SlideShare una empresa de Scribd logo
1 de 37
Dos & Ddos Attack
Man in The Middle
Attack
Presented by Kanan Amirov
Rauf Asadov
Outline
 Types of attacks
 What is Dos and Dos attack?
 Types of DoS Attack
 Symptoms of attack and preventative measures
 Man in the Middle Attack
Common Types of attacks
 Eavesdropping
 Data Modification
 Identity Spoofing (IP Address Spoofing)
 Password-Based Attacks
 Denial-of-Service Attack (DoS)
 Man-in-the-Middle Attack
 Compromised-Key Attack
 Application-Layer Attack
 Sniffer Attack
What is Dos and DDos attacks?
DoS
 In a denial-of-service (DoS)
attack, an attacker attempts
to prevent legitimate users
from accessing information or
services.
DDoS
 In a distributed denial-of-
service (DDoS) attack, an
attacker may use your
computer to attack another
computer.
Difference of DoS and DDoS Attacks
 DoS = when a single host
attacks
 DDoS = when multiple hosts
attack at the same time
Types of DoS Attack
Some of the most commonly used DDoS attack types include:
 Penetration
 Eavesdropping
 Man-In-The-Middle
 Flooding
 Attacker gets inside your machine
 Can take over machine and do whatever he wants
 Achieves entry via software flaw(s), stolen passwords
or insider access
Penetration
Eavesdropping
 Attacker gains access to same network
 Listens to traffic going in and out of your machine
Man-In-The-Middle
 Attacker listens to output and controls output
 Can substitute messages in both directions
Flooding
 Attacker sends an overwhelming number of messages at
your machine; great congestion
 The congestion may occur in the path before your
machine
 Messages from legitimate users are crowded out
 Usually called a Denial of Service (DoS) attack, because
that’s the effect
 Usually involves a large number of machines, hence
Distributed Denial of Service (DDoS) attack
Symptoms of attack and preventative measures
 Unusually slow network performance, unavailability of a particular
website, inability to access any website, and dramatic increase in the
amount of spam you receive.
 Symptoms could stem from hardware or software problems and
mistaken for a DoS.
 Users can take steps to prevent becoming part of a botnet:
◦ Install and use Anti-virus software
◦ Setup a firewall to protect your system from unauthorized access
◦Use common sense security practices to avoid malware, trojans
and viruses
Man in the Middle
Attack
Public key cryptography is generally used in two ways:
1. by generating a shared secret at both ends of the communications link (key agreement)
2. by sending a secret to the other end of the communications link (key transport)
Diffie-Hellman key agreement scheme
RSA (Rivest, Shamir, Adleman) scheme
Alice and Bob knows p and g
a b
Alice’s public key 𝑔 𝑎
𝑚𝑜𝑑 𝑝
Bob’s public key 𝑔 𝑏 𝑚𝑜𝑑 𝑝
Shared key (𝑔 𝑏
𝑚𝑜𝑑 𝑝) 𝑎
𝑚𝑜𝑑 𝑝 Shared key (𝑔 𝑎
𝑚𝑜𝑑 𝑝) 𝑏
𝑚𝑜𝑑 𝑝
Key agreement schemes are vulnerable to man-in-
the-middle attacks
What is Man-in-the-Middle Attack?
■ In cryptography and computer security, a man-in-the-
middle attack (MITM) also known as “hijacking” is
an attack where the attacker secretly relays and
possibly alters the communication between two
parties who believe they are directly communicating
with each other.
Man-in-the-Middle (MITM) Attack Concept
a b
Alice’s public key 𝑔 𝑎
𝑚𝑜𝑑 𝑝
Bob’s public key 𝑔 𝑏
𝑚𝑜𝑑 𝑝
c
Anonym's public key 𝑔 𝑐
𝑚𝑜𝑑 𝑝
Bob’s public key 𝑔 𝑐
𝑚𝑜𝑑 𝑝
Alice’s public key 𝑔 𝑐
𝑚𝑜𝑑 𝑝
Shared key (𝑔 𝑐
𝑚𝑜𝑑 𝑝) 𝑎
𝑚𝑜𝑑 𝑝 Shared key (𝑔 𝑐
𝑚𝑜𝑑 𝑝) 𝑏
𝑚𝑜𝑑 𝑝
Man-in-the-middle attack types
“A passive attack is one in
which the attacker is only
able to monitor the
communications
channel.
Passive Active
An active attack is one in
which the attacker
attempts to add, delete,
or modify messages.
Threatens confidentiality
Threatens both
confidentiality and data
integrity
…EXAMPLES…
■Wi-Fi Eavesdropping
The hacker can create a fake Wi-Fi node disguised as a
legitimate Wi-Fi access point to steal the personal information of
everyone who connects.
■Email Hijacking
The hacker gain access to important email accounts, and he will
monitor the transactions. For example, they can wait for a
scenario where the customer will be sending money and
respond, spoofing the company’s email address, with their own
bank details instead of the company’s. This way, the customer
thinks they’re sending their payment to the company, but they’re
really sending it right to the hacker.
…EXAMPLES…(CONT)
■Session Hijacking
Once you log into a website, a connection between your
computer and the website is established. Hackers can hijack
your session with the website through numerous means. One
popular option they use is stealing your browser cookies. In case
you don’t know, cookies store small pieces of information that
makes web browsing convenient for you. It can be your online
activity, login credentials, pre-fill forms, and in some cases, your
location. If they got hold of your login cookies, they can easily
log into your accounts and assume your identity.
MITM TECHNIQUES
Man-in-the-middle attacks can be accomplished using a variety
of methods
■ARP poisoning- ARP (Address Resolution Protocol)
spoofing is also known as "ARP spoofing " or ARP Poison
Routing. The attacker may use ARP spoofing to sniff data
frames on LAN and to modify the packets. The attacker
may corrupt the ARP caches of directly connected hosts
and finally take over the IP address of the victim host.
This requires that the attacker be on the same Ethernet
segment as either the victim or the host with which it is
communicating.
ARP cache
IP Address MAC Address
192.168.0.1 00:00:00:00:00:00
who is 192.168.0.1? I am 192.168.0.1
ARP request ARP reply
ARP cache
IP Address
192.168.0.1 00:00:00:00:00:00
192.168.0.1 f2:f2:f2:f2:f2:f2
MAC Address
who is 192.168.0.1? who is 192.168.0.1?
I am 192.168.0.1 I am 192.168.0.1
Man-in-the-middle attacks can be accomplished using a variety
of methods (CONT)
■DNS spoofing- The attacker starts by sniffing the ID of
any DNS request, and then replies to the target requests
before the real DNS server.
Defense and Detection
Encrypt, Encrypt, and Encrypt
■SSL/TLS Certificates will prevent you from connecting
through the MitM.
If your website still uses the more vulnerable HTTP protocol, it’s
time to upgrade to the safer HTTPS protocol through SSL/TLS
Certificates. A TLS Certificate will activate the HTTPS protocol,
which is the safer version of HTTP. This allows an encrypted,
secure connection between your server and your clients’
computers, keeping all information from prying hackers.
■Tunnel into a trusted endpoint IPSEC(Internet Protocol
security), SSH(Secure SHell) tunnels, VPN, Proxies
■Use the latest version of software (e.g. browsers)
■To stop ARP poisoning, use network switches that have
MAC binding features. Switches with MAC binding store
the first MAC address that appears on a port and do not
allow the mapping to be changed without authentication.
■The second generation of the WPA security protocol
(WPA2) is based on the final IEEE 802.11i amendment to
the 802.11 standard. It uses AES encryption which makes
it more secure compared to WEP and WPA protocols.
The main vulnerability of WPA2 is the encryption done at
WPA2 only is effective for who is kept outside the
network.
Demonstrating a Man in the Middle
Attack using ARPspoof tool
Sender Receiver
What do we need?
Any Question

Más contenido relacionado

La actualidad más candente

Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackKaustubh Padwad
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Gaurav Sharma
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Amit Tyagi
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2Scott Sutherland
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanningamiable_indian
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
Ch 10: Hacking Web Servers
Ch 10: Hacking Web ServersCh 10: Hacking Web Servers
Ch 10: Hacking Web ServersSam Bowne
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionAPNIC
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security AttacksSajid Hasan
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game Rahul Neel Mani
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printingleminhvuong
 

La actualidad más candente (20)

Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Ddos attacks
Ddos attacksDdos attacks
Ddos attacks
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Xss attack
Xss attackXss attack
Xss attack
 
Man in the middle
Man in the middleMan in the middle
Man in the middle
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Ch 10: Hacking Web Servers
Ch 10: Hacking Web ServersCh 10: Hacking Web Servers
Ch 10: Hacking Web Servers
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security Attacks
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
 

Similar a Dos & DDoS Attack Types, MITM Explained

You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attacktaufiq463421
 
Denial of services : limiting the threat
Denial of services : limiting the threatDenial of services : limiting the threat
Denial of services : limiting the threatSensePost
 
types of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptxtypes of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptxtaufiq463421
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptxsakshiyad2611
 
Computer hacking
Computer hackingComputer hacking
Computer hackingArjun Tomar
 
DENGAROUS CYBER ATTACKS
DENGAROUS CYBER ATTACKSDENGAROUS CYBER ATTACKS
DENGAROUS CYBER ATTACKSHackingmantra
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9Geoff Pesimo
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTDHRUV562167
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 

Similar a Dos & DDoS Attack Types, MITM Explained (20)

You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Denail of Service
Denail of ServiceDenail of Service
Denail of Service
 
basic knowhow hacking
basic knowhow hackingbasic knowhow hacking
basic knowhow hacking
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attack
 
Network Security
Network SecurityNetwork Security
Network Security
 
Denial of services : limiting the threat
Denial of services : limiting the threatDenial of services : limiting the threat
Denial of services : limiting the threat
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
types of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptxtypes of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptx
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Security threats
Security threatsSecurity threats
Security threats
 
DENGAROUS CYBER ATTACKS
DENGAROUS CYBER ATTACKSDENGAROUS CYBER ATTACKS
DENGAROUS CYBER ATTACKS
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Lecture 1-2.pptx
Lecture 1-2.pptxLecture 1-2.pptx
Lecture 1-2.pptx
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 

Más de marada0033

Modern face recognition with deep learning Script
Modern face recognition with deep learning ScriptModern face recognition with deep learning Script
Modern face recognition with deep learning Scriptmarada0033
 
Intelligent Agents
Intelligent AgentsIntelligent Agents
Intelligent Agentsmarada0033
 
Modern face recognition with deep learning
Modern face recognition with deep learningModern face recognition with deep learning
Modern face recognition with deep learningmarada0033
 
Neural network
Neural networkNeural network
Neural networkmarada0033
 
Introduction to Computer Engineering. Motherboard.
Introduction to Computer Engineering. Motherboard.Introduction to Computer Engineering. Motherboard.
Introduction to Computer Engineering. Motherboard.marada0033
 
Protected addressing mode and Paging
Protected addressing mode and PagingProtected addressing mode and Paging
Protected addressing mode and Pagingmarada0033
 
Audio spotlight
Audio spotlightAudio spotlight
Audio spotlightmarada0033
 
Babəkin Başçılığı Altında Azadlıq Hərəkatı
Babəkin Başçılığı Altında Azadlıq HərəkatıBabəkin Başçılığı Altında Azadlıq Hərəkatı
Babəkin Başçılığı Altında Azadlıq Hərəkatımarada0033
 
Wireless Power Transmission
Wireless Power TransmissionWireless Power Transmission
Wireless Power Transmissionmarada0033
 

Más de marada0033 (10)

Modern face recognition with deep learning Script
Modern face recognition with deep learning ScriptModern face recognition with deep learning Script
Modern face recognition with deep learning Script
 
Intelligent Agents
Intelligent AgentsIntelligent Agents
Intelligent Agents
 
Modern face recognition with deep learning
Modern face recognition with deep learningModern face recognition with deep learning
Modern face recognition with deep learning
 
Neural network
Neural networkNeural network
Neural network
 
Introduction to Computer Engineering. Motherboard.
Introduction to Computer Engineering. Motherboard.Introduction to Computer Engineering. Motherboard.
Introduction to Computer Engineering. Motherboard.
 
Protected addressing mode and Paging
Protected addressing mode and PagingProtected addressing mode and Paging
Protected addressing mode and Paging
 
Audio spotlight
Audio spotlightAudio spotlight
Audio spotlight
 
Java J2ME
Java J2MEJava J2ME
Java J2ME
 
Babəkin Başçılığı Altında Azadlıq Hərəkatı
Babəkin Başçılığı Altında Azadlıq HərəkatıBabəkin Başçılığı Altında Azadlıq Hərəkatı
Babəkin Başçılığı Altında Azadlıq Hərəkatı
 
Wireless Power Transmission
Wireless Power TransmissionWireless Power Transmission
Wireless Power Transmission
 

Último

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Último (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Dos & DDoS Attack Types, MITM Explained

  • 1. Dos & Ddos Attack Man in The Middle Attack Presented by Kanan Amirov Rauf Asadov
  • 2. Outline  Types of attacks  What is Dos and Dos attack?  Types of DoS Attack  Symptoms of attack and preventative measures  Man in the Middle Attack
  • 3. Common Types of attacks  Eavesdropping  Data Modification  Identity Spoofing (IP Address Spoofing)  Password-Based Attacks  Denial-of-Service Attack (DoS)  Man-in-the-Middle Attack  Compromised-Key Attack  Application-Layer Attack  Sniffer Attack
  • 4. What is Dos and DDos attacks?
  • 5. DoS  In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. DDoS  In a distributed denial-of- service (DDoS) attack, an attacker may use your computer to attack another computer.
  • 6. Difference of DoS and DDoS Attacks  DoS = when a single host attacks  DDoS = when multiple hosts attack at the same time
  • 7. Types of DoS Attack Some of the most commonly used DDoS attack types include:  Penetration  Eavesdropping  Man-In-The-Middle  Flooding
  • 8.  Attacker gets inside your machine  Can take over machine and do whatever he wants  Achieves entry via software flaw(s), stolen passwords or insider access Penetration
  • 9. Eavesdropping  Attacker gains access to same network  Listens to traffic going in and out of your machine
  • 10. Man-In-The-Middle  Attacker listens to output and controls output  Can substitute messages in both directions
  • 11. Flooding  Attacker sends an overwhelming number of messages at your machine; great congestion  The congestion may occur in the path before your machine  Messages from legitimate users are crowded out  Usually called a Denial of Service (DoS) attack, because that’s the effect  Usually involves a large number of machines, hence Distributed Denial of Service (DDoS) attack
  • 12. Symptoms of attack and preventative measures  Unusually slow network performance, unavailability of a particular website, inability to access any website, and dramatic increase in the amount of spam you receive.  Symptoms could stem from hardware or software problems and mistaken for a DoS.  Users can take steps to prevent becoming part of a botnet: ◦ Install and use Anti-virus software ◦ Setup a firewall to protect your system from unauthorized access ◦Use common sense security practices to avoid malware, trojans and viruses
  • 13. Man in the Middle Attack
  • 14. Public key cryptography is generally used in two ways: 1. by generating a shared secret at both ends of the communications link (key agreement) 2. by sending a secret to the other end of the communications link (key transport) Diffie-Hellman key agreement scheme RSA (Rivest, Shamir, Adleman) scheme
  • 15. Alice and Bob knows p and g
  • 16. a b Alice’s public key 𝑔 𝑎 𝑚𝑜𝑑 𝑝 Bob’s public key 𝑔 𝑏 𝑚𝑜𝑑 𝑝
  • 17. Shared key (𝑔 𝑏 𝑚𝑜𝑑 𝑝) 𝑎 𝑚𝑜𝑑 𝑝 Shared key (𝑔 𝑎 𝑚𝑜𝑑 𝑝) 𝑏 𝑚𝑜𝑑 𝑝
  • 18. Key agreement schemes are vulnerable to man-in- the-middle attacks
  • 19. What is Man-in-the-Middle Attack? ■ In cryptography and computer security, a man-in-the- middle attack (MITM) also known as “hijacking” is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
  • 20. Man-in-the-Middle (MITM) Attack Concept a b Alice’s public key 𝑔 𝑎 𝑚𝑜𝑑 𝑝 Bob’s public key 𝑔 𝑏 𝑚𝑜𝑑 𝑝 c Anonym's public key 𝑔 𝑐 𝑚𝑜𝑑 𝑝 Bob’s public key 𝑔 𝑐 𝑚𝑜𝑑 𝑝 Alice’s public key 𝑔 𝑐 𝑚𝑜𝑑 𝑝 Shared key (𝑔 𝑐 𝑚𝑜𝑑 𝑝) 𝑎 𝑚𝑜𝑑 𝑝 Shared key (𝑔 𝑐 𝑚𝑜𝑑 𝑝) 𝑏 𝑚𝑜𝑑 𝑝
  • 22. “A passive attack is one in which the attacker is only able to monitor the communications channel. Passive Active An active attack is one in which the attacker attempts to add, delete, or modify messages. Threatens confidentiality Threatens both confidentiality and data integrity
  • 23. …EXAMPLES… ■Wi-Fi Eavesdropping The hacker can create a fake Wi-Fi node disguised as a legitimate Wi-Fi access point to steal the personal information of everyone who connects. ■Email Hijacking The hacker gain access to important email accounts, and he will monitor the transactions. For example, they can wait for a scenario where the customer will be sending money and respond, spoofing the company’s email address, with their own bank details instead of the company’s. This way, the customer thinks they’re sending their payment to the company, but they’re really sending it right to the hacker.
  • 24. …EXAMPLES…(CONT) ■Session Hijacking Once you log into a website, a connection between your computer and the website is established. Hackers can hijack your session with the website through numerous means. One popular option they use is stealing your browser cookies. In case you don’t know, cookies store small pieces of information that makes web browsing convenient for you. It can be your online activity, login credentials, pre-fill forms, and in some cases, your location. If they got hold of your login cookies, they can easily log into your accounts and assume your identity.
  • 26. Man-in-the-middle attacks can be accomplished using a variety of methods ■ARP poisoning- ARP (Address Resolution Protocol) spoofing is also known as "ARP spoofing " or ARP Poison Routing. The attacker may use ARP spoofing to sniff data frames on LAN and to modify the packets. The attacker may corrupt the ARP caches of directly connected hosts and finally take over the IP address of the victim host. This requires that the attacker be on the same Ethernet segment as either the victim or the host with which it is communicating.
  • 27. ARP cache IP Address MAC Address 192.168.0.1 00:00:00:00:00:00 who is 192.168.0.1? I am 192.168.0.1 ARP request ARP reply
  • 28. ARP cache IP Address 192.168.0.1 00:00:00:00:00:00 192.168.0.1 f2:f2:f2:f2:f2:f2 MAC Address who is 192.168.0.1? who is 192.168.0.1? I am 192.168.0.1 I am 192.168.0.1
  • 29. Man-in-the-middle attacks can be accomplished using a variety of methods (CONT) ■DNS spoofing- The attacker starts by sniffing the ID of any DNS request, and then replies to the target requests before the real DNS server.
  • 31. Encrypt, Encrypt, and Encrypt ■SSL/TLS Certificates will prevent you from connecting through the MitM. If your website still uses the more vulnerable HTTP protocol, it’s time to upgrade to the safer HTTPS protocol through SSL/TLS Certificates. A TLS Certificate will activate the HTTPS protocol, which is the safer version of HTTP. This allows an encrypted, secure connection between your server and your clients’ computers, keeping all information from prying hackers.
  • 32. ■Tunnel into a trusted endpoint IPSEC(Internet Protocol security), SSH(Secure SHell) tunnels, VPN, Proxies ■Use the latest version of software (e.g. browsers) ■To stop ARP poisoning, use network switches that have MAC binding features. Switches with MAC binding store the first MAC address that appears on a port and do not allow the mapping to be changed without authentication.
  • 33. ■The second generation of the WPA security protocol (WPA2) is based on the final IEEE 802.11i amendment to the 802.11 standard. It uses AES encryption which makes it more secure compared to WEP and WPA protocols. The main vulnerability of WPA2 is the encryption done at WPA2 only is effective for who is kept outside the network.
  • 34. Demonstrating a Man in the Middle Attack using ARPspoof tool
  • 36. What do we need?