Logo Umeet2001

ESPAÑOL
Presentación

Programa

Desarrollo

ENGLISH

Presentation

Programa

Desarrollo


KefarUninet da la bienvenida a nuestro expositor de hoy
Kefarel Sr. Guido Fortunati,
Kefarresidente en Irvine, California
Kefarse desempeña actualmente como administrador de red y
sistema
KefarLa conferencia se titula: DoS Attacks
Kefarse solicitan traductores para esta conferencia, los voluntarios
pueden intervenir
Kefaren el canal #redes
KefarAdelante zuez
Kefar
Kefar
zuezhello everyone and welcome to the DoS tutorial
zuezthis session has been created to make your internet life more
enjoyable ;)
zueztopics to be covered today include:
zuez1) modern denial of service
zuez2) modern attacks
zuez3) high rate attacks
zuez4) attacking infrastructures :)
zuez5) lan attacks
zuez6) DDoS
zuez8) How to filter with FreeBVSD
zuezFreeBSD even
zuez10) protectiong router interfaces
zuezand last
zueznuke information for all the windows population and tipos :)
error: Connection reset by peer)
zuezmy first topic will cover the ICMP type nuke..
zuezlets say ssping or jolt
zuezold school programs..
zuezthese programs, send large and jumbled packets to windows
boxes.
zuezany windows, wether you are running 9x, 98, Me, NT, whatever
zuezas a sidenote, jolt is not to be mistaken with the beverage :)
#linux
zuezso anyways
zuezwhen windows attemps to re-asemble these packets into
usable data,m it cant and your connection often slows down or just dies
zuezkeep in mind, that while this is a pain, a simple reboot would
fix it :)
peter111[169.158.160.148])
zuezi4d also would like to point out the main differente between
ssping and jolt
zuezfirst up, jolt..
faiku[212.174.49.117])
zuezjolt sends large and oversized packets top windoiws boxes
zuezsorry, windows boxes.
zuezssping sends smaller packets, so that4s pretty much the main
difference..
zueznow
zuezfirst
zuezwinnuke is a straight tcp pagket, sent to port 139
zuezcommon netbios/samba port..
zuezcan you follow me, vixard?
zuezok anyways, folks..
zuezwinnuke will send you OOB packets
(Read error: Connection reset by peer)
zuezand no, OOB is NOT out of bound
zuezkeep that in mind
zuezOOB stuff can also be send to other ports..
zuezso to speak, OOB won4t break things.
zuezactually, that4s why most port blockers work for windows
boxes.
zueznow, the other one i will explain before DoS stuff is ssping
zuezssping works with the icmp protocol..
zuez1) its od, and incepted only for LANs.
zuez2) it4s easy to spoof, and no, there4s no way to trace spoofs :)
zuez3) its implementation doesn4t even seem to be the same for
BSD/Linux, etc
Connection reset by peer)
zueznow, windows, being a little bit silly as many of you know :)
zuezexpects that when it gets an icmp packet its going to be atleast
64bytes
zuezso, what ssping do?
#linux
zuezsends 63 bytes :)
#linux
#linux
zuezso when windows tries to unravel and decipher the packet it
comes up to one byte short, and chokes on a icmp furball
zuezthis is as deep as i am going with this matter
zuezask your questions in #qc :)
zuezok, i am about to end with this matter..
zuezto put it simply, two words, memori write :)
off)
zuezwhen windows expects to write something of a certain size
and it cant, it will overwrite memory, move memory around, and eventually
choke
zuez#qc <MJesus> <viXard> que es "jolt" ???
zuezlet me explain what is jolt once again
zuezjolt sends large and oversized packets like i said before.
zuezjust to confuse your windows box
zuezthis is as deep as i am covering this guys, if someone has any
kind of issue please ask.
#linux
zuezok
zuezsorry for the delay
zuezmacs shouldnt be affected
zuezand no UNIX systems are affected by this.
zuezso, if you run UNIX/MacOS you don4t have to worry about this.
zuezof course there are many ways to bring a mac down his
knees, but i won4t give out the codes :P
zuezok
zuezi will be explaining now modern denial of service attacks..
zuezoh
zuezsorry
zuezi skeeped something elite
zuezno, nevermind.
zuezok
zuezfirst off, serious modern Denial of Service attack looks nothing
like traditional attacks
Pabli[trinidad.ssp.sld.cu])
zuez#redes <viXard> espera a que el paquete icmp sea de 654
bytes
zuezthe modern attacks which destroy services generally fall into
one or more of the following categories:
zuezhigh rate floods
zuezansy ffflood of packets which is not designed to waste
bandwidth, but instead is designed to waste CPU and processing abilities,
can be quite devastating
zuezany, sorry
zuezin this case, syn floods..
zuezthe evolution of the SYN flood has brought about the separate
evolution of the high rate flood, which now has a life of its own
zueznow, let me explain real quick how to protect your BOX from syn
attacks if you run FreeBSD
zuezyou can simply add this line to your kernel, it should help
zuezoptions         TCP_DROP_SYNFIN
zuezbeyond that, its a matter of timme and CPU
zuezso, be aware.
zuezthe second class is, infraestructure attack
zuezfor well defended victims, it may be easier for the attacker to go
after the network rather then sending packets directly to the true target
zueznow
zuezDDoS folks
zuezDDoS is much more than just multiplication of attack sources
zuezit brings about issues of path diversity, obscurity, invisibility, and
demoralization of the victim.
zuezword
zuezok
zuezany question?
zueznext topic will be high rate floods
* zuez takes a 30s break :-)
zuezok
> thanks, the translator are too busy, zuez
#linux Cannot send to channel
Kefarok zuez
zuez#qc <Ston> es winxp vulnerable a algunos de los DoS
mencionado anteriormente ?
zuezyes, certainly it is
zuezi will dcc you a reg patch after this session if thats ok with you.
zuezyo t enviare un parche luego de la conversacion te enviare un
parche para el XP ston
zuezok
zuezwhen i say high rate floods, i mean SYN floods
zuezbelieve me, SYN flood can be quite devastating..
zuezi4ve had to drive all over SFO to SD to unplug networks just to
stop SYN attacks, you cannot do too much about it..
zuezthe original goal of the SYN flood was to overwhelm a small
queue of outstanding half-open connections with a very small amount of
bandwidth
zuezso, in other words, this will prevent new connections and use
your CPU
zuezspecially if you are kinda poor and run a pentium 100MHz like i
do, its painfull!
zuezbesides, this attack is against the tcp implementation
zuezit can be used from a dialup connection to bring T1s/T3s and
larger bandwidth to their knees
zuez#qc <sarnold> I'll explain why that opinion is *Very* stupid after
zeuz is finished
zuezany issue peep?
viXardmaybe hi´s talking about my paste
zuezsorry for the delay, i am waiting for sarnold
zuezalright
zuezok
zuezone way to fix the SYN problem was to develop a better TCP
stack
zuezjust like fbsd did and linux..
zuez(for all you linux lovers down here!)
zuezi think they used hash tables to do this, but maybe people like
HoraPe, cron or vizard can help you with this better than me.
zuezso anyways
zuezthe concept of the syn cookie was introduced essentially
encoding all state information necessary for the connection to be opened in
the return SYN|ACK
zuezso, no state needs to be mantained in the victim machine..
zueznow
zuezas far as i know, some time around mid 1998
zuezsyn just came back to the itnernet life..
zuezthis time the goal wasn't simply to overflow a queue and prevent
new connections, it was to generate packets so fast that the victim spent all
their time processing them
zuezto put it simply, CPU killer!
zuezit dont matter how cool your box is, bloiieve me
zuezi have had this PIII 800MHz with 1Gb sitting behind cisco pix and
checkpoints and someone killed our whole network when i ran an IRCtoo IRC
server :)
zuezthe high rate flood highlights the problems of existing tcp/I`p
implementations
zueztcp/ip sorry
zuezthe amount of overhead which goes into handling each frame,
inspecting each header, and processing each packet is large
zuezso, figure yourself :)
zuezwhen doing packet/sec calculations, remember that link layer
overhead starts to play a major factor
zuezlet me find something real quick for you folks
zuezok here it is
zuezit works something like this
zuez    Preamble and SFD (8 bytes)
zuez  + Ethernet Header  (14 bytes)
zuez  + Payload          (40 bytes in a SYN flood)
zuez  + Frame Padding    (6 bytes)
zuez  + Frame Checksum   (4 bytes)
zuez  + Inter Frame Gap  (12 bytes)
zuez#qc <sarnold> zeuz, was that a problem with the FreeBSD stack,
with a very long execution path for any given packet?
zuezyes, it has been fixed with the 4.x/5.x branch, altho there are still
many issues about this i will cover later on if you don4t mind, for all you
FearBSD guys you can go to www.freebsd.org, however, i will explain how the
FreeBSD stack works l
zuezso, your best way is, if you are running 3.x which is obsolete,
cvsup to 4.x.
zuezso..
zuez#qc <peter111> yo quiero pregutar algo sobre la conferencia...
zuezdime
zuez#qc <peter111> quien sabe donde conseguir un programa para
Atackar por MS-DOS desde Win98 S.E
zuezyou dont, or i am reporting you to the FBI autorities.
zuezso
zuezlets go on with this folks
zuezremember, attacking networks is bad.
zuezfor example a 10Mbps ethernet pipe will max out at less then
5Mbps of IP, when handling smallest-size packets.
zuezplease, Horape or riel or anyone correct me if thats wrong
please.
zueznow
zuezlets go on with secton 4 folks
zuezattacking the infraestructure of a network..
zuezthe design of most routers involves a central processor which
handles routing protocols and administrative functions
zuezwether ytou have a cisco, juniper, whatever, it has a processor,
ram, etc
zuezits pretty much a computer designed to do networking duties
zuezthe traditional design of routers placed certain exceptional
packets on the slow path, which requires attention from that processor
zuezso
zuezkeep in mind, any time your router checks for a path or anything,
it will eventually use the processor
zuezand yes, to avoid the questions, it can easily grash with a big
attack
zuezhowever, i do believe cisco 12000 series, use distributed
processors on each line card to handle the majority of routing without touching
the main route processor used for routing protocols
zueznever used a cisco 12000 of course .)
zuezjust general knowledge ;)
zuezwhen the processor which handles administrative and routing
functions handles any packets at all, and particularly when it lacks good
scheduling functions, it becomes vulnerable to denial of service
zuezi think you can get individual cards for cisco to continue
forwarding packets
zuezi am not sure, i am sorry :)
zuezso, what happens if you are running an ISP and you have a
strong attack folks?
zuezthanks horacio pena (horape) for the cisco information :)
zuezhe just told me cisco can handle that nice feature, with few bugs
tho..
zuezso, lets go on with this folks..
zuezso, if you happen to experience a big attack, you may see the
router may not even be responsive at the local console, as the CPU spends its
time processing interrupts and packets
zuezso, dont try to do anything with it, just unplug the cord and wait
for a stop please.
zuezin the other side, attacks which overwhelm the route processors
can be particularly bad when BGP is disrupted
zuezIf a BGP speaking router is held down long enough for its peers
to time out the keep alive and tear down the session, the routes get withdrawn..
zuezand, plus..
zuezIf this removes the route used to carry the attack, the victim
becomes unreachable and the attack is discarded further upstream
zuezthat should bring your routerto l life too
zuezto life sorry :)
zuezbut, as soon as the peer is established, the attack will begin again
#linux
zuez(hope this explains a little bit why i dont want you to learn DoS
skills, peter ;)
zuezok
zuezlets talk about juniper routes now
zuezi am not that familiar with juniper, in fact, i know a little bit about
them as i have had to deal with FreeBSD+juniper :)
zuezall i know is that juniper fare much better against this kind of
attack because of their clean separation between packet processing and the
routing engine
zuezthats whu i like junipers :)
zuezwhy.
zuezeven exceptional packets which cannot be handled by an ASIC
have a dedicated processor which limits the destructive potential of this kind of
attack
zuezsorry for the delay, i am reading #qc as well :)
zuez#qc <velco> hmm, got a DDoS idea, instead DDoSing the
original target, original target's defense measures, e.g. cut the
zuez    routes, thus isolating innocent r00ted hosts which carry the
attack.
zuezyou dont
zuezvelco, you dont want to kill your upstream and get them to
discard your packets buddy.
zueznow..
zuezthe most common way to attack a router is to send packets
destined to one of its local interfaces
zuezwether its a cisco, juniper, diet coke router, whatever, thats the
easier way to attack a router..
zuezsome folks are msging me asking for smurf attacks, i will cover it
later on too..
zuezsorry if i skeiped smurf attacks
zuezso, lets keep talking about outers
zueza cisco grp can be crippled by as few as 20,000 packets per
second or so, i don4t know exactly (i am not a machine, again folks, horape
riel or any folks probably know more about routers than i do..)
timeout)
zuezthe funny part is ..
zuezsyn ports cannot only be sent to open ports on roputers like
telnet..
zuezbut floods to random ports can be way too more devastating
zuezanother way to generate exceptional packets is the use of IP
options
zuezlike hrm
* zuez remmebers ;)
zuezrouter caches..
zuezthe most damaging thing of a SYN flood is the rst or ack replies
generated in response
zuezdont worry tho, i will explain how to protect random routers
against this problems :-)
zuezso now
packets/sec can also be generated in a twist in the usual use of a smurf attack
zuezhow does it work?
zuezusing the network broadcast..
zuezit will try to generate router harming effects instead of large
packets designed to use large amount of bandwidth
zuezonce, my friend ramiro (zero) tried to smurf his neighbor
because he was using too much bandwidth (keep in mind they share a aDSL
line) and he got smacked down with a 4pounds hammer
zuezj/k.
zuezanyways
zuezthe attack of choice is still syn
zuezany qurestion?
zuezerr, any question?
zuezask your questions in #qc.
zuezok
zueznow i am covering LAN attacks
zuezmainly because my friend asked
#linux
zueza variant of the smurf broadcast flood not commonly considered
is the link layer broadcast flood
zuezin an atTack like smurff..
zuezattack.
zuezpackets are directed at an IP broadcast address, and the
router/gateway will convert the packet into a layer link broadcast..
zuezso
zuezone way to prevent yourself frm people like ramiro is to idisable
directed broadcast request.s
zuezrequests..
zuezhowever, the attacker shall cause a LAN attack/smurf if he is in
the same broadcast
zuezjust like the example i gave you folks
zuezramiro was using the same broadcast his neighbor does..
zuezits also posible to generate a raw frame and forge the source
macaddress to make the attack more dificult to trace..
zuezanyways
zuezyou can get good switches that can distinguish between
broadcast and multicast traffic
zuezanother potential area for LAN DoS is a spoofed ICMPs..
zuezeek, ICMP
zuezerr
zuezICMP redirected to ARP :)
zuezthats it!
zuezwhich, will trick traffic into taking a detour ;)
zuezthis not only create DoS, it can also be used to redirect trafic to
another network for sniffing and such things
zuezany question?
zuezok
zuezi already explained DDoS a little bit
zuezand i know many of you are a little bite tired/bored ..
zuez#qc <Ston> el ataque OOB fue resuelto en win98 es cierto que
volvio a la luz en winxp ?
Questions and Commentary at #qc'
zuezno.
zuez2000/XP NO son vulnerables.
zueznext chapter
zuezHow to filter?
zuezfiltering smurf is quite easy, as you dont need ICMP echo replies..
zuezlet me cover how to filtetr w/cisco routers..
zuezno service tcp-small-servers to prevent abuse of the small
services for DOS or other attacks
zuezso thats tcp-small-servers
zuezyou can asl
zuezerr
zuezsilly keyboard
zuezyou can also add no service udp-small-servers
zuezip route 0.0.0.0.0.0.0.0 null 0 253 todiscard packets with invalid
destination addresses
zuezerr
zuezerror
zuezthat should be ip route 0.0.0.0.0.0.0.0 null 0 255 folks
peter111[169.158.160.151]: Connection reset by peer)
zuezthats as dee as i am going with cisco, if you need furter
assistance feel free to msg me after this session or visit www.cisco.com
zuezip route 0.0.0.0 0.0.0.0 null 0 255
zuezthanks horape :)
zuezok
zuezi think this session is over folks
zuezits taking way too much time
viXard:)
zuezdoes anyone have any question regarding anything?
viXardtime to ask folks
viXard#qc for it
zuezwell
zueztake what you have learned and use it to help yourself  and
others whenever possible
viXardnice explanation ;)
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
Kefarplas plas plas
Kefarplas plas plas
Kefarplas plas plas
Neo;)))
Kefarplas plas plas
zuez:)
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
zuezthank you folks.
> clap clap clap clap clap clap clap clap clap clap
Neozuez well done ;)
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
MySQLbravo!!!!!!!!!!!!!!!!!!!!!
Zeroclap clap clap clap clap clap clap clap clap clap clap clap
daniplas plas plas plas plas plas plas plas <-- plas Flood DoS Atack
daniplas plas plas plas plas plas plas plas <-- plas Flood DoS Atack
daniplas plas plas plas plas plas plas plas <-- plas Flood DoS Atack
daniplas plas plas plas plas plas plas plas <-- plas Flood DoS Atack
daniplas plas plas plas plas plas plas plas <-- plas Flood DoS Atack
peter111plas plas plas plas plas plas plas plas plas
peter111plas plas plas plas plas plas plas plas plas
peter111plas plas plas plas plas plas plas plas plas
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
zuezi would like to thank horape, mjesus, kefar, riel, cron among
others to the great support, and Zero for being a golden boy.
elzoplas plas plas plas
elzoplas plas plas plas
> clap clap clap clap clap clap clap clap clap clap
peter111Otro!!!! Otro!!!! Otro!!!! Otro!!!
> clap clap clap clap clap clap clap clap clap clap
MySQLplas plas plas plas plas plas plas
> clap clap clap clap clap clap clap clap clap clap
MySQLplas plas plas plas plas plas plas
MySQLplas plas plas plas plas plas plas
> clap clap clap clap clap clap clap clap clap clap
MySQLplas plas plas plas plas plas plas
Zerolol
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
* cron felicita a zuez por el trabajo
MySQLbravo!!
peter111clap clap... clap
peter111clap clap... clap
MySQLbravo!!
peter111clap clap... clap
MySQLtorero!
MySQLtorero!
peter111plas plas plas
peter111plas plas plas
peter111plas plas plas
zuezmuchas gracias :)
viXard<Ston> es posible detectar un DoS que se produsca dentro de
una red... si es posible como se arrria?
* peter111 le gusto mucho la conf.
viXard<Ston> haria
Stons/arrria/haria
zuezok
clap clap clap clap clap clap clap clap clap clap clap clap clap '
peter111Felicidades zuez
> clap clap clap clap clap clap clap clap clap clap
> clap clap clap clap clap clap clap clap clap clap
zuezston, what OS?
zuezanyways, if you happen to run snmp you should see a big traffic
going through your interfaces :)
StonLinux To Win*
zuezston: tcpdump :)
JALH clap clap clap clap!!
peter111MJesus: cuando es la proxima conferencia?
JALH:)
> :))
Stonahhhh the admin use winnt and i use linux...
zuezSton: run any application that lets you debug your itnernal traffic.
dardhalnice lecture, very good
zuezi dont tend to run NT, i dont know :(
Stonok
zuezthank you.
viXardpeter111: el lunes
> Dec, 9. 22:00
> Horst von Brandt. (Chile)
> title pending !
sarnoldzuez, thank you :) I'm sorry I phrased my message to viXard
so poorly ..
viXardhttp://grc.com/dos/
Stones posible para totalmente un DoS ?
HoraPeviXard, ugh!
zuezsarnold, no problem man
zuezSton: no, de hecho no hay mucho que puedas hacer :)
croncosas como "echo 2 > /proc/sys/net/ipv4/tcp_keepalive_probes"
y "echo 30 > /proc/sys/net/ipv4/tcp_keepalive_time" pueden ser util. Ref:
http://www.linuxdoc.org/LDP/solrhe/Securing-Optimizing-Linux-RH-Edition-v1.3
/chap6sec75.html
Exiting)
viXardHoraPE: huh ?
HoraPeque esa página no vale nada...
zuezme voy llendo
zuezque tengan un muy buen fin de semana.
viXardno ?
botijono es grave, Jorge...lo grave es el complejo de logo
HoraPeel que la escribe es un idiota
danizuez: gracias por la charla ;)
viXardbueh
zuezgracias :)
> graciassssssssssssssssssss
* zuez se fue.
viXardcorre que te corre XD
Stonping -f -s -l 65510 zuez
Ston;)
Stonyo me voy para mi casa, dejo de llover y la oficina da asco
Stonadios
here somewhere...)
sarnoldvixard; grc.com's frequent ranting about WindowsXP is
completely unfounded.
sarnoldvixard: as i understand grc.com's complains against WinXP, it
is primarily the 'raw sockets' that he doesn't like
viXardtell me more
sarnoldvixard: however, it completely escapes him that 4.2BSD
introduced sockets back in 1983...
viXardjej
sarnoldvixard: Completely free *BSD systems have had this capability
since 1994 at the absolute latest
viXardwell, i just read the story about their DoS attack
sarnoldvixard: and, I'm reasonably certain Linux had the same
capabiltiies around 1993, maybe earlier, again -- completely free
End of #linux buffer Fri Dec 07 23:23:38 2001

Generated by irclog2html.pl by Jeff Waugh - find it at freshmeat.net!


Mas información: umeet@uninet.edu