<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.cas.mcmaster.ca/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Luongqt&amp;title=Special%3AContributions</id>
		<title>Computing and Software Wiki - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Luongqt&amp;title=Special%3AContributions"/>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Special:Contributions/Luongqt"/>
		<updated>2026-04-30T06:16:04Z</updated>
		<subtitle>From Computing and Software Wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks</id>
		<title>Tools for conducting denial-of-service attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks"/>
				<updated>2009-04-13T03:51:52Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Bot_attack.jpg|thumb|right|400px|Attack of the bots. Too late for something too big.]]&lt;br /&gt;
In the world of computer [http://en.wikipedia.org/wiki/Network_security network security], denial-of-service attack is a sneaky and furious monster. It is calm and quite. But when it attacks you, your system will be defeated within minutes (sometimes seconds). What is it? Where does it come from? What can it do? How can you conduct it? Conduct with what? Software or hardware?&lt;br /&gt;
&lt;br /&gt;
Nowadays there are tools available on the [http://en.wikipedia.org/wiki/Internet Internet] that allow attackers to conduct denial-of-service attacks to any vulnerable servers. They are created by [http://en.wikipedia.org/wiki/Black_hat_hacker black hat hackers] for different reasons varying from personal, political reasons to nastiness. Damages from a DoS attack are usually devastating to businesses such as search engines, email providers, banks, e-commerce sites that rely heavily on availability.&lt;br /&gt;
&lt;br /&gt;
On the other hand, although details of denial-of-service attacks are well-known and studied, it is quite difficult to protect any systems from it due to the very nature of the attacks. Scanning tools and other intrusion detection systems can be used to detect attacks or find vulnerable spots which can lead to an DoS attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Definition&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;==&lt;br /&gt;
[[Image:Dosgeek.jpg|thumb|right|400px|DoS in comic]]&lt;br /&gt;
Denial-of-service (DoS) attack is an attempt to violate the availability condition of &lt;br /&gt;
network security. Its sole purpose is to shut a computer system down or drain all its &lt;br /&gt;
available resources, which prevents it to serve legitimate users. As computer becomes more &lt;br /&gt;
and more popular, DoS attack evolves to Distributed DoS (DDoS) attack which amplifies the &lt;br /&gt;
damage from thousand to million times.&lt;br /&gt;
The most common technique for conducting DoS attacks is to &amp;quot;flood&amp;quot; the target with &lt;br /&gt;
information/data. Others aim for the victim's Achilles' heel that cause it to crash.&lt;br /&gt;
===Fact===&lt;br /&gt;
[[Image:CnnDoS.PNG|thumb|right|400px|DoS reported on CNN]]&lt;br /&gt;
[[Image:NewDoSTool.PNG|thumb|right|400px|Trinity]]&lt;br /&gt;
* On February 6th, 2000, Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day, hours after going public. By that evening, [http://en.wikipedia.org/wiki/Ebay eBay (EBAY)], Amazon.com (AMZN), and [http://en.wikipedia.org/wiki/Cnn CNN] (TWX) had gone dark. And in the morning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtually choked off. As a result, Yahoo, which relies on advertising for much of its revenue, lost potentially an estimated $500,000 because its users were unable to access Yahoo's Web pages and the advertisements they carried. (Business Week Online, 12 February 2000)&lt;br /&gt;
&lt;br /&gt;
* The [http://en.wikipedia.org/wiki/Fbi FBI]'s Web site was taken out of service for three hours on 18 February, 2000 by a DDoS attack. (CNN)&lt;br /&gt;
&lt;br /&gt;
* In October 2002, an attacker tried to performed a DDoS attack on the complete set of DNS root servers which have 13 servers of replicated DNS data in total. By a simple form of DDoS attack, he successfully took down 9 of them. The other 4 remained fully functional. The attack lasted only one hour. A longer and stronger attack might have been extremely harmful.&lt;br /&gt;
&lt;br /&gt;
* During the [http://en.wikipedia.org/wiki/Iraq_war Iraq War] in 2003, a DDoS attack was launched on the Qatar-based Al-Jazeera news organization, which broadcast pictures of captured American soldiers. Al-Jazeera attempted to out-provision the attackers by purchasing more bandwidth, but they merely ratcheted up the attack. The Web site was largely unreachable for two days, following which someone hijacked their DNS name, redirecting requests to another Web site that promoted the American cause.&lt;br /&gt;
==Types of attack==&lt;br /&gt;
There are basically three types of DoS attack:&lt;br /&gt;
# Bandwidth attacks: straight forward, comsume resources.&lt;br /&gt;
# Protocol attacks: take advantage of expected behavior of protocols such as [http://en.wikipedia.org/wiki/Transmission_Control_Protocol TCP], [http://en.wikipedia.org/wiki/User_Datagram_Protocol UDP] and [http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol ICMP].&lt;br /&gt;
# Software vulnerability attacks: exploit vulnerabilities in network software, such as a web server, or the underlying TCP/IP stack.&lt;br /&gt;
There are many tools for each type such as:&lt;br /&gt;
* Sending oversized packets (protocol)&lt;br /&gt;
* fragmentation overlap (protocol)&lt;br /&gt;
* loopback floods (protocol)&lt;br /&gt;
* Application DoS (software)&lt;br /&gt;
* UDP floods (protocol)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/SYN_(TCP) SYN] floods (bandwidth)&lt;br /&gt;
==Tools for conducting DoS attacks&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;==&lt;br /&gt;
===SSPing===&lt;br /&gt;
[[Image:SmurfAttack.gif|thumb|right|300px|Smurf]]&lt;br /&gt;
[[Image:SYN_flood.jpg|thumb|right|300px|SYN Flood]]&lt;br /&gt;
[[Image:Mixter.jpg|thumb|right|300px|The creator of Targa]]&lt;br /&gt;
&lt;br /&gt;
SSPing, a DoS tool, is a program sends the victim's computer a series of highly fragmented, &lt;br /&gt;
over-sized ICMP data packets. While trying to put the fragments together, the computer can &lt;br /&gt;
get into a memory overflow which causes the machine to freeze. With a few packets, the &lt;br /&gt;
attacker can lock the victim's computer instantaneously. The identity of the attacker is &lt;br /&gt;
unknown since the connection is lost as the victim restarts the computer. SSPing affects &lt;br /&gt;
[http://en.wikipedia.org/wiki/Windows_95 Windows 95]/[http://en.wikipedia.org/wiki/Windows_NT NT] and [http://en.wikipedia.org/wiki/Mac_os Mac OS].&lt;br /&gt;
Jolt is a program known for this kind of attack. It will freeze unpatched Windows 95, NT &lt;br /&gt;
machines by sending a series of spoofed &amp;amp; highly fragmented ICMP packets to the target, &lt;br /&gt;
which then tries to reassemble the received fragments.&lt;br /&gt;
===Land Exploit===&lt;br /&gt;
Land Exploit is a DoS attack in which a program sends a TCP SYN packet where the target and &lt;br /&gt;
source addresses are the same and port numbers are the same. Receiving such packet causes &lt;br /&gt;
some TCP implementations to crash the target system or exhaust all CPU resources. The name &lt;br /&gt;
of the attack comes from the first distributed source code (called &amp;quot;exploit&amp;quot;) that made it &lt;br /&gt;
possible to implement this attack: land.c. Computers running Windows 95 and NT are desired targets of this kind of attack.&lt;br /&gt;
===Smurf===&lt;br /&gt;
Smurf is a simple effective DoS attack involving forged ICMP packets sent to a broadcast &lt;br /&gt;
address. Attackers spoof the source address on ICMP echo requests and sending them to an IP &lt;br /&gt;
broadcast address. This causes every machine on the broadcast network to receive the reply &lt;br /&gt;
and respond back to the source address that was forged by the attacker. This attack results &lt;br /&gt;
in DoS due to high network traffic which not only hurts the victim but the broadcast &lt;br /&gt;
network also.&lt;br /&gt;
There is a similar tool called Fraggle which uses UDP packets instead.&lt;br /&gt;
===SYN Flood&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;===&lt;br /&gt;
With a series of SYN packets, the attacker can drain the victim resources which leads to &lt;br /&gt;
rejecting legitimate requests.&lt;br /&gt;
System A sends a SYN packet to system B asking to establish a connection via three-way &lt;br /&gt;
handshake. However the source address of the packet is spoofed thus misleads system B to &lt;br /&gt;
switch to SYN_RECV state and send an SYN/ACK packet to the [http://en.wikipedia.org/wiki/IP_address_spoofing spoofed address]. These &lt;br /&gt;
connections are called half-open connections. The source address does not exist and system &lt;br /&gt;
B can only flush the potential connection once the connection-establishment timer expires. &lt;br /&gt;
This timer varies from system to system ranging from seconds to minutes. This type of &lt;br /&gt;
attack is very dangerous because with little resources (e.g. bandwidth), the attacker can &lt;br /&gt;
take down an industrial strength web server. Moreover, this is a stealth attack since &lt;br /&gt;
everything (e.g. the packet) look so normal. Today, SYN flood is the primary capacity &lt;br /&gt;
depletion mechanism for denial of service attacks.&lt;br /&gt;
===Targa===&lt;br /&gt;
Targa, written by a German hacker known as Mixter, is a free software packet available on the Internet. It can run 8 different DoS attacks using some of the tools listed above. The attacker can try individual attack or try all attacks until it is successful. The attacker must be logged in with root permissions; since most of the attacks, use IP spoofing that requires root privileges. The attack can be done from any machine on which the targa.c code compiles. Target platforms can be any operating system but the attacks do not have an impact on all operating systems.&lt;br /&gt;
&lt;br /&gt;
The attacks that can be done with the Targa kit:&lt;br /&gt;
&lt;br /&gt;
* Jolt by Jeff W. Roberson&lt;br /&gt;
* Land by m3lt&lt;br /&gt;
* Winnuke by _eci&lt;br /&gt;
* Nestea by humble and ttol&lt;br /&gt;
* Syndrop by PineKoan&lt;br /&gt;
* Teardrop by route|daemon9&lt;br /&gt;
* Bonk by route|daemon9 and klepto&lt;br /&gt;
* NewTear by route|daemon9 (a variation of Teardrop)&lt;br /&gt;
&lt;br /&gt;
For further information about these tools, please refer to the references below.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
[[Image:Network_security.jpg|thumb|right|400px|Network security]]&lt;br /&gt;
You could do the following things to minimize the DoS attack:&lt;br /&gt;
&lt;br /&gt;
* Effective robust design&lt;br /&gt;
* Bandwidth limitations&lt;br /&gt;
* Keep systems patched&lt;br /&gt;
* Run the least amount of services&lt;br /&gt;
* Allow only necessary traffic&lt;br /&gt;
* Block IP addresses&lt;br /&gt;
&lt;br /&gt;
Due to the power of DoS attacks and the way they work, there is nothing that can be done to prevent a Dos attack entirely.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
DoS attacks can happen to anyone with devastating damage. A good network design will help mitigating DoS attacks. It is essential to have filtering capability based on packet header and content within the network or at the critical gateways in order to filter malicious traffic as a response to such attacks while waiting for a permanent solution. It is important to have the relevant referrals in the policy and legislation to address the issue of DoS and DDoS to ensure an effective cooperation between service providers and law enforcement agencies.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* [1] Stuart McClure, Joel Scambray and George Kurtz, Hacking Exposed—Network Security Secrets &amp;amp; Solutions, Fifth Edition,McGraw-Hill/Osborne, ISBN:9780072260816&lt;br /&gt;
* [2]International Council of Electronic Commerce Consultants, Ethical Hacking and Countermeasures [EC-Council Exam 312-50]—Student Courseware,ISBN No 0972936211&lt;br /&gt;
* [3] Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher, Internet Denial of Service: Attack and Defense Mechanisms, Prentice Hall PTR, Print ISBN: 0-13-147573-8&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [[Cell BE - A Network on a Chip]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Digital Enhanced Cordless Telecommunications (DECT)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Internet Control Message Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Denial Of Service Attacks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Wi-Fi]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cryptography in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Hypertext Transfer Protocol over Secure Socket Layer (HTTPS)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bluetooth]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The practicality of IPv6]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Dynamic Host Configuration Protocol (DHCP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Social Network Service ]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Keystroke Logging: Are You Next]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Latency]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Onion Routing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Radio Frequency Identification (RFID)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[3G Communications]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security in Smartphones]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Credit Card Chip Security and Technology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Address Resolution Protocol (ARP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[How to Connect to the Internet via an ISP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[CAPTCHA]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security for Small Home Networks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Rootkits]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Proxy Server]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Firewall]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Malware]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Peer-to-Peer Network Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[High-Speed Downlink Packet Access (HSDPA)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Man in the Middle Attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Attached Storage]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[RSA Encryption Algorithm]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Corporate Security and IT Policies]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethical Hacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Extensible Messaging and Presence Protocol (XMPP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cloud Computing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethernet Routing Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Personal Data Protection and Privacy]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Public Key Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[AJAX Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Topology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[IP Spoofing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[WLAN Standard 802.11n]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Domain Name System]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Web 2.0]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Local Area Network]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bots &amp;amp; Botnets]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Trivial File Transfer Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Load Balancing for Network Servers]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Simple Mail Transfer Protocol (SMTP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Email Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Data Encryption for Storage Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Statistics of Internet Threats]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[VoIP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Deep Packet Inspection]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Fingerprint Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Multicasting]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[MD5 Rainbow Tables]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The Interplanetary Internet]]&amp;lt;BR&amp;gt;&lt;br /&gt;
==External links==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service Attacks]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Network_security Network security]&amp;lt;br&amp;gt;&lt;br /&gt;
* [http://www.hackforums.net Hacker Forums]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [http://lib.tkk.fi/Diss/2006/isbn9512282151/article1.pdf Mitigating denial of service attacks: A tutorial]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [http://homepages.cs.ncl.ac.uk/jeff.yan/sec2002.pdf Denial of Service: Another Example]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [http://e-articles.info/e/a/title/Wireless-Attacks-~-Jamming-(Denial-of-Service)/ Wireless Attacks ~ Jamming (Denial of Service)]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [http://kondor.etf.bg.ac.yu/~vm/tutorial/ssgrr2001/denial.ppt Denial of Service Attacks: Methods, Tools, and Defenses]&lt;br /&gt;
&lt;br /&gt;
--[[User:Luongqt|Luongqt]] 23:51, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks</id>
		<title>Tools for conducting denial-of-service attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks"/>
				<updated>2009-04-13T03:45:37Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Bot_attack.jpg|thumb|right|400px|Attack of the bots. Too late for something too big.]]&lt;br /&gt;
In the world of computer [http://en.wikipedia.org/wiki/Network_security network security], denial-of-service attack is a sneaky and furious monster. It is calm and quite. But when it attacks you, your system will be defeated within minutes (sometimes seconds). What is it? Where does it come from? What can it do? How can you conduct it? Conduct with what? Software or hardware?&lt;br /&gt;
&lt;br /&gt;
Nowadays there are tools available on the [http://en.wikipedia.org/wiki/Internet Internet] that allow attackers to conduct denial-of-service attacks to any vulnerable servers. They are created by [http://en.wikipedia.org/wiki/Black_hat_hacker black hat hackers] for different reasons varying from personal, political reasons to nastiness. Damages from a DoS attack are usually devastating to businesses such as search engines, email providers, banks, e-commerce sites that rely heavily on availability.&lt;br /&gt;
&lt;br /&gt;
On the other hand, although details of denial-of-service attacks are well-known and studied, it is quite difficult to protect any systems from it due to the very nature of the attacks. Scanning tools and other intrusion detection systems can be used to detect attacks or find vulnerable spots which can lead to an DoS attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Definition&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;==&lt;br /&gt;
[[Image:Dosgeek.jpg|thumb|right|400px|DoS in comic]]&lt;br /&gt;
Denial-of-service (DoS) attack is an attempt to violate the availability condition of &lt;br /&gt;
network security. Its sole purpose is to shut a computer system down or drain all its &lt;br /&gt;
available resources, which prevents it to serve legitimate users. As computer becomes more &lt;br /&gt;
and more popular, DoS attack evolves to Distributed DoS (DDoS) attack which amplifies the &lt;br /&gt;
damage from thousand to million times.&lt;br /&gt;
The most common technique for conducting DoS attacks is to &amp;quot;flood&amp;quot; the target with &lt;br /&gt;
information/data. Others aim for the victim's Achilles' heel that cause it to crash.&lt;br /&gt;
===Fact===&lt;br /&gt;
[[Image:CnnDoS.PNG|thumb|right|400px|DoS reported on CNN]]&lt;br /&gt;
[[Image:NewDoSTool.PNG|thumb|right|400px|Trinity]]&lt;br /&gt;
* On February 6th, 2000, Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day, hours after going public. By that evening, [http://en.wikipedia.org/wiki/Ebay eBay (EBAY)], Amazon.com (AMZN), and [http://en.wikipedia.org/wiki/Cnn CNN] (TWX) had gone dark. And in the morning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtually choked off. As a result, Yahoo, which relies on advertising for much of its revenue, lost potentially an estimated $500,000 because its users were unable to access Yahoo's Web pages and the advertisements they carried. (Business Week Online, 12 February 2000)&lt;br /&gt;
&lt;br /&gt;
* The [http://en.wikipedia.org/wiki/Fbi FBI]'s Web site was taken out of service for three hours on 18 February, 2000 by a DDoS attack. (CNN)&lt;br /&gt;
&lt;br /&gt;
* In October 2002, an attacker tried to performed a DDoS attack on the complete set of DNS root servers which have 13 servers of replicated DNS data in total. By a simple form of DDoS attack, he successfully took down 9 of them. The other 4 remained fully functional. The attack lasted only one hour. A longer and stronger attack might have been extremely harmful.&lt;br /&gt;
&lt;br /&gt;
* During the [http://en.wikipedia.org/wiki/Iraq_war Iraq War] in 2003, a DDoS attack was launched on the Qatar-based Al-Jazeera news organization, which broadcast pictures of captured American soldiers. Al-Jazeera attempted to out-provision the attackers by purchasing more bandwidth, but they merely ratcheted up the attack. The Web site was largely unreachable for two days, following which someone hijacked their DNS name, redirecting requests to another Web site that promoted the American cause.&lt;br /&gt;
==Types of attack==&lt;br /&gt;
There are basically three types of DoS attack:&lt;br /&gt;
# Bandwidth attacks: straight forward, comsume resources.&lt;br /&gt;
# Protocol attacks: take advantage of expected behavior of protocols such as [http://en.wikipedia.org/wiki/Transmission_Control_Protocol TCP], [http://en.wikipedia.org/wiki/User_Datagram_Protocol UDP] and [http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol ICMP].&lt;br /&gt;
# Software vulnerability attacks: exploit vulnerabilities in network software, such as a web server, or the underlying TCP/IP stack.&lt;br /&gt;
There are many tools for each type such as:&lt;br /&gt;
* Sending oversized packets (protocol)&lt;br /&gt;
* fragmentation overlap (protocol)&lt;br /&gt;
* loopback floods (protocol)&lt;br /&gt;
* Application DoS (software)&lt;br /&gt;
* UDP floods (protocol)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/SYN_(TCP) SYN] floods (bandwidth)&lt;br /&gt;
==Tools for conducting DoS attacks&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;==&lt;br /&gt;
===SSPing===&lt;br /&gt;
[[Image:SmurfAttack.gif|thumb|right|300px|Smurf]]&lt;br /&gt;
[[Image:SYN_flood.jpg|thumb|right|300px|SYN Flood]]&lt;br /&gt;
[[Image:Mixter.jpg|thumb|right|300px|The creator of Targa]]&lt;br /&gt;
&lt;br /&gt;
SSPing, a DoS tool, is a program sends the victim's computer a series of highly fragmented, &lt;br /&gt;
over-sized ICMP data packets. While trying to put the fragments together, the computer can &lt;br /&gt;
get into a memory overflow which causes the machine to freeze. With a few packets, the &lt;br /&gt;
attacker can lock the victim's computer instantaneously. The identity of the attacker is &lt;br /&gt;
unknown since the connection is lost as the victim restarts the computer. SSPing affects &lt;br /&gt;
[http://en.wikipedia.org/wiki/Windows_95 Windows 95]/[http://en.wikipedia.org/wiki/Windows_NT NT] and [http://en.wikipedia.org/wiki/Mac_os Mac OS].&lt;br /&gt;
Jolt is a program known for this kind of attack. It will freeze unpatched Windows 95, NT &lt;br /&gt;
machines by sending a series of spoofed &amp;amp; highly fragmented ICMP packets to the target, &lt;br /&gt;
which then tries to reassemble the received fragments.&lt;br /&gt;
===Land Exploit===&lt;br /&gt;
Land Exploit is a DoS attack in which a program sends a TCP SYN packet where the target and &lt;br /&gt;
source addresses are the same and port numbers are the same. Receiving such packet causes &lt;br /&gt;
some TCP implementations to crash the target system or exhaust all CPU resources. The name &lt;br /&gt;
of the attack comes from the first distributed source code (called &amp;quot;exploit&amp;quot;) that made it &lt;br /&gt;
possible to implement this attack: land.c. Computers running Windows 95 and NT are desired targets of this kind of attack.&lt;br /&gt;
===Smurf===&lt;br /&gt;
Smurf is a simple effective DoS attack involving forged ICMP packets sent to a broadcast &lt;br /&gt;
address. Attackers spoof the source address on ICMP echo requests and sending them to an IP &lt;br /&gt;
broadcast address. This causes every machine on the broadcast network to receive the reply &lt;br /&gt;
and respond back to the source address that was forged by the attacker. This attack results &lt;br /&gt;
in DoS due to high network traffic which not only hurts the victim but the broadcast &lt;br /&gt;
network also.&lt;br /&gt;
There is a similar tool called Fraggle which uses UDP packets instead.&lt;br /&gt;
===SYN Flood&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;===&lt;br /&gt;
With a series of SYN packets, the attacker can drain the victim resources which leads to &lt;br /&gt;
rejecting legitimate requests.&lt;br /&gt;
System A sends a SYN packet to system B asking to establish a connection via three-way &lt;br /&gt;
handshake. However the source address of the packet is spoofed thus misleads system B to &lt;br /&gt;
switch to SYN_RECV state and send an SYN/ACK packet to the [http://en.wikipedia.org/wiki/IP_address_spoofing spoofed address]. These &lt;br /&gt;
connections are called half-open connections. The source address does not exist and system &lt;br /&gt;
B can only flush the potential connection once the connection-establishment timer expires. &lt;br /&gt;
This timer varies from system to system ranging from seconds to minutes. This type of &lt;br /&gt;
attack is very dangerous because with little resources (e.g. bandwidth), the attacker can &lt;br /&gt;
take down an industrial strength web server. Moreover, this is a stealth attack since &lt;br /&gt;
everything (e.g. the packet) look so normal. Today, SYN flood is the primary capacity &lt;br /&gt;
depletion mechanism for denial of service attacks.&lt;br /&gt;
===Targa===&lt;br /&gt;
Targa, written by a German hacker known as Mixter, is a free software packet available on the Internet. It can run 8 different DoS attacks using some of the tools listed above. The attacker can try individual attack or try all attacks until it is successful. The attacker must be logged in with root permissions; since most of the attacks, use IP spoofing that requires root privileges. The attack can be done from any machine on which the targa.c code compiles. Target platforms can be any operating system but the attacks do not have an impact on all operating systems.&lt;br /&gt;
&lt;br /&gt;
The attacks that can be done with the Targa kit:&lt;br /&gt;
&lt;br /&gt;
* Jolt by Jeff W. Roberson&lt;br /&gt;
* Land by m3lt&lt;br /&gt;
* Winnuke by _eci&lt;br /&gt;
* Nestea by humble and ttol&lt;br /&gt;
* Syndrop by PineKoan&lt;br /&gt;
* Teardrop by route|daemon9&lt;br /&gt;
* Bonk by route|daemon9 and klepto&lt;br /&gt;
* NewTear by route|daemon9 (a variation of Teardrop)&lt;br /&gt;
&lt;br /&gt;
For further information about these tools, please refer to the references below.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
[[Image:Network_security.jpg|thumb|right|400px|Network security]]&lt;br /&gt;
You could do the following things to minimize the DoS attack:&lt;br /&gt;
&lt;br /&gt;
* Effective robust design&lt;br /&gt;
* Bandwidth limitations&lt;br /&gt;
* Keep systems patched&lt;br /&gt;
* Run the least amount of services&lt;br /&gt;
* Allow only necessary traffic&lt;br /&gt;
* Block IP addresses&lt;br /&gt;
&lt;br /&gt;
Due to the power of DoS attacks and the way they work, there is nothing that can be done to prevent a Dos attack entirely.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
DoS attacks can happen to anyone with devastating damage. A good network design will help mitigating DoS attacks. It is essential to have filtering capability based on packet header and content within the network or at the critical gateways in order to filter malicious traffic as a response to such attacks while waiting for a permanent solution. It is important to have the relevant referrals in the policy and legislation to address the issue of DoS and DDoS to ensure an effective cooperation between service providers and law enforcement agencies.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* [1] Stuart McClure, Joel Scambray and George Kurtz, Hacking Exposed—Network Security Secrets &amp;amp; Solutions, Fifth Edition,McGraw-Hill/Osborne, ISBN:9780072260816&lt;br /&gt;
* [2]International Council of Electronic Commerce Consultants, Ethical Hacking and Countermeasures [EC-Council Exam 312-50]—Student Courseware,ISBN No 0972936211&lt;br /&gt;
* [3] Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher, Internet Denial of Service: Attack and Defense Mechanisms, Prentice Hall PTR, Print ISBN: 0-13-147573-8&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [[Cell BE - A Network on a Chip]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Digital Enhanced Cordless Telecommunications (DECT)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Internet Control Message Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Denial Of Service Attacks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Wi-Fi]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cryptography in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Hypertext Transfer Protocol over Secure Socket Layer (HTTPS)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bluetooth]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The practicality of IPv6]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Dynamic Host Configuration Protocol (DHCP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Social Network Service ]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Keystroke Logging: Are You Next]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Latency]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Onion Routing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Radio Frequency Identification (RFID)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[3G Communications]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security in Smartphones]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Credit Card Chip Security and Technology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Address Resolution Protocol (ARP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[How to Connect to the Internet via an ISP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[CAPTCHA]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security for Small Home Networks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Rootkits]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Proxy Server]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Firewall]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Malware]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Peer-to-Peer Network Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[High-Speed Downlink Packet Access (HSDPA)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Man in the Middle Attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Attached Storage]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[RSA Encryption Algorithm]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Corporate Security and IT Policies]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethical Hacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Extensible Messaging and Presence Protocol (XMPP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cloud Computing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethernet Routing Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Personal Data Protection and Privacy]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Public Key Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[AJAX Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Topology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[IP Spoofing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[WLAN Standard 802.11n]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Domain Name System]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Web 2.0]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Local Area Network]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bots &amp;amp; Botnets]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Trivial File Transfer Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Load Balancing for Network Servers]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Simple Mail Transfer Protocol (SMTP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Email Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Data Encryption for Storage Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Statistics of Internet Threats]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[VoIP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Deep Packet Inspection]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Fingerprint Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Multicasting]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[MD5 Rainbow Tables]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The Interplanetary Internet]]&amp;lt;BR&amp;gt;&lt;br /&gt;
==External links==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service Attacks]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Network_security Network security]&amp;lt;br&amp;gt;&lt;br /&gt;
* [http://www.hackforums.net Hacker Forums]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [http://lib.tkk.fi/Diss/2006/isbn9512282151/article1.pdf Mitigating denial of service attacks: A tutorial]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--[[User:Luongqt|Luongqt]] 23:45, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks</id>
		<title>Tools for conducting denial-of-service attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks"/>
				<updated>2009-04-10T19:12:41Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Bot_attack.jpg|thumb|right|400px|Attack of the bots. Too late for something too big.]]&lt;br /&gt;
In the world of computer [http://en.wikipedia.org/wiki/Network_security network security], denial-of-service attack is a sneaky and furious monster. It is calm and quite. But when it attacks you, your system will be defeated within minutes (sometimes seconds). What is it? Where does it come from? What can it do? How can you conduct it? Conduct with what? Software or hardware?&lt;br /&gt;
&lt;br /&gt;
Nowadays there are tools available on the [http://en.wikipedia.org/wiki/Internet Internet] that allow attackers to conduct denial-of-service attacks to any vulnerable servers. They are created by [http://en.wikipedia.org/wiki/Black_hat_hacker black hat hackers] for different reasons varying from personal, political reasons to nastiness. Damages from a DoS attack are usually devastating to businesses such as search engines, email providers, banks, e-commerce sites that rely heavily on availability.&lt;br /&gt;
&lt;br /&gt;
On the other hand, although details of denial-of-service attacks are well-known and studied, it is quite difficult to protect any systems from it due to the very nature of the attacks. Scanning tools and other intrusion detection systems can be used to detect attacks or find vulnerable spots which can lead to an DoS attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Definition==&lt;br /&gt;
[[Image:Dosgeek.jpg|thumb|right|400px|DoS in comic]]&lt;br /&gt;
Denial-of-service (DoS) attack is an attempt to violate the availability condition of &lt;br /&gt;
network security. Its sole purpose is to shut a computer system down or drain all its &lt;br /&gt;
available resources, which prevents it to serve legitimate users. As computer becomes more &lt;br /&gt;
and more popular, DoS attack evolves to Distributed DoS (DDoS) attack which amplifies the &lt;br /&gt;
damage from thousand to million times.&lt;br /&gt;
The most common technique for conducting DoS attacks is to &amp;quot;flood&amp;quot; the target with &lt;br /&gt;
information/data. Others aim for the victim's Achilles' heel that cause it to crash.&lt;br /&gt;
===Fact===&lt;br /&gt;
[[Image:CnnDoS.PNG|thumb|right|400px|DoS reported on CNN]]&lt;br /&gt;
[[Image:NewDoSTool.PNG|thumb|right|400px|Trinity]]&lt;br /&gt;
* On February 6th, 2000, Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day, hours after going public. By that evening, [http://en.wikipedia.org/wiki/Ebay eBay (EBAY)], Amazon.com (AMZN), and [http://en.wikipedia.org/wiki/Cnn CNN] (TWX) had gone dark. And in the morning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtually choked off. As a result, Yahoo, which relies on advertising for much of its revenue, lost potentially an estimated $500,000 because its users were unable to access Yahoo's Web pages and the advertisements they carried. (Business Week Online, 12 February 2000)&lt;br /&gt;
&lt;br /&gt;
* The [http://en.wikipedia.org/wiki/Fbi FBI]'s Web site was taken out of service for three hours on 18 February, 2000 by a DDoS attack. (CNN)&lt;br /&gt;
&lt;br /&gt;
* In October 2002, an attacker tried to performed a DDoS attack on the complete set of DNS root servers which have 13 servers of replicated DNS data in total. By a simple form of DDoS attack, he successfully took down 9 of them. The other 4 remained fully functional. The attack lasted only one hour. A longer and stronger attack might have been extremely harmful.&lt;br /&gt;
&lt;br /&gt;
* During the [http://en.wikipedia.org/wiki/Iraq_war Iraq War] in 2003, a DDoS attack was launched on the Qatar-based Al-Jazeera news organization, which broadcast pictures of captured American soldiers. Al-Jazeera attempted to out-provision the attackers by purchasing more bandwidth, but they merely ratcheted up the attack. The Web site was largely unreachable for two days, following which someone hijacked their DNS name, redirecting requests to another Web site that promoted the American cause.&lt;br /&gt;
==Types of attack==&lt;br /&gt;
There are basically three types of DoS attack:&lt;br /&gt;
# Bandwidth attacks: straight forward, comsume resources.&lt;br /&gt;
# Protocol attacks: take advantage of expected behavior of protocols such as [http://en.wikipedia.org/wiki/Transmission_Control_Protocol TCP], [http://en.wikipedia.org/wiki/User_Datagram_Protocol UDP] and [http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol ICMP].&lt;br /&gt;
# Software vulnerability attacks: exploit vulnerabilities in network software, such as a web server, or the underlying TCP/IP stack.&lt;br /&gt;
There are many tools for each type such as:&lt;br /&gt;
* Sending oversized packets (protocol)&lt;br /&gt;
* fragmentation overlap (protocol)&lt;br /&gt;
* loopback floods (protocol)&lt;br /&gt;
* Application DoS (software)&lt;br /&gt;
* UDP floods (protocol)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/SYN_(TCP) SYN] floods (bandwidth)&lt;br /&gt;
==Tools for conducting DoS attacks==&lt;br /&gt;
===SSPing===&lt;br /&gt;
[[Image:SmurfAttack.gif|thumb|right|300px|Smurf]]&lt;br /&gt;
[[Image:SYN_flood.jpg|thumb|right|300px|SYN Flood]]&lt;br /&gt;
[[Image:Mixter.jpg|thumb|right|300px|The creator of Targa]]&lt;br /&gt;
&lt;br /&gt;
SSPing, a DoS tool, is a program sends the victim's computer a series of highly fragmented, &lt;br /&gt;
over-sized ICMP data packets. While trying to put the fragments together, the computer can &lt;br /&gt;
get into a memory overflow which causes the machine to freeze. With a few packets, the &lt;br /&gt;
attacker can lock the victim's computer instantaneously. The identity of the attacker is &lt;br /&gt;
unknown since the connection is lost as the victim restarts the computer. SSPing affects &lt;br /&gt;
[http://en.wikipedia.org/wiki/Windows_95 Windows 95]/[http://en.wikipedia.org/wiki/Windows_NT NT] and [http://en.wikipedia.org/wiki/Mac_os Mac OS].&lt;br /&gt;
Jolt is a program known for this kind of attack. It will freeze unpatched Windows 95, NT &lt;br /&gt;
machines by sending a series of spoofed &amp;amp; highly fragmented ICMP packets to the target, &lt;br /&gt;
which then tries to reassemble the received fragments.&lt;br /&gt;
===Land Exploit===&lt;br /&gt;
Land Exploit is a DoS attack in which a program sends a TCP SYN packet where the target and &lt;br /&gt;
source addresses are the same and port numbers are the same. Receiving such packet causes &lt;br /&gt;
some TCP implementations to crash the target system or exhaust all CPU resources. The name &lt;br /&gt;
of the attack comes from the first distributed source code (called &amp;quot;exploit&amp;quot;) that made it &lt;br /&gt;
possible to implement this attack: land.c. Computers running Windows 95 and NT are desired targets of this kind of attack.&lt;br /&gt;
===Smurf===&lt;br /&gt;
Smurf is a simple effective DoS attack involving forged ICMP packets sent to a broadcast &lt;br /&gt;
address. Attackers spoof the source address on ICMP echo requests and sending them to an IP &lt;br /&gt;
broadcast address. This causes every machine on the broadcast network to receive the reply &lt;br /&gt;
and respond back to the source address that was forged by the attacker. This attack results &lt;br /&gt;
in DoS due to high network traffic which not only hurts the victim but the broadcast &lt;br /&gt;
network also.&lt;br /&gt;
There is a similar tool called Fraggle which uses UDP packets instead.&lt;br /&gt;
===SYN Flood===&lt;br /&gt;
With a series of SYN packets, the attacker can drain the victim resources which leads to &lt;br /&gt;
rejecting legitimate requests.&lt;br /&gt;
System A sends a SYN packet to system B asking to establish a connection via three-way &lt;br /&gt;
handshake. However the source address of the packet is spoofed thus misleads system B to &lt;br /&gt;
switch to SYN_RECV state and send an SYN/ACK packet to the [http://en.wikipedia.org/wiki/IP_address_spoofing spoofed address]. These &lt;br /&gt;
connections are called half-open connections. The source address does not exist and system &lt;br /&gt;
B can only flush the potential connection once the connection-establishment timer expires. &lt;br /&gt;
This timer varies from system to system ranging from seconds to minutes. This type of &lt;br /&gt;
attack is very dangerous because with little resources (e.g. bandwidth), the attacker can &lt;br /&gt;
take down an industrial strength web server. Moreover, this is a stealth attack since &lt;br /&gt;
everything (e.g. the packet) look so normal. Today, SYN flood is the primary capacity &lt;br /&gt;
depletion mechanism for denial of service attacks.&lt;br /&gt;
===Targa===&lt;br /&gt;
Targa, written by a German hacker known as Mixter, is a free software packet available on the Internet. It can run 8 different DoS attacks using some of the tools listed above. The attacker can try individual attack or try all attacks until it is successful. The attacker must be logged in with root permissions; since most of the attacks, use IP spoofing that requires root privileges. The attack can be done from any machine on which the targa.c code compiles. Target platforms can be any operating system but the attacks do not have an impact on all operating systems.&lt;br /&gt;
&lt;br /&gt;
The attacks that can be done with the Targa kit:&lt;br /&gt;
&lt;br /&gt;
* Jolt by Jeff W. Roberson&lt;br /&gt;
* Land by m3lt&lt;br /&gt;
* Winnuke by _eci&lt;br /&gt;
* Nestea by humble and ttol&lt;br /&gt;
* Syndrop by PineKoan&lt;br /&gt;
* Teardrop by route|daemon9&lt;br /&gt;
* Bonk by route|daemon9 and klepto&lt;br /&gt;
* NewTear by route|daemon9 (a variation of Teardrop)&lt;br /&gt;
&lt;br /&gt;
For further information about these tools, please refer to the references below.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
[[Image:Network_security.jpg|thumb|right|400px|Network security]]&lt;br /&gt;
You could do the following things to minimize the DoS attack:&lt;br /&gt;
&lt;br /&gt;
* Effective robust design&lt;br /&gt;
* Bandwidth limitations&lt;br /&gt;
* Keep systems patched&lt;br /&gt;
* Run the least amount of services&lt;br /&gt;
* Allow only necessary traffic&lt;br /&gt;
* Block IP addresses&lt;br /&gt;
&lt;br /&gt;
Due to the power of DoS attacks and the way they work, there is nothing that can be done to prevent a Dos attack entirely.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
DoS attacks can happen to anyone with devastating damage. A good network design will help mitigating DoS attacks. It is essential to have filtering capability based on packet header and content within the network or at the critical gateways in order to filter malicious traffic as a response to such attacks while waiting for a permanent solution. It is important to have the relevant referrals in the policy and legislation to address the issue of DoS and DDoS to ensure an effective cooperation between service providers and law enforcement agencies.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* Stuart McClure, Joel Scambray and George Kurtz, Hacking Exposed—Network Security Secrets &amp;amp; Solutions, Fifth Edition,McGraw-Hill/Osborne, ISBN:9780072260816&lt;br /&gt;
* International Council of Electronic Commerce Consultants, Ethical Hacking and Countermeasures [EC-Council Exam 312-50]—Student Courseware,ISBN No 0972936211&lt;br /&gt;
* Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher, Internet Denial of Service: Attack and Defense Mechanisms, Prentice Hall PTR, Print ISBN: 0-13-147573-8&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [[Cell BE - A Network on a Chip]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Digital Enhanced Cordless Telecommunications (DECT)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Internet Control Message Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Denial Of Service Attacks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Wi-Fi]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cryptography in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Hypertext Transfer Protocol over Secure Socket Layer (HTTPS)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bluetooth]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The practicality of IPv6]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Dynamic Host Configuration Protocol (DHCP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Social Network Service ]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Keystroke Logging: Are You Next]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Latency]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Onion Routing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Radio Frequency Identification (RFID)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[3G Communications]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security in Smartphones]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Credit Card Chip Security and Technology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Address Resolution Protocol (ARP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[How to Connect to the Internet via an ISP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[CAPTCHA]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security for Small Home Networks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Rootkits]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Proxy Server]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Firewall]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Malware]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Peer-to-Peer Network Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[High-Speed Downlink Packet Access (HSDPA)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Man in the Middle Attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Attached Storage]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[RSA Encryption Algorithm]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Corporate Security and IT Policies]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethical Hacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Extensible Messaging and Presence Protocol (XMPP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cloud Computing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethernet Routing Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Personal Data Protection and Privacy]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Public Key Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[AJAX Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Topology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[IP Spoofing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[WLAN Standard 802.11n]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Domain Name System]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Web 2.0]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Local Area Network]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bots &amp;amp; Botnets]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Trivial File Transfer Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Load Balancing for Network Servers]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Simple Mail Transfer Protocol (SMTP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Email Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Data Encryption for Storage Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Statistics of Internet Threats]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[VoIP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Deep Packet Inspection]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Fingerprint Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Multicasting]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[MD5 Rainbow Tables]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The Interplanetary Internet]]&amp;lt;BR&amp;gt;&lt;br /&gt;
==External links==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service Attacks]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Network_security Network security]&amp;lt;br&amp;gt;&lt;br /&gt;
* [http://www.hackforums.net Hacker Forums]&amp;lt;BR&amp;gt;&lt;br /&gt;
--[[User:Luongqt|Luongqt]] 15:12, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks</id>
		<title>Tools for conducting denial-of-service attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks"/>
				<updated>2009-04-10T19:12:22Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Bot_attack.jpg|thumb|right|400px|Attack of the bots. Too late for something too big.]]&lt;br /&gt;
In the world of computer [http://en.wikipedia.org/wiki/Network_security network security], denial-of-service attack is a sneaky and furious monster. It is calm and quite. But when it attacks you, your system will be defeated within minutes (sometimes seconds). What is it? Where does it come from? What can it do? How can you conduct it? Conduct with what? Software or hardware?&lt;br /&gt;
&lt;br /&gt;
Nowadays there are tools available on the [http://en.wikipedia.org/wiki/Internet Internet] that allow attackers to conduct denial-of-service attacks to any vulnerable servers. They are created by [http://en.wikipedia.org/wiki/Black_hat_hacker black hat hackers] for different reasons varying from personal, political reasons to nastiness. Damages from a DoS attack are usually devastating to businesses such as search engines, email providers, banks, e-commerce sites that rely heavily on availability.&lt;br /&gt;
&lt;br /&gt;
On the other hand, although details of denial-of-service attacks are well-known and studied, it is quite difficult to protect any systems from it due to the very nature of the attacks. Scanning tools and other intrusion detection systems can be used to detect attacks or find vulnerable spots which can lead to an DoS attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Definition==&lt;br /&gt;
[[Image:Dosgeek.jpg|thumb|right|400px|DoS in comic]]&lt;br /&gt;
Denial-of-service (DoS) attack is an attempt to violate the availability condition of &lt;br /&gt;
network security. Its sole purpose is to shut a computer system down or drain all its &lt;br /&gt;
available resources, which prevents it to serve legitimate users. As computer becomes more &lt;br /&gt;
and more popular, DoS attack evolves to Distributed DoS (DDoS) attack which amplifies the &lt;br /&gt;
damage from thousand to million times.&lt;br /&gt;
The most common technique for conducting DoS attacks is to &amp;quot;flood&amp;quot; the target with &lt;br /&gt;
information/data. Others aim for the victim's Achilles' heel that cause it to crash.&lt;br /&gt;
===Fact===&lt;br /&gt;
[[Image:CnnDoS.PNG|thumb|right|400px|DoS reported on CNN]]&lt;br /&gt;
[[Image:NewDoSTool.PNG|thumb|right|400px|Trinity]]&lt;br /&gt;
* On February 6th, 2000, Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day, hours after going public. By that evening, [http://en.wikipedia.org/wiki/Ebay eBay (EBAY)], Amazon.com (AMZN), and [http://en.wikipedia.org/wiki/Cnn CNN] (TWX) had gone dark. And in the morning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtually choked off. As a result, Yahoo, which relies on advertising for much of its revenue, lost potentially an estimated $500,000 because its users were unable to access Yahoo's Web pages and the advertisements they carried. (Business Week Online, 12 February 2000)&lt;br /&gt;
&lt;br /&gt;
* The [http://en.wikipedia.org/wiki/Fbi FBI]'s Web site was taken out of service for three hours on 18 February, 2000 by a DDoS attack. (CNN)&lt;br /&gt;
&lt;br /&gt;
* In October 2002, an attacker tried to performed a DDoS attack on the complete set of DNS root servers which have 13 servers of replicated DNS data in total. By a simple form of DDoS attack, he successfully took down 9 of them. The other 4 remained fully functional. The attack lasted only one hour. A longer and stronger attack might have been extremely harmful.&lt;br /&gt;
&lt;br /&gt;
* During the [http://en.wikipedia.org/wiki/Iraq_war Iraq War] in 2003, a DDoS attack was launched on the Qatar-based Al-Jazeera news organization, which broadcast pictures of captured American soldiers. Al-Jazeera attempted to out-provision the attackers by purchasing more bandwidth, but they merely ratcheted up the attack. The Web site was largely unreachable for two days, following which someone hijacked their DNS name, redirecting requests to another Web site that promoted the American cause.&lt;br /&gt;
==Types of attack==&lt;br /&gt;
There are basically three types of DoS attack:&lt;br /&gt;
# Bandwidth attacks: straight forward, comsume resources.&lt;br /&gt;
# Protocol attacks: take advantage of expected behavior of protocols such as [http://en.wikipedia.org/wiki/Transmission_Control_Protocol TCP], [http://en.wikipedia.org/wiki/User_Datagram_Protocol UDP] and [http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol ICMP].&lt;br /&gt;
# Software vulnerability attacks: exploit vulnerabilities in network software, such as a web server, or the underlying TCP/IP stack.&lt;br /&gt;
There are many tools for each type such as:&lt;br /&gt;
* Sending oversized packets (protocol)&lt;br /&gt;
* fragmentation overlap (protocol)&lt;br /&gt;
* loopback floods (protocol)&lt;br /&gt;
* Application DoS (software)&lt;br /&gt;
* UDP floods (protocol)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/SYN_(TCP) SYN] floods (bandwidth)&lt;br /&gt;
==Tools for conducting DoS attacks==&lt;br /&gt;
===SSPing===&lt;br /&gt;
[[Image:SmurfAttack.gif|thumb|right|300px|Smurf]]&lt;br /&gt;
[[Image:SYN_flood.jpg|thumb|right|300px|SYN Flood]]&lt;br /&gt;
[[Image:Mixter.jpg|thumb|right|300px|The creator of Targa]]&lt;br /&gt;
&lt;br /&gt;
SSPing, a DoS tool, is a program sends the victim's computer a series of highly fragmented, &lt;br /&gt;
over-sized ICMP data packets. While trying to put the fragments together, the computer can &lt;br /&gt;
get into a memory overflow which causes the machine to freeze. With a few packets, the &lt;br /&gt;
attacker can lock the victim's computer instantaneously. The identity of the attacker is &lt;br /&gt;
unknown since the connection is lost as the victim restarts the computer. SSPing affects &lt;br /&gt;
[http://en.wikipedia.org/wiki/Windows_95 Windows 95]/[http://en.wikipedia.org/wiki/Windows_NT NT] and [http://en.wikipedia.org/wiki/Mac_os Mac OS].&lt;br /&gt;
Jolt is a program known for this kind of attack. It will freeze unpatched Windows 95, NT &lt;br /&gt;
machines by sending a series of spoofed &amp;amp; highly fragmented ICMP packets to the target, &lt;br /&gt;
which then tries to reassemble the received fragments.&lt;br /&gt;
===Land Exploit===&lt;br /&gt;
Land Exploit is a DoS attack in which a program sends a TCP SYN packet where the target and &lt;br /&gt;
source addresses are the same and port numbers are the same. Receiving such packet causes &lt;br /&gt;
some TCP implementations to crash the target system or exhaust all CPU resources. The name &lt;br /&gt;
of the attack comes from the first distributed source code (called &amp;quot;exploit&amp;quot;) that made it &lt;br /&gt;
possible to implement this attack: land.c. Computers running Windows 95 and NT are desired targets of this kind of attack.&lt;br /&gt;
===Smurf===&lt;br /&gt;
Smurf is a simple effective DoS attack involving forged ICMP packets sent to a broadcast &lt;br /&gt;
address. Attackers spoof the source address on ICMP echo requests and sending them to an IP &lt;br /&gt;
broadcast address. This causes every machine on the broadcast network to receive the reply &lt;br /&gt;
and respond back to the source address that was forged by the attacker. This attack results &lt;br /&gt;
in DoS due to high network traffic which not only hurts the victim but the broadcast &lt;br /&gt;
network also.&lt;br /&gt;
There is a similar tool called Fraggle which uses UDP packets instead.&lt;br /&gt;
===SYN Flood===&lt;br /&gt;
With a series of SYN packets, the attacker can drain the victim resources which leads to &lt;br /&gt;
rejecting legitimate requests.&lt;br /&gt;
System A sends a SYN packet to system B asking to establish a connection via three-way &lt;br /&gt;
handshake. However the source address of the packet is spoofed thus misleads system B to &lt;br /&gt;
switch to SYN_RECV state and send an SYN/ACK packet to the [http://en.wikipedia.org/wiki/IP_address_spoofing spoofed address]. These &lt;br /&gt;
connections are called half-open connections. The source address does not exist and system &lt;br /&gt;
B can only flush the potential connection once the connection-establishment timer expires. &lt;br /&gt;
This timer varies from system to system ranging from seconds to minutes. This type of &lt;br /&gt;
attack is very dangerous because with little resources (e.g. bandwidth), the attacker can &lt;br /&gt;
take down an industrial strength web server. Moreover, this is a stealth attack since &lt;br /&gt;
everything (e.g. the packet) look so normal. Today, SYN flood is the primary capacity &lt;br /&gt;
depletion mechanism for denial of service attacks.&lt;br /&gt;
===Targa===&lt;br /&gt;
Targa, written by a German hacker known as Mixter, is a free software packet available on the Internet. It can run 8 different DoS attacks using some of the tools listed above. The attacker can try individual attack or try all attacks until it is successful. The attacker must be logged in with root permissions; since most of the attacks, use IP spoofing that requires root privileges. The attack can be done from any machine on which the targa.c code compiles. Target platforms can be any operating system but the attacks do not have an impact on all operating systems.&lt;br /&gt;
&lt;br /&gt;
The attacks that can be done with the Targa kit:&lt;br /&gt;
&lt;br /&gt;
* Jolt by Jeff W. Roberson&lt;br /&gt;
* Land by m3lt&lt;br /&gt;
* Winnuke by _eci&lt;br /&gt;
* Nestea by humble and ttol&lt;br /&gt;
* Syndrop by PineKoan&lt;br /&gt;
* Teardrop by route|daemon9&lt;br /&gt;
* Bonk by route|daemon9 and klepto&lt;br /&gt;
* NewTear by route|daemon9 (a variation of Teardrop)&lt;br /&gt;
&lt;br /&gt;
For further information about these tools, please refer to the references below.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
[[Image:Network_security.jpg|thumb|right|400px|Network security]]&lt;br /&gt;
You could do the following things to minimize the DoS attack:&lt;br /&gt;
&lt;br /&gt;
* Effective robust design&lt;br /&gt;
* Bandwidth limitations&lt;br /&gt;
* Keep systems patched&lt;br /&gt;
* Run the least amount of services&lt;br /&gt;
* Allow only necessary traffic&lt;br /&gt;
* Block IP addresses&lt;br /&gt;
&lt;br /&gt;
Due to the power of DoS attacks and the way they work, there is nothing that can be done to prevent a Dos attack entirely.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
DoS attacks can happen to anyone with devastating damage. A good network design will help mitigating DoS attacks. It is essential to have filtering capability based on packet header and content within the network or at the critical gateways in order to filter malicious traffic as a response to such attacks while waiting for a permanent solution. It is important to have the relevant referrals in the policy and legislation to address the issue of DoS and DDoS to ensure an effective cooperation between service providers and law enforcement agencies.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* Stuart McClure, Joel Scambray and George Kurtz, Hacking Exposed—Network Security Secrets &amp;amp; Solutions, Fifth Edition,McGraw-Hill/Osborne, ISBN:9780072260816&lt;br /&gt;
* International Council of Electronic Commerce Consultants, Ethical Hacking and Countermeasures [EC-Council Exam 312-50]—Student Courseware,ISBN No 0972936211&lt;br /&gt;
* Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher, Internet Denial of Service: Attack and Defense Mechanisms, Prentice Hall PTR, Print ISBN: 0-13-147573-8&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [[Cell BE - A Network on a Chip]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Digital Enhanced Cordless Telecommunications (DECT)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Internet Control Message Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Denial Of Service Attacks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Wi-Fi]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cryptography in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Hypertext Transfer Protocol over Secure Socket Layer (HTTPS)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bluetooth]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The practicality of IPv6]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Dynamic Host Configuration Protocol (DHCP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Social Network Service ]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Keystroke Logging: Are You Next]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Latency]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Onion Routing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Radio Frequency Identification (RFID)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[3G Communications]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security in Smartphones]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Credit Card Chip Security and Technology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Address Resolution Protocol (ARP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[How to Connect to the Internet via an ISP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[CAPTCHA]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security for Small Home Networks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Rootkits]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Proxy Server]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Firewall]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Malware]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Peer-to-Peer Network Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[High-Speed Downlink Packet Access (HSDPA)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Man in the Middle Attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Attached Storage]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[RSA Encryption Algorithm]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Corporate Security and IT Policies]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethical Hacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Extensible Messaging and Presence Protocol (XMPP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cloud Computing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethernet Routing Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Personal Data Protection and Privacy]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Public Key Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[AJAX Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Topology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[IP Spoofing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[WLAN Standard 802.11n]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Domain Name System]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Web 2.0]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Local Area Network]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bots &amp;amp; Botnets]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Trivial File Transfer Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Load Balancing for Network Servers]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Simple Mail Transfer Protocol (SMTP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Email Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Data Encryption for Storage Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Statistics of Internet Threats]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[VoIP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Deep Packet Inspection]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Fingerprint Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Multicasting]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[MD5 Rainbow Tables]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The Interplanetary Internet]]&amp;lt;BR&amp;gt;&lt;br /&gt;
==External links==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service Attacks]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Network_security Network security]&amp;lt;br&amp;gt;&lt;br /&gt;
* [http://www.hackforums.net Hacker Forums]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[User:Luongqt|Luongqt]]&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Mixter.jpg</id>
		<title>File:Mixter.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Mixter.jpg"/>
				<updated>2009-04-10T19:06:07Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;Mixter, creator of Targa&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Mixter, creator of Targa&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks</id>
		<title>Tools for conducting denial-of-service attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks"/>
				<updated>2009-04-10T19:03:12Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Bot_attack.jpg|thumb|right|400px|Attack of the bots. Too late for something too big.]]&lt;br /&gt;
In the world of computer [http://en.wikipedia.org/wiki/Network_security network security], denial-of-service attack is a sneaky and furious monster. It is calm and quite. But when it attacks you, your system will be defeated within minutes (sometimes seconds). What is it? Where does it come from? What can it do? How can you conduct it? Conduct with what? Software or hardware?&lt;br /&gt;
&lt;br /&gt;
Nowadays there are tools available on the [http://en.wikipedia.org/wiki/Internet Internet] that allow attackers to conduct denial-of-service attacks to any vulnerable servers. They are created by [http://en.wikipedia.org/wiki/Black_hat_hacker black hat hackers] for different reasons varying from personal, political reasons to nastiness. Damages from a DoS attack are usually devastating to businesses such as search engines, email providers, banks, e-commerce sites that rely heavily on availability.&lt;br /&gt;
&lt;br /&gt;
On the other hand, although details of denial-of-service attacks are well-known and studied, it is quite difficult to protect any systems from it due to the very nature of the attacks. Scanning tools and other intrusion detection systems can be used to detect attacks or find vulnerable spots which can lead to an DoS attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Definition==&lt;br /&gt;
[[Image:Dosgeek.jpg|thumb|right|400px|DoS in comic]]&lt;br /&gt;
Denial-of-service (DoS) attack is an attempt to violate the availability condition of &lt;br /&gt;
network security. Its sole purpose is to shut a computer system down or drain all its &lt;br /&gt;
available resources, which prevents it to serve legitimate users. As computer becomes more &lt;br /&gt;
and more popular, DoS attack evolves to Distributed DoS (DDoS) attack which amplifies the &lt;br /&gt;
damage from thousand to million times.&lt;br /&gt;
The most common technique for conducting DoS attacks is to &amp;quot;flood&amp;quot; the target with &lt;br /&gt;
information/data. Others aim for the victim's Achilles' heel that cause it to crash.&lt;br /&gt;
===Fact===&lt;br /&gt;
[[Image:CnnDoS.PNG|thumb|right|400px|DoS reported on CNN]]&lt;br /&gt;
* On February 6th, 2000, Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day, hours after going public. By that evening, [http://en.wikipedia.org/wiki/Ebay eBay (EBAY)], Amazon.com (AMZN), and [http://en.wikipedia.org/wiki/Cnn CNN] (TWX) had gone dark. And in the morning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtually choked off. As a result, Yahoo, which relies on advertising for much of its revenue, lost potentially an estimated $500,000 because its users were unable to access Yahoo's Web pages and the advertisements they carried. (Business Week Online, 12 February 2000)&lt;br /&gt;
&lt;br /&gt;
* The [http://en.wikipedia.org/wiki/Fbi FBI]'s Web site was taken out of service for three hours on 18 February, 2000 by a DDoS attack. (CNN)&lt;br /&gt;
&lt;br /&gt;
* In October 2002, an attacker tried to performed a DDoS attack on the complete set of DNS root servers which have 13 servers of replicated DNS data in total. By a simple form of DDoS attack, he successfully took down 9 of them. The other 4 remained fully functional. The attack lasted only one hour. A longer and stronger attack might have been extremely harmful.&lt;br /&gt;
&lt;br /&gt;
* During the [http://en.wikipedia.org/wiki/Iraq_war Iraq War] in 2003, a DDoS attack was launched on the Qatar-based Al-Jazeera news organization, which broadcast pictures of captured American soldiers. Al-Jazeera attempted to out-provision the attackers by purchasing more bandwidth, but they merely ratcheted up the attack. The Web site was largely unreachable for two days, following which someone hijacked their DNS name, redirecting requests to another Web site that promoted the American cause.&lt;br /&gt;
==Types of attack==&lt;br /&gt;
There are basically three types of DoS attack:&lt;br /&gt;
# Bandwidth attacks: straight forward, comsume resources.&lt;br /&gt;
# Protocol attacks: take advantage of expected behavior of protocols such as [http://en.wikipedia.org/wiki/Transmission_Control_Protocol TCP], [http://en.wikipedia.org/wiki/User_Datagram_Protocol UDP] and [http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol ICMP].&lt;br /&gt;
# Software vulnerability attacks: exploit vulnerabilities in network software, such as a web server, or the underlying TCP/IP stack.&lt;br /&gt;
There are many tools for each type such as:&lt;br /&gt;
* Sending oversized packets (protocol)&lt;br /&gt;
* fragmentation overlap (protocol)&lt;br /&gt;
* loopback floods (protocol)&lt;br /&gt;
* Application DoS (software)&lt;br /&gt;
* UDP floods (protocol)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/SYN_(TCP) SYN] floods (bandwidth)&lt;br /&gt;
==Tools for conducting DoS attacks==&lt;br /&gt;
===SSPing===&lt;br /&gt;
[[Image:SmurfAttack.gif|thumb|right|300px|Smurf]]&lt;br /&gt;
[[Image:SYN_flood.jpg|thumb|right|300px|SYN Flood]]&lt;br /&gt;
[[Image:NewDoSTool.PNG|thumb|right|400px|Trinity]]&lt;br /&gt;
SSPing, a DoS tool, is a program sends the victim's computer a series of highly fragmented, &lt;br /&gt;
over-sized ICMP data packets. While trying to put the fragments together, the computer can &lt;br /&gt;
get into a memory overflow which causes the machine to freeze. With a few packets, the &lt;br /&gt;
attacker can lock the victim's computer instantaneously. The identity of the attacker is &lt;br /&gt;
unknown since the connection is lost as the victim restarts the computer. SSPing affects &lt;br /&gt;
Windows 95/NT and Mac OS.&lt;br /&gt;
Jolt is a program known for this kind of attack. It will freeze unpatched Windows 95, NT &lt;br /&gt;
machines by sending a series of spoofed &amp;amp; highly fragmented ICMP packets to the target, &lt;br /&gt;
which then tries to reassemble the received fragments.&lt;br /&gt;
===Land Exploit===&lt;br /&gt;
Land Exploit is a DoS attack in which a program sends a TCP SYN packet where the target and &lt;br /&gt;
source addresses are the same and port numbers are the same. Receiving such packet causes &lt;br /&gt;
some TCP implementations to crash the target system or exhaust all CPU resources. The name &lt;br /&gt;
of the attack comes from the first distributed source code (called &amp;quot;exploit&amp;quot;) that made it &lt;br /&gt;
possible to implement this attack: land.c. Computers running Windows 95 and NT are desired targets of this kind of attack.&lt;br /&gt;
===Smurf===&lt;br /&gt;
Smurf is a simple effective DoS attack involving forged ICMP packets sent to a broadcast &lt;br /&gt;
address. Attackers spoof the source address on ICMP echo requests and sending them to an IP &lt;br /&gt;
broadcast address. This causes every machine on the broadcast network to receive the reply &lt;br /&gt;
and respond back to the source address that was forged by the attacker. This attack results &lt;br /&gt;
in DoS due to high network traffic which not only hurts the victim but the broadcast &lt;br /&gt;
network also.&lt;br /&gt;
There is a similar tool called Fraggle which uses UDP packets instead.&lt;br /&gt;
===SYN Flood===&lt;br /&gt;
With a series of SYN packets, the attacker can drain the victim resources which leads to &lt;br /&gt;
rejecting legitimate requests.&lt;br /&gt;
System A sends a SYN packet to system B asking to establish a connection via three-way &lt;br /&gt;
handshake. However the source address of the packet is spoofed thus misleads system B to &lt;br /&gt;
switch to SYN_RECV state and send an SYN/ACK packet to the [http://en.wikipedia.org/wiki/IP_address_spoofing spoofed address]. These &lt;br /&gt;
connections are called half-open connections. The source address does not exist and system &lt;br /&gt;
B can only flush the potential connection once the connection-establishment timer expires. &lt;br /&gt;
This timer varies from system to system ranging from seconds to minutes. This type of &lt;br /&gt;
attack is very dangerous because with little resources (e.g. bandwidth), the attacker can &lt;br /&gt;
take down an industrial strength web server. Moreover, this is a stealth attack since &lt;br /&gt;
everything (e.g. the packet) look so normal. Today, SYN flood is the primary capacity &lt;br /&gt;
depletion mechanism for denial of service attacks.&lt;br /&gt;
===Targa===&lt;br /&gt;
Targa, written by a German hacker known as Mixter, is a free software packet available on the Internet. It can run 8 different DoS attacks using some of the tools listed above. The attacker can try individual attack or try all attacks until it is successful. The attacker must be logged in with root permissions; since most of the attacks, use IP spoofing that requires root privileges. The attack can be done from any machine on which the targa.c code compiles. Target platforms can be any operating system but the attacks do not have an impact on all operating systems.&lt;br /&gt;
&lt;br /&gt;
The attacks that can be done with the Targa kit:&lt;br /&gt;
&lt;br /&gt;
* Jolt by Jeff W. Roberson&lt;br /&gt;
* Land by m3lt&lt;br /&gt;
* Winnuke by _eci&lt;br /&gt;
* Nestea by humble and ttol&lt;br /&gt;
* Syndrop by PineKoan&lt;br /&gt;
* Teardrop by route|daemon9&lt;br /&gt;
* Bonk by route|daemon9 and klepto&lt;br /&gt;
* NewTear by route|daemon9 (a variation of Teardrop)&lt;br /&gt;
&lt;br /&gt;
For further information about these tools, please refer to the references below.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
[[Image:Network_security.jpg|thumb|right|400px|Network security]]&lt;br /&gt;
You could do the following things to minimize the DoS attack:&lt;br /&gt;
&lt;br /&gt;
* Effective robust design&lt;br /&gt;
* Bandwidth limitations&lt;br /&gt;
* Keep systems patched&lt;br /&gt;
* Run the least amount of services&lt;br /&gt;
* Allow only necessary traffic&lt;br /&gt;
* Block IP addresses&lt;br /&gt;
&lt;br /&gt;
Due to the power of DoS attacks and the way they work, there is nothing that can be done to prevent a Dos attack entirely.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
DoS attacks can happen to anyone with devastating damage. A good network design will help mitigating DoS attacks. It is essential to have filtering capability based on packet header and content within the network or at the critical gateways in order to filter malicious traffic as a response to such attacks while waiting for a permanent solution. It is important to have the relevant referrals in the policy and legislation to address the issue of DoS and DDoS to ensure an effective cooperation between service providers and law enforcement agencies.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* Stuart McClure, Joel Scambray and George Kurtz, Hacking Exposed—Network Security Secrets &amp;amp; Solutions, Fifth Edition,McGraw-Hill/Osborne, ISBN:9780072260816&lt;br /&gt;
* International Council of Electronic Commerce Consultants, Ethical Hacking and Countermeasures [EC-Council Exam 312-50]—Student Courseware,ISBN No 0972936211&lt;br /&gt;
* Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher, Internet Denial of Service: Attack and Defense Mechanisms, Prentice Hall PTR, Print ISBN: 0-13-147573-8&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [[Cell BE - A Network on a Chip]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Digital Enhanced Cordless Telecommunications (DECT)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Internet Control Message Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Denial Of Service Attacks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Wi-Fi]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cryptography in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Hypertext Transfer Protocol over Secure Socket Layer (HTTPS)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bluetooth]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The practicality of IPv6]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Dynamic Host Configuration Protocol (DHCP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Social Network Service ]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Keystroke Logging: Are You Next]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Latency]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Onion Routing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Radio Frequency Identification (RFID)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[3G Communications]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security in Smartphones]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Credit Card Chip Security and Technology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Address Resolution Protocol (ARP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[How to Connect to the Internet via an ISP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[CAPTCHA]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security for Small Home Networks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Rootkits]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Proxy Server]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Firewall]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Malware]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Peer-to-Peer Network Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[High-Speed Downlink Packet Access (HSDPA)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Man in the Middle Attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Attached Storage]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[RSA Encryption Algorithm]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Corporate Security and IT Policies]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethical Hacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Extensible Messaging and Presence Protocol (XMPP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cloud Computing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethernet Routing Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Personal Data Protection and Privacy]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Public Key Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[AJAX Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Topology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[IP Spoofing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[WLAN Standard 802.11n]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Domain Name System]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Web 2.0]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Local Area Network]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bots &amp;amp; Botnets]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Trivial File Transfer Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Load Balancing for Network Servers]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Simple Mail Transfer Protocol (SMTP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Email Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Data Encryption for Storage Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Statistics of Internet Threats]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[VoIP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Deep Packet Inspection]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Fingerprint Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Multicasting]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[MD5 Rainbow Tables]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The Interplanetary Internet]]&amp;lt;BR&amp;gt;&lt;br /&gt;
==External links==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service Attacks]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Network_security Network security]&amp;lt;br&amp;gt;&lt;br /&gt;
* [http://www.hackforums.net Hacker Forums]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--[[User:Luongqt|Luongqt]] 15:03, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:NewDoSTool.PNG</id>
		<title>File:NewDoSTool.PNG</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:NewDoSTool.PNG"/>
				<updated>2009-04-10T19:00:48Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;Trinity&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Trinity&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks</id>
		<title>Tools for conducting denial-of-service attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks"/>
				<updated>2009-04-10T18:58:37Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Bot_attack.jpg|thumb|right|400px|Attack of the bots. Too late for something too big.]]&lt;br /&gt;
In the world of computer [http://en.wikipedia.org/wiki/Network_security network security], denial-of-service attack is a sneaky and furious monster. It is calm and quite. But when it attacks you, your system will be defeated within minutes (sometimes seconds). What is it? Where does it come from? What can it do? How can you conduct it? Conduct with what? Software or hardware?&lt;br /&gt;
&lt;br /&gt;
Nowadays there are tools available on the [http://en.wikipedia.org/wiki/Internet Internet] that allow attackers to conduct denial-of-service attacks to any vulnerable servers. They are created by [http://en.wikipedia.org/wiki/Black_hat_hacker black hat hackers] for different reasons varying from personal, political reasons to nastiness. Damages from a DoS attack are usually devastating to businesses such as search engines, email providers, banks, e-commerce sites that rely heavily on availability.&lt;br /&gt;
&lt;br /&gt;
On the other hand, although details of denial-of-service attacks are well-known and studied, it is quite difficult to protect any systems from it due to the very nature of the attacks. Scanning tools and other intrusion detection systems can be used to detect attacks or find vulnerable spots which can lead to an DoS attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Definition==&lt;br /&gt;
[[Image:Dosgeek.jpg|thumb|right|400px|DoS in comic]]&lt;br /&gt;
Denial-of-service (DoS) attack is an attempt to violate the availability condition of &lt;br /&gt;
network security. Its sole purpose is to shut a computer system down or drain all its &lt;br /&gt;
available resources, which prevents it to serve legitimate users. As computer becomes more &lt;br /&gt;
and more popular, DoS attack evolves to Distributed DoS (DDoS) attack which amplifies the &lt;br /&gt;
damage from thousand to million times.&lt;br /&gt;
The most common technique for conducting DoS attacks is to &amp;quot;flood&amp;quot; the target with &lt;br /&gt;
information/data. Others aim for the victim's Achilles' heel that cause it to crash.&lt;br /&gt;
===Fact===&lt;br /&gt;
[[Image:CnnDoS.PNG|thumb|right|400px|DoS reported on CNN]]&lt;br /&gt;
* On February 6th, 2000, Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day, hours after going public. By that evening, [http://en.wikipedia.org/wiki/Ebay eBay (EBAY)], Amazon.com (AMZN), and [http://en.wikipedia.org/wiki/Cnn CNN] (TWX) had gone dark. And in the morning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtually choked off. As a result, Yahoo, which relies on advertising for much of its revenue, lost potentially an estimated $500,000 because its users were unable to access Yahoo's Web pages and the advertisements they carried. (Business Week Online, 12 February 2000)&lt;br /&gt;
&lt;br /&gt;
* The [http://en.wikipedia.org/wiki/Fbi FBI]'s Web site was taken out of service for three hours on 18 February, 2000 by a DDoS attack. (CNN)&lt;br /&gt;
&lt;br /&gt;
* In October 2002, an attacker tried to performed a DDoS attack on the complete set of DNS root servers which have 13 servers of replicated DNS data in total. By a simple form of DDoS attack, he successfully took down 9 of them. The other 4 remained fully functional. The attack lasted only one hour. A longer and stronger attack might have been extremely harmful.&lt;br /&gt;
&lt;br /&gt;
* During the [http://en.wikipedia.org/wiki/Iraq_war Iraq War] in 2003, a DDoS attack was launched on the Qatar-based Al-Jazeera news organization, which broadcast pictures of captured American soldiers. Al-Jazeera attempted to out-provision the attackers by purchasing more bandwidth, but they merely ratcheted up the attack. The Web site was largely unreachable for two days, following which someone hijacked their DNS name, redirecting requests to another Web site that promoted the American cause.&lt;br /&gt;
==Types of attack==&lt;br /&gt;
There are basically three types of DoS attack:&lt;br /&gt;
# Bandwidth attacks: straight forward, comsume resources.&lt;br /&gt;
# Protocol attacks: take advantage of expected behavior of protocols such as [http://en.wikipedia.org/wiki/Transmission_Control_Protocol TCP], [http://en.wikipedia.org/wiki/User_Datagram_Protocol UDP] and [http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol ICMP].&lt;br /&gt;
# Software vulnerability attacks: exploit vulnerabilities in network software, such as a web server, or the underlying TCP/IP stack.&lt;br /&gt;
There are many tools for each type such as:&lt;br /&gt;
* Sending oversized packets (protocol)&lt;br /&gt;
* fragmentation overlap (protocol)&lt;br /&gt;
* loopback floods (protocol)&lt;br /&gt;
* Application DoS (software)&lt;br /&gt;
* UDP floods (protocol)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/SYN_(TCP) SYN] floods (bandwidth)&lt;br /&gt;
==Tools for conducting DoS attacks==&lt;br /&gt;
===SSPing===&lt;br /&gt;
[[Image:SmurfAttack.gif|thumb|right|300px|Smurf]]&lt;br /&gt;
[[Image:SYN_flood.jpg|thumb|right|300px|SYN Flood]]&lt;br /&gt;
SSPing, a DoS tool, is a program sends the victim's computer a series of highly fragmented, &lt;br /&gt;
over-sized ICMP data packets. While trying to put the fragments together, the computer can &lt;br /&gt;
get into a memory overflow which causes the machine to freeze. With a few packets, the &lt;br /&gt;
attacker can lock the victim's computer instantaneously. The identity of the attacker is &lt;br /&gt;
unknown since the connection is lost as the victim restarts the computer. SSPing affects &lt;br /&gt;
Windows 95/NT and Mac OS.&lt;br /&gt;
Jolt is a program known for this kind of attack. It will freeze unpatched Windows 95, NT &lt;br /&gt;
machines by sending a series of spoofed &amp;amp; highly fragmented ICMP packets to the target, &lt;br /&gt;
which then tries to reassemble the received fragments.&lt;br /&gt;
===Land Exploit===&lt;br /&gt;
Land Exploit is a DoS attack in which a program sends a TCP SYN packet where the target and &lt;br /&gt;
source addresses are the same and port numbers are the same. Receiving such packet causes &lt;br /&gt;
some TCP implementations to crash the target system or exhaust all CPU resources. The name &lt;br /&gt;
of the attack comes from the first distributed source code (called &amp;quot;exploit&amp;quot;) that made it &lt;br /&gt;
possible to implement this attack: land.c. Computers running Windows 95 and NT are desired targets of this kind of attack.&lt;br /&gt;
===Smurf===&lt;br /&gt;
Smurf is a simple effective DoS attack involving forged ICMP packets sent to a broadcast &lt;br /&gt;
address. Attackers spoof the source address on ICMP echo requests and sending them to an IP &lt;br /&gt;
broadcast address. This causes every machine on the broadcast network to receive the reply &lt;br /&gt;
and respond back to the source address that was forged by the attacker. This attack results &lt;br /&gt;
in DoS due to high network traffic which not only hurts the victim but the broadcast &lt;br /&gt;
network also.&lt;br /&gt;
There is a similar tool called Fraggle which uses UDP packets instead.&lt;br /&gt;
===SYN Flood===&lt;br /&gt;
With a series of SYN packets, the attacker can drain the victim resources which leads to &lt;br /&gt;
rejecting legitimate requests.&lt;br /&gt;
System A sends a SYN packet to system B asking to establish a connection via three-way &lt;br /&gt;
handshake. However the source address of the packet is spoofed thus misleads system B to &lt;br /&gt;
switch to SYN_RECV state and send an SYN/ACK packet to the [http://en.wikipedia.org/wiki/IP_address_spoofing spoofed address]. These &lt;br /&gt;
connections are called half-open connections. The source address does not exist and system &lt;br /&gt;
B can only flush the potential connection once the connection-establishment timer expires. &lt;br /&gt;
This timer varies from system to system ranging from seconds to minutes. This type of &lt;br /&gt;
attack is very dangerous because with little resources (e.g. bandwidth), the attacker can &lt;br /&gt;
take down an industrial strength web server. Moreover, this is a stealth attack since &lt;br /&gt;
everything (e.g. the packet) look so normal. Today, SYN flood is the primary capacity &lt;br /&gt;
depletion mechanism for denial of service attacks.&lt;br /&gt;
===Targa===&lt;br /&gt;
Targa, written by a German hacker known as Mixter, is a free software packet available on the Internet. It can run 8 different DoS attacks using some of the tools listed above. The attacker can try individual attack or try all attacks until it is successful. The attacker must be logged in with root permissions; since most of the attacks, use IP spoofing that requires root privileges. The attack can be done from any machine on which the targa.c code compiles. Target platforms can be any operating system but the attacks do not have an impact on all operating systems.&lt;br /&gt;
&lt;br /&gt;
The attacks that can be done with the Targa kit:&lt;br /&gt;
&lt;br /&gt;
* Jolt by Jeff W. Roberson&lt;br /&gt;
* Land by m3lt&lt;br /&gt;
* Winnuke by _eci&lt;br /&gt;
* Nestea by humble and ttol&lt;br /&gt;
* Syndrop by PineKoan&lt;br /&gt;
* Teardrop by route|daemon9&lt;br /&gt;
* Bonk by route|daemon9 and klepto&lt;br /&gt;
* NewTear by route|daemon9 (a variation of Teardrop)&lt;br /&gt;
&lt;br /&gt;
For further information about these tools, please refer to the references below.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
[[Image:Network_security.jpg|thumb|right|400px|Network security]]&lt;br /&gt;
You could do the following things to minimize the DoS attack:&lt;br /&gt;
&lt;br /&gt;
* Effective robust design&lt;br /&gt;
* Bandwidth limitations&lt;br /&gt;
* Keep systems patched&lt;br /&gt;
* Run the least amount of services&lt;br /&gt;
* Allow only necessary traffic&lt;br /&gt;
* Block IP addresses&lt;br /&gt;
&lt;br /&gt;
Due to the power of DoS attacks and the way they work, there is nothing that can be done to prevent a Dos attack entirely.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
DoS attacks can happen to anyone with devastating damage. A good network design will help mitigating DoS attacks. It is essential to have filtering capability based on packet header and content within the network or at the critical gateways in order to filter malicious traffic as a response to such attacks while waiting for a permanent solution. It is important to have the relevant referrals in the policy and legislation to address the issue of DoS and DDoS to ensure an effective cooperation between service providers and law enforcement agencies.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* Stuart McClure, Joel Scambray and George Kurtz, Hacking Exposed—Network Security Secrets &amp;amp; Solutions, Fifth Edition,McGraw-Hill/Osborne, ISBN:9780072260816&lt;br /&gt;
* International Council of Electronic Commerce Consultants, Ethical Hacking and Countermeasures [EC-Council Exam 312-50]—Student Courseware,ISBN No 0972936211&lt;br /&gt;
* Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher, Internet Denial of Service: Attack and Defense Mechanisms, Prentice Hall PTR, Print ISBN: 0-13-147573-8&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [[Cell BE - A Network on a Chip]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Digital Enhanced Cordless Telecommunications (DECT)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Internet Control Message Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Denial Of Service Attacks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Wi-Fi]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cryptography in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Hypertext Transfer Protocol over Secure Socket Layer (HTTPS)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bluetooth]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The practicality of IPv6]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Dynamic Host Configuration Protocol (DHCP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Social Network Service ]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Keystroke Logging: Are You Next]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Latency]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Onion Routing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Radio Frequency Identification (RFID)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[3G Communications]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security in Smartphones]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Credit Card Chip Security and Technology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Address Resolution Protocol (ARP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[How to Connect to the Internet via an ISP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[CAPTCHA]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security for Small Home Networks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Rootkits]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Proxy Server]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Firewall]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Malware]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Peer-to-Peer Network Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[High-Speed Downlink Packet Access (HSDPA)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Man in the Middle Attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Attached Storage]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[RSA Encryption Algorithm]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Corporate Security and IT Policies]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethical Hacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Extensible Messaging and Presence Protocol (XMPP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cloud Computing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethernet Routing Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Personal Data Protection and Privacy]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Public Key Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[AJAX Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Topology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[IP Spoofing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[WLAN Standard 802.11n]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Domain Name System]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Web 2.0]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Local Area Network]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bots &amp;amp; Botnets]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Trivial File Transfer Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Load Balancing for Network Servers]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Simple Mail Transfer Protocol (SMTP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Email Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Data Encryption for Storage Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Statistics of Internet Threats]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[VoIP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Deep Packet Inspection]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Fingerprint Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Multicasting]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[MD5 Rainbow Tables]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The Interplanetary Internet]]&amp;lt;BR&amp;gt;&lt;br /&gt;
==External links==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service Attacks]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Network_security Network security]&amp;lt;br&amp;gt;&lt;br /&gt;
* [http://www.hackforums.net Hacker Forums]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[User:Luongqt|Luongqt]]&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Network_security.jpg</id>
		<title>File:Network security.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Network_security.jpg"/>
				<updated>2009-04-10T18:56:20Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;Network security&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Network security&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Bot_attack.jpg</id>
		<title>File:Bot attack.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Bot_attack.jpg"/>
				<updated>2009-04-10T18:53:42Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;Attack of the bots&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Attack of the bots&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:CnnDoS.PNG</id>
		<title>File:CnnDoS.PNG</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:CnnDoS.PNG"/>
				<updated>2009-04-10T18:47:33Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;DoS reported on CNN&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;DoS reported on CNN&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks</id>
		<title>Tools for conducting denial-of-service attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks"/>
				<updated>2009-04-10T18:28:16Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In the world of computer [http://en.wikipedia.org/wiki/Network_security network security], denial-of-service attack is a sneaky and furious monster. It is calm and quite. But when it attacks you, your system will be defeated within minutes (sometimes seconds). What is it? Where does it come from? What can it do? How can you conduct it? Conduct with what? Software or hardware?&lt;br /&gt;
&lt;br /&gt;
Nowadays there are tools available on the [http://en.wikipedia.org/wiki/Internet Internet] that allow attackers to conduct denial-of-service attacks to any vulnerable servers. They are created by [http://en.wikipedia.org/wiki/Black_hat_hacker black hat hackers] for different reasons varying from personal, political reasons to nastiness. Damages from a DoS attack are usually devastating to businesses such as search engines, email providers, banks, e-commerce sites that rely heavily on availability.&lt;br /&gt;
&lt;br /&gt;
On the other hand, although details of denial-of-service attacks are well-known and studied, it is quite difficult to protect any systems from it due to the very nature of the attacks. Scanning tools and other intrusion detection systems can be used to detect attacks or find vulnerable spots which can lead to an DoS attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Definition==&lt;br /&gt;
[[Image:Dosgeek.jpg|thumb|right|400px|DoS in comic]]&lt;br /&gt;
Denial-of-service (DoS) attack is an attempt to violate the availability condition of &lt;br /&gt;
network security. Its sole purpose is to shut a computer system down or drain all its &lt;br /&gt;
available resources, which prevents it to serve legitimate users. As computer becomes more &lt;br /&gt;
and more popular, DoS attack evolves to Distributed DoS (DDoS) attack which amplifies the &lt;br /&gt;
damage from thousand to million times.&lt;br /&gt;
The most common technique for conducting DoS attacks is to &amp;quot;flood&amp;quot; the target with &lt;br /&gt;
information/data. Others aim for the victim's Achilles' heel that cause it to crash.&lt;br /&gt;
===Fact===&lt;br /&gt;
* On February 6th, 2000, Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day, hours after going public. By that evening, [http://en.wikipedia.org/wiki/Ebay eBay (EBAY)], Amazon.com (AMZN), and [http://en.wikipedia.org/wiki/Cnn CNN] (TWX) had gone dark. And in the morning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtually choked off. As a result, Yahoo, which relies on advertising for much of its revenue, lost potentially an estimated $500,000 because its users were unable to access Yahoo's Web pages and the advertisements they carried. (Business Week Online, 12 February 2000)&lt;br /&gt;
&lt;br /&gt;
* The [http://en.wikipedia.org/wiki/Fbi FBI]'s Web site was taken out of service for three hours on 18 February, 2000 by a DDoS attack. (CNN)&lt;br /&gt;
&lt;br /&gt;
* In October 2002, an attacker tried to performed a DDoS attack on the complete set of DNS root servers which have 13 servers of replicated DNS data in total. By a simple form of DDoS attack, he successfully took down 9 of them. The other 4 remained fully functional. The attack lasted only one hour. A longer and stronger attack might have been extremely harmful.&lt;br /&gt;
&lt;br /&gt;
* During the [http://en.wikipedia.org/wiki/Iraq_war Iraq War] in 2003, a DDoS attack was launched on the Qatar-based Al-Jazeera news organization, which broadcast pictures of captured American soldiers. Al-Jazeera attempted to out-provision the attackers by purchasing more bandwidth, but they merely ratcheted up the attack. The Web site was largely unreachable for two days, following which someone hijacked their DNS name, redirecting requests to another Web site that promoted the American cause.&lt;br /&gt;
==Types of attack==&lt;br /&gt;
There are basically three types of DoS attack:&lt;br /&gt;
# Bandwidth attacks: straight forward, comsume resources.&lt;br /&gt;
# Protocol attacks: take advantage of expected behavior of protocols such as [http://en.wikipedia.org/wiki/Transmission_Control_Protocol TCP], [http://en.wikipedia.org/wiki/User_Datagram_Protocol UDP] and [http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol ICMP].&lt;br /&gt;
# Software vulnerability attacks: exploit vulnerabilities in network software, such as a web server, or the underlying TCP/IP stack.&lt;br /&gt;
There are many tools for each type such as:&lt;br /&gt;
* Sending oversized packets (protocol)&lt;br /&gt;
* fragmentation overlap (protocol)&lt;br /&gt;
* loopback floods (protocol)&lt;br /&gt;
* Application DoS (software)&lt;br /&gt;
* UDP floods (protocol)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/SYN_(TCP) SYN] floods (bandwidth)&lt;br /&gt;
==Tools for conducting DoS attacks==&lt;br /&gt;
===SSPing===&lt;br /&gt;
[[Image:SmurfAttack.gif|thumb|right|300px|Smurf]]&lt;br /&gt;
[[Image:SYN_flood.jpg|thumb|right|300px|SYN Flood]]&lt;br /&gt;
SSPing, a DoS tool, is a program sends the victim's computer a series of highly fragmented, &lt;br /&gt;
over-sized ICMP data packets. While trying to put the fragments together, the computer can &lt;br /&gt;
get into a memory overflow which causes the machine to freeze. With a few packets, the &lt;br /&gt;
attacker can lock the victim's computer instantaneously. The identity of the attacker is &lt;br /&gt;
unknown since the connection is lost as the victim restarts the computer. SSPing affects &lt;br /&gt;
Windows 95/NT and Mac OS.&lt;br /&gt;
Jolt is a program known for this kind of attack. It will freeze unpatched Windows 95, NT &lt;br /&gt;
machines by sending a series of spoofed &amp;amp; highly fragmented ICMP packets to the target, &lt;br /&gt;
which then tries to reassemble the received fragments.&lt;br /&gt;
===Land Exploit===&lt;br /&gt;
Land Exploit is a DoS attack in which a program sends a TCP SYN packet where the target and &lt;br /&gt;
source addresses are the same and port numbers are the same. Receiving such packet causes &lt;br /&gt;
some TCP implementations to crash the target system or exhaust all CPU resources. The name &lt;br /&gt;
of the attack comes from the first distributed source code (called &amp;quot;exploit&amp;quot;) that made it &lt;br /&gt;
possible to implement this attack: land.c. Computers running Windows 95 and NT are desired targets of this kind of attack.&lt;br /&gt;
===Smurf===&lt;br /&gt;
Smurf is a simple effective DoS attack involving forged ICMP packets sent to a broadcast &lt;br /&gt;
address. Attackers spoof the source address on ICMP echo requests and sending them to an IP &lt;br /&gt;
broadcast address. This causes every machine on the broadcast network to receive the reply &lt;br /&gt;
and respond back to the source address that was forged by the attacker. This attack results &lt;br /&gt;
in DoS due to high network traffic which not only hurts the victim but the broadcast &lt;br /&gt;
network also.&lt;br /&gt;
There is a similar tool called Fraggle which uses UDP packets instead.&lt;br /&gt;
===SYN Flood===&lt;br /&gt;
With a series of SYN packets, the attacker can drain the victim resources which leads to &lt;br /&gt;
rejecting legitimate requests.&lt;br /&gt;
System A sends a SYN packet to system B asking to establish a connection via three-way &lt;br /&gt;
handshake. However the source address of the packet is spoofed thus misleads system B to &lt;br /&gt;
switch to SYN_RECV state and send an SYN/ACK packet to the spoofed address. These &lt;br /&gt;
connections are called half-open connections. The source address does not exist and system &lt;br /&gt;
B can only flush the potential connection once the connection-establishment timer expires. &lt;br /&gt;
This timer varies from system to system ranging from seconds to minutes. This type of &lt;br /&gt;
attack is very dangerous because with little resources (e.g. bandwidth), the attacker can &lt;br /&gt;
take down an industrial strength web server. Moreover, this is a stealth attack since &lt;br /&gt;
everything (e.g. the packet) look so normal. Today, SYN flood is the primary capacity &lt;br /&gt;
depletion mechanism for denial of service attacks.&lt;br /&gt;
===Targa===&lt;br /&gt;
Targa, written by a German hacker known as Mixter, is a free software packet available on the Internet. It can run 8 different DoS attacks using some of the tools listed above. The attacker can try individual attack or try all attacks until it is successful. The attacker must be logged in with root permissions; since most of the attacks, use IP spoofing that requires root privileges. The attack can be done from any machine on which the targa.c code compiles. Target platforms can be any operating system but the attacks do not have an impact on all operating systems.&lt;br /&gt;
&lt;br /&gt;
The attacks that can be done with the Targa kit:&lt;br /&gt;
&lt;br /&gt;
* Jolt by Jeff W. Roberson&lt;br /&gt;
* Land by m3lt&lt;br /&gt;
* Winnuke by _eci&lt;br /&gt;
* Nestea by humble and ttol&lt;br /&gt;
* Syndrop by PineKoan&lt;br /&gt;
* Teardrop by route|daemon9&lt;br /&gt;
* Bonk by route|daemon9 and klepto&lt;br /&gt;
* NewTear by route|daemon9 (a variation of Teardrop)&lt;br /&gt;
&lt;br /&gt;
For further information about these tools, please refer to the references below.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
You could do the following things to minimize the DoS attack:&lt;br /&gt;
&lt;br /&gt;
* Effective robust design&lt;br /&gt;
* Bandwidth limitations&lt;br /&gt;
* Keep systems patched&lt;br /&gt;
* Run the least amount of services&lt;br /&gt;
* Allow only necessary traffic&lt;br /&gt;
* Block IP addresses&lt;br /&gt;
&lt;br /&gt;
Due to the power of DoS attacks and the way they work, there is nothing that can be done to prevent a Dos attack entirely.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
DoS attacks can happen to anyone with devastating damage. A good network design will help mitigating DoS attacks. It is essential to have filtering capability based on packet header and content within the network or at the critical gateways in order to filter malicious traffic as a response to such attacks while waiting for a permanent solution. It is important to have the relevant referrals in the policy and legislation to address the issue of DoS and DDoS to ensure an effective cooperation between service providers and law enforcement agencies.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* Stuart McClure, Joel Scambray and George Kurtz, Hacking Exposed—Network Security Secrets &amp;amp; Solutions, Fifth Edition,McGraw-Hill/Osborne, ISBN:9780072260816&lt;br /&gt;
* International Council of Electronic Commerce Consultants, Ethical Hacking and Countermeasures [EC-Council Exam 312-50]—Student Courseware,ISBN No 0972936211&lt;br /&gt;
* Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher, Internet Denial of Service: Attack and Defense Mechanisms, Prentice Hall PTR, Print ISBN: 0-13-147573-8&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [[Digital Enhanced Cordless Telecommunications (DECT)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Internet Control Message Protocol (ICMP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Denial Of Service Attacks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cryptography in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Hypertext Transfer Protocol over Secure Socket Layer (HTTPS)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bluetooth]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cell BE Hardware Employed as Network on a Chip]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[IPv6]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Dynamic Host Configuration Protocol (DHCP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Social Network Services ]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Latency]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Onion Routing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Radio Frequency Identification]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[3G Communications]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security in Smartphones]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Credit Card Chip Security and Technology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Address Resolution Protocol (ARP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[How to Connect to the Internet via an ISP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[CAPTCHAs]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security for Small Home Networks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Rootkits]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Proxy Servers]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Firewalls]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Malware]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Peer-to-Peer File Sharing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[High-Speed Downlink Packet Access (HSDPA)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Attached Storage (NAS) Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[RSA Encryption Algorithm]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Corporate Security and IT Policies]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethical Hacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Extensible Messaging and Presence Protocol (XMPP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cloud Computing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethernet Routing Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Personal Data Protection and Privacy]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Public Key Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[AJAX Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Topology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[IP Spoofing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[WLAN Standard 802.11n]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Domain Name System (DNS)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Web 2.0]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Local Area Networks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Botnets]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Trivial FTP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Load Balancing for Network Servers]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Simple Mail Transfer Protocol (SMTP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Email Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Data Encryption for Storage Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Statistical Analysis of Internet Security Threats]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Voice over IP (VoIP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Deep Packet Inspection]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Fingerprint Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Multicasting]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[MD5 Rainbow Tables]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The Interplanetary Internet]]&amp;lt;BR&amp;gt;&lt;br /&gt;
==External links==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service Attacks]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Network_security Network security]&amp;lt;br&amp;gt;&lt;br /&gt;
[[User:Luongqt|Luongqt]]&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks</id>
		<title>Tools for conducting denial-of-service attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks"/>
				<updated>2009-04-09T00:05:11Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In the world of computer network security, denial-of-service attack is a sneaky and furious monster. It is calm and quite. But when it attacks you, your system will be defeated within minutes (sometimes seconds). What is it? Where does it come from? What can it do? How can you conduct it? Conduct with what? Software or hardware?&lt;br /&gt;
&lt;br /&gt;
Nowadays there are tools available on the Internet that allow any average user to conduct a denial-of-service attack to any vulnerable servers. They are created by black hat hackers for different reasons varying from personal, political reasons to nastiness. Damages from a DoS attack are usually devastating to businesses such as search engines, email providers, banks, e-commerce sites that rely heavily on availability.&lt;br /&gt;
&lt;br /&gt;
On the other hand, although details of denial-of-service attacks are well-known and studied, it is quite difficult to protect any systems from it due to the very nature of the attacks. Scanning tools and other intrusion detection systems can be used to detect attacks or find vulnerable spots which can lead to an DoS attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Definition==&lt;br /&gt;
[[Image:Dosgeek.jpg|thumb|right|400px|DoS in comic]]&lt;br /&gt;
Denial-of-service (DoS) attack is an attempt to violate the availability condition of &lt;br /&gt;
network security. Its sole purpose is to shut a computer system down or drain all its &lt;br /&gt;
available resources, which prevents it to serve legitimate users. As computer becomes more &lt;br /&gt;
and more popular, DoS attack evolves to Distributed DoS (DDoS) attack which amplifies the &lt;br /&gt;
damage from thousand to million times.&lt;br /&gt;
The most common technique for conducting DoS attacks is to &amp;quot;flood&amp;quot; the target with &lt;br /&gt;
information/data. Others aim for the victim's Achilles' heel that cause it to crash.&lt;br /&gt;
===Fact===&lt;br /&gt;
On February 6th, 2000, Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. &lt;br /&gt;
(BUYX) was hit the next day, hours after going public. By that evening, eBay (EBAY), &lt;br /&gt;
Amazon.com (AMZN), and CNN (TWX) had gone dark. And in the morning, the mayhem continued &lt;br /&gt;
with online broker E*Trade (EGRP) and others having traffic to their sites virtually choked &lt;br /&gt;
off. As a result, Yahoo, which relies on advertising for much of its revenue, lost potentially an estimated $500,000 because its users were unable to access Yahoo's Web pages and the advertisements they carried. (Business Week Online, 12 February 2000)&lt;br /&gt;
&lt;br /&gt;
The FBI's Web site was taken out of service for three hours on 18 February, 2000 by a DDoS attack. (CNN)&lt;br /&gt;
&lt;br /&gt;
In October 2002, an attacker tried to performed a DDoS attack on the complete set of DNS root servers which have 13 servers of replicated DNS data in total. By a simple form of DDoS attack, he successfully took down 9 of them. The other 4 remained fully functional. The attack lasted only one hour. A longer and stronger attack might have been extremely harmful.&lt;br /&gt;
&lt;br /&gt;
During the Iraq War in 2003, a DDoS attack was launched on the Qatar-based Al-Jazeera news organization, which broadcast pictures of captured American soldiers. Al-Jazeera attempted to out-provision the attackers by purchasing more bandwidth, but they merely ratcheted up the attack. The Web site was largely unreachable for two days, following which someone hijacked their DNS name, redirecting requests to another Web site that promoted the American cause.&lt;br /&gt;
==Types of attack==&lt;br /&gt;
There are basically three types of DoS attack:&lt;br /&gt;
# Bandwidth attacks: straight forward, comsume resources.&lt;br /&gt;
# Protocol attacks: take advantage of expected behavior of protocols such as TCP, UDP and ICMP.&lt;br /&gt;
# Software vulnerability attacks: exploit vulnerabilities in network software, such as a web server, or the underlying TCP/IP stack.&lt;br /&gt;
There are many tools for each type such as:&lt;br /&gt;
* Sending oversized packets (protocol)&lt;br /&gt;
* fragmentation overlap (protocol)&lt;br /&gt;
* loopback floods (protocol)&lt;br /&gt;
* Application DoS (software)&lt;br /&gt;
* UDP floods (protocol)&lt;br /&gt;
* SYN floods (bandwidth)&lt;br /&gt;
==Tools for conducting DoS attacks==&lt;br /&gt;
===SSPing===&lt;br /&gt;
[[Image:SmurfAttack.gif|thumb|right|300px|Smurf]]&lt;br /&gt;
[[Image:SYN_flood.jpg|thumb|right|300px|SYN Flood]]&lt;br /&gt;
SSPing, a DoS tool, is a program sends the victim's computer a series of highly fragmented, &lt;br /&gt;
over-sized ICMP data packets. While trying to put the fragments together, the computer can &lt;br /&gt;
get into a memory overflow which causes the machine to freeze. With a few packets, the &lt;br /&gt;
attacker can lock the victim's computer instantaneously. The identity of the attacker is &lt;br /&gt;
unknown since the connection is lost as the victim restarts the computer. SSPing affects &lt;br /&gt;
Windows 95/NT and Mac OS.&lt;br /&gt;
Jolt is a program known for this kind of attack. It will freeze unpatched Windows 95, NT &lt;br /&gt;
machines by sending a series of spoofed &amp;amp; highly fragmented ICMP packets to the target, &lt;br /&gt;
which then tries to reassemble the received fragments.&lt;br /&gt;
===Land Exploit===&lt;br /&gt;
Land Exploit is a DoS attack in which a program sends a TCP SYN packet where the target and &lt;br /&gt;
source addresses are the same and port numbers are the same. Receiving such packet causes &lt;br /&gt;
some TCP implementations to crash the target system or exhaust all CPU resources. The name &lt;br /&gt;
of the attack comes from the first distributed source code (called &amp;quot;exploit&amp;quot;) that made it &lt;br /&gt;
possible to implement this attack: land.c. Computers running Windows 95 and NT are desired targets of this kind of attack.&lt;br /&gt;
===Smurf===&lt;br /&gt;
Smurf is a simple effective DoS attack involving forged ICMP packets sent to a broadcast &lt;br /&gt;
address. Attackers spoof the source address on ICMP echo requests and sending them to an IP &lt;br /&gt;
broadcast address. This causes every machine on the broadcast network to receive the reply &lt;br /&gt;
and respond back to the source address that was forged by the attacker. This attack results &lt;br /&gt;
in DoS due to high network traffic which not only hurts the victim but the broadcast &lt;br /&gt;
network also.&lt;br /&gt;
There is a similar tool called Fraggle which uses UDP packets instead.&lt;br /&gt;
===SYN Flood===&lt;br /&gt;
With a series of SYN packets, the attacker can drain the victim resources which leads to &lt;br /&gt;
rejecting legitimate requests.&lt;br /&gt;
System A sends a SYN packet to system B asking to establish a connection via three-way &lt;br /&gt;
handshake. However the source address of the packet is spoofed thus misleads system B to &lt;br /&gt;
switch to SYN_RECV state and send an SYN/ACK packet to the spoofed address. These &lt;br /&gt;
connections are called half-open connections. The source address does not exist and system &lt;br /&gt;
B can only flush the potential connection once the connection-establishment timer expires. &lt;br /&gt;
This timer varies from system to system ranging from seconds to minutes. This type of &lt;br /&gt;
attack is very dangerous because with little resources (e.g. bandwidth), the attacker can &lt;br /&gt;
take down an industrial strength web server. Moreover, this is a stealth attack since &lt;br /&gt;
everything (e.g. the packet) look so normal. Today, SYN flood is the primary capacity &lt;br /&gt;
depletion mechanism for denial of service attacks.&lt;br /&gt;
===Targa===&lt;br /&gt;
Targa, written by a German hacker known as Mixter, is a free software packet available on the Internet. It can run 8 different DoS attacks using some of the tools listed above. The attacker can try individual attack or try all attacks until it is successful. The attacker must be logged in with root permissions; since most of the attacks, use IP spoofing that requires root privileges. The attack can be done from any machine on which the targa.c code compiles. Target platforms can be any operating system but the attacks do not have an impact on all operating systems.&lt;br /&gt;
&lt;br /&gt;
The attacks that can be done with the Targa kit:&lt;br /&gt;
&lt;br /&gt;
* Jolt by Jeff W. Roberson&lt;br /&gt;
* Land by m3lt&lt;br /&gt;
* Winnuke by _eci&lt;br /&gt;
* Nestea by humble and ttol&lt;br /&gt;
* Syndrop by PineKoan&lt;br /&gt;
* Teardrop by route|daemon9&lt;br /&gt;
* Bonk by route|daemon9 and klepto&lt;br /&gt;
* NewTear by route|daemon9 (a variation of Teardrop)&lt;br /&gt;
&lt;br /&gt;
For further information about these tools, please refer to the references below.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
You could do the following things to minimize the DoS attack:&lt;br /&gt;
&lt;br /&gt;
* Effective robust design&lt;br /&gt;
* Bandwidth limitations&lt;br /&gt;
* Keep systems patched&lt;br /&gt;
* Run the least amount of services&lt;br /&gt;
* Allow only necessary traffic&lt;br /&gt;
* Block IP addresses&lt;br /&gt;
&lt;br /&gt;
Due to the power of DoS attacks and the way they work, there is nothing that can be done to prevent a Dos attack entirely.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
DoS attacks can happen to anyone with devastating damage. A good network design will help mitigating DoS attacks. It is essential to have filtering capability based on packet header and content within the network or at the critical gateways in order to filter malicious traffic as a response to such attacks while waiting for a permanent solution. It is important to have the relevant referrals in the policy and legislation to address the issue of DoS and DDoS to ensure an effective cooperation between service providers and law enforcement agencies.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* Stuart McClure, Joel Scambray and George Kurtz, Hacking Exposed—Network Security Secrets &amp;amp; Solutions, Fifth Edition,McGraw-Hill/Osborne, ISBN:9780072260816&lt;br /&gt;
* International Council of Electronic Commerce Consultants, Ethical Hacking and Countermeasures [EC-Council Exam 312-50]—Student Courseware,ISBN No 0972936211&lt;br /&gt;
* Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher, Internet Denial of Service: Attack and Defense Mechanisms, Prentice Hall PTR, Print ISBN: 0-13-147573-8&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service Attacks]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Network_security Network security]&lt;br /&gt;
[[User:Luongqt|Luongqt]]&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Dosgeek.jpg</id>
		<title>File:Dosgeek.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Dosgeek.jpg"/>
				<updated>2009-04-08T20:22:30Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;Comic for DoS&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Comic for DoS&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks</id>
		<title>Tools for conducting denial-of-service attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks"/>
				<updated>2009-04-08T20:19:42Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In the world of computer network security, denial-of-service attack is a sneaky and furious monster. It is calm and quite. But when it attacks you, your system will be defeated within minutes (sometimes seconds). What is it? Where does it come from? What can it do? How can you conduct it? Conduct with what? Software or hardware?&lt;br /&gt;
&lt;br /&gt;
Nowadays there are tools available on the Internet that allow any average user to conduct a denial-of-service attack to any vulnerable servers. They are created by black hat hackers for different reasons varying from personal, political reasons to nastiness. Damages from a DoS attack are usually devastating to businesses such as search engines, email providers, banks, e-commerce sites that rely heavily on availability.&lt;br /&gt;
&lt;br /&gt;
On the other hand, although details of denial-of-service attacks are well-known and studied, it is quite difficult to protect any systems from it due to the very nature of the attacks. Scanning tools and other intrusion detection systems can be used to detect attacks or find vulnerable spots which can lead to an DoS attack.&lt;br /&gt;
==Definition==&lt;br /&gt;
Denial-of-service (DoS) attack is an attempt to violate the availability condition of network security. Its sole purpose is to shut a computer system down or drain all its available resources, which prevents it to serve legitimate users.&lt;br /&gt;
&lt;br /&gt;
As computer becomes more and more popular, DoS attack evolves to Distributed DoS (DDoS) attack which amplifies the damage from thousand to million times.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Fact===&lt;br /&gt;
On February 6th, 2000, Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day, hours after going public. By that evening, eBay (EBAY), Amazon.com (AMZN), and CNN (TWX) had gone dark. And in the morning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtually choked off. (Business Week Online, 12 February 2000) &lt;br /&gt;
&lt;br /&gt;
==Types of attack==&lt;br /&gt;
There are many ways to conduct a DoS attack. Some of them are&lt;br /&gt;
* Sending oversized packets&lt;br /&gt;
* fragmentation overlap&lt;br /&gt;
* loopback floods&lt;br /&gt;
* Application DoS&lt;br /&gt;
* UDP floods&lt;br /&gt;
* SYN floods&lt;br /&gt;
==Tools for conducting DoS attacks==&lt;br /&gt;
&lt;br /&gt;
===SSPing===&lt;br /&gt;
[[Image:SmurfAttack.gif|thumb|right|100px|Smurf]]&lt;br /&gt;
[[Image:SYN_flood.jpg|thumb|right|100px|SYN Flood]]&lt;br /&gt;
SSPing, a DoS tool, is a program sends the victim's computer a series of highly fragmented, oversized ICMP data packets. While trying to put the fragments together, the computer can get into a memory overflow which causes the machine to freeze. SSPing affects Windows 95/NT and Mac OS.&lt;br /&gt;
&lt;br /&gt;
Jolt is a program known for this kind of attack. It will freeze un-patched Windows 95, NT machines by sending a series of spoofed &amp;amp; highly fragmented ICMP packets to the target, which then tries to reassemble the received fragments.&lt;br /&gt;
===Land Exploit===&lt;br /&gt;
Land Exploit is a DoS attack in which a program sends a TCP SYN packet where the target and source addresses are the same and port numbers are the same.&lt;br /&gt;
This trick works for Windows 95 and Windows NT. The computer which is running one of these operating systems will operate slowly and sometimes hang.&lt;br /&gt;
===Smurf===&lt;br /&gt;
Smurf is a simple effective DoS attack involving forged ICMP packets sent to a broadcast address. Attackers spoof the source address on ICMP echo requests and sending them to an IP broadcast address. This causes every machine on the broadcast network to receive the reply and respond back to the source address that was forged by the attacker. This attack results in DoS due to high network traffic which not only hurts the victim but the broadcase network also.&lt;br /&gt;
There is a similar tool called Fraggle which uses UDP packets instead.&lt;br /&gt;
===SYN Flood===&lt;br /&gt;
With a series of SYN packets, the attacker can drain the victim resources which leads to rejecting legitimate requests.&lt;br /&gt;
System A sends a SYN packet to system B asking to establish a connection via three-way handshake. However the source address of the packet is spoofed thus misleads system B to switch to SYN_RECV state and send an SYN/ACK packet to the spoofed address. These connections are called half-open connections. The source address does not exist and system B can only flush the potential connection once the connection-establishment timer expires. This timer varies from system to system ranging from seconds to minutes. This type of attack is very dangerous because with little resources (e.g. bandwidth), the attacker can take down an industrial strength web server. Moreover, this is a stealth attack since everything (e.g. the packet) look so normal. Today, SYN flood is the primary capacity depletion mechanism for denial of service attacks.&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
&lt;br /&gt;
[[User:Luongqt|Luongqt]]&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:SYN_flood.jpg</id>
		<title>File:SYN flood.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:SYN_flood.jpg"/>
				<updated>2009-04-08T20:12:43Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks</id>
		<title>Tools for conducting denial-of-service attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Tools_for_conducting_denial-of-service_attacks"/>
				<updated>2009-04-08T20:07:25Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;New page: In the world of computer network security, denial-of-service attack is a sneaky and furious monster. It is calm and quite. But when it attacks you, your system will be defeated within minu...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In the world of computer network security, denial-of-service attack is a sneaky and furious monster. It is calm and quite. But when it attacks you, your system will be defeated within minutes (sometimes seconds). What is it? Where does it come from? What can it do? How can you conduct it? Conduct with what? Software or hardware?&lt;br /&gt;
&lt;br /&gt;
Nowadays there are tools available on the Internet that allow any average user to conduct a denial-of-service attack to any vulnerable servers. They are created by black hat hackers for different reasons varying from personal, political reasons to nastiness. Damages from a DoS attack are usually devastating to businesses such as search engines, email providers, banks, e-commerce sites that rely heavily on availability.&lt;br /&gt;
&lt;br /&gt;
On the other hand, although details of denial-of-service attacks are well-known and studied, it is quite difficult to protect any systems from it due to the very nature of the attacks. Scanning tools and other intrusion detection systems can be used to detect attacks or find vulnerable spots which can lead to an DoS attack.&lt;br /&gt;
==Definition==&lt;br /&gt;
Denial-of-service (DoS) attack is an attempt to violate the availability condition of network security. Its sole purpose is to shut a computer system down or drain all its available resources, which prevents it to serve legitimate users.&lt;br /&gt;
&lt;br /&gt;
As computer becomes more and more popular, DoS attack evolves to Distributed DoS (DDoS) attack which amplifies the damage from thousand to million times.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Fact===&lt;br /&gt;
On February 6th, 2000, Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day, hours after going public. By that evening, eBay (EBAY), Amazon.com (AMZN), and CNN (TWX) had gone dark. And in the morning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtually choked off. (Business Week Online, 12 February 2000) &lt;br /&gt;
&lt;br /&gt;
==Types of attack==&lt;br /&gt;
There are many ways to conduct a DoS attack. Some of them are&lt;br /&gt;
* Sending oversized packets&lt;br /&gt;
* fragmentation overlap&lt;br /&gt;
* loopback floods&lt;br /&gt;
* Application DoS&lt;br /&gt;
* UDP floods&lt;br /&gt;
* SYN floods&lt;br /&gt;
==Tools for conducting DoS attacks==&lt;br /&gt;
===SSPing===&lt;br /&gt;
SSPing, a DoS tool, is a program sends the victim's computer a series of highly fragmented, oversized ICMP data packets. While trying to put the fragments together, the computer can get into a memory overflow which causes the machine to freeze. SSPing affects Windows 95/NT and Mac OS.&lt;br /&gt;
&lt;br /&gt;
Jolt is a program known for this kind of attack. It will freeze un-patched Windows 95, NT machines by sending a series of spoofed &amp;amp; highly fragmented ICMP packets to the target, which then tries to reassemble the received fragments.&lt;br /&gt;
===Land Exploit===&lt;br /&gt;
Land Exploit is a DoS attack in which a program sends a TCP SYN packet where the target and source addresses are the same and port numbers are the same.&lt;br /&gt;
This trick works for Windows 95 and Windows NT. The computer which is running one of these operating systems will operate slowly and sometimes hang.&lt;br /&gt;
===Smurf===&lt;br /&gt;
[[Image:SmurfAttack.gif]]&lt;br /&gt;
&lt;br /&gt;
Smurf is a simple effective DoS attack involving forged ICMP packets sent to a broadcast address. Attackers spoof the source address on ICMP echo requests and sending them to an IP broadcast address. This causes every machine on the broadcast network to receive the reply and respond back to the source address that was forged by the attacker. This attack results in DoS due to high network traffic which not only hurts the victim but the broadcase network also.&lt;br /&gt;
There is a similar tool called Fraggle which uses UDP packets instead.&lt;br /&gt;
===SYN Flood===&lt;br /&gt;
With a series of SYN packets, the attacker can drain the victim resources which leads to rejecting legitimate requests.&lt;br /&gt;
System A sends a SYN packet to system B asking to establish a connection via three-way handshake. However the source address of the packet is spoofed thus misleads system B to switch to SYN_RECV state and send an SYN/ACK packet to the spoofed address. These connections are called half-open connections. The source address does not exist and system B can only flush the potential connection once the connection-establishment timer expires. This timer varies from system to system ranging from seconds to minutes. This type of attack is very dangerous because with little resources (e.g. bandwidth), the attacker can take down an industrial strength web server. Moreover, this is a stealth attack since everything (e.g. the packet) look so normal. Today, SYN flood is the primary capacity depletion mechanism for denial of service attacks.&lt;br /&gt;
&lt;br /&gt;
[[User:Luongqt|Luongqt]]&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:SmurfAttack.gif</id>
		<title>File:SmurfAttack.gif</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:SmurfAttack.gif"/>
				<updated>2009-04-08T20:06:32Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;Smurf Attack in DoS&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smurf Attack in DoS&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-12-10T04:15:02Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Computer security is an important factor in our information world with Internet and digitally owned materials. Over the past twenty years, network security has evolved continuously. More secure implementations are invented to replace old less secure implementations. Kevin Mitnick was able to hack into Tsutomu Shimomura's X-Terminal computer due to early implementation of [http://en.wikipedia.org/wiki/Transmission_Control_Protocol TCP] connection, which was not really secure at that time. With a huge desire of curiosity, Mitnick did something that no one has ever done before him. He exploited the trusted relationship between two computers by performing man-in-the-middle attack under a spoofed identity. His attack made him the most famous [http://en.wikipedia.org/wiki/Hacker hacker] in [http://en.wikipedia.org/wiki/United_States United States of America].&lt;br /&gt;
[[Image:Kevin mitnick FBI.gif|thumb|right|250px|Mitnick on FBI wanted list]]&lt;br /&gt;
== Who is Mitnick? ==&lt;br /&gt;
[[Image:kevinmitnick.jpg|thumb|right|170px|Kevin Mitnick]]&lt;br /&gt;
[[Image:Shimomura.jpg|thumb|right|170px|Tsutomu Shimomura]]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in United States of America. He is an expert in [[social engineering]], which helped him to obtain many classified information used for his hacking hobby. In his early age, he was on the [http://en.wikipedia.org/wiki/Fbi FBI] most wanted cyber criminal list. He was captured by the FBI with the aid of [http://en.wikipedia.org/wiki/Tsutomu Tsutomu] and sentenced 5 years in prison. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
&lt;br /&gt;
==Three-way handshake==&lt;br /&gt;
If there is a trusted relationship between two computers (e.g. server and client), a connection can be established by a [http://www.pccitizen.com/threewayhandshake.htm three-way handshake]. In the Mitnick attack, the three-way handshake used TCP sequence number and IP address as proof for identity and signature. Three-way handshake has three steps:&lt;br /&gt;
====Step 1: SYN request====&lt;br /&gt;
Computer A sends a SYN request under its IP address with a random TCP sequence number xA to computer B.&lt;br /&gt;
====Step 2: SYN/ACK response====&lt;br /&gt;
Computer B sends an ACK response with number (xA+1) and its own random TCP sequence number xB back to computer A.&lt;br /&gt;
====Step 3: ACK or RESET response====&lt;br /&gt;
If computer A wants to establish the connection, it sends an ACK response with number (xB+1) back to computer B. Otherwise, it sends a RESET response to drop the connection request.&lt;br /&gt;
==The attack==&lt;br /&gt;
[[Image:Mitnickattack.JPG|thumb|right|500px|The Mitnick attack]]&lt;br /&gt;
The Mitnick attack has five general steps:&lt;br /&gt;
====Step 1: Information gathering====&lt;br /&gt;
Before the attack, Mitnick was able to determine the TCP sequence number generator’s behavior of X-Terminal and a trusted relationship between X-Terminal and Server.&lt;br /&gt;
======Determine the TCP sequence number generator’s behavior======&lt;br /&gt;
Mitnick sent SYN request to X-Terminal and received SYN/ACK response. Then he sent RESET response to keep the X-Terminal from being filled up. He repeated this for twenty times. He found there is a pattern between two successive TCP sequence numbers. It turned out that the numbers were not random at all. The latter number was greater than the previous one by 128000.&lt;br /&gt;
======Determine a trusted relationship between X-Terminal and Server======&lt;br /&gt;
Before the attack, Mitnick hacked into Shimomura’s website. He used command finger and showmount to find if X-Terminal had trusted relationship with any other computers.&lt;br /&gt;
====Step 2: The flood====&lt;br /&gt;
Mitnick kept the Server muted by filling the Server up with half-open SYN requests from spoofed IP address. To create half-open SYN requests, he used routable but not active IP address. Because he had no intention to complete three-way handshake with the Server, half-open SYN request occupied the Server’s memory faster. The result is that the Server could not respond to any other requests. This is a type of Denial of Service attack.&lt;br /&gt;
====Step 3: Trusted relationship hijacking====&lt;br /&gt;
Mitnick sent a SYN request to X-Terminal with spoofed IP address as the Server. He used an arbitrary number as the Server’s TCP sequence number. X-Terminal sent a SYN/ACK response to the Server. Because the Server was muted, it did not receive the SYN/ACK response. As mentioned in the information gathering step, Mitnick was able to generate the TCP sequence number that X-Terminal created for the Server. Mitnick, again spoofed his IP as the Server’s IP, sent an ACK response to X-Terminal to finish three-way handshake. Because the returned TCP sequence number was correct, X-Terminal allowed Mitnick connect to it. The connection was established. Shimomura’s computer was considered hacked by finishing this step.&lt;br /&gt;
====Step 4: Remote command pump====&lt;br /&gt;
Mitnick wanted to create a backdoor on Shimomura computer so that he could come back later without repeating the hijack. He pumped commands from his computer to Shimomura’s computer. To be precise, they were &amp;quot;echo + + &amp;gt;&amp;gt; /.rhosts&amp;quot;. The ++ allowed any computers connect to X-Terminal without being verified.&lt;br /&gt;
====Step 5: Clean up====&lt;br /&gt;
Mitnick sent RESET responses to the Server to cancel all his SYN requests. The Server was freed.&lt;br /&gt;
== Detection ==&lt;br /&gt;
There are no specific mechanisms to detect the Mitnick attack directly. However, a security analyst can combine several mechanisms to detect the attack indirectly. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
== Prevention==&lt;br /&gt;
Nowadays, Mitnick attack is no longer practical because the security in networking field is way improved than before. However, preventing Mitnick attack is the least requirement a system must satisfy to be considered secure. It worths to mention that in the days of the attack, people (e.g. Tsutomu) used [http://en.wikipedia.org/wiki/Remote_shell remote shell (RSH)] instead of [http://en.wikipedia.org/wiki/Secure_Shell secure shell (SSH)] like today.&lt;br /&gt;
==Comments==&lt;br /&gt;
The Mitnick attack was a classic case. Mitnick took advantage of easy-to-be-known weaknesses. After his attack, computer security was taken more seriously. New tools was developed to improve security in networking over the Internet. SSH (secure shell) is used to replace RSH (remote shell) which allowed data transfered insecurely.&lt;br /&gt;
== References ==&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Transport_Control_Protocol Transport control protocol]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Ip_spoofing IP address spoofing]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/OSI_model Open Systems Interconnection Basic Reference Model (OSI Model)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Tsutomu Tsutomu Shimomura (the victim of the attack)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick (the attacker)]&amp;lt;BR&amp;gt;&lt;br /&gt;
Amazon.com: [http://www.amazon.com/Network-Intrusion-Detection-Analysts-Handbook/dp/0735708681 '''Network intrusion detection, an analyst's handbook''' by ''Stephen Northcutt'']&lt;br /&gt;
==See also==&lt;br /&gt;
Information Security Topics:&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Random Number Generators and Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometric systems regarding security design principle]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Phishing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometrics in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Smart Card technology to prevent fraud]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Anti-spam Systems and Techniques]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Payment Card Industry Data Security Standard]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Autocomplete]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Information security awareness]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
- [http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://hack.pl/gfx/wywiady/Kevin_Mitnick.jpg Kevin Mitnick picture]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
QUANG LUONG&lt;br /&gt;
Revised date: Dec 9 2007&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-12-10T04:06:57Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Computer security is an important factor in our information world with Internet and digitally owned materials. Over the past twenty years, network security has evolved continuously. More secure implementations are invented to replace old less secure implementations. Kevin Mitnick was able to hack into Tsutomu Shimomura's X-Terminal computer due to early implementation of TCP connection, which was not really secure at that time. With a huge desire of curiosity, Mitnick did something that no one has ever done before him. He exploited the trusted relationship between two computers by performing man-in-the-middle attack under a spoofed identity. His attack made him the most famous hacker in United States of America.&lt;br /&gt;
[[Image:Kevin mitnick FBI.gif|thumb|right|250px|Mitnick on FBI wanted list]]&lt;br /&gt;
== Who is Mitnick? ==&lt;br /&gt;
[[Image:kevinmitnick.jpg|thumb|right|170px|Kevin Mitnick]]&lt;br /&gt;
[[Image:Shimomura.jpg|thumb|right|170px|Tsutomu Shimomura]]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in United States of America. He is an expert in [[social engineering]], which helped him to obtain many classified information used for his hacking hobby. In his early age, he was on the FBI most wanted cyber criminal list. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prison. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
&lt;br /&gt;
==Three-way handshake==&lt;br /&gt;
If there is a trusted relationship between two computers (e.g. server and client), a connection can be established by a [http://www.pccitizen.com/threewayhandshake.htm three-way handshake]. In the Mitnick attack, the three-way handshake used TCP sequence number and IP address as proof for identity and signature. Three-way handshake has three steps:&lt;br /&gt;
====Step 1: SYN request====&lt;br /&gt;
Computer A sends a SYN request under its IP address with a random TCP sequence number xA to computer B.&lt;br /&gt;
====Step 2: SYN/ACK response====&lt;br /&gt;
Computer B sends an ACK response with number (xA+1) and its own random TCP sequence number xB back to computer A.&lt;br /&gt;
====Step 3: ACK or RESET response====&lt;br /&gt;
If computer A wants to establish the connection, it sends an ACK response with number (xB+1) back to computer B. Otherwise, it sends a RESET response to drop the connection request.&lt;br /&gt;
==The attack==&lt;br /&gt;
[[Image:Mitnickattack.JPG|thumb|right|500px|The Mitnick attack]]&lt;br /&gt;
The Mitnick attack has five general steps:&lt;br /&gt;
====Step 1: Information gathering====&lt;br /&gt;
Before the attack, Mitnick was able to determine the TCP sequence number generator’s behavior of X-Terminal and a trusted relationship between X-Terminal and Server.&lt;br /&gt;
======Determine the TCP sequence number generator’s behavior======&lt;br /&gt;
Mitnick sent SYN request to X-Terminal and received SYN/ACK response. Then he sent RESET response to keep the X-Terminal from being filled up. He repeated this for twenty times. He found there is a pattern between two successive TCP sequence numbers. It turned out that the numbers were not random at all. The latter number was greater than the previous one by 128000.&lt;br /&gt;
======Determine a trusted relationship between X-Terminal and Server======&lt;br /&gt;
Before the attack, Mitnick hacked into Shimomura’s website. He used command finger and showmount to find if X-Terminal had trusted relationship with any other computers.&lt;br /&gt;
====Step 2: The flood====&lt;br /&gt;
Mitnick kept the Server muted by filling the Server up with half-open SYN requests from spoofed IP address. To create half-open SYN requests, he used routable but not active IP address. Because he had no intention to complete three-way handshake with the Server, half-open SYN request occupied the Server’s memory faster. The result is that the Server could not respond to any other requests. This is a type of Denial of Service attack.&lt;br /&gt;
====Step 3: Trusted relationship hijacking====&lt;br /&gt;
Mitnick sent a SYN request to X-Terminal with spoofed IP address as the Server. He used an arbitrary number as the Server’s TCP sequence number. X-Terminal sent a SYN/ACK response to the Server. Because the Server was muted, it did not receive the SYN/ACK response. As mentioned in the information gathering step, Mitnick was able to generate the TCP sequence number that X-Terminal created for the Server. Mitnick, again spoofed his IP as the Server’s IP, sent an ACK response to X-Terminal to finish three-way handshake. Because the returned TCP sequence number was correct, X-Terminal allowed Mitnick connect to it. The connection was established. Shimomura’s computer was considered hacked by finishing this step.&lt;br /&gt;
====Step 4: Remote command pump====&lt;br /&gt;
Mitnick wanted to create a backdoor on Shimomura computer so that he could come back later without repeating the hijack. He pumped commands from his computer to Shimomura’s computer. To be precise, they were &amp;quot;echo + + &amp;gt;&amp;gt; /.rhosts&amp;quot;. The ++ allowed any computers connect to X-Terminal without being verified.&lt;br /&gt;
====Step 5: Clean up====&lt;br /&gt;
Mitnick sent RESET responses to the Server to cancel all his SYN requests. The Server was freed.&lt;br /&gt;
== Detection ==&lt;br /&gt;
There are no specific mechanisms to detect the Mitnick attack directly. However, a security analyst can combine several mechanisms to detect the attack indirectly. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
== Prevention==&lt;br /&gt;
Nowadays, Mitnick attack is no longer practical because the security in networking field is way improved than before. However, preventing Mitnick attack is the least requirement a system must satisfy to be considered secure. It worths to mention that in the days of the attack, people (e.g. Tsutomu) used remote shell (RSH) instead of secure shell (SSH) like today.&lt;br /&gt;
==Comments==&lt;br /&gt;
The Mitnick attack was a classic case. Mitnick took advantage of easy-to-be-known weaknesses. After his attack, computer security was taken more seriously. New tools was developed to improve security in networking over the Internet. SSH (secure shell) is used to replace RSH (remote shell) which allowed data transfered insecurely.&lt;br /&gt;
== References ==&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Transport_Control_Protocol Transport control protocol]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Ip_spoofing IP address spoofing]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/OSI_model Open Systems Interconnection Basic Reference Model (OSI Model)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Tsutomu Tsutomu Shimomura (the victim of the attack)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick (the attacker)]&amp;lt;BR&amp;gt;&lt;br /&gt;
Amazon.com: [http://www.amazon.com/Network-Intrusion-Detection-Analysts-Handbook/dp/0735708681 '''Network intrusion detection, an analyst's handbook''' by ''Stephen Northcutt'']&lt;br /&gt;
==See also==&lt;br /&gt;
Information Security Topics:&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Random Number Generators and Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometric systems regarding security design principle]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Phishing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometrics in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Smart Card technology to prevent fraud]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Anti-spam Systems and Techniques]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Payment Card Industry Data Security Standard]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Autocomplete]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Information security awareness]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
- [http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://hack.pl/gfx/wywiady/Kevin_Mitnick.jpg Kevin Mitnick picture]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
QUANG LUONG&lt;br /&gt;
Revised date: Dec 9 2007&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-12-10T04:06:26Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;/* Who is Mitnick? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Computer security is an important factor in our information world with Internet and digitally owned materials. Over the past twenty years, network security has evolved continuously. More secure implementations are invented to replace old less secure implementations. Kevin Mitnick was able to hack into Tsutomu Shimomura's X-Terminal computer due to early implementation of TCP connection, which was not really secure at that time. With a huge desire of curiosity, Mitnick did something that no one has ever done before him. He exploited the trusted relationship between two computers by performing man-in-the-middle attack under a spoofed identity. His attack made him the most famous hacker in United States of America.&lt;br /&gt;
[[Image:Kevin mitnick FBI.gif|thumb|right|250px|Mitnick on FBI wanted list]]&lt;br /&gt;
== Who is Mitnick? ==&lt;br /&gt;
[[Image:kevinmitnick.jpg|thumb|right|150px|Kevin Mitnick]]&lt;br /&gt;
[[Image:Shimomura.jpg|thumb|right|150px|Kevin Mitnick]]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in United States of America. He is an expert in [[social engineering]], which helped him to obtain many classified information used for his hacking hobby. In his early age, he was on the FBI most wanted cyber criminal list. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prison. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
&lt;br /&gt;
==Three-way handshake==&lt;br /&gt;
If there is a trusted relationship between two computers (e.g. server and client), a connection can be established by a [http://www.pccitizen.com/threewayhandshake.htm three-way handshake]. In the Mitnick attack, the three-way handshake used TCP sequence number and IP address as proof for identity and signature. Three-way handshake has three steps:&lt;br /&gt;
====Step 1: SYN request====&lt;br /&gt;
Computer A sends a SYN request under its IP address with a random TCP sequence number xA to computer B.&lt;br /&gt;
====Step 2: SYN/ACK response====&lt;br /&gt;
Computer B sends an ACK response with number (xA+1) and its own random TCP sequence number xB back to computer A.&lt;br /&gt;
====Step 3: ACK or RESET response====&lt;br /&gt;
If computer A wants to establish the connection, it sends an ACK response with number (xB+1) back to computer B. Otherwise, it sends a RESET response to drop the connection request.&lt;br /&gt;
==The attack==&lt;br /&gt;
[[Image:Mitnickattack.JPG|thumb|right|500px|The Mitnick attack]]&lt;br /&gt;
The Mitnick attack has five general steps:&lt;br /&gt;
====Step 1: Information gathering====&lt;br /&gt;
Before the attack, Mitnick was able to determine the TCP sequence number generator’s behavior of X-Terminal and a trusted relationship between X-Terminal and Server.&lt;br /&gt;
======Determine the TCP sequence number generator’s behavior======&lt;br /&gt;
Mitnick sent SYN request to X-Terminal and received SYN/ACK response. Then he sent RESET response to keep the X-Terminal from being filled up. He repeated this for twenty times. He found there is a pattern between two successive TCP sequence numbers. It turned out that the numbers were not random at all. The latter number was greater than the previous one by 128000.&lt;br /&gt;
======Determine a trusted relationship between X-Terminal and Server======&lt;br /&gt;
Before the attack, Mitnick hacked into Shimomura’s website. He used command finger and showmount to find if X-Terminal had trusted relationship with any other computers.&lt;br /&gt;
====Step 2: The flood====&lt;br /&gt;
Mitnick kept the Server muted by filling the Server up with half-open SYN requests from spoofed IP address. To create half-open SYN requests, he used routable but not active IP address. Because he had no intention to complete three-way handshake with the Server, half-open SYN request occupied the Server’s memory faster. The result is that the Server could not respond to any other requests. This is a type of Denial of Service attack.&lt;br /&gt;
====Step 3: Trusted relationship hijacking====&lt;br /&gt;
Mitnick sent a SYN request to X-Terminal with spoofed IP address as the Server. He used an arbitrary number as the Server’s TCP sequence number. X-Terminal sent a SYN/ACK response to the Server. Because the Server was muted, it did not receive the SYN/ACK response. As mentioned in the information gathering step, Mitnick was able to generate the TCP sequence number that X-Terminal created for the Server. Mitnick, again spoofed his IP as the Server’s IP, sent an ACK response to X-Terminal to finish three-way handshake. Because the returned TCP sequence number was correct, X-Terminal allowed Mitnick connect to it. The connection was established. Shimomura’s computer was considered hacked by finishing this step.&lt;br /&gt;
====Step 4: Remote command pump====&lt;br /&gt;
Mitnick wanted to create a backdoor on Shimomura computer so that he could come back later without repeating the hijack. He pumped commands from his computer to Shimomura’s computer. To be precise, they were &amp;quot;echo + + &amp;gt;&amp;gt; /.rhosts&amp;quot;. The ++ allowed any computers connect to X-Terminal without being verified.&lt;br /&gt;
====Step 5: Clean up====&lt;br /&gt;
Mitnick sent RESET responses to the Server to cancel all his SYN requests. The Server was freed.&lt;br /&gt;
== Detection ==&lt;br /&gt;
There are no specific mechanisms to detect the Mitnick attack directly. However, a security analyst can combine several mechanisms to detect the attack indirectly. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
== Prevention==&lt;br /&gt;
Nowadays, Mitnick attack is no longer practical because the security in networking field is way improved than before. However, preventing Mitnick attack is the least requirement a system must satisfy to be considered secure. It worths to mention that in the days of the attack, people (e.g. Tsutomu) used remote shell (RSH) instead of secure shell (SSH) like today.&lt;br /&gt;
==Comments==&lt;br /&gt;
The Mitnick attack was a classic case. Mitnick took advantage of easy-to-be-known weaknesses. After his attack, computer security was taken more seriously. New tools was developed to improve security in networking over the Internet. SSH (secure shell) is used to replace RSH (remote shell) which allowed data transfered insecurely.&lt;br /&gt;
== References ==&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Transport_Control_Protocol Transport control protocol]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Ip_spoofing IP address spoofing]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/OSI_model Open Systems Interconnection Basic Reference Model (OSI Model)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Tsutomu Tsutomu Shimomura (the victim of the attack)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick (the attacker)]&amp;lt;BR&amp;gt;&lt;br /&gt;
Amazon.com: [http://www.amazon.com/Network-Intrusion-Detection-Analysts-Handbook/dp/0735708681 '''Network intrusion detection, an analyst's handbook''' by ''Stephen Northcutt'']&lt;br /&gt;
==See also==&lt;br /&gt;
Information Security Topics:&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Random Number Generators and Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometric systems regarding security design principle]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Phishing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometrics in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Smart Card technology to prevent fraud]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Anti-spam Systems and Techniques]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Payment Card Industry Data Security Standard]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Autocomplete]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Information security awareness]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
- [http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://hack.pl/gfx/wywiady/Kevin_Mitnick.jpg Kevin Mitnick picture]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
QUANG LUONG&lt;br /&gt;
Revised date: Dec 9 2007&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-12-10T04:04:36Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Computer security is an important factor in our information world with Internet and digitally owned materials. Over the past twenty years, network security has evolved continuously. More secure implementations are invented to replace old less secure implementations. Kevin Mitnick was able to hack into Tsutomu Shimomura's X-Terminal computer due to early implementation of TCP connection, which was not really secure at that time. With a huge desire of curiosity, Mitnick did something that no one has ever done before him. He exploited the trusted relationship between two computers by performing man-in-the-middle attack under a spoofed identity. His attack made him the most famous hacker in United States of America.&lt;br /&gt;
[[Image:Kevin mitnick FBI.gif|thumb|right|250px|Mitnick on FBI wanted list]]&lt;br /&gt;
== Who is Mitnick? ==&lt;br /&gt;
[[Image:kevinmitnick.jpg|frame|right|Kevin Mitnick]]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in United States of America. He is an expert in [[social engineering]], which helped him to obtain many classified information used for his hacking hobby. In his early age, he was on the FBI most wanted cyber criminal list. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prison. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
==Three-way handshake==&lt;br /&gt;
If there is a trusted relationship between two computers (e.g. server and client), a connection can be established by a [http://www.pccitizen.com/threewayhandshake.htm three-way handshake]. In the Mitnick attack, the three-way handshake used TCP sequence number and IP address as proof for identity and signature. Three-way handshake has three steps:&lt;br /&gt;
====Step 1: SYN request====&lt;br /&gt;
Computer A sends a SYN request under its IP address with a random TCP sequence number xA to computer B.&lt;br /&gt;
====Step 2: SYN/ACK response====&lt;br /&gt;
Computer B sends an ACK response with number (xA+1) and its own random TCP sequence number xB back to computer A.&lt;br /&gt;
====Step 3: ACK or RESET response====&lt;br /&gt;
If computer A wants to establish the connection, it sends an ACK response with number (xB+1) back to computer B. Otherwise, it sends a RESET response to drop the connection request.&lt;br /&gt;
==The attack==&lt;br /&gt;
[[Image:Mitnickattack.JPG|thumb|right|500px|The Mitnick attack]]&lt;br /&gt;
The Mitnick attack has five general steps:&lt;br /&gt;
====Step 1: Information gathering====&lt;br /&gt;
Before the attack, Mitnick was able to determine the TCP sequence number generator’s behavior of X-Terminal and a trusted relationship between X-Terminal and Server.&lt;br /&gt;
======Determine the TCP sequence number generator’s behavior======&lt;br /&gt;
Mitnick sent SYN request to X-Terminal and received SYN/ACK response. Then he sent RESET response to keep the X-Terminal from being filled up. He repeated this for twenty times. He found there is a pattern between two successive TCP sequence numbers. It turned out that the numbers were not random at all. The latter number was greater than the previous one by 128000.&lt;br /&gt;
======Determine a trusted relationship between X-Terminal and Server======&lt;br /&gt;
Before the attack, Mitnick hacked into Shimomura’s website. He used command finger and showmount to find if X-Terminal had trusted relationship with any other computers.&lt;br /&gt;
====Step 2: The flood====&lt;br /&gt;
Mitnick kept the Server muted by filling the Server up with half-open SYN requests from spoofed IP address. To create half-open SYN requests, he used routable but not active IP address. Because he had no intention to complete three-way handshake with the Server, half-open SYN request occupied the Server’s memory faster. The result is that the Server could not respond to any other requests. This is a type of Denial of Service attack.&lt;br /&gt;
====Step 3: Trusted relationship hijacking====&lt;br /&gt;
Mitnick sent a SYN request to X-Terminal with spoofed IP address as the Server. He used an arbitrary number as the Server’s TCP sequence number. X-Terminal sent a SYN/ACK response to the Server. Because the Server was muted, it did not receive the SYN/ACK response. As mentioned in the information gathering step, Mitnick was able to generate the TCP sequence number that X-Terminal created for the Server. Mitnick, again spoofed his IP as the Server’s IP, sent an ACK response to X-Terminal to finish three-way handshake. Because the returned TCP sequence number was correct, X-Terminal allowed Mitnick connect to it. The connection was established. Shimomura’s computer was considered hacked by finishing this step.&lt;br /&gt;
====Step 4: Remote command pump====&lt;br /&gt;
Mitnick wanted to create a backdoor on Shimomura computer so that he could come back later without repeating the hijack. He pumped commands from his computer to Shimomura’s computer. To be precise, they were &amp;quot;echo + + &amp;gt;&amp;gt; /.rhosts&amp;quot;. The ++ allowed any computers connect to X-Terminal without being verified.&lt;br /&gt;
====Step 5: Clean up====&lt;br /&gt;
Mitnick sent RESET responses to the Server to cancel all his SYN requests. The Server was freed.&lt;br /&gt;
== Detection ==&lt;br /&gt;
There are no specific mechanisms to detect the Mitnick attack directly. However, a security analyst can combine several mechanisms to detect the attack indirectly. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
== Prevention==&lt;br /&gt;
Nowadays, Mitnick attack is no longer practical because the security in networking field is way improved than before. However, preventing Mitnick attack is the least requirement a system must satisfy to be considered secure. It worths to mention that in the days of the attack, people (e.g. Tsutomu) used remote shell (RSH) instead of secure shell (SSH) like today.&lt;br /&gt;
==Comments==&lt;br /&gt;
The Mitnick attack was a classic case. Mitnick took advantage of easy-to-be-known weaknesses. After his attack, computer security was taken more seriously. New tools was developed to improve security in networking over the Internet. SSH (secure shell) is used to replace RSH (remote shell) which allowed data transfered insecurely.&lt;br /&gt;
== References ==&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Transport_Control_Protocol Transport control protocol]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Ip_spoofing IP address spoofing]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/OSI_model Open Systems Interconnection Basic Reference Model (OSI Model)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Tsutomu Tsutomu Shimomura (the victim of the attack)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick (the attacker)]&amp;lt;BR&amp;gt;&lt;br /&gt;
Amazon.com: [http://www.amazon.com/Network-Intrusion-Detection-Analysts-Handbook/dp/0735708681 '''Network intrusion detection, an analyst's handbook''' by ''Stephen Northcutt'']&lt;br /&gt;
==See also==&lt;br /&gt;
Information Security Topics:&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Random Number Generators and Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometric systems regarding security design principle]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Phishing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometrics in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Smart Card technology to prevent fraud]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Anti-spam Systems and Techniques]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Payment Card Industry Data Security Standard]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Autocomplete]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Information security awareness]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
- [http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://hack.pl/gfx/wywiady/Kevin_Mitnick.jpg Kevin Mitnick picture]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
QUANG LUONG&lt;br /&gt;
Revised date: Dec 9 2007&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-12-09T22:47:41Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;/* Prevention */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Computer security is an important factor in our information world with Internet and digitally owned materials. Over the past twenty years, network security has evolved continuously. More secure implementations are invented to replace old less secure implementations. Kevin Mitnick was able to hack into Tsutomu Shimomura's X-Terminal computer thanks to early implementation of TCP connection, which was not really secure at that time. With a huge desire of curiosity, Mitnick did something that no one has ever done before him. He exploited the trusted relationship between two computers by performing man-in-the-middle attack under a spoofed identity. His attack made him the most famous hacker in United States of America.&lt;br /&gt;
[[Image:Kevin mitnick FBI.gif|thumb|right|250px|Mitnick on FBI wanted list]]&lt;br /&gt;
== Who is Mitnick? ==&lt;br /&gt;
[[Image:kevinmitnick.jpg|frame|right|Kevin Mitnick]]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in United States of America. He is an expert [[Social engineering]], which helped him to obtain many classified information used for his hacking habbit. In his early age, he was on the FBI most wanted cyber criminal list. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prisons. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
==Three-way handshake==&lt;br /&gt;
If there is a trusted relationship between two computers (e.g. server and client), a connection can be established by a [http://www.pccitizen.com/threewayhandshake.htm three-way handshake]. In the Mitnick attack, the three-way handshake used TCP sequence number and IP address as proof for identity and signature. Three-way handshake has three steps:&lt;br /&gt;
====Step 1: SYN request====&lt;br /&gt;
Computer A sends a SYN request under its IP address with a random TCP sequence number xA to computer B.&lt;br /&gt;
====Step 2: SYN/ACK response====&lt;br /&gt;
Computer B sends an ACK response with number (xA+1) and its own random TCP sequence number xB back to computer A.&lt;br /&gt;
====Step 3: ACK or RESET response====&lt;br /&gt;
If computer A wants to establish the connection, it sends an ACK response with number (xB+1) back to computer B. Otherwise, it sends a RESET response to drop the connection request.&lt;br /&gt;
==The attack==&lt;br /&gt;
[[Image:Mitnickattack.JPG|thumb|right|500px|The Mitnick attack]]&lt;br /&gt;
The Mitnick attack has five general steps:&lt;br /&gt;
====Step 1: Information gathering====&lt;br /&gt;
Before the attack, Mitnick was able to determine the TCP sequence number generator’s behavior of X-Terminal and a trusted relationship between X-Terminal and Server.&lt;br /&gt;
======Determine the TCP sequence number generator’s behavior======&lt;br /&gt;
Mitnick sent SYN request to X-Terminal and received SYN/ACK response. Then he sent RESET response to keep the X-Terminal from being filled up. He repeated this for twenty times. He found there is a pattern between two successive TCP sequence numbers. It turned out that the numbers were not random at all. The latter number was greater than the previous one by 128000.&lt;br /&gt;
======Determine a trusted relationship between X-Terminal and Server======&lt;br /&gt;
Before the attack, Mitnick hacked into Shimomura’s website. He used command finger and showmount to find if X-Terminal had trusted relationship with any other computers.&lt;br /&gt;
====Step 2: The flood====&lt;br /&gt;
Mitnick kept the Server muted by filling the Server up with half-open SYN requests from spoofed IP address. To create half-open SYN requests, he used routable but not active IP address. Because he had no intention to complete three-way handshake with the Server, half-open SYN request occupied the Server’s memory faster. The result is that the Server could not respond to any other requests. This is a type of Denial of Service attack.&lt;br /&gt;
====Step 3: Trusted relationship hijacking====&lt;br /&gt;
Mitnick sent a SYN request to X-Terminal with spoofed IP address as the Server. He used an arbitrary number as the Server’s TCP sequence number. X-Terminal sent a SYN/ACK response to the Server. Because the Server was muted, it did not receive the SYN/ACK response. As mentioned in the information gathering step, Mitnick was able to generate the TCP sequence number that X-Terminal created for the Server. Mitnick, again spoofed his IP as the Server’s IP, sent an ACK response to X-Terminal to finish three-way handshake. Because the returned TCP sequence number was correct, X-Terminal allowed Mitnick connect to it. The connection was established. Shimomura’s computer was considered hacked by finishing this step.&lt;br /&gt;
====Step 4: Remote command pump====&lt;br /&gt;
Mitnick wanted to create a backdoor on Shimomura computer so that he could come back later without repeating the hijack. He pumped commands from his computer to Shimomura’s computer. To be precise, they were &amp;quot;echo + + &amp;gt;&amp;gt; /.rhosts&amp;quot;. The ++ allowed any computers connect to X-Terminal without being verified.&lt;br /&gt;
====Step 5: Clean up====&lt;br /&gt;
Mitnick sent RESET responses to the Server to cancel all his SYN requests. The Server was freed.&lt;br /&gt;
== Detection ==&lt;br /&gt;
There are no specific mechanisms to detect the Mitnick attack directly. However, a security analyst can combine several mechanisms to detect the attack indirectly. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
&lt;br /&gt;
== Prevention==&lt;br /&gt;
Nowadays, Mitnick attack is no longer practical because the security in networking field is way improved than before. However, preventing Mitnick attack is the least requirement a system must satisfy to be considered secure. It worths to mention that in the days of the attack, people (e.g. Tsutomu) used remote shell (RSH) instead of secure shell (SSH) like today.&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
The Mitnick attack was a classic case. Mitnick took advantage of easy-to-be-known weaknesses. After his attack, computer security was taken more seriously. New tools was developed to improve security in networking over the Internet. SSH (secure shell) is used to replace RSH (remote shell) which allowed data transfered insecurely.&lt;br /&gt;
== References ==&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Transport_Control_Protocol Transport control protocol]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Ip_spoofing IP address spoofing]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/OSI_model Open Systems Interconnection Basic Reference Model (OSI Model)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Tsutomu Tsutomu Shimomura (the victim of the attack)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick (the attacker)]&amp;lt;BR&amp;gt;&lt;br /&gt;
Amazon.com: [http://www.amazon.com/Network-Intrusion-Detection-Analysts-Handbook/dp/0735708681 '''Network intrusion detection, an analyst's handbook''' by ''Stephen Northcutt'']&lt;br /&gt;
==See also==&lt;br /&gt;
Information Security Topics:&lt;br /&gt;
- [[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Random Number Generators and Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometric systems regarding security design principle]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Phishing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometrics in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Smart Card technology to prevent fraud]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Anti-spam Systems and Techniques]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Payment Card Industry Data Security Standard]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Autocomplete]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Information security awareness]]&amp;lt;BR&amp;gt;&lt;br /&gt;
== External links ==&lt;br /&gt;
- [http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://hack.pl/gfx/wywiady/Kevin_Mitnick.jpg Kevin Mitnick picture]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
QUANG LUONG&lt;br /&gt;
Revised date: Dec 9 2007&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-12-09T22:38:10Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;/* Detection */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Computer security is an important factor in our information world with Internet and digitally owned materials. Over the past twenty years, network security has evolved continuously. More secure implementations are invented to replace old less secure implementations. Kevin Mitnick was able to hack into Tsutomu Shimomura's X-Terminal computer thanks to early implementation of TCP connection, which was not really secure at that time. With a huge desire of curiosity, Mitnick did something that no one has ever done before him. He exploited the trusted relationship between two computers by performing man-in-the-middle attack under a spoofed identity. His attack made him the most famous hacker in United States of America.&lt;br /&gt;
[[Image:Kevin mitnick FBI.gif|thumb|right|250px|Mitnick on FBI wanted list]]&lt;br /&gt;
== Who is Mitnick? ==&lt;br /&gt;
[[Image:kevinmitnick.jpg|frame|right|Kevin Mitnick]]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in United States of America. He is an expert [[Social engineering]], which helped him to obtain many classified information used for his hacking habbit. In his early age, he was on the FBI most wanted cyber criminal list. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prisons. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
==Three-way handshake==&lt;br /&gt;
If there is a trusted relationship between two computers (e.g. server and client), a connection can be established by a [http://www.pccitizen.com/threewayhandshake.htm three-way handshake]. In the Mitnick attack, the three-way handshake used TCP sequence number and IP address as proof for identity and signature. Three-way handshake has three steps:&lt;br /&gt;
====Step 1: SYN request====&lt;br /&gt;
Computer A sends a SYN request under its IP address with a random TCP sequence number xA to computer B.&lt;br /&gt;
====Step 2: SYN/ACK response====&lt;br /&gt;
Computer B sends an ACK response with number (xA+1) and its own random TCP sequence number xB back to computer A.&lt;br /&gt;
====Step 3: ACK or RESET response====&lt;br /&gt;
If computer A wants to establish the connection, it sends an ACK response with number (xB+1) back to computer B. Otherwise, it sends a RESET response to drop the connection request.&lt;br /&gt;
==The attack==&lt;br /&gt;
[[Image:Mitnickattack.JPG|thumb|right|500px|The Mitnick attack]]&lt;br /&gt;
The Mitnick attack has five general steps:&lt;br /&gt;
====Step 1: Information gathering====&lt;br /&gt;
Before the attack, Mitnick was able to determine the TCP sequence number generator’s behavior of X-Terminal and a trusted relationship between X-Terminal and Server.&lt;br /&gt;
======Determine the TCP sequence number generator’s behavior======&lt;br /&gt;
Mitnick sent SYN request to X-Terminal and received SYN/ACK response. Then he sent RESET response to keep the X-Terminal from being filled up. He repeated this for twenty times. He found there is a pattern between two successive TCP sequence numbers. It turned out that the numbers were not random at all. The latter number was greater than the previous one by 128000.&lt;br /&gt;
======Determine a trusted relationship between X-Terminal and Server======&lt;br /&gt;
Before the attack, Mitnick hacked into Shimomura’s website. He used command finger and showmount to find if X-Terminal had trusted relationship with any other computers.&lt;br /&gt;
====Step 2: The flood====&lt;br /&gt;
Mitnick kept the Server muted by filling the Server up with half-open SYN requests from spoofed IP address. To create half-open SYN requests, he used routable but not active IP address. Because he had no intention to complete three-way handshake with the Server, half-open SYN request occupied the Server’s memory faster. The result is that the Server could not respond to any other requests. This is a type of Denial of Service attack.&lt;br /&gt;
====Step 3: Trusted relationship hijacking====&lt;br /&gt;
Mitnick sent a SYN request to X-Terminal with spoofed IP address as the Server. He used an arbitrary number as the Server’s TCP sequence number. X-Terminal sent a SYN/ACK response to the Server. Because the Server was muted, it did not receive the SYN/ACK response. As mentioned in the information gathering step, Mitnick was able to generate the TCP sequence number that X-Terminal created for the Server. Mitnick, again spoofed his IP as the Server’s IP, sent an ACK response to X-Terminal to finish three-way handshake. Because the returned TCP sequence number was correct, X-Terminal allowed Mitnick connect to it. The connection was established. Shimomura’s computer was considered hacked by finishing this step.&lt;br /&gt;
====Step 4: Remote command pump====&lt;br /&gt;
Mitnick wanted to create a backdoor on Shimomura computer so that he could come back later without repeating the hijack. He pumped commands from his computer to Shimomura’s computer. To be precise, they were &amp;quot;echo + + &amp;gt;&amp;gt; /.rhosts&amp;quot;. The ++ allowed any computers connect to X-Terminal without being verified.&lt;br /&gt;
====Step 5: Clean up====&lt;br /&gt;
Mitnick sent RESET responses to the Server to cancel all his SYN requests. The Server was freed.&lt;br /&gt;
== Detection ==&lt;br /&gt;
There are no specific mechanisms to detect the Mitnick attack directly. However, a security analyst can combine several mechanisms to detect the attack indirectly. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
&lt;br /&gt;
== Prevention==&lt;br /&gt;
Since now we know how Mitnick attacked Shimomura, we can easily prevent this kind of attack by simply randomize out TCP sequence number. However, nowadays Mitnick attack is no longer practical. Computer users use SSH instead of RSH like before.&lt;br /&gt;
==Comments==&lt;br /&gt;
The Mitnick attack was a classic case. Mitnick took advantage of easy-to-be-known weaknesses. After his attack, computer security was taken more seriously. New tools was developed to improve security in networking over the Internet. SSH (secure shell) is used to replace RSH (remote shell) which allowed data transfered insecurely.&lt;br /&gt;
== References ==&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Transport_Control_Protocol Transport control protocol]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Ip_spoofing IP address spoofing]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/OSI_model Open Systems Interconnection Basic Reference Model (OSI Model)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Tsutomu Tsutomu Shimomura (the victim of the attack)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick (the attacker)]&amp;lt;BR&amp;gt;&lt;br /&gt;
Amazon.com: [http://www.amazon.com/Network-Intrusion-Detection-Analysts-Handbook/dp/0735708681 '''Network intrusion detection, an analyst's handbook''' by ''Stephen Northcutt'']&lt;br /&gt;
==See also==&lt;br /&gt;
Information Security Topics:&lt;br /&gt;
- [[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Random Number Generators and Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometric systems regarding security design principle]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Phishing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometrics in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Smart Card technology to prevent fraud]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Anti-spam Systems and Techniques]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Payment Card Industry Data Security Standard]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Autocomplete]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Information security awareness]]&amp;lt;BR&amp;gt;&lt;br /&gt;
== External links ==&lt;br /&gt;
- [http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://hack.pl/gfx/wywiady/Kevin_Mitnick.jpg Kevin Mitnick picture]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
QUANG LUONG&lt;br /&gt;
Revised date: Dec 9 2007&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-12-09T22:36:56Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Computer security is an important factor in our information world with Internet and digitally owned materials. Over the past twenty years, network security has evolved continuously. More secure implementations are invented to replace old less secure implementations. Kevin Mitnick was able to hack into Tsutomu Shimomura's X-Terminal computer thanks to early implementation of TCP connection, which was not really secure at that time. With a huge desire of curiosity, Mitnick did something that no one has ever done before him. He exploited the trusted relationship between two computers by performing man-in-the-middle attack under a spoofed identity. His attack made him the most famous hacker in United States of America.&lt;br /&gt;
[[Image:Kevin mitnick FBI.gif|thumb|right|250px|Mitnick on FBI wanted list]]&lt;br /&gt;
== Who is Mitnick? ==&lt;br /&gt;
[[Image:kevinmitnick.jpg|frame|right|Kevin Mitnick]]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in United States of America. He is an expert [[Social engineering]], which helped him to obtain many classified information used for his hacking habbit. In his early age, he was on the FBI most wanted cyber criminal list. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prisons. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
==Three-way handshake==&lt;br /&gt;
If there is a trusted relationship between two computers (e.g. server and client), a connection can be established by a [http://www.pccitizen.com/threewayhandshake.htm three-way handshake]. In the Mitnick attack, the three-way handshake used TCP sequence number and IP address as proof for identity and signature. Three-way handshake has three steps:&lt;br /&gt;
====Step 1: SYN request====&lt;br /&gt;
Computer A sends a SYN request under its IP address with a random TCP sequence number xA to computer B.&lt;br /&gt;
====Step 2: SYN/ACK response====&lt;br /&gt;
Computer B sends an ACK response with number (xA+1) and its own random TCP sequence number xB back to computer A.&lt;br /&gt;
====Step 3: ACK or RESET response====&lt;br /&gt;
If computer A wants to establish the connection, it sends an ACK response with number (xB+1) back to computer B. Otherwise, it sends a RESET response to drop the connection request.&lt;br /&gt;
==The attack==&lt;br /&gt;
[[Image:Mitnickattack.JPG|thumb|right|500px|The Mitnick attack]]&lt;br /&gt;
The Mitnick attack has five general steps:&lt;br /&gt;
====Step 1: Information gathering====&lt;br /&gt;
Before the attack, Mitnick was able to determine the TCP sequence number generator’s behavior of X-Terminal and a trusted relationship between X-Terminal and Server.&lt;br /&gt;
======Determine the TCP sequence number generator’s behavior======&lt;br /&gt;
Mitnick sent SYN request to X-Terminal and received SYN/ACK response. Then he sent RESET response to keep the X-Terminal from being filled up. He repeated this for twenty times. He found there is a pattern between two successive TCP sequence numbers. It turned out that the numbers were not random at all. The latter number was greater than the previous one by 128000.&lt;br /&gt;
======Determine a trusted relationship between X-Terminal and Server======&lt;br /&gt;
Before the attack, Mitnick hacked into Shimomura’s website. He used command finger and showmount to find if X-Terminal had trusted relationship with any other computers.&lt;br /&gt;
====Step 2: The flood====&lt;br /&gt;
Mitnick kept the Server muted by filling the Server up with half-open SYN requests from spoofed IP address. To create half-open SYN requests, he used routable but not active IP address. Because he had no intention to complete three-way handshake with the Server, half-open SYN request occupied the Server’s memory faster. The result is that the Server could not respond to any other requests. This is a type of Denial of Service attack.&lt;br /&gt;
====Step 3: Trusted relationship hijacking====&lt;br /&gt;
Mitnick sent a SYN request to X-Terminal with spoofed IP address as the Server. He used an arbitrary number as the Server’s TCP sequence number. X-Terminal sent a SYN/ACK response to the Server. Because the Server was muted, it did not receive the SYN/ACK response. As mentioned in the information gathering step, Mitnick was able to generate the TCP sequence number that X-Terminal created for the Server. Mitnick, again spoofed his IP as the Server’s IP, sent an ACK response to X-Terminal to finish three-way handshake. Because the returned TCP sequence number was correct, X-Terminal allowed Mitnick connect to it. The connection was established. Shimomura’s computer was considered hacked by finishing this step.&lt;br /&gt;
====Step 4: Remote command pump====&lt;br /&gt;
Mitnick wanted to create a backdoor on Shimomura computer so that he could come back later without repeating the hijack. He pumped commands from his computer to Shimomura’s computer. To be precise, they were &amp;quot;echo + + &amp;gt;&amp;gt; /.rhosts&amp;quot;. The ++ allowed any computers connect to X-Terminal without being verified.&lt;br /&gt;
====Step 5: Clean up====&lt;br /&gt;
Mitnick sent RESET responses to the Server to cancel all his SYN requests. The Server was freed.&lt;br /&gt;
== Detection ==&lt;br /&gt;
There is no specific mechanism to detect the Mitnick attack. However, a security analyst can combine several mechanisms to detect the attack. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
== Prevention==&lt;br /&gt;
Since now we know how Mitnick attacked Shimomura, we can easily prevent this kind of attack by simply randomize out TCP sequence number. However, nowadays Mitnick attack is no longer practical. Computer users use SSH instead of RSH like before.&lt;br /&gt;
==Comments==&lt;br /&gt;
The Mitnick attack was a classic case. Mitnick took advantage of easy-to-be-known weaknesses. After his attack, computer security was taken more seriously. New tools was developed to improve security in networking over the Internet. SSH (secure shell) is used to replace RSH (remote shell) which allowed data transfered insecurely.&lt;br /&gt;
== References ==&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Transport_Control_Protocol Transport control protocol]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Ip_spoofing IP address spoofing]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/OSI_model Open Systems Interconnection Basic Reference Model (OSI Model)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Tsutomu Tsutomu Shimomura (the victim of the attack)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick (the attacker)]&amp;lt;BR&amp;gt;&lt;br /&gt;
Amazon.com: [http://www.amazon.com/Network-Intrusion-Detection-Analysts-Handbook/dp/0735708681 '''Network intrusion detection, an analyst's handbook''' by ''Stephen Northcutt'']&lt;br /&gt;
==See also==&lt;br /&gt;
Information Security Topics:&lt;br /&gt;
- [[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Random Number Generators and Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometric systems regarding security design principle]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Phishing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometrics in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Smart Card technology to prevent fraud]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Anti-spam Systems and Techniques]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Payment Card Industry Data Security Standard]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Autocomplete]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Information security awareness]]&amp;lt;BR&amp;gt;&lt;br /&gt;
== External links ==&lt;br /&gt;
- [http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://hack.pl/gfx/wywiady/Kevin_Mitnick.jpg Kevin Mitnick picture]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
QUANG LUONG&lt;br /&gt;
Revised date: Dec 9 2007&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-12-09T22:32:31Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Computer security is an important factor in our information world with Internet and digitally owned materials. Over the past twenty years, network security has evolved continuously. More secure implementations are invented to replace old less secure implementations. Kevin Mitnick was able to hack into Tsutomu Shimomura's X-Terminal computer thanks to early implementation of TCP connection, which was not really secure at that time. With a huge desire of curiosity, Mitnick did something that no one has ever done before him. He exploited the trusted relationship between two computers by performing man-in-the-middle attack under a spoofed identity. His attack made him the most famous hacker in United States of America.&lt;br /&gt;
[[Image:Kevin mitnick FBI.gif|thumb|right|250px|Mitnick on FBI wanted list]]&lt;br /&gt;
== Who is Mitnick? ==&lt;br /&gt;
[[Image:kevinmitnick.jpg|frame|right|Kevin Mitnick]]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in United States of America. He is an expert [[Social engineering]], which helped him to obtain many classified information used for his hacking habbit. In his early age, he was on the FBI most wanted cyber criminal list. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prisons. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
==Three-way handshake==&lt;br /&gt;
If there is a trusted relationship between two computers (e.g. server and client), a connection can be established by a [http://www.pccitizen.com/threewayhandshake.htm three-way handshake]. In the Mitnick attack, the three-way handshake used TCP sequence number and IP address as proof for identity and signature. Three-way handshake has three steps:&lt;br /&gt;
====Step 1: SYN request====&lt;br /&gt;
Computer A sends a SYN request under its IP address with a random TCP sequence number xA to computer B.&lt;br /&gt;
====Step 2: SYN/ACK response====&lt;br /&gt;
Computer B sends an ACK response with number (xA+1) and its own random TCP sequence number xB back to computer A.&lt;br /&gt;
====Step 3: ACK or RESET response====&lt;br /&gt;
If computer A wants to establish the connection, it sends an ACK response with number (xB+1) back to computer B. Otherwise, it sends a RESET response to drop the connection request.&lt;br /&gt;
==The attack==&lt;br /&gt;
[[Image:Mitnickattack.JPG|thumb|right|500px|The Mitnick attack]]&lt;br /&gt;
The Mitnick attack has five general steps:&lt;br /&gt;
====Step 1: Information gathering====&lt;br /&gt;
Before the attack, Mitnick was able to determine the TCP sequence number generator’s behavior of X-Terminal and a trusted relationship between X-Terminal and Server.&lt;br /&gt;
======Determine the TCP sequence number generator’s behavior======&lt;br /&gt;
Mitnick sent SYN request to X-Terminal and received SYN/ACK response. Then he sent RESET response to keep the X-Terminal from being filled up. He repeated this for twenty times. He found there is a pattern between two successive TCP sequence numbers. It turned out that the numbers were not random at all. The latter number was greater than the previous one by 128000.&lt;br /&gt;
======Determine a trusted relationship between X-Terminal and Server======&lt;br /&gt;
Before the attack, Mitnick hacked into Shimomura’s website. He used command finger and showmount to find if X-Terminal had trusted relationship with any other computers.&lt;br /&gt;
====Step 2: The flood====&lt;br /&gt;
Mitnick kept the Server muted by filling the Server up with half-open SYN requests from spoofed IP address. To create half-open SYN requests, he used routable but not active IP address. Because he had no intention to complete three-way handshake with the Server, half-open SYN request occupied the Server’s memory faster. The result is that the Server could not respond to any other requests. This is a type of Denial of Service attack.&lt;br /&gt;
====Step 3: Trusted relationship hijacking====&lt;br /&gt;
Mitnick sent a SYN request to X-Terminal with spoofed IP address as the Server. He used an arbitrary number as the Server’s TCP sequence number. X-Terminal sent a SYN/ACK response to the Server. Because the Server was muted, it did not receive the SYN/ACK response. As mentioned in the information gathering step, Mitnick was able to generate the TCP sequence number that X-Terminal created for the Server. Mitnick, again spoofed his IP as the Server’s IP, sent an ACK response to X-Terminal to finish three-way handshake. Because the returned TCP sequence number was correct, X-Terminal allowed Mitnick connect to it. The connection was established. Shimomura’s computer was considered hacked by finishing this step.&lt;br /&gt;
====Step 4: Remote command pump====&lt;br /&gt;
Mitnick wanted to create a backdoor on Shimomura computer so that he could come back later without repeating the hijack. He pumped commands from his computer to Shimomura’s computer. To be precise, they were &amp;quot;echo + + &amp;gt;&amp;gt; /.rhosts&amp;quot;. The ++ allowed any computers connect to X-Terminal without being verified.&lt;br /&gt;
====Step 5: Clean up====&lt;br /&gt;
Mitnick sent RESET responses to the Server to cancel all his SYN requests. The Server was freed.&lt;br /&gt;
&lt;br /&gt;
== Detection ==&lt;br /&gt;
There is no specific mechanism to detect the Mitnick attack. However, a security analyst can combine several mechanisms to detect the attack. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
== Prevention==&lt;br /&gt;
Since now we know how Mitnick attacked Shimomura, we can easily prevent this kind of attack by simply randomize out TCP sequence number. However, nowadays Mitnick attack is no longer practical. Computer users use SSH instead of RSH like before.&lt;br /&gt;
==Comments==&lt;br /&gt;
The Mitnick attack was a classic case. Mitnick took advantage of yet-to-be-known weaknesses. After his case, computer security was taken seriously. New tools was developing to improve security. SSH is used to replace RSH. UNIX systems are built with security in mind.&lt;br /&gt;
== References ==&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Transport_Control_Protocol Transport control protocol]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Ip_spoofing IP address spoofing]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/OSI_model Open Systems Interconnection Basic Reference Model (OSI Model)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Tsutomu Tsutomu Shimomura (the victim of the attack)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick (the attacker)]&amp;lt;BR&amp;gt;&lt;br /&gt;
Amazon.com: [http://www.amazon.com/Network-Intrusion-Detection-Analysts-Handbook/dp/0735708681 '''Network intrusion detection, an analyst's handbook''' by ''Stephen Northcutt'']&lt;br /&gt;
==See also==&lt;br /&gt;
Information Security Topics:&lt;br /&gt;
- [[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Random Number Generators and Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometric systems regarding security design principle]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Phishing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometrics in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Smart Card technology to prevent fraud]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Anti-spam Systems and Techniques]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Payment Card Industry Data Security Standard]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Autocomplete]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Information security awareness]]&amp;lt;BR&amp;gt;&lt;br /&gt;
== External links ==&lt;br /&gt;
- [http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://hack.pl/gfx/wywiady/Kevin_Mitnick.jpg Kevin Mitnick picture]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
QUANG LUONG&lt;br /&gt;
Revised date: Dec 9 2007&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Kevin_mitnick_FBI.gif</id>
		<title>File:Kevin mitnick FBI.gif</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Kevin_mitnick_FBI.gif"/>
				<updated>2007-12-09T22:22:01Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-12-09T22:21:05Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Computer security is an important factor in our information world with Internet and digitally owned materials. Over the past twenty years, network security has evolved continuously. More secure implementations are invented to replace old less secure implementations. Kevin Mitnick was able to hack into Tsutomu Shimomura's X-Terminal computer thanks to early implementation of TCP connection, which was not really secure at that time. With a huge desire of curiosity, Mitnick did something that no one has ever done before him. He exploited the trusted relationship between two computers by performing man-in-the-middle attack under a spoofed identity. His attack made him the most famous hacker in United States of America.&lt;br /&gt;
== Who is Mitnick? ==&lt;br /&gt;
[[Image:kevinmitnick.jpg|frame|right|Kevin Mitnick]]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in United States of America. He is an expert [[Social engineering]], which helped him to obtain many classified information used for his hacking habbit. In his early age, he was on the FBI most wanted cyber criminal list. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prisons. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
==Three-way handshake==&lt;br /&gt;
If there is a trusted relationship between two computers (e.g. server and client), a connection can be established by a [http://www.pccitizen.com/threewayhandshake.htm three-way handshake]. In the Mitnick attack, the three-way handshake used TCP sequence number and IP address as proof for identity and signature. Three-way handshake has three steps:&lt;br /&gt;
====Step 1: SYN request====&lt;br /&gt;
Computer A sends a SYN request under its IP address with a random TCP sequence number xA to computer B.&lt;br /&gt;
====Step 2: SYN/ACK response====&lt;br /&gt;
Computer B sends an ACK response with number (xA+1) and its own random TCP sequence number xB back to computer A.&lt;br /&gt;
====Step 3: ACK or RESET response====&lt;br /&gt;
If computer A wants to establish the connection, it sends an ACK response with number (xB+1) back to computer B. Otherwise, it sends a RESET response to drop the connection request.&lt;br /&gt;
==The attack==&lt;br /&gt;
[[Image:Mitnickattack.JPG|frame|right|The Mitnick attack]]&lt;br /&gt;
The Mitnick attack has five general steps:&lt;br /&gt;
====Step 1: Information gathering====&lt;br /&gt;
Before the attack, Mitnick was able to determine the TCP sequence number generator’s behavior of X-Terminal and a trusted relationship between X-Terminal and Server.&lt;br /&gt;
======Determine the TCP sequence number generator’s behavior======&lt;br /&gt;
Mitnick sent SYN request to X-Terminal and received SYN/ACK response. Then he sent RESET response to keep the X-Terminal from being filled up. He repeated this for twenty times. He found there is a pattern between two successive TCP sequence numbers. It turned out that the numbers were not random at all. The latter number was greater than the previous one by 128000.&lt;br /&gt;
======Determine a trusted relationship between X-Terminal and Server======&lt;br /&gt;
Before the attack, Mitnick hacked into Shimomura’s website. He used command finger and showmount to find if X-Terminal had trusted relationship with any other computers.&lt;br /&gt;
====Step 2: The flood====&lt;br /&gt;
Mitnick kept the Server muted by filling the Server up with half-open SYN requests from spoofed IP address. To create half-open SYN requests, he used routable but not active IP address. Because he had no intention to complete three-way handshake with the Server, half-open SYN request occupied the Server’s memory faster. The result is that the Server could not respond to any other requests. This is a type of Denial of Service attack.&lt;br /&gt;
====Step 3: Trusted relationship hijacking====&lt;br /&gt;
Mitnick sent a SYN request to X-Terminal with spoofed IP address as the Server. He used an arbitrary number as the Server’s TCP sequence number. X-Terminal sent a SYN/ACK response to the Server. Because the Server was muted, it did not receive the SYN/ACK response. As mentioned in the information gathering step, Mitnick was able to generate the TCP sequence number that X-Terminal created for the Server. Mitnick, again spoofed his IP as the Server’s IP, sent an ACK response to X-Terminal to finish three-way handshake. Because the returned TCP sequence number was correct, X-Terminal allowed Mitnick connect to it. The connection was established. Shimomura’s computer was considered hacked by finishing this step.&lt;br /&gt;
====Step 4: Remote command pump====&lt;br /&gt;
Mitnick wanted to create a backdoor on Shimomura computer so that he could come back later without repeating the hijack. He pumped commands from his computer to Shimomura’s computer. To be precise, they were &amp;quot;echo + + &amp;gt;&amp;gt; /.rhosts&amp;quot;. The ++ allowed any computers connect to X-Terminal without being verified.&lt;br /&gt;
====Step 5: Clean up====&lt;br /&gt;
Mitnick sent RESET responses to the Server to cancel all his SYN requests. The Server was freed.&lt;br /&gt;
&lt;br /&gt;
== Detection ==&lt;br /&gt;
There is no specific mechanism to detect the Mitnick attack. However, a security analyst can combine several mechanisms to detect the attack. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
== Prevention==&lt;br /&gt;
Since now we know how Mitnick attacked Shimomura, we can easily prevent this kind of attack by simply randomize out TCP sequence number. However, nowadays Mitnick attack is no longer practical. Computer users use SSH instead of RSH like before.&lt;br /&gt;
==Comments==&lt;br /&gt;
The Mitnick attack was a classic case. Mitnick took advantage of yet-to-be-known weaknesses. After his case, computer security was taken seriously. New tools was developing to improve security. SSH is used to replace RSH. UNIX systems are built with security in mind.&lt;br /&gt;
== References ==&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Transport_Control_Protocol Transport control protocol]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Ip_spoofing IP address spoofing]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/OSI_model Open Systems Interconnection Basic Reference Model (OSI Model)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Tsutomu Tsutomu Shimomura (the victim of the attack)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick (the attacker)]&amp;lt;BR&amp;gt;&lt;br /&gt;
Amazon.com: [http://www.amazon.com/Network-Intrusion-Detection-Analysts-Handbook/dp/0735708681 '''Network intrusion detection, an analyst's handbook''' by ''Stephen Northcutt'']&lt;br /&gt;
==See also==&lt;br /&gt;
Information Security Topics:&lt;br /&gt;
- [[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Random Number Generators and Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometric systems regarding security design principle]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Phishing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometrics in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Smart Card technology to prevent fraud]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Anti-spam Systems and Techniques]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Payment Card Industry Data Security Standard]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Autocomplete]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Information security awareness]]&amp;lt;BR&amp;gt;&lt;br /&gt;
== External links ==&lt;br /&gt;
- [http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://hack.pl/gfx/wywiady/Kevin_Mitnick.jpg Kevin Mitnick picture]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
QUANG LUONG&lt;br /&gt;
Revised date: Dec 9 2007&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-12-04T20:09:10Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Computer security is an important factor in our information world with Internet and digitally owned materials. Over the past twenty years, network security has evolved continuously. More secure implementations are invented to replace old less secure implementations. Kevin Mitnick was able to hack into Tsutomu Shimomura's X-Terminal computer thanks to early implementation of TCP connection, which was not really secure at that time. With a huge desire of curiosity, Mitnick did something that no one has ever done before him. He exploited the trusted relationship between two computers by performing man-in-the-middle attack under a spoofed identity. His attack made him the most famous hacker in United States of America.&lt;br /&gt;
== Who is Mitnick? ==&lt;br /&gt;
[[Image:kevinmitnick.jpg|frame|right|Kevin Mitnick]]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in United States of America. He is an expert [[Social engineering]], which helped him to obtain many classified information used for his hacking habbit. In his early age, he was on the FBI most wanted cyber criminal list. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prisons. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
==Three-way handshake==&lt;br /&gt;
If there is a trusted relationship between two computers (e.g. server and client), a connection can be established by a [http://www.pccitizen.com/threewayhandshake.htm three-way handshake]. In the Mitnick attack, the three-way handshake used TCP sequence number and IP address as proof for identity and signature. Three-way handshake has three steps:&lt;br /&gt;
====Step 1: SYN request====&lt;br /&gt;
Computer A sends a SYN request under its IP address with a random TCP sequence number xA to computer B.&lt;br /&gt;
====Step 2: SYN/ACK response====&lt;br /&gt;
Computer B sends an ACK response with number (xA+1) and its own random TCP sequence number xB back to computer A.&lt;br /&gt;
====Step 3: ACK or RESET response====&lt;br /&gt;
If computer A wants to establish the connection, it sends an ACK response with number (xB+1) back to computer B. Otherwise, it sends a RESET response to drop the connection request.&lt;br /&gt;
==The attack==&lt;br /&gt;
[[Image:Mitnickattack.JPG|frame|right|The Mitnick attack]]&lt;br /&gt;
The Mitnick attack has five general steps:&lt;br /&gt;
====Step 1: Information gathering====&lt;br /&gt;
Before the attack, Mitnick was able to determine the TCP sequence number generator’s behavior of X-Terminal and a trusted relationship between X-Terminal and Server.&lt;br /&gt;
======Determine the TCP sequence number generator’s behavior======&lt;br /&gt;
Mitnick sent SYN request to X-Terminal and received SYN/ACK response. Then he sent RESET response to keep the X-Terminal from being filled up. He repeated this for twenty times. He found there is a pattern between two successive TCP sequence numbers. It turned out that the numbers were not random at all. The latter number was greater than the previous one by 128000.&lt;br /&gt;
======Determine a trusted relationship between X-Terminal and Server======&lt;br /&gt;
Before the attack, Mitnick hacked into Shimomura’s website. He used command finger and showmount to find if X-Terminal had trusted relationship with any other computers.&lt;br /&gt;
====Step 2: The flood====&lt;br /&gt;
Mitnick kept the Server muted by filling the Server up with half-open SYN requests from spoofed IP address. To create half-open SYN requests, he used routable but not active IP address. Because he had no intention to complete three-way handshake with the Server, half-open SYN request occupied the Server’s memory faster. The result is that the Server could not respond to any other requests. This is a type of Denial of Service attack.&lt;br /&gt;
====Step 3: Trusted relationship hijacking====&lt;br /&gt;
Mitnick sent a SYN request to X-Terminal with spoofed IP address as the Server. He used an arbitrary number as the Server’s TCP sequence number. X-Terminal sent a SYN/ACK response to the Server. Because the Server was muted, it did not receive the SYN/ACK response. As mentioned in the information gathering step, Mitnick was able to generate the TCP sequence number that X-Terminal created for the Server. Mitnick, again spoofed his IP as the Server’s IP, sent an ACK response to X-Terminal to finish three-way handshake. Because the returned TCP sequence number was correct, X-Terminal allowed Mitnick connect to it. The connection was established. Shimomura’s computer was considered hacked by finishing this step.&lt;br /&gt;
====Step 4: Remote command pump====&lt;br /&gt;
Mitnick wanted to create a backdoor on Shimomura computer so that he could come back later without repeating the hijack. He pumped commands from his computer to Shimomura’s computer. To be precise, they were &amp;quot;echo + + &amp;gt;&amp;gt; /.rhosts&amp;quot;. The ++ allowed any computers connect to X-Terminal without being verified.&lt;br /&gt;
====Step 5: Clean up====&lt;br /&gt;
Mitnick sent RESET responses to the Server to cancel all his SYN requests. The Server was freed.&lt;br /&gt;
&lt;br /&gt;
== Detection ==&lt;br /&gt;
There is no specific mechanism to detect the Mitnick attack. However, a security analyst can combine several mechanisms to detect the attack. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
== Prevention==&lt;br /&gt;
Since now we know how Mitnick attacked Shimomura, we can easily prevent this kind of attack by simply randomize out TCP sequence number. However, nowadays Mitnick attack is no longer practical. Computer users use SSH instead of RSH like before.&lt;br /&gt;
==Comments==&lt;br /&gt;
The Mitnick attack was a classic case. Mitnick took advantage of yet-to-be-known weaknesses. After his case, computer security was taken seriously. New tools was developing to improve security. SSH is used to replace RSH. UNIX systems are built with security in mind.&lt;br /&gt;
== References ==&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Transport_Control_Protocol Transport control protocol]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Ip_spoofing IP address spoofing]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/OSI_model Open Systems Interconnection Basic Reference Model (OSI Model)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Tsutomu Tsutomu Shimomura (the victim of the attack)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick (the attacker)]&amp;lt;BR&amp;gt;&lt;br /&gt;
Amazon.com: [http://www.amazon.com/Network-Intrusion-Detection-Analysts-Handbook/dp/0735708681 '''Network intrusion detection, an analyst's handbook''' by ''Stephen Northcutt'']&lt;br /&gt;
==See also==&lt;br /&gt;
Information Security Topics:&lt;br /&gt;
- [[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Random Number Generators and Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometric systems regarding security design principle]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Phishing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometrics in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Smart Card technology to prevent fraud]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Anti-spam Systems and Techniques]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Payment Card Industry Data Security Standard]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Autocomplete]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Information security awareness]]&amp;lt;BR&amp;gt;&lt;br /&gt;
== External links ==&lt;br /&gt;
- [http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://hack.pl/gfx/wywiady/Kevin_Mitnick.jpg Kevin Mitnick picture]&amp;lt;BR&amp;gt;&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-12-04T20:06:01Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Computer security is an important factor in our information world with Internet and digitally owned materials. Over the past twenty years, network security has evolved continuously. More secure implementations are invented to replace old less secure implementations. Kevin Mitnick was able to hack into Tsutomu Shimomura's X-Terminal computer thanks to early implementation of TCP connection, which was not really secure at that time. With a huge desire of curiosity, Mitnick did something that no one has ever done before him. He exploited the trusted relationship between two computers by performing man-in-the-middle attack under a spoofed identity. His attack made him the most famous hacker in United States of America.&lt;br /&gt;
== Who is Mitnick? ==&lt;br /&gt;
[[Image:kevinmitnick.jpg|frame|right|Kevin Mitnick]]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in United States of America. He is an expert [[Social engineering]], which helped him to obtain many classified information used for his hacking habbit. In his early age, he was on the FBI most wanted cyber criminal list. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prisons. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
==Three-way handshake==&lt;br /&gt;
If there is a trusted relationship between two computers (e.g. server and client), a connection can be established by a [http://www.pccitizen.com/threewayhandshake.htm three-way handshake]. In the Mitnick attack, the three-way handshake used TCP sequence number and IP address as proof for identity and signature. Three-way handshake has three steps:&lt;br /&gt;
====Step 1: SYN request====&lt;br /&gt;
Computer A sends a SYN request under its IP address with a random TCP sequence number xA to computer B.&lt;br /&gt;
====Step 2: SYN/ACK response====&lt;br /&gt;
Computer B sends an ACK response with number (xA+1) and its own random TCP sequence number xB back to computer A.&lt;br /&gt;
====Step 3: ACK or RESET response====&lt;br /&gt;
If computer A wants to establish the connection, it sends an ACK response with number (xB+1) back to computer B. Otherwise, it sends a RESET response to drop the connection request.&lt;br /&gt;
==The attack==&lt;br /&gt;
[[Image:Mitnickattack.JPG|frame|right|The Mitnick attack]]&lt;br /&gt;
The Mitnick attack has five general steps:&lt;br /&gt;
====Step 1: Information gathering====&lt;br /&gt;
Before the attack, Mitnick was able to determine the TCP sequence number generator’s behavior of X-Terminal and a trusted relationship between X-Terminal and Server.&lt;br /&gt;
======Determine the TCP sequence number generator’s behavior======&lt;br /&gt;
Mitnick sent SYN request to X-Terminal and received SYN/ACK response. Then he sent RESET response to keep the X-Terminal from being filled up. He repeated this for twenty times. He found there is a pattern between two successive TCP sequence numbers. It turned out that the numbers were not random at all. The latter number was greater than the previous one by 128000.&lt;br /&gt;
======Determine a trusted relationship between X-Terminal and Server======&lt;br /&gt;
Before the attack, Mitnick hacked into Shimomura’s website. He used command finger and showmount to find if X-Terminal had trusted relationship with any other computers.&lt;br /&gt;
====Step 2: The flood====&lt;br /&gt;
Mitnick kept the Server muted by filling the Server up with half-open SYN requests from spoofed IP address. To create half-open SYN requests, he used routable but not active IP address. Because he had no intention to complete three-way handshake with the Server, half-open SYN request occupied the Server’s memory faster. The result is that the Server could not respond to any other requests. This is a type of Denial of Service attack.&lt;br /&gt;
====Step 3: Trusted relationship hijacking====&lt;br /&gt;
Mitnick sent a SYN request to X-Terminal with spoofed IP address as the Server. He used an arbitrary number as the Server’s TCP sequence number. X-Terminal sent a SYN/ACK response to the Server. Because the Server was muted, it did not receive the SYN/ACK response. As mentioned in the information gathering step, Mitnick was able to generate the TCP sequence number that X-Terminal created for the Server. Mitnick, again spoofed his IP as the Server’s IP, sent an ACK response to X-Terminal to finish three-way handshake. Because the returned TCP sequence number was correct, X-Terminal allowed Mitnick connect to it. The connection was established. Shimomura’s computer was considered hacked by finishing this step.&lt;br /&gt;
====Step 4: Remote command pump====&lt;br /&gt;
Mitnick wanted to create a backdoor on Shimomura computer so that he could come back later without repeating the hijack. He pumped commands from his computer to Shimomura’s computer. To be precise, they were &amp;quot;echo + + &amp;gt;&amp;gt; /.rhosts&amp;quot;. The ++ allowed any computers connect to X-Terminal without being verified.&lt;br /&gt;
====Step 5: Clean up====&lt;br /&gt;
Mitnick sent RESET responses to the Server to cancel all his SYN requests. The Server was freed.&lt;br /&gt;
&lt;br /&gt;
== Detection ==&lt;br /&gt;
There is no specific mechanism to detect the Mitnick attack. However, a security analyst can combine several mechanisms to detect the attack. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
== Prevention==&lt;br /&gt;
Since now we know how Mitnick attacked Shimomura, we can easily prevent this kind of attack by simply randomize out TCP sequence number. However, nowadays Mitnick attack is no longer practical. Computer users use SSH instead of RSH like before.&lt;br /&gt;
==Comments==&lt;br /&gt;
The Mitnick attack was a classic case. Mitnick took advantage of yet-to-be-known weaknesses. After his case, computer security was taken seriously. New tools was developing to improve security. SSH is used to replace RSH. UNIX systems are built with security in mind.&lt;br /&gt;
== Further readings ==&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Transport_Control_Protocol Transport control protocol]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Ip_spoofing IP address spoofing]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/OSI_model Open Systems Interconnection Basic Reference Model (OSI Model)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Tsutomu Tsutomu Shimomura (the victim of the attack)]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick (the attacker)]&lt;br /&gt;
== External links ==&lt;br /&gt;
- [http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [http://hack.pl/gfx/wywiady/Kevin_Mitnick.jpg Kevin Mitnick picture]&amp;lt;BR&amp;gt;&lt;br /&gt;
Amazon.com: [http://www.amazon.com/Network-Intrusion-Detection-Analysts-Handbook/dp/0735708681 '''Network intrusion detection, an analyst's handbook''' by ''Stephen Northcutt'']&lt;br /&gt;
==Other information security topics==&lt;br /&gt;
- [[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Random Number Generators and Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometric systems regarding security design principle]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Phishing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Biometrics in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Smart Card technology to prevent fraud]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Anti-spam Systems and Techniques]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Payment Card Industry Data Security Standard]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Autocomplete]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
- [[Information security awareness]]&amp;lt;BR&amp;gt;&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-12-04T17:40:58Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Who is Mitnick? ==&lt;br /&gt;
[[Image:kevinmitnick.jpg|frame|right|Kevin Mitnick]]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in US. He hacked into [http://en.wikipedia.org/wiki/Tsutomu_Shimomura Tsutomu Shimomura]'s computer(referred as the target) to steal information on December 25, 1994. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prisons. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
== Overview ==&lt;br /&gt;
Kevin Mitnick used [http://en.wikipedia.org/wiki/Ip_spoofing IP spoofing], [http://en.wikipedia.org/wiki/Transmission_Control_Protocol#Using_TCP TCP(Internet Protocol Suite) sequence number] prediction to gain access control of target's computer. The Mitnick attack is a form of [http://en.wikipedia.org/wiki/Man_in_the_middle Man-in-the-middle attack]. It corrupted the [http://www.pccitizen.com/threewayhandshake.htm three-way handshake].&lt;br /&gt;
&lt;br /&gt;
==Three-way handshake==&lt;br /&gt;
If there is a trusted relationship between two computers (e.g. server and client), a connection can be established by a three-way handshake. In the Mitnick attack, the three-way handshake used TCP sequence number and IP address as proof for identity and signature. Three-way handshake has three steps:&lt;br /&gt;
&lt;br /&gt;
Step 1: SYN request&lt;br /&gt;
Computer A sends a SYN request under its IP address with a random TCP sequence number xA to computer B.&lt;br /&gt;
&lt;br /&gt;
Step 2: SYN/ACK response&lt;br /&gt;
Computer B sends an ACK response with number (xA+1) and its own random TCP sequence number xB back to computer A.&lt;br /&gt;
&lt;br /&gt;
Step 3: ACK or RESET response&lt;br /&gt;
If computer A wants to establish the connection, it sends an ACK response with number (xB+1) back to computer B. Otherwise, it sends a RESET response to drop the connection request.&lt;br /&gt;
&lt;br /&gt;
==The attack==&lt;br /&gt;
[[Image:Mitnickattack.JPG|frame|right|The Mitnick attack]]&lt;br /&gt;
The Mitnick attack has five general steps:&lt;br /&gt;
====Step 1: Information gathering====&lt;br /&gt;
Before the attack, Mitnick was able to determine the TCP sequence number generator’s behavior of X-Terminal and a trusted relationship between X-Terminal and Server.&lt;br /&gt;
======Determine the TCP sequence number generator’s behavior======&lt;br /&gt;
Mitnick sent SYN request to X-Terminal and received SYN/ACK response. Then he sent RESET response to keep the X-Terminal from being filled up. He repeated this for twenty times. He found there is a pattern between two successive TCP sequence numbers. It turned out that the numbers were not random at all. The latter number was greater than the previous one by 128000.&lt;br /&gt;
======Determine a trusted relationship between X-Terminal and Server======&lt;br /&gt;
Before the attack, Mitnick hacked into Shimomura’s website. He used command finger and showmount to find if X-Terminal had trusted relationship with any other computers.&lt;br /&gt;
====Step 2: The flood====&lt;br /&gt;
Mitnick kept the Server muted by filling the Server up with half-open SYN requests from spoofed IP address. To create half-open SYN requests, he used routable but not active IP address. Because he had no intention to complete three-way handshake with the Server, half-open SYN request occupied the Server’s memory faster. The result is that the Server could not respond to any other requests. This is a type of Denial of Service attack.&lt;br /&gt;
====Step 3: Trusted relationship hijacking====&lt;br /&gt;
Mitnick sent a SYN request to X-Terminal with spoofed IP address as the Server. He used an arbitrary number as the Server’s TCP sequence number. X-Terminal sent a SYN/ACK response to the Server. Because the Server was muted, it did not receive the SYN/ACK response. As mentioned in the information gathering step, Mitnick was able to generate the TCP sequence number that X-Terminal created for the Server. Mitnick, again spoofed his IP as the Server’s IP, sent an ACK response to X-Terminal to finish three-way handshake. Because the returned TCP sequence number was correct, X-Terminal allowed Mitnick connect to it. The connection was established. Shimomura’s computer was considered hacked by finishing this step.&lt;br /&gt;
====Step 4: Remote command pump====&lt;br /&gt;
Mitnick wanted to create a backdoor on Shimomura computer so that he could come back later without repeating the hijack. He pumped commands from his computer to Shimomura’s computer. To be precise, they were echo + + &amp;gt;&amp;gt; /.rhosts. The ++ allowed any computers connect to X-Terminal without being verified.&lt;br /&gt;
====Step 5: Clean up====&lt;br /&gt;
Mitnick sent RESET responses to the Server to cancel all his SYN requests. The Server was freed.&lt;br /&gt;
&lt;br /&gt;
== Detection ==&lt;br /&gt;
There is no specific mechanism to detect the Mitnick attack. However, a security analyst can combine several mechanisms to detect the attack. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
== Prevention==&lt;br /&gt;
Since now we know how Mitnick attacked Shimomura, we can easily prevent this kind of attack by simply randomize out TCP sequence number. However, nowadays Mitnick attack is no longer practical. Computer users use SSH instead of RSH like before.&lt;br /&gt;
==Comments==&lt;br /&gt;
The Mitnick attack was a classic case. Mitnick took advantage of yet-to-be-known weaknesses. After his case, computer security was taken seriously. New tools was developing to improve security. SSH is used to replace RSH. UNIX systems are built with security in mind.&lt;br /&gt;
&lt;br /&gt;
== Further readings ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Transport_Control_Protocol Transport control protocol]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Ip_spoofing IP address spoofing]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/OSI_model Open Systems Interconnection Basic Reference Model (OSI Model)]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Tsutomu Tsutomu Shimomura (the victim of the attack)]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick (the attacker)]&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
[http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&lt;br /&gt;
&lt;br /&gt;
[http://hack.pl/gfx/wywiady/Kevin_Mitnick.jpg Kevin Mitnick picture]&lt;br /&gt;
&lt;br /&gt;
Amazon.com: [http://www.amazon.com/Network-Intrusion-Detection-Analysts-Handbook/dp/0735708681 '''Network intrusion detection, an analyst's handbook''' by ''Stephen Northcutt'']&lt;br /&gt;
&lt;br /&gt;
==Other information security topics==&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Random Number Generators and Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Biometric systems regarding security design principle]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Phishing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Biometrics in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Smart Card technology to prevent fraud]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Anti-spam Systems and Techniques]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Autocomplete]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Information security awareness]]&amp;lt;BR&amp;gt;&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-12-04T17:39:52Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Who is Mitnick? ==&lt;br /&gt;
[[Image:kevinmitnick.jpg|frame|right|Kevin Mitnick]]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in US. He hacked into [http://en.wikipedia.org/wiki/Tsutomu_Shimomura Tsutomu Shimomura]'s computer(referred as the target) to steal information on December 25, 1994. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prisons. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
== Overview ==&lt;br /&gt;
Kevin Mitnick used [http://en.wikipedia.org/wiki/Ip_spoofing IP spoofing], [http://en.wikipedia.org/wiki/Transmission_Control_Protocol#Using_TCP TCP(Internet Protocol Suite) sequence number] prediction to gain access control of target's computer. The Mitnick attack is a form of [http://en.wikipedia.org/wiki/Man_in_the_middle Man-in-the-middle attack]. It corrupted the [http://www.pccitizen.com/threewayhandshake.htm three-way handshake].&lt;br /&gt;
&lt;br /&gt;
==Three-way handshake==&lt;br /&gt;
If there is a trusted relationship between two computers (e.g. server and client), a connection can be established by a three-way handshake. In the Mitnick attack, the three-way handshake used TCP sequence number and IP address as proof for identity and signature. Three-way handshake has three steps:&lt;br /&gt;
&lt;br /&gt;
Step 1: SYN request&lt;br /&gt;
Computer A sends a SYN request under its IP address with a random TCP sequence number xA to computer B.&lt;br /&gt;
&lt;br /&gt;
Step 2: SYN/ACK response&lt;br /&gt;
Computer B sends an ACK response with number (xA+1) and its own random TCP sequence number xB back to computer A.&lt;br /&gt;
&lt;br /&gt;
Step 3: ACK or RESET response&lt;br /&gt;
If computer A wants to establish the connection, it sends an ACK response with number (xB+1) back to computer B. Otherwise, it sends a RESET response to drop the connection request.&lt;br /&gt;
&lt;br /&gt;
==The attack==&lt;br /&gt;
[[Image:Mitnickattack.JPG|frame|right|The Mitnick attack]]&lt;br /&gt;
The Mitnick attack has five general steps:&lt;br /&gt;
====Step 1: Information gathering====&lt;br /&gt;
Before the attack, Mitnick was able to determine the TCP sequence number generator’s behavior of X-Terminal and a trusted relationship between X-Terminal and Server.&lt;br /&gt;
======Determine the TCP sequence number generator’s behavior======&lt;br /&gt;
Mitnick sent SYN request to X-Terminal and received SYN/ACK response. Then he sent RESET response to keep the X-Terminal from being filled up. He repeated this for twenty times. He found there is a pattern between two successive TCP sequence numbers. It turned out that the numbers were not random at all. The latter number was greater than the previous one by 128000.&lt;br /&gt;
======Determine a trusted relationship between X-Terminal and Server======&lt;br /&gt;
Before the attack, Mitnick hacked into Shimomura’s website. He used command finger and showmount to find if X-Terminal had trusted relationship with any other computers.&lt;br /&gt;
====Step 2: The flood====&lt;br /&gt;
Mitnick kept the Server muted by filling the Server up with half-open SYN requests from spoofed IP address. To create half-open SYN requests, he used routable but not active IP address. Because he had no intention to complete three-way handshake with the Server, half-open SYN request occupied the Server’s memory faster. The result is that the Server could not respond to any other requests. This is a type of Denial of Service attack.&lt;br /&gt;
====Step 3: Trusted relationship hijacking====&lt;br /&gt;
Mitnick sent a SYN request to X-Terminal with spoofed IP address as the Server. He used an arbitrary number as the Server’s TCP sequence number. X-Terminal sent a SYN/ACK response to the Server. Because the Server was muted, it did not receive the SYN/ACK response. As mentioned in the information gathering step, Mitnick was able to generate the TCP sequence number that X-Terminal created for the Server. Mitnick, again spoofed his IP as the Server’s IP, sent an ACK response to X-Terminal to finish three-way handshake. Because the returned TCP sequence number was correct, X-Terminal allowed Mitnick connect to it. The connection was established. Shimomura’s computer was considered hacked by finishing this step.&lt;br /&gt;
====Step 4: Remote command pump====&lt;br /&gt;
Mitnick wanted to create a backdoor on Shimomura computer so that he could come back later without repeating the hijack. He pumped commands from his computer to Shimomura’s computer. To be precise, they were echo + + &amp;gt;&amp;gt; /.rhosts. The ++ allowed any computers connect to X-Terminal without being verified.&lt;br /&gt;
====Step 5: Clean up====&lt;br /&gt;
Mitnick sent RESET responses to the Server to cancel all his SYN requests. The Server was freed.&lt;br /&gt;
&lt;br /&gt;
== Detection ==&lt;br /&gt;
There is no specific mechanism to detect the Mitnick attack. However, a security analyst can combine several mechanisms to detect the attack. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
== Prevention==&lt;br /&gt;
Since now we know how Mitnick attacked Shimomura, we can easily prevent this kind of attack by simply randomize out TCP sequence number. However, nowadays Mitnick attack is no longer practical. Computer users use SSH instead of RSH like before.&lt;br /&gt;
==Comments==&lt;br /&gt;
The Mitnick attack was a classic case. Mitnick took advantage of yet-to-be-known weaknesses. After his case, computer security was taken seriously. New tools was developing to improve security. SSH is used to replace RSH. UNIX systems are built with security in mind.&lt;br /&gt;
&lt;br /&gt;
== Further readings ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Transport_Control_Protocol Transport control protocol]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Ip_spoofing IP address spoofing]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/OSI_model Open Systems Interconnection Basic Reference Model (OSI Model)]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Tsutomu Tsutomu Shimomura (the victim of the attack)]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick (the attacker)]&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
[http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&lt;br /&gt;
&lt;br /&gt;
[http://hack.pl/gfx/wywiady/Kevin_Mitnick.jpg Kevin Mitnick picture]&lt;br /&gt;
&lt;br /&gt;
Amazon.com: [http://www.amazon.com/Network-Intrusion-Detection-Analysts-Handbook/dp/0735708681 '''Network intrusion detection, an analyst's handbook''' by ''Stephen Northcutt'']&lt;br /&gt;
&lt;br /&gt;
==Other information security topics==&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Mitnickattack.JPG</id>
		<title>File:Mitnickattack.JPG</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Mitnickattack.JPG"/>
				<updated>2007-12-04T17:29:03Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-12-03T02:11:57Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Who is Mitnick? ==&lt;br /&gt;
[[Image:kevinmitnick.jpg|frame|right|Kevin Mitnick]]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in US. He hacked into [http://en.wikipedia.org/wiki/Tsutomu_Shimomura Tsutomu Shimomura]'s computer(referred as the target) to steal information on December 25, 1994. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prisons. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
== Overview ==&lt;br /&gt;
Kevin Mitnick used [http://en.wikipedia.org/wiki/Ip_spoofing IP spoofing], [http://en.wikipedia.org/wiki/Transmission_Control_Protocol#Using_TCP TCP(Internet Protocol Suite) sequence number] prediction to gain access control of target's computer. The Mitnick attack is a form of [http://en.wikipedia.org/wiki/Man_in_the_middle Man-in-the-middle attack]. It corrupted the [http://www.pccitizen.com/threewayhandshake.htm three-way handshake].&lt;br /&gt;
&lt;br /&gt;
== How did it happpen? ==&lt;br /&gt;
==== Preparation ====&lt;br /&gt;
First, Mitnick had to determine if there is a trusted connection between the target and any servers that it is connected to. Mitnick was able to predict the sequence number in the [http://en.wikipedia.org/wiki/Internet_protocol_suite TCP] header of the SYN/ACK packet. Being able to predict the sequence number allowed Mitnick to validate himself as the server.&lt;br /&gt;
&lt;br /&gt;
==== Step 1: SYN flooding ====&lt;br /&gt;
Mitnick sent SYN packets with fake IP address to the server continuously to keep the server from responding to genuine requests. When the server is flooded, it is considered muted, which means it cannot respond to any other requests. &lt;br /&gt;
&lt;br /&gt;
==== Step 2: Hijacking ====&lt;br /&gt;
Mitnick spoofed the server's IP address and sent a request to ebtablish a connection with the target.&lt;br /&gt;
&lt;br /&gt;
 Mitnick -----SYN-----&amp;gt; target : &amp;quot;I am your server and I want to connect to you&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The target accepted his request and demanded a three-way TCP connection handshake to validate the identity. To perform a three-way handshake, the target sent an SYN/ACK packet to the server.&lt;br /&gt;
&lt;br /&gt;
 target -----SYN/ACK-----&amp;gt; server : &amp;quot;You requested a connection. Now I want to confirm that. Send me your confirmation please.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
There are two cases now.&lt;br /&gt;
&lt;br /&gt;
1. If the server did send a request, it would send back an ACK packet to the server. A trusted connection is established.&lt;br /&gt;
 target &amp;lt;-----ACK----- server : &amp;quot;Yes, I confirm. Let's connect!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2. If the server did not send a request, it would send back a RST packet(RESET packet) to the server. The connection is dropped.&lt;br /&gt;
 target &amp;lt;-----RST----- server : &amp;quot;Sorry, I did not request it. There must be a mistake. Please drop the connection now.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Apparently, the server, which was being muted, could not send a RST packet to the target. This is where Mitnick sent an ACK packet to the target and completed three-way handshake.&lt;br /&gt;
  Mitnick -----ACK-----&amp;gt;target : &amp;quot;Yes, I confirm. Let's connect!&amp;quot;&lt;br /&gt;
The one way connectiong is established. Now the target was connected to Mitnick and would allow him to run any commands on the target.&lt;br /&gt;
&lt;br /&gt;
[http://img527.imageshack.us/img527/8462/86297598yt9.png Mitnick Attack Graph]&lt;br /&gt;
==== Step 3: Cleaning up ====&lt;br /&gt;
After successfully hacking into the target, he didn't want any attentions by keeping other users from logging into the server by sending out a series of RSTs to stop flooding the server.&lt;br /&gt;
== Detection ==&lt;br /&gt;
There is no specific mechanism to detect the Mitnick attack. However, a security analyst can combine several mechanisms to detect the attack. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
== Prevention==&lt;br /&gt;
The Mitnick attack was possible due to weaknesses in early implementation of TCP&lt;br /&gt;
== Further readings ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Transport_Control_Protocol Transport control protocol]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Ip_spoofing IP address spoofing]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/OSI_model Open Systems Interconnection Basic Reference Model (OSI Model)]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Tsutomu Tsutomu Shimomura (the victim of the attack)]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick (the attaker)]&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
[http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&lt;br /&gt;
&lt;br /&gt;
[http://hack.pl/gfx/wywiady/Kevin_Mitnick.jpg Kevin Mitnick picture]&lt;br /&gt;
&lt;br /&gt;
Amazon.com: [http://www.amazon.com/Network-Intrusion-Detection-Analysts-Handbook/dp/0735708681 '''Network intrusion detection, an analyst's handbook''' by ''Stephen Northcutt'']&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Kevinmitnick.jpg</id>
		<title>File:Kevinmitnick.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Kevinmitnick.jpg"/>
				<updated>2007-12-03T02:04:35Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Shimomura.jpg</id>
		<title>File:Shimomura.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Shimomura.jpg"/>
				<updated>2007-12-03T02:02:57Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-11-18T05:45:29Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Who is Mitnick? ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in US. He hacked into [http://en.wikipedia.org/wiki/Tsutomu_Shimomura Tsutomu Shimomura]'s computer(referred as the target) to steal information on December 25, 1994. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prisons. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
== Overview ==&lt;br /&gt;
Kevin Mitnick used [http://en.wikipedia.org/wiki/Ip_spoofing IP spoofing], [http://en.wikipedia.org/wiki/Transmission_Control_Protocol#Using_TCP TCP(Internet Protocol Suite) sequence number] prediction to gain access control of target's computer. The Mitnick attack is a form of [http://en.wikipedia.org/wiki/Man_in_the_middle Man-in-the-middle attack]. It corrupted the [http://www.pccitizen.com/threewayhandshake.htm three-way handshake].&lt;br /&gt;
&lt;br /&gt;
== How did it happpen? ==&lt;br /&gt;
==== Preparation ====&lt;br /&gt;
First, Mitnick had to determine if there is a trusted connection between the target and any servers that it is connected to. Mitnick was able to predict the sequence number in the [http://en.wikipedia.org/wiki/Internet_protocol_suite TCP] header of the SYN/ACK packet. Being able to predict the sequence number allowed Mitnick to validate himself as the server.&lt;br /&gt;
&lt;br /&gt;
==== Step 1: SYN flooding ====&lt;br /&gt;
Mitnick sent SYN packets with fake IP address to the server continuously to keep the server from responding to genuine requests. When the server is flooded, it is considered muted, which means it cannot respond to any other requests. &lt;br /&gt;
&lt;br /&gt;
==== Step 2: Hijacking ====&lt;br /&gt;
Mitnick spoofed the server's IP address and sent a request to ebtablish a connection with the target.&lt;br /&gt;
&lt;br /&gt;
 Mitnick -----SYN-----&amp;gt; target : &amp;quot;I am your server and I want to connect to you&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The target accepted his request and demanded a three-way TCP connection handshake to validate the identity. To perform a three-way handshake, the target sent an SYN/ACK packet to the server.&lt;br /&gt;
&lt;br /&gt;
 target -----SYN/ACK-----&amp;gt; server : &amp;quot;You requested a connection. Now I want to confirm that. Send me your confirmation please.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
There are two cases now.&lt;br /&gt;
&lt;br /&gt;
1. If the server did send a request, it would send back an ACK packet to the server. A trusted connection is established.&lt;br /&gt;
 target &amp;lt;-----ACK----- server : &amp;quot;Yes, I confirm. Let's connect!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2. If the server did not send a request, it would send back a RST packet(RESET packet) to the server. The connection is dropped.&lt;br /&gt;
 target &amp;lt;-----RST----- server : &amp;quot;Sorry, I did not request it. There must be a mistake. Please drop the connection now.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Apparently, the server, which was being muted, could not send a RST packet to the target. This is where Mitnick sent an ACK packet to the target and completed three-way handshake.&lt;br /&gt;
  Mitnick -----ACK-----&amp;gt;target : &amp;quot;Yes, I confirm. Let's connect!&amp;quot;&lt;br /&gt;
The one way connectiong is established. Now the target was connected to Mitnick and would allow him to run any commands on the target.&lt;br /&gt;
&lt;br /&gt;
[http://img527.imageshack.us/img527/8462/86297598yt9.png Mitnick Attack Graph]&lt;br /&gt;
==== Step 3: Cleaning up ====&lt;br /&gt;
After successfully hacking into the target, he didn't want any attentions by keeping other users from logging into the server by sending out a series of RSTs to stop flooding the server.&lt;br /&gt;
== Detection ==&lt;br /&gt;
There is no specific mechanism to detect the Mitnick attack. However, a security analyst can combine several mechanisms to detect the attack. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
== Prevention==&lt;br /&gt;
The Mitnick attack was possible due to weaknesses in early implementation of TCP&lt;br /&gt;
== Further readings ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Transport_Control_Protocol Transport control protocol]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Ip_spoofing IP address spoofing]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/OSI_model Open Systems Interconnection Basic Reference Model (OSI Model)]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Tsutomu Tsutomu Shimomura (the victim of the attack)]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick (the attaker)]&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
[http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&lt;br /&gt;
&lt;br /&gt;
[http://hack.pl/gfx/wywiady/Kevin_Mitnick.jpg Kevin Mitnick picture]&lt;br /&gt;
&lt;br /&gt;
Amazon.com: [http://www.amazon.com/Network-Intrusion-Detection-Analysts-Handbook/dp/0735708681 '''Network intrusion detection, an analyst's handbook''' by ''Stephen Northcutt'']&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-11-12T23:39:40Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Who is Mitnick? ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in US. He hacked into [http://en.wikipedia.org/wiki/Tsutomu_Shimomura Tsutomu Shimomura]'s computer(referred as the target) to steal information on December 25, 1994. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prisons. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
== Overview ==&lt;br /&gt;
Kevin Mitnick used [http://en.wikipedia.org/wiki/Ip_spoofing IP spoofing], [http://en.wikipedia.org/wiki/Transmission_Control_Protocol#Using_TCP TCP(Internet Protocol Suite) sequence number] prediction to gain access control of target's computer. The Mitnick attack is a form of [http://en.wikipedia.org/wiki/Man_in_the_middle Man-in-the-middle attack]. It corrupted the [http://www.pccitizen.com/threewayhandshake.htm three-way handshake].&lt;br /&gt;
&lt;br /&gt;
== How did it happpen? ==&lt;br /&gt;
==== Preparation ====&lt;br /&gt;
First, Mitnick had to determine if there is a trusted connection between the target and any servers that it is connected to. Mitnick was able to predict the sequence number in the [http://en.wikipedia.org/wiki/Internet_protocol_suite TCP] header of the SYN/ACK packet. Being able to predict the sequence number allowed Mitnick to validate himself as the server.&lt;br /&gt;
&lt;br /&gt;
==== Step 1: SYN flooding ====&lt;br /&gt;
Mitnick sent SYN packets with fake IP address to the server continuously to keep the server from responding to genuine requests. When the server is flooded, it is considered muted, which means it cannot respond to any other requests. &lt;br /&gt;
&lt;br /&gt;
==== Step 2: Hijacking ====&lt;br /&gt;
Mitnick spoofed the server's IP address and sent a request to ebtablish a connection with the target.&lt;br /&gt;
&lt;br /&gt;
 Mitnick -----SYN-----&amp;gt; target : &amp;quot;I am your server and I want to connect to you&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The target accepted his request and demanded a three-way TCP connection handshake to validate the identity. To perform a three-way handshake, the target sent an SYN/ACK packet to the server.&lt;br /&gt;
&lt;br /&gt;
 target -----SYN/ACK-----&amp;gt; server : &amp;quot;You requested a connection. Now I want to confirm that. Send me your confirmation please.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
There are two cases now.&lt;br /&gt;
&lt;br /&gt;
1. If the server did send a request, it would send back an ACK packet to the server. A trusted connection is established.&lt;br /&gt;
 target &amp;lt;-----ACK----- server : &amp;quot;Yes, I confirm. Let's connect!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2. If the server did not send a request, it would send back a RST packet(RESET packet) to the server. The connection is dropped.&lt;br /&gt;
 target &amp;lt;-----RST----- server : &amp;quot;Sorry, I did not request it. There must be a mistake. Please drop the connection now.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Apparently, the server, which was being muted, could not send a RST packet to the target. This is where Mitnick sent an ACK packet to the target and completed three-way handshake.&lt;br /&gt;
  Mitnick -----ACK-----&amp;gt;target : &amp;quot;Yes, I confirm. Let's connect!&amp;quot;&lt;br /&gt;
The one way connectiong is established. Now the target was connected to Mitnick and would allow him to run any commands on the target.&lt;br /&gt;
==== Step 3: Cleaning up ====&lt;br /&gt;
After successfully hacking into the target, he didn't want any attentions by keeping other users from logging into the server by sending out a series of RSTs to stop flooding the server.&lt;br /&gt;
== Detection ==&lt;br /&gt;
There is no specific mechanism to detect the Mitnick attack. However, a security analyst can combine several mechanisms to detect the attack. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
== Prevention==&lt;br /&gt;
The Mitnick attack was possible due to weaknesses in early implementation of TCP&lt;br /&gt;
== Further readings ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Transport_Control_Protocol Transport control protocol]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Ip_spoofing IP address spoofing]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/OSI_model Open Systems Interconnection Basic Reference Model (OSI Model)]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Tsutomu Tsutomu Shimomura (the victim of the attack)]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick (the attaker)]&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
[http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&lt;br /&gt;
&lt;br /&gt;
[http://hack.pl/gfx/wywiady/Kevin_Mitnick.jpg Kevin Mitnick picture]&lt;br /&gt;
&lt;br /&gt;
Amazon.com: [http://www.amazon.com/Network-Intrusion-Detection-Analysts-Handbook/dp/0735708681 '''Network intrusion detection, an analyst's handbook''' by ''Stephen Northcutt'']&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-11-12T23:34:10Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;/* External links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Who is Mitnick? ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in US. He hacked into [http://en.wikipedia.org/wiki/Tsutomu_Shimomura Tsutomu Shimomura]'s computer(referred as the target) to steal information on December 25, 1994. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prisons. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
== Overview ==&lt;br /&gt;
Kevin Mitnick used [http://en.wikipedia.org/wiki/Ip_spoofing IP spoofing], [http://en.wikipedia.org/wiki/Transmission_Control_Protocol#Using_TCP TCP(Internet Protocol Suite) sequence number] prediction to gain access control of target's computer. The Mitnick attack is a form of [http://en.wikipedia.org/wiki/Man_in_the_middle Man-in-the-middle attack]. It corrupted the [http://www.pccitizen.com/threewayhandshake.htm three-way handshake].&lt;br /&gt;
&lt;br /&gt;
== How did it happpen? ==&lt;br /&gt;
==== Preparation ====&lt;br /&gt;
First, Mitnick had to determine if there is a trusted connection between the target and any servers that it is connected to. Mitnick was able to predict the sequence number in the [http://en.wikipedia.org/wiki/Internet_protocol_suite TCP] header of the SYN/ACK packet. Being able to predict the sequence number allowed Mitnick to validate himself as the server.&lt;br /&gt;
&lt;br /&gt;
==== Step 1: SYN flooding ====&lt;br /&gt;
Mitnick sent SYN packets with fake IP address to the server continuously to keep the server from responding to genuine requests. When the server is flooded, it is considered muted, which means it cannot respond to any other requests. &lt;br /&gt;
&lt;br /&gt;
==== Step 2: Hijacking ====&lt;br /&gt;
Mitnick spoofed the server's IP address and sent a request to ebtablish a connection with the target.&lt;br /&gt;
&lt;br /&gt;
 Mitnick -----SYN-----&amp;gt; target : &amp;quot;I am your server and I want to connect to you&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The target accepted his request and demanded a three-way TCP connection handshake to validate the identity. To perform a three-way handshake, the target sent an SYN/ACK packet to the server.&lt;br /&gt;
&lt;br /&gt;
 target -----SYN/ACK-----&amp;gt; server : &amp;quot;You requested a connection. Now I want to confirm that. Send me your confirmation please.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
There are two cases now.&lt;br /&gt;
&lt;br /&gt;
1. If the server did send a request, it would send back an ACK packet to the server. A trusted connection is established.&lt;br /&gt;
 target &amp;lt;-----ACK----- server : &amp;quot;Yes, I confirm. Let's connect!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2. If the server did not send a request, it would send back a RST packet(RESET packet) to the server. The connection is dropped.&lt;br /&gt;
 target &amp;lt;-----RST----- server : &amp;quot;Sorry, I did not request it. There must be a mistake. Please drop the connection now.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Apparently, the server, which was being muted, could not send a RST packet to the target. This is where Mitnick sent an ACK packet to the target and completed three-way handshake.&lt;br /&gt;
  Mitnick -----ACK-----&amp;gt;target : &amp;quot;Yes, I confirm. Let's connect!&amp;quot;&lt;br /&gt;
The one way connectiong is established. Now the target was connected to Mitnick and would allow him to run any commands on the target.&lt;br /&gt;
==== Step 3: Cleaning up ====&lt;br /&gt;
After successfully hacking into the target, he didn't want any attentions by keeping other users from logging into the server by sending out a series of RSTs to stop flooding the server.&lt;br /&gt;
== Detection ==&lt;br /&gt;
There is no specific mechanism to detect the Mitnick attack. However, a security analyst can combine several mechanisms to detect the attack. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
== Prevention==&lt;br /&gt;
The Mitnick attack was possible due to weaknesses in early implementation of TCP&lt;br /&gt;
== External links ==&lt;br /&gt;
[http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&lt;br /&gt;
&lt;br /&gt;
[http://hack.pl/gfx/wywiady/Kevin_Mitnick.jpg Kevin Mitnick picture]&lt;br /&gt;
&lt;br /&gt;
Amazon.com: [http://www.amazon.com/Network-Intrusion-Detection-Analysts-Handbook/dp/0735708681 '''Network intrusion detection, an analyst's handbook''' by ''Stephen Northcutt'']&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-11-12T23:28:35Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Who is Mitnick? ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in US. He hacked into [http://en.wikipedia.org/wiki/Tsutomu_Shimomura Tsutomu Shimomura]'s computer(referred as the target) to steal information on December 25, 1994. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prisons. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
== Overview ==&lt;br /&gt;
Kevin Mitnick used [http://en.wikipedia.org/wiki/Ip_spoofing IP spoofing], [http://en.wikipedia.org/wiki/Transmission_Control_Protocol#Using_TCP TCP(Internet Protocol Suite) sequence number] prediction to gain access control of target's computer. The Mitnick attack is a form of [http://en.wikipedia.org/wiki/Man_in_the_middle Man-in-the-middle attack]. It corrupted the [http://www.pccitizen.com/threewayhandshake.htm three-way handshake].&lt;br /&gt;
&lt;br /&gt;
== How did it happpen? ==&lt;br /&gt;
==== Preparation ====&lt;br /&gt;
First, Mitnick had to determine if there is a trusted connection between the target and any servers that it is connected to. Mitnick was able to predict the sequence number in the [http://en.wikipedia.org/wiki/Internet_protocol_suite TCP] header of the SYN/ACK packet. Being able to predict the sequence number allowed Mitnick to validate himself as the server.&lt;br /&gt;
&lt;br /&gt;
==== Step 1: SYN flooding ====&lt;br /&gt;
Mitnick sent SYN packets with fake IP address to the server continuously to keep the server from responding to genuine requests. When the server is flooded, it is considered muted, which means it cannot respond to any other requests. &lt;br /&gt;
&lt;br /&gt;
==== Step 2: Hijacking ====&lt;br /&gt;
Mitnick spoofed the server's IP address and sent a request to ebtablish a connection with the target.&lt;br /&gt;
&lt;br /&gt;
 Mitnick -----SYN-----&amp;gt; target : &amp;quot;I am your server and I want to connect to you&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The target accepted his request and demanded a three-way TCP connection handshake to validate the identity. To perform a three-way handshake, the target sent an SYN/ACK packet to the server.&lt;br /&gt;
&lt;br /&gt;
 target -----SYN/ACK-----&amp;gt; server : &amp;quot;You requested a connection. Now I want to confirm that. Send me your confirmation please.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
There are two cases now.&lt;br /&gt;
&lt;br /&gt;
1. If the server did send a request, it would send back an ACK packet to the server. A trusted connection is established.&lt;br /&gt;
 target &amp;lt;-----ACK----- server : &amp;quot;Yes, I confirm. Let's connect!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2. If the server did not send a request, it would send back a RST packet(RESET packet) to the server. The connection is dropped.&lt;br /&gt;
 target &amp;lt;-----RST----- server : &amp;quot;Sorry, I did not request it. There must be a mistake. Please drop the connection now.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Apparently, the server, which was being muted, could not send a RST packet to the target. This is where Mitnick sent an ACK packet to the target and completed three-way handshake.&lt;br /&gt;
  Mitnick -----ACK-----&amp;gt;target : &amp;quot;Yes, I confirm. Let's connect!&amp;quot;&lt;br /&gt;
The one way connectiong is established. Now the target was connected to Mitnick and would allow him to run any commands on the target.&lt;br /&gt;
==== Step 3: Cleaning up ====&lt;br /&gt;
After successfully hacking into the target, he didn't want any attentions by keeping other users from logging into the server by sending out a series of RSTs to stop flooding the server.&lt;br /&gt;
== Detection ==&lt;br /&gt;
There is no specific mechanism to detect the Mitnick attack. However, a security analyst can combine several mechanisms to detect the attack. Basically, the attack can be detected by both network-based and host-based intrusion detection systems ([http://en.wikipedia.org/wiki/Intrusion_detection_system IDS]). For network-based IDS, port scan and host scan can be used to detect a potential attack. For host-based IDS, the attack can be detected using two commonly used UNIX tool, ''TCP wrappers'' and ''tripwire''. For further details, refer to the book '''Network Intrusion Detection, an analyst's hand book''' by ''Stephen Northcutt'' (ISBN: 0-7357-0868-1)&lt;br /&gt;
== Prevention==&lt;br /&gt;
The Mitnick attack was possible due to weaknesses in early implementation of TCP&lt;br /&gt;
== External links ==&lt;br /&gt;
[http://www.youtube.com/watch?v=8_VYWefmy34 An interview with Mitnick]&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-11-10T20:59:19Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Who is Mitnick? ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in US. He hacked into [http://en.wikipedia.org/wiki/Tsutomu_Shimomura Tsutomu Shimomura]'s computer(referred as the target) to steal information on December 25, 1994. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prisons. Now he is a security consultant in his own firm [http://www.mitnicksecurity.com/index.php Mitnick Security Consulting].&lt;br /&gt;
== Overview ==&lt;br /&gt;
Kevin Mitnick used [http://en.wikipedia.org/wiki/Ip_spoofing IP spoofing], [http://en.wikipedia.org/wiki/Transmission_Control_Protocol#Using_TCP TCP(Internet Protocol Suite) sequence number] prediction to gain access control of target's computer. The Mitnick attack is a form of [http://en.wikipedia.org/wiki/Man_in_the_middle Man-in-the-middle attack]. It corrupted the [http://www.pccitizen.com/threewayhandshake.htm three-way handshake].&lt;br /&gt;
&lt;br /&gt;
== How did it happpen? ==&lt;br /&gt;
==== Preparation ====&lt;br /&gt;
First, Mitnick had to determine if there is a trusted connection between the target and any servers that it is connected to. Mitnick was able to predict the sequence number in the [http://en.wikipedia.org/wiki/Internet_protocol_suite TCP] header of the SYN/ACK packet. Being able to predict the sequence number allowed Mitnick to validate himself as the server.&lt;br /&gt;
&lt;br /&gt;
==== Step 1: SYN flooding ====&lt;br /&gt;
Mitnick sent SYN packets with fake IP address to the server continuously to keep the server from responding to genuine requests. When the server is flooded, it is considered muted, which means it cannot respond to any other requests. &lt;br /&gt;
&lt;br /&gt;
==== Step 2: Hijacking ====&lt;br /&gt;
Mitnick spoofed the server's IP address and sent a request to ebtablish a connection with the target.&lt;br /&gt;
&lt;br /&gt;
 Mitnick -----SYN-----&amp;gt; target : &amp;quot;I am your server and I want to connect to you&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The target accepted his request and demanded a three-way TCP connection handshake to validate the identity. To perform a three-way handshake, the target sent an SYN/ACK packet to the server.&lt;br /&gt;
&lt;br /&gt;
 target -----SYN/ACK-----&amp;gt; server : &amp;quot;You requested a connection. Now I want to confirm that. Send me your confirmation please.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
There are two cases now.&lt;br /&gt;
&lt;br /&gt;
1. If the server did send a request, it would send back an ACK packet to the server. A trusted connection is established.&lt;br /&gt;
 target &amp;lt;-----ACK----- server : &amp;quot;Yes, I confirm. Let's connect!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2. If the server did not send a request, it would send back a RST packet(RESET packet) to the server. The connection is dropped.&lt;br /&gt;
 target &amp;lt;-----RST----- server : &amp;quot;Sorry, I did not request it. There must be a mistake. Please drop the connection now.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Apparently, the server, which was being muted, could not send a RST packet to the target. This is where Mitnick sent an ACK packet to the target and completed three-way handshake.&lt;br /&gt;
  Mitnick -----ACK-----&amp;gt;target : &amp;quot;Yes, I confirm. Let's connect!&amp;quot;&lt;br /&gt;
The one way connectiong is established. Now the target was connected to Mitnick and would allow him to run any commands on the target.&lt;br /&gt;
==== Step 3: Cleaning up ====&lt;br /&gt;
After successfully hacking into the target, he didn't want any attentions by keeping other users from logging into the server by sending out a series of RSTs to stop flooding the server.&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-11-10T20:36:25Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Who is Mitnick? ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in US. He hacked into [http://en.wikipedia.org/wiki/Tsutomu_Shimomura Tsutomu Shimomura]'s computer(referred as the target) to steal information on December 25, 1994. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prisons.&lt;br /&gt;
== Overview ==&lt;br /&gt;
Kevin Mitnick used [http://en.wikipedia.org/wiki/Ip_spoofing IP spoofing], [http://en.wikipedia.org/wiki/Transmission_Control_Protocol#Using_TCP TCP sequence number] prediction to gain access control of target's computer. The Mitnick attack is a form of [http://en.wikipedia.org/wiki/Man_in_the_middle Man-in-the-middle attack]. It corrupted the [http://www.pccitizen.com/threewayhandshake.htm three-way handshake].&lt;br /&gt;
&lt;br /&gt;
== How did it happpen? ==&lt;br /&gt;
First, Mitnick had to determine if there is a trusted connection between the target and any servers that it is connected to. If there is, he now can start the attack.&lt;br /&gt;
==== Preparation ====&lt;br /&gt;
Mitnick was able to predict the sequence number in the TCP header of the SYN/ACK packet. Being able to predict the sequence number allowed Mitnick to validate himself as the server.&lt;br /&gt;
&lt;br /&gt;
==== Step 1: SYN flooding ====&lt;br /&gt;
Mitnick sent SYN packets with fake IP address to the server continuously to keep the server from responding to genuine requests.&lt;br /&gt;
&lt;br /&gt;
==== Step 2: Hijacking ====&lt;br /&gt;
Mitnick spoofed the server's IP address and sent a request to ebtablish a connection with the target.&lt;br /&gt;
&lt;br /&gt;
 Mitnick -----SYN-----&amp;gt; target : &amp;quot;I am your server and I want to connect to you&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The target accepted his request and demanded a three-way TCP connection handshake to validate the identity. To perform a three-way handshake, the target sent an SYN/ACK packet to the server.&lt;br /&gt;
&lt;br /&gt;
 target -----SYN/ACK-----&amp;gt; server : &amp;quot;You requested a connection. Now I want to confirm that. Send me your confirmation please.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
There are two cases now.&lt;br /&gt;
&lt;br /&gt;
1. If the server did send a request, it would send back an ACK packet to the server. A trusted connection is established.&lt;br /&gt;
 target &amp;lt;-----ACK----- server : &amp;quot;Yes, I confirm. Let's connect!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2. If the server did not send a request, it would send back a RST packet(RESET packet) to the server. The connection is dropped.&lt;br /&gt;
 target &amp;lt;-----RST----- server : &amp;quot;Sorry, I did not request it. There must be a mistake. Please drop the connection now.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Apparently, the server, which was being muted, could not send a RST packet to the target. This is where Mitnick sent an ACK packet to the target and completed three-way handshake.&lt;br /&gt;
  Mitnick -----ACK-----&amp;gt;target : &amp;quot;Yes, I confirm. Let's connect!&amp;quot;&lt;br /&gt;
The one way connectiong is established. Now the target was connected to Mitnick and would allow him to run any commands on the target.&lt;br /&gt;
==== Step 3: Cleaning up ====&lt;br /&gt;
After successfully hacking into the target, he didn't want any attentions by keeping other users from logging into the server by sending out a series of RSTs to stop flooding the server.&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-11-10T19:44:38Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Who is Mitnick? ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Mitnick Kevin Mitnick](born October 6, 1963) is known as &amp;quot;the most famous&amp;quot; hacker in US. He hacked into [http://en.wikipedia.org/wiki/Tsutomu_Shimomura Tsutomu Shimomura]'s computer(referred as the target) to steal information on December 25, 1994. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prisons.&lt;br /&gt;
== Overview ==&lt;br /&gt;
The Mitnick attack exploited the weakness of [http://en.wikipedia.org/wiki/Remote_Shell rsh] using [http://en.wikipedia.org/wiki/Ip_spoofing IP spoofing] and [http://en.wikipedia.org/wiki/Transmission_Control_Protocol#Using_TCP TCP sequence number] prediction to gain access control of target's cmputer.&lt;br /&gt;
&lt;br /&gt;
== How can it happpen? ==&lt;br /&gt;
First, Mitnick had to determine if there is a trusted connection between the target and any servers that it is connected to. If there is, he now can start the attack.&lt;br /&gt;
&lt;br /&gt;
== Step 1: IP spoofing (I am Tsutomu!)==&lt;br /&gt;
Mitnick spoofed Tsutomu's IP address and sent a request to ebtablish a connection with the server.&lt;br /&gt;
&lt;br /&gt;
          Mitnick -----SYN-----&amp;gt; server : &amp;quot;I am Tsutomu and I want to connect to you&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The server accepted his request and demanded a three-way TCP connection handshake to validate the identity. To perform a three-way handshake, the server sent an SYN/ACK packet to the target's IP address.&lt;br /&gt;
&lt;br /&gt;
          server -----SYN/ACK-----&amp;gt; target : &amp;quot;You requested a connection. Now I want to confirm that. Send me your confirmation please.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
There are two cases now.&lt;br /&gt;
&lt;br /&gt;
1. If the target did send a request, it would send back an ACK packet to the server. A trusted connection is established.&lt;br /&gt;
          server &amp;lt;-----ACK----- target : &amp;quot;Yes, I confirm. Let's connect!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2. If the target did not send a request, it would send back a RST packet(RESET packet) to the server. The connection is dropped.&lt;br /&gt;
          server &amp;lt;-----RST----- target : &amp;quot;Sorry, I did not request it. There must be a mistake. Please drop the connection now.&amp;quot;&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_mitnick_attack</id>
		<title>The mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_mitnick_attack"/>
				<updated>2007-11-03T04:31:49Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;The mitnick attack moved to The Mitnick attack: capitalize name&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[The Mitnick attack]]&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-11-03T04:31:49Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;The mitnick attack moved to The Mitnick attack: capitalize name&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;An attack by Kevin Mitnick.&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack</id>
		<title>The Mitnick attack</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack"/>
				<updated>2007-11-03T04:30:35Z</updated>
		
		<summary type="html">&lt;p&gt;Luongqt:&amp;#32;New page: An attack by Kevin Mitnick.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;An attack by Kevin Mitnick.&lt;/div&gt;</summary>
		<author><name>Luongqt</name></author>	</entry>

	</feed>