Low Level Network Attacks
CS 161 Fall 2022 - Lecture 17
Computer Science 161
Last Time: Intro to Networking
2
Application
Transport
(Inter) Network
Link
Physical
1
2
3
4
7
Computer Science 161
Last Time: ARP
3
Computer Science 161
Today: Low-Level Network Attacks
4
Computer Science 161
Dynamic Host Configuration Protocol (DHCP)
5
Computer Science 161
DHCP: Initial Network Configuration
6
Computer Science 161
Steps of the DHCP Handshake
7
Computer Science 161
Dynamic Host Configuration Protocol (DHCP)
8
Alice
Bob
DHCP Server 1
DHCP Server 2
Router
Alice’s configuration | |
My IP | ??? |
DNS Server | ??? |
Gateway | ??? |
Alice wants to connect to the network, but she’s missing a configuration.
Computer Science 161
Dynamic Host Configuration Protocol (DHCP)
9
Alice
Alice’s configuration | |
My IP | ??? |
DNS Server | ??? |
Gateway | ??? |
1. Client Discover: Alice broadcasts a request for a configuration.
Bob
DHCP Server 1
DHCP Server 2
Router
“Can anyone give me a configuration?”
Computer Science 161
Dynamic Host Configuration Protocol (DHCP)
10
Alice
Bob
DHCP Server
DHCP Server
Router
Alice’s configuration | |
My IP | ??? |
DNS Server | ??? |
Gateway | ??? |
2. DHCP Offer: Any DHCP server can reply with an offer for Alice.
“You can use IP x, DNS server y, and gateway z”
“You can use IP a, DNS server b, and gateway c”
Computer Science 161
Dynamic Host Configuration Protocol (DHCP)
11
Alice
Alice’s configuration | |
My IP | ??? |
DNS Server | ??? |
Gateway | ??? |
3. Client Request: Alice broadcasts which configuration she has chosen.
Bob
DHCP Server 1
DHCP Server 2
Router
“I’ll use DHCP Server 1”
Computer Science 161
Dynamic Host Configuration Protocol (DHCP)
12
Alice
Alice’s configuration | |
My IP | x |
DNS Server | y |
Gateway | z |
4. DHCP Acknowledgement: The chosen DHCP server confirms that the configuration has been set for Alice.
Bob
DHCP Server 1
DHCP Server 2
Router
Reserved for Alice: IP x, DNS y, gateway z
Computer Science 161
DHCP Attacks
13
Computer Science 161
ARP and DHCP
14
Computer Science 161
DHCP Defenses
15
Computer Science 161
Wireless Local Networks
16
Computer Science 161
Wi-Fi
17
Computer Science 161
WPA2
18
Computer Science 161
WPA Handshake
19
Client
Access Point
Derive PSK from wifi password
Derive PSK from wifi password
Authentication Request
ANonce
SNonce
Derive PTK from PSK, nonces, MAC addresses
Derive PTK from PSK, nonces, MAC addresses
MIC
MIC
GTK
ACK
Computer Science 161
WPA Handshake
20
Computer Science 161
Optimized WPA 4-Way Handshake
21
Client
Access Point
Derive PSK from wifi password
Derive PSK from wifi password
Authentication Request
ANonce
SNonce + MIC
Derive PTK from PSK, nonces, MAC addresses
Derive PTK from PSK, nonces, MAC addresses
MIC + GTK
ACK
Computer Science 161
WPA-PSK Attacks
22
Client
Access Point
Derive PSK from wifi password
Derive PSK from wifi password
Authentication Request
ANonce
SNonce
Derive PTK from PSK, nonces, MAC addresses
Derive PTK from PSK, nonces, MAC addresses
MIC
MIC
GTK
ACK
Computer Science 161
WPA-PSK Attacks
23
Client
Access Point
Derive PSK from wifi password
Derive PSK from wifi password
Authentication Request
ANonce
SNonce
Derive PTK from PSK, nonces, MAC addresses
Derive PTK from PSK, nonces, MAC addresses
MIC
MIC
GTK
ACK
Computer Science 161
WPA-PSK Attacks
24
Client
Access Point
Derive PSK from wifi password
Derive PSK from wifi password
Authentication Request
ANonce
SNonce
Derive PTK from PSK, nonces, MAC addresses
Derive PTK from PSK, nonces, MAC addresses
MIC
MIC
GTK
ACK
Computer Science 161
WPA-Enterprise
25
Computer Science 161
WPA-Enterprise Attacks
26
Computer Science 161
Border Gateway Protocol (BGP)
27
Textbook Chapter 29
Computer Science 161
Review: Internet Protocol (IP)
28
Computer Science 161
Subnets
29
Computer Science 161
Routing Packets
30
Computer Science 161
Autonomous Systems
31
Computer Science 161
BGP
32
Sender
Recipient
AS 1
AS 3
AS 2
AS 5
AS 4
AS 6
I can reach {Recipient}
I can reach {AS6->Recipient}
I can reach {AS6->Recipient}
I can reach {AS4->AS6->Recipient}
I can reach {AS5->AS6->Recipient}
I can reach {AS4->AS6->Recipient}
Computer Science 161
IP and BGP Attacks
33
Computer Science 161
Summary
34
Computer Science 161
Summary
35
Computer Science 161
Summary
36
Computer Science 161