TCP/IP Internet Layer Attack Vector #2

6 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$69.99
List Price:  $99.99
You save:  $30
€65.44
List Price:  €93.49
You save:  €28.05
£56.04
List Price:  £80.06
You save:  £24.02
CA$95.74
List Price:  CA$136.79
You save:  CA$41.04
A$107.11
List Price:  A$153.03
You save:  A$45.91
S$95.36
List Price:  S$136.24
You save:  S$40.87
HK$547.90
List Price:  HK$782.75
You save:  HK$234.85
CHF 64.03
List Price:  CHF 91.47
You save:  CHF 27.44
NOK kr772.60
List Price:  NOK kr1,103.76
You save:  NOK kr331.16
DKK kr487.88
List Price:  DKK kr697.01
You save:  DKK kr209.12
NZ$117.84
List Price:  NZ$168.36
You save:  NZ$50.51
د.إ257.06
List Price:  د.إ367.25
You save:  د.إ110.18
৳7,700.43
List Price:  ৳11,001.09
You save:  ৳3,300.65
₹5,837.33
List Price:  ₹8,339.41
You save:  ₹2,502.07
RM333.81
List Price:  RM476.90
You save:  RM143.08
₦92,489.99
List Price:  ₦132,134.22
You save:  ₦39,644.23
₨19,474.37
List Price:  ₨27,821.72
You save:  ₨8,347.35
฿2,588.61
List Price:  ฿3,698.17
You save:  ฿1,109.56
₺2,275.23
List Price:  ₺3,250.47
You save:  ₺975.23
B$358.08
List Price:  B$511.57
You save:  B$153.48
R1,312.98
List Price:  R1,875.77
You save:  R562.78
Лв127.91
List Price:  Лв182.73
You save:  Лв54.82
₩96,452.39
List Price:  ₩137,795.03
You save:  ₩41,342.64
₪267.73
List Price:  ₪382.49
You save:  ₪114.75
₱4,034.64
List Price:  ₱5,764.02
You save:  ₱1,729.38
¥11,065.06
List Price:  ¥15,807.91
You save:  ¥4,742.85
MX$1,201.03
List Price:  MX$1,715.83
You save:  MX$514.80
QR255.05
List Price:  QR364.38
You save:  QR109.32
P965.79
List Price:  P1,379.76
You save:  P413.97
KSh9,296.24
List Price:  KSh13,280.92
You save:  KSh3,984.67
E£3,349.82
List Price:  E£4,785.67
You save:  E£1,435.84
ብር3,985.10
List Price:  ብር5,693.24
You save:  ብር1,708.14
Kz58,375.85
List Price:  Kz83,397.65
You save:  Kz25,021.80
CLP$66,375.71
List Price:  CLP$94,826.51
You save:  CLP$28,450.80
CN¥507.11
List Price:  CN¥724.48
You save:  CN¥217.36
RD$4,113.13
List Price:  RD$5,876.15
You save:  RD$1,763.02
DA9,392.53
List Price:  DA13,418.47
You save:  DA4,025.94
FJ$158.35
List Price:  FJ$226.22
You save:  FJ$67.87
Q544.06
List Price:  Q777.27
You save:  Q233.20
GY$14,678.83
List Price:  GY$20,970.66
You save:  GY$6,291.82
ISK kr9,837.79
List Price:  ISK kr14,054.59
You save:  ISK kr4,216.80
DH708.72
List Price:  DH1,012.51
You save:  DH303.78
L1,246.75
List Price:  L1,781.16
You save:  L534.40
ден4,025.16
List Price:  ден5,750.48
You save:  ден1,725.31
MOP$565.76
List Price:  MOP$808.27
You save:  MOP$242.50
N$1,340.22
List Price:  N$1,914.68
You save:  N$574.46
C$2,582.07
List Price:  C$3,688.83
You save:  C$1,106.76
रु9,353.99
List Price:  रु13,363.42
You save:  रु4,009.42
S/263.57
List Price:  S/376.55
You save:  S/112.97
K270.82
List Price:  K386.91
You save:  K116.08
SAR262.50
List Price:  SAR375.01
You save:  SAR112.51
ZK1,859.31
List Price:  ZK2,656.27
You save:  ZK796.96
L325.94
List Price:  L465.65
You save:  L139.71
Kč1,644.39
List Price:  Kč2,349.23
You save:  Kč704.84
Ft25,720.62
List Price:  Ft36,745.32
You save:  Ft11,024.70
SEK kr762.14
List Price:  SEK kr1,088.81
You save:  SEK kr326.67
ARS$61,174.36
List Price:  ARS$87,395.69
You save:  ARS$26,221.33
Bs486.59
List Price:  Bs695.16
You save:  Bs208.56
COP$277,528.94
List Price:  COP$396,486.91
You save:  COP$118,957.97
₡35,172.98
List Price:  ₡50,249.28
You save:  ₡15,076.29
L1,732.56
List Price:  L2,475.19
You save:  L742.63
₲520,857.74
List Price:  ₲744,114.38
You save:  ₲223,256.64
$U2,703.34
List Price:  $U3,862.08
You save:  $U1,158.74
zł282.38
List Price:  zł403.41
You save:  zł121.03
Already have an account? Log In

Transcript

In this lecture, I'm going to be talking about IP fragmentation attack, how to detect it, and how to mitigate it. Let's start with the basic definition. fragmentation is an Internet Protocol process that breaks packets into smaller pieces, which are called fragments so that the resulting pieces can pass through a link with smaller maximum transmission amount that is MTU. And the original packet size fragments are assembled by the receiving host. So here actually we have two important concepts I can say. The first one is the MTU, the maximum transmission unit, in case you don't know what it is, I recommend you to go back and refresh your knowledge on that.

And the second important thing is the fact that the fragments are reassembled by the receiving host. These are the two things that make this attack possible. Here the attacker exploits the fact that whenever the size of an IP packet is bigger than maximum transmission, you Or MTU the router on the destination site is going to fragment it. In other words, the attacker sends such packets that they will be first fragmented by the router and then assembled at the targeted host. And of course, such packets will be sent over and over to cause a denial of service. Let me also quickly draw you so that you can understand it in a better way.

Suppose that we have such a router here and the big IP packet is coming to the router. If this packet is specially crafted, the router will try to fragment it and forward it to the destination. In this case, the targeted host will try to assemble it at its end. Obviously, the attacker will not stop after just one big IP packet. It will send many many such big packets and all of them will go to destination in the same way and destination will try to assemble all of them. Basically in the short future, this nation will be out of memory and the host will no longer be able to serve it services.

Now, of course, the question is, why does the router behave like that? What is the setting that the attacker sets in the packet, so that you know, it allows the malformed packets pass through the router. There goes the settings and here is the IP header shown. But we are not going to actually be focusing on the whole header for this attack. We will be rather focused on the flat section and especially on those two flex first one is the bit one, which indicates whether this packet to be fragmented or not, obviously the attacker wants it to be fragmented. Therefore he sets it to zero.

And as per bit to the attacker sets to one in order to indicate to the destination host that more fragments are coming and therefore keep listening That is keep your resources busy for me. And how does it look like on Wireshark how to detect this attack vector, there it goes. For IP fragmentation attack, this is the filter you need to use on Wireshark. After applying it, oftentimes This is more or less what you should get. As you can see, this nation is trying to assemble all the fragmented packets. And if you do investigate even more deeply, this is what you will see.

This is actually also what we discussed. We haven't discussed this part because this is a default setting. But these two bits we have discussed are important. Don't fragment is set to zero. So it will be fragmented and more fragments are coming is set to one. So yeah, the attacker wants to destination to expect more fragments while at the same time.

In the background, he opens new connections and repeats the same things to exploit more resources. So after all these, how to mitigate? Well, the most obvious one is to disable fragmentation on your router, if possible. In other words, regardless of what packet is coming, you can just ignore all the fragmented packets. So if a packet demands fragmentation, you can just drop that packet at the router. However, this will have its own complications depending on the surface you earn.

So unfortunately, in real life, this is not always that great or possible at all. And if that's the case, basically the best method to detect mitigate such an attack is inspecting incoming packets for violations of fragmentation rules constantly. And for that, we will have to use either a router Secure proxy defining those rules for fragmentation will be up to you. It will depend on your environment. But I can tell you that you will have to define a minimum limit and a maximum limit either way. Finally, I'd like to also mention that this concept that I have explained in this lecture, I mean, the fragmentation concept is analogous to another famous attack, which is TCP teardrop attack, because it uses the same methodology.

Not only that, there are also other kinds of fragmentation attacks as well, like on ICMP and UDP protocols. And the concept is exactly the same. In other words, whenever you hear another kind of fragmentation attack, like it can be a UDP fragmentation or ICMP fragmentation attack, you can make sure that the concept is going to be exactly the same How I described here in this lecture for IP fragmentation.

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.