网络安全代写|Create Two Ten-minute Videos On Virtual Labs

本次英国代写是一个网络安全相关的Lab,需要用到wireshark

Assessment 

The CEO of the company requested you to produce two videos. Each video needs to cover a specific and relevant part of what you have faced during the lab sessions and cannot be more than 10 minutes long.

You can use Kaltura Capture software to create the videos, or whatever software you are comfortable with.

The CEO wants that each video to:

· introduce the scenario that you are about to show

· show your expertise in performing the commands given in the instructions

· guide a non-expert user to use each command and to make her understanding the outputs displayed.

For the lab, we will be looking at both denial of service and IP spoofing. In other to achieve this, we require to be the attacker, Victim 1 and Victim.

Book 2.14 Virtual lab

Project Topic: Denial of service and IP spoofing

You can use the following VM Control Panel or other Window VM to recorded video.

https://student-vms.nms.kcl.ac.uk/settings

https://apps.nms.kcl.ac.uk/wiki/doku.php?id=computingsupport:services:remote:external#configuring_an_ssh_rsa_key_pai

Step Virtual lab

In this lab, you are going to conduct both a denial of service attack (using SYN flooding) and an IP spoofing attack combined together. The idea is that you will have one machine (ATTACKER) conducting a denial of service attack on another machine (VICTIM-1), and for that aim the attacker will spoof the IP of another machine (VICTIM-2), so that victim1 thinks the denial of service attack is coming from victim2 instead of from the attacker.

You will start by learning how to conduct IP spoofing in the first place and set the TCP SYN flag in any packets sent, and then you will conduct a combined attack using both IP spoofing and SYN flooding. Recall from previous labs that, in order to get the IP of a particular VM, you will need to execute it in:

ifconfig 

IMPORTANT: make sure at all times during this lab that the IP address you use in the commands below are on the VM IP range. Otherwise you might be causing trouble to the college network!

 

Setting the environment

For this practical, we will use two main tools: Wireshark, which you already used in a previous lab, and hping3. hping3 is a free packet generator and analyser for the TCP/IP protocol. hping3 is able to send custom TCP/IP packets and to display target replies like the PING program does with ICMP replies. Note that hping3 is a convenient tool, but you could do exactly the same yourself by creating a program that opens up a raw socket (eg both C and Python languages have libraries for this – see the optional exercise at the end) so that you could directly create IP and TCP packets and manipulate the IP and TCP headers of the packets you create (eg to modify the source IP field to spoof the IP of victim2) and send them over the network.

To get to know more about all the options available in hping3, in the ATTACKER machine, open a terminal and then type:

hping3 –help

Next, to set the environment for this exercise, we will start Wireshark on the victim machine so we can inspect the traffic created during the attack better. You can do this as you did in a previous lab. As a reminder, to start Wireshark in VICTIM-1, click on the ‘Ethernet’ capture. In the display filter, type TCP, and click the right (blue) arrow to apply the filter to only include TCP traffic.

 

Sending packets with the SYN flag on

The first thing you are going to do is to craft packets that have the SYN flag on and send them to VICTIM-1. That is, instead of creating a full TCP connection, you will just send the first message of the TCP Three-Way Handshake. You could do this programmatically (see the optional exercise at the end), but for simplicity, we are going to use the hping3 tool.

You can send a TCP datagram to VICTIM-1 from the attacker terminal by executing:

sudo hping3 <IP of VICTIM-1> -S -p 22

What ‘-S’ does is it sets the SYN flag in the TCP header of all packets sent by hping3. Therefore, all packets sent seem to try to create a TCP connection with VICTIM-1.

What is ‘-p 22’ doing? Have a look at hping3 help and try to answer this. Also, why 22 and not any other number?

Now, turn to Wireshark in VICTIM-1 and observe the traffic. What did you observe? Which two machines seem to be talking to each other? What TCP flags are set in the TCP headers? Why?

Note that hping3 will keep sending packets until you terminate it. You can do it from the terminal with Ctrl-C.

 

IP spoofing

Now, you are going to do the same but with spoofing the origin, so that VICTIM-1 will think that the TCP packets with the SYN flag on are coming from VICTIM-2 instead of from the ATTACKER. To show the spoofed SYN packets sent in a SYN flooding attack type in the ATTACKER machine (note you need to prepend ‘sudo’ as it requires root privileges):

sudo hping3 <IP of VICTIM-1> -S -a <IP of VICTIM-2> -p 22

What ‘–a <IP of VICTIM-2>’ does is to spoof the IP address provided and put it in the source field of the IP header of any packets hping3 sends, effectively spoofing it. In other words, when VICTIM-1 receives any packets, it will think the packets come from VICTIM-2.

Observe the packets captured on Wireshark in VICTIM-1. What did you observe? Which two machines seem to be talking to each other? What TCP flags are set in the TCP headers? Why?

On the ATTACKER, stop sending packets with Ctrl-C.

 

DoS attack with IP spoofing

Now, you are going to increase the frequency of hping3 sending spoofed packets with the SYN flag to flood the victim. For that, in the ATTACKER machine type:

sudo hping3 <IP VICTIM-1> -S -a <IP VICTIM-2> -p 22 –flood

Again, observe the packets captured on Wireshark. Wireshark on the victim machine of the denial of service will likely become unresponsive. Either wait for it to catch up (after stopping the flood from the attacker), or force-quit Wireshark (you can do this from a terminal with ‘killall -9 wireshark’). In some cases, you may even need to reboot the VM.

Stop the flood at any time with Ctrl-C.

Basically, what ‘–flood’ does is not waiting for a response (which will already be sent to the spoofed IP address of VICTIM-2) and not printing anything so as to send as many packets as possible, and to ultimately send packets faster.

Finally, go back again to the help of hping3 and explore and try further options and attacks.

If you are not clear about answers to some of the above questions, make a note and ask your tutor to clarify in the next webinar.

 

Play with raw sockets (optional)

Would you like to write a program yourself that conducts IP spoofing and SYN flooding instead of using hping3? You can base on the open-source educational ‘spoof’ program written in the C language by Purdue University (opens in a new window)(opens in a new tab) which shows the source code in C to do IP spoofing. You could extend it to do SYN flooding too.