General Presentation Topic: Man in The Middle Attack
General Presentation Topic: Man in The Middle Attack
General Presentation Topic: Man in The Middle Attack
B2804B43
10809297
INDEX
1) DEFINITION
2) MEMO
3) MITM TECHNIQUES
4) TOOLS
5) NOTE
6) REFERENCE
DEFINITION
The term "Man-in-the-middle attack" (MITM attack) refers to the type of attack where the
attacker intrudes into the communication between the endpoints on a network to inject false
information and intercept the data transferred between them.
MEMO
MITM TECHNIQUES
The techniques used for MITM attacks can be classified below in consideration of the
following three network environment types:
ARP spoofing
o Briefing: ARP (Address Resolution Protocol) spoofing is also known as "ARP
poisoning" or ARP Poison Routing. The attacker may use ARP spoofing to
sniff data frames on LAN and to modify the packets. The attacker may corrupt
the ARP caches of directly connected hosts and finally take over the IP
address of the victim host.
o Tools used:
ARPoison is a UNIX Command-line tool that can be used to create
spoofed ARP packets.
Ettercap can be used for filtering, hijacking, poisoning, sniffing,
including SSH v.1 sniffing (transparent attack).
Dsniff can be used for poisoning, sniffing, including SSH v.1 sniffing
(proxy attack)
Parasite is a daemon used to watch a LAN for ARP requests and
automatically send spoofed ARP replies.
DNS spoofing
o Briefing: The attacker starts by sniffing the ID of any DNS request, and then
replies to the target requests before the real DNS server.
o Tools used:
ADM DNS spoofing tools can spoof DNS packets via various active
and passive methods.
Ettercap (Plugin needed: phantom plugin)
Dsniff (dnsspoof)
Zodiac can be used for DNS name server versioning, DNS local
spoofing (answering DNS queries before the remote name server),
DNS jizz spoofing, and DNS ID spoofing.
IP address spoofing
o Briefing: The attacker creates IP packets with a forged source IP address in
order to conceal the identity of the packet sender or to impersonate another
computer system. (This method of attack on a remote system can be very
difficult, because it involves modifying thousands of packets at a time. This
type of attack is most effective where trust relationships exist between
endpoints.)
o Tools used:
Hping can be used to prepare spoofed IP datagrams with only a one-
line command, and the attacker can send the prepared datagrams to
almost any target victim.
Spoofed IP
Port stealing
o Briefing: The term "Port Stealing" refers to the MITM technique used to spoof
the switch forwarding database (FDB) and usurp the switch port of the victim
host for packet sniffing on Layer 2 switched networks. The attacker starts by
flooding the switch with the forged ARP packets that contain the same source
MAC address as that of the victim host and the same destination MAC address
as that of the attacker host. Note that those packets are invisible to other host
on the same network. Now that the victim host also sends packets to the
switch at the same time, the switch will receive packets containing the same
source MAC address with two different ports. Therefore, the switch will
repeatedly alter the MAC address binding to either of the two ports by
referencing the relevant information in the packets. If the attacker's packets are
faster, the switch will send the attacker the packets intended for the victim
host. Then the attacker sniffs the received packet, stops flooding and sends an
ARP request for the victim’s IP address. After receiving the ARP reply from
the victim host, the attacker will manage to forward the "stolen" packet to the
victim host. Finally, the flooding is launched again for another attacking cycle.
o Tools used:
Ettercap (Plugin needed: Confusion plugin)
STP mangling
o Briefing: STP (Spanning-Tree Protocol) mangling refers to the technique used
for the attacker host to be elected as the new root bridge of the spanning tree.
The attacker may start either by forging BPDUs (Bridge Protocol Data Units)
with high priority assuming to be the new root, or by broadcasting STP
Configuration/Topology Change Acknowledgement BPDUs to get his host
elected as the new root bridge. By taking over the root bridge, the attacker will
be able to intercept most of the traffic.
o Tools used:
Ettercap (Plugin needed: Lamia plugin)
Yersinia
ARP poisoning
DNS spoofing
DHCP spoofing (e.g., Spoofing the DHCP Server)* is a type of attack on DHCP
server to obtain IP addresses using spoofed DHCP messages
Gateway spoofing (usually, spoofing the default gateway)
ICMP redirection
IRDP spoofing - route mangling
Remote
DNS poisoning
Route mangling
Traffic tunneling
TOOLS
The fowllowing tools are commonly used for launching, detecting or testing MITM attacks.
Ettercap
Yersinia
Yersinia supports multithreading: multiple users and multiple attacks per user. It has three
main modes: command line, network client and ncurses GUI. The attacker can use it to listen
to the network, sniff packets, edit protocol fields, intercept network data in pcap format,
analyze captured packets and replay them with the attacker's modifications.
Yersinia can be used for 29 types of attacks. In STP cases, the MITM attacker may use it on
computers with two Ethernet cards to disguise as a root role dual-homed switch. In HSRP
cases, the MITM attacker may use it to become an active router.
NOTE
REFERENCE