spoofing keegan haukaas, samuel robertson, jack murdock

16
Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock

Upload: della-farmer

Post on 30-Dec-2015

221 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock

SpoofingKeegan Haukaas, Samuel Robertson, Jack Murdock

Page 2: Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock

Overview

Email Spoofing

IP Spoofing

Web Spoofing

Page 3: Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock

Email Spoofing

Pretending to send an email from someone else

Page 4: Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock

Reasons for Email Spoofing

Hide Identity

Impersonate Company or Authority

Page 5: Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock

How to Spoof an Email

SMTP functions

Insert commands in headers

Page 6: Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock

Examples

Posing as a Bank

Posing as Facebook

Posing as Relative

Page 7: Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock

Mitigating Email Spoofing

Look at address

Read through message

Check links against legitimate site

Page 8: Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock

Reporting Email Spoofing

Legitimate Company/Person

Federal Trade Commission [email protected]

Page 9: Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock

IP Spoofing

IP spoofing is when the IP source address is changed in the packet header

Legitimate uses' of IP Spoofing- Website Testing

Illegitimate uses of IP SpoofingDoSGain entry to System

Page 10: Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock

IP Spoofing (cont.)

Nmap Ipconfig /allNmap –iflist

Nmap –e eth7 –S 10.154.14.138.10.25.17.45

Defense against IP SpoofingPacket FilteringDO NOT rely only on IP address to gain access

Page 11: Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock

Web Spoofing

General techniques: Similar URLCopy Site design/code “Malvertising”

Page 12: Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock

Similar URL

Mistyping Favebook vs Facebook

Alternate Top-Level DomainsWhitehouse.gov vs Whitehouse.com

Countermeasures:Purchase the alternate domain, check spelling, check

security certificate

Page 13: Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock

Design Hijacking

Copies all (or all accessible) HTML, CSS, JavaScript, etc. Incorporates design into new siteMost likely also uses a spoofed/similar URL

Check for Security Certificate/HTTPSWebsites need to be verified in some way to be

granted a certificate

Countermeasures:Code obfuscation, closed-source, HTTPS, etc.

Page 14: Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock

Malvertising

Stands for Malicious Advertising

Exploits ads in sitesAttacker puts up “clean” ads, gains reputationThen injects malicious code into advertisements “Drive-by” style attacks, or click activation

Attacker hacks site, injects code into banner ads

Countermeasures: Install AdBlock, don’t click on ads, avoid sites with

instrusive/pop-up ads, check site’s reputation

Page 15: Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock

Summary

Email Spoofing

IP Spoofing

Web Spoofing

Page 16: Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock

QA&