You are on page 1of 12

1/6/2018 Course Work – 2

Advanced Networking Technologies (COMP 30022)

Ali Shafqat
13F11212
Table of Contents

S No. Contents Pg. no.


1 Reconnaissance attacks 2
2 Access attacks 5
3 Research article 9
4 References 10

P a g e 1 | 12
Introduction:

In the days of advanced technologies, our computer networks need several kind of security
measures to stay safe from network hackers and attackers. These hackers or attackers can
penetrate our computer network easily by the utilization of malware and bugs, as they are highly
trained professionals. By breaching they network these hackers can get access to the confidential
data and information of the which can become a nightmare for the particular organization, as
they may lose quite a lot of money. So to prevent such kind of attacker and hacker from
breaching the computer network there are different types of counter measure that can be taken to
secure the network. There are different types of network attack, Analysis on two of them is as
follows:

1. Reconnaissance attack:
When an unauthorized person or attempt to collect confidential information about network
system mapping, its vulnerabilities and the services present on the network or the system by
illegal path is known as reconnaissance attack. Reconnaissance attack itself divided in to
different types, they are as follows:
a. Packet Sniffer:
(Thomas, 2014)Packet sniffer is one type of reconnaissance attack; this attack is purely
software based attack, in this attack hacker utilizes a sniffer application. Sniffer is a
kind of application that is used to capture packets that are passing through the
network. It is also called network protocol analyzer. The data that is present with in
the packets that are passing through the network can be viewed by the utilization of a
sniffer, if the packets are not encrypted. The process utilized by hacker for capturing
network packets by the use of sniffer is refer to sniffing. They content in present in
the packet can be analyzed once it is captured by the hacker using sniffer. The main
purpose of hacker to this sniffer is to get confidential information such as password,
account data and information about the network. Some of the popular sniffer
application
are: Sniffit,
Dsniiff and
Wireshark.
P a g e 2 | 12
b. Port Scan attack:
(Tom, 2014)Just like packet sniffer this is also one type of reconnaissance attack. In
this attack the software which is utilized by the hacker or attacker is known as port
scanner. Port scanner is a kind of application that is utilized by a network
administrator to check for open ports present in the network. Port plays part of little
door in the system, through these port network packets pass from one system to
another system. The protocol used by the ports are TCP or UDP. These two protocols
have 65536 ports. It depends on internet service to use which port. For example,
listening of webserver is done on port number 80 of TCP, and listening of mail server
is done on port number 25 of TCP. So attacker utilize these port scanning tools and
look the network for open ports to breach in to the network. This is the most
commonly used type of reconnaissance attack, as hacker get the information about the
computer in which he can get inside and get its access. If hacker is successful in
getting access to one computer of the network, then whole network will be affected
with attack. Some of the popular port scanner application are: Superscan, Nmap and
Nessus.

c. Ping Sweep attack:

P a g e 3 | 12
(Agarcia, 2014)This is third type of reconnaissance attack, this is a kind of attack
through which hacker is able to figure the active and utilized machine at that
particular time. Just like other attacks ping sweep also effects the computer network
in difference ways. A hacker can see active machine in the network by this attack,
and he can also access the list of IP address that are present within the company. With
this a hacker can target multiple computer at a time and also it easy for him to view
his specific targets. This is a dangerous attack because if the target computer contains
server or database then he can access the whole network. This attack also affects the
speed of the network, due to many request in the network at the same time. Ping
sweep are now being utilized from long time but this attack is bit slower than other
attacks.

d. Internet Information Queries attack:


(Orbitco, 2015)This attack is also known as DNS query attack. In this attack, hackers
utilize internet tools to carry out their task. The two most common used internet tools
are: whois utilities and nslookup. In this attack attacker can effortlessly decide the IP
address space appointed to a given association or system. In the wake of discovering
the IP address, the interloper would then be able to ping the freely accessible IP
delivers to recognize the addresses that are dynamic.

P a g e 4 | 12
2. Access attack:
(Orbitco, 2015)Just like reconnaissance attack access attack is one more kind of network
attack. In, this attack hacker tries to gain access to web accounts, FTP services confidential
database, authentication services and other confidential information for some specific reasons
which are: gaining access in to the network, retrieving confidential data and gain privileges
of higher level. Reconnaissance attack itself divided in to different types, they are as follows:
1. Password Attack
(Orbitco, 2015)The implementation of password attack is done by hackers in following
ways:
 Brute force attack: in this attack hacker utilizes some kind of software to find
out the password combination of the account but the help of electronic
dictionary. This attack can also refer to repeated attempts because the hacker
tries to enter password and user name several times to find out the right
credentials of the particular account.
 Manipulation of users
 IP spoofing
 Packet sniffers
 Malware program or virus such as Trojan
horse

P a g e 5 | 12
Examples of password attacks:
 Compromising of passwords is done using these methods:
1. Cracking dictionary
2. Computation of Bruce force
 Loft crack “L0phtCrack” takes out hashes
from the password and serves a plain text
password.

2. Trust Exploitation:
In this attack the main goal of attacker is to compromise a trusted host, utilization of
this is done to attack other hosts present in the network. In this situation firewall is
useless whether the network is protected with the firewall or not, Because the attacker
will attack other host in the network using trusted host outside the firewall.

3. Port Redirection:
(David Minutella, Jeremy Cioara, Heather Stevenson, 2008) This port redirection is kind of
trust exploitation attack, in this hacker passes traffic through a firewall using
compromised host. This attack by pass all rules set present in the firewall because of
the change in the source port.
P a g e 6 | 12
4. Man – in – the – Middle attacks:
The purpose of Man – in – the – Middle attack are:
 Information stealing
 Gaining access to internal network by hacking the session that are going out.
 Information about the users and internal network can be obtain by traffic
analysis.
 DoS
 Data corruption during transmission.
 Changes in network session by introduction of new data.

P a g e 7 | 12
Counter Measure:
1. Reconnaissance attack counter measure:
 Utilization of IPS and firewall.
 Switched network can also prevent attackers.
 Sniffer attack can be detected by utilizing anti-sniffing tools.
 Utilization of encryption in the data according to the need of organization
security, without imposing too much stress on the users and the system.
 Policy on the usage of protocols.
2. Access Attack counter measures:
Methods to relieve get to assaults include:
 Solid watchword security
 Guideline of least trust
 Cryptography
 Applying working framework and application patches

Practices that assistance to guarantee a solid secret key arrangement:

 Debilitate accounts after a particular number of unsuccessful logins. This


training counteracts persistent secret key endeavors.
 Try not to utilize plaintext passwords. Utilize either a one-time secret key or
scrambled watchword.

P a g e 8 | 12
 Utilize solid passwords. Solid passwords are no less than eight characters and
contain capitalized letters, lowercase letters, numbers, and uncommon
characters.

Research article:
(Mardiana Mohammad Noor, 2013)This exploration inferred that inSSIDer is the best apparatus
(demonstrates merchant of the entrance point and show flag quality graphically) utilizing
Windows working framework and KisMAC is the best instrument for Mac (distinguishes Wi-
Fi noiselessly, channel tuning capacity and recognizes remote customers associated with the
entrance point). Parcel sniffing is another huge risk to remote systems by utilizing bundle
sniffer, for example, Wireshark, Network Miner or Cain and Able. The writer of likewise
expressed that the greater part of the Internet keeps running in the plaintext, making it clear

P a g e 9 | 12
by parcel sniffers, yet in the event that the discussion is go through scrambled association, for
example, webpage utilizing SSL encryption, information is less powerless. Remote systems
are more defenseless to the sort of assaults since it causes less unsettling influences if the
aggressor acts like one of the customer has keeping in mind the end goal to get to the system
and dispatch assault to a solitary host. In, the creator has drilled down the security dangers
from this action, for example, spying, breaking the certifications, session commandeering by
taking the casualty's session site's treat and uncovering one's web exercises.
Counter Measures:
Here are some handy suggestions for countermeasures to the dangers in remote systems from
specialist co-ops' side: Having known the incentive for the SSID for the switch and access
point is the underlying advance to get through a remote system. Precautionary measures
should likewise be taken when the clients are utilizing remote system outside of their homes
or workplaces, for example, problem areas to defend secret certifications from any
aggressors. By having clear and reasonable strategy or assertion of precluded activities in
remote system, for example, bundle sniffing or setting any gadget which can go about as a
RAP may decrease pernicious exercises in remote system. The quick advancements of
remote systems request steady enhancements of system administration to guarantee better
availability and openness without putting security at stake. System heads are additionally
encouraged to set more grounded secret word to maintain a strategic distance from beginner
programmers from breaking it.

References
Agarcia, 2014. Computer Security. [Online]
Available at: https://computersecurity123.wordpress.com/2014/07/16/ping-sweeps-and-port-scans/
[Accessed Wednesday December 2017].

David Minutella, Jeremy Cioara, Heather Stevenson, 2008. CCENT Exam Prep: General Network Security.
[Online]
Available at: http://www.pearsonitcertification.com/articles/article.aspx?p=1151753&seqNum=2
[Accessed Monday January 2017].

P a g e 10 | 12
Mardiana Mohammad Noor, W. H. H., 2013. Wireless Networks: Developments, Threats and
Countermeasures. International Journal of Digital Information and Wireless Communications, p. 16.

Orbitco, 2015. Orbit Computer Solution. [Online]


Available at: http://www.orbit-computer-solutions.com/types-of-network-attacks/
[Accessed Thursday December 2017].

Orbitco, 2015. Orbit Computer Solutions. [Online]


Available at: http://www.orbit-computer-solutions.com/type-of-network-attack-network-access-
attacks/
[Accessed Friday December 2017].

Thomas, J., 2014. Omni Secu. [Online]


Available at: http://www.omnisecu.com/security/sniffer-attack.php
[Accessed Monday December 2017].

Tom, 2014. Search Security. [Online]


Available at: http://searchsecurity.techtarget.com/answer/What-is-a-port-scan-attack
[Accessed Monday December 2017].

P a g e 11 | 12

You might also like