spoofing, they will answer for those ICMP requests by sending the request to the victim or back to the attacker. It means just by using his own bandwidth here, an attacker because of misconfigured routers, or misconfigured servers can exploit ICMP protocol and therefore can amplify his attack bandwidth towards the victim.

Here, though zombies are not necessarily under the full control of the attacker, in other words, they can be just misconfigured and non compromised regular servers or routers. Therefore being a zombie doesn't mean that you know they are compromised and they are under the control of attacker in the scenario It is enough that the attacker can only exploit the MIS configuration. So one takeaway is this attack doesn't mean that these machines or these routers are compromised. No, it's just the exploitation of mis configuration. After finding out about these two attack types, let's actually find out how to mitigate them as part of mitigation against ICMP bloat. The most obvious one is to configure individual hosts or routers not to respond to ICMP requests or broadcasts.

This is actually a fundamental rule. And in fact, most of our modern routers are set like that by default. So in most cases, you won't have to do any manual work in order to protect yourself against ICMP flood. However, it's still good to check in case there are some old routers which are misconfigured fact even if there are any misconfigurations most of our modern firewalls protect against ICMP flood by default. That means most of modern firewalls do not allow ICMP traffic to pass through the origin. However, in case you don't use any firewall, of course, then the first item, I'm checking the configuration, the proper configuration becomes even more important.

And when it comes to mitigation against Smurf attack, the first item is again the same, because you need to configure your routers properly in order to prevent not only attacks against your own environment, but also against turning your network components into zombies, while the attacker attacks to other networks. As you can see also in the second item, and again, most modern firewalls protect against a smurf attack by default. So in most cases, you won't have to do anything, but it's still better to check the configuration of your router. That is to say to verify that it's properly configured, and check that your firewall is set in its default settings, which in most cases should read the correct setting.

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.