Internetworks offers a comprehensive collection of articles and tutorials on computer networks, covering basic to advanced concepts such as data link layer, network layer, network security, and more. It’s a great starting point for beginners and a useful reference for advanced learners. A+ N+ CCNA CCNP CCIE
by Edgar C Francis
A Smurf attack is a form of a
DDoS attack (distributed denial of service). Smurf attack occurs at layer 3. A Smurf attack is named after the malware DDoS Smurf and more widely Smurf attack is named after a cartoon because it takes down a big target by working together.
Smurf
attack exploiting vulnerabilities of IP and ICMP.
First, the attacker builds a Smurf malware spoofed packet that has its source address set to the targeted
victim and this packet is sent to the destination address is a subnet broadcast address of a router or firewall. This is also called a directed broadcast. Now it sends requests (ICMP) to
every host device address inside the network. More numbers of devices mean more
requests. All the devices receive these requests and they reply to the target
victim host with an ICMP packet. This attack makes the victim overwhelmed and results in denial-of-service to legitimate
traffic.
I am assuming you understand the DDoS Smurf's attack, now let's configure and then we will see how to prevent these attacks.
Topology: -
configure the topology as per the diagram
assign the IP addresses on servers and PCs as per the topology.
assign the IP address Kali Linux 2-2 as per the topology
configure trunk and allowed all VLANs on the switch
configure PC ports as access ports.
configure static routing between routers
target server-1 from Kali 2-2
configure Smurf to attack the victim server with ICMP messages
make sure the server choked up and make it almost dead.
{assign the IP addresses on servers and PCs as per the topology}
(Now we try to ping from PCs to KALI and we will make sure the network is working fine)
PC1> ping 192.168.2.25
84 bytes from 192.168.2.25 icmp_seq=1 ttl=62 time=62.669 ms
84 bytes from 192.168.2.25 icmp_seq=2 ttl=62 time=66.405 ms
84 bytes from 192.168.2.25 icmp_seq=3 ttl=62 time=63.907 ms
84 bytes from 192.168.2.25 icmp_seq=4 ttl=62 time=70.719 ms
84 bytes from 192.168.2.25 icmp_seq=5 ttl=62 time=62.990 ms
SERVER-1> ping 192.168.2.25
84 bytes from 192.168.2.25 icmp_seq=1 ttl=62 time=63.265 ms
84 bytes from 192.168.2.25 icmp_seq=2 ttl=62 time=64.596 ms
84 bytes from 192.168.2.25 icmp_seq=3 ttl=62 time=72.530 ms
84 bytes from 192.168.2.25 icmp_seq=4 ttl=62 time=63.830 ms
84 bytes from 192.168.2.25 icmp_seq=5 ttl=62 time=64.962 ms
(AS OF NOW EVERYTHING IS WORKING FINE, NOW WE ARE GOING TO ATTACK OUR VICTIM SERVER-1)
(Now we are going to capture traffic with the help of Wireshark)
(As you can see from the above output, we are capturing traffic between router-1 and router-2 and router-1 is getting thousands of ICMP requests. now capture traffic between server and switch)
(Now you will see router-1 sending ICMP requests and now our server is getting down) let's see on the server)
SERVER-1>
SERVER-1> ping 192.168.1.10
84 bytes from 192.168.1.10 icmp_seq=1 ttl=64 time=25.006 ms
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
84 bytes from 192.168.1.10 icmp_seq=2 ttl=64 time=5.128 ms
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
84 bytes from 192.168.1.10 icmp_seq=3 ttl=64 time=10.348 ms
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
84 bytes from 192.168.1.10 icmp_seq=4 ttl=64 time=7.397 ms
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
84 bytes from 192.168.1.10 icmp_seq=5 ttl=64 time=6.493 ms
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
queue is full
SERVER-1>
(When we try to ping PC1 from the server the queue is full. Soon our server goes down and it chocked up)
(Now the question comes to how to prevent SMURF ATTACK)
MAC address flooding attack or CAM overflow attack is a very
serious concern for ethical hackers, this can leave your systems vulnerable to
attack.
How MAC flooding attack works?
The first attacker finds the connection and connects to your
switch then the attacker starts to flood large numbers of fake source MAC addresses to
switch with port mappings. Now we know switches have a limited amount of memory
and when memory is full and there is no space left for a new MAC address in the table. Our switch will act like a hub and frames are flooded to all ports. Now attackers
can capture sensitive data from the network.
Now let’s configure MAC address flooding attack and then we
see how to prevent overflow attacks.
configure the topology as per the diagram
configure the IP addresses as per the topology
configure a static IP address on KALI MACHINE
make sure all the PC able to communicate including KALI with the ping command.
configure Wireshark on the KALI machine for ICMP capture
and configure CYBER ATTACK MAC flooding with the help of Kali.
check the MAC table on the switch if it's full of FAKE MAC addresses
configure port security on a switch and make sure will not happen again.
try again MAC flooding ATTACK and make sure to switch take action shutdown attacking port.
{configure the IP addresses as per the topology}
PC1> show ip all
NAME IP/MASK GATEWAY MAC DNS
PC1 10.1.1.3/8 10.1.1.1 00:50:79:66:68:00
PC2> show ip all
NAME IP/MASK GATEWAY MAC DNS
PC2 10.1.1.4/8 10.1.1.1 00:50:79:66:68:01
PC3> show ip all
NAME IP/MASK GATEWAY MAC DNS
PC3 10.1.1.5/8 10.1.1.1 00:50:79:66:68:02
PC4> show ip all
NAME IP/MASK GATEWAY MAC DNS
PC4 10.1.1.6/8 10.1.1.1 00:50:79:66:68:03
PC5> show ip all
NAME IP/MASK GATEWAY MAC DNS
PC5 10.1.1.7/8 10.1.1.1 00:50:79:66:68:04
{configuring Kali first bootup}
{now configure a static IP address on KALI MACHINE}
{verify the IP address}
{make sure all the PC able to communicate including KALI with the ping command}
PC1> ping 10.1.1.2
84 bytes from 10.1.1.2 icmp_seq=1 ttl=64 time=10.039 ms
84 bytes from 10.1.1.2 icmp_seq=2 ttl=64 time=15.646 ms
84 bytes from 10.1.1.2 icmp_seq=3 ttl=64 time=18.816 ms
84 bytes from 10.1.1.2 icmp_seq=4 ttl=64 time=8.456 ms
84 bytes from 10.1.1.2 icmp_seq=5 ttl=64 time=64.010 ms
PC2> ping 10.1.1.5
84 bytes from 10.1.1.5 icmp_seq=1 ttl=64 time=34.211 ms
84 bytes from 10.1.1.5 icmp_seq=2 ttl=64 time=8.096 ms
84 bytes from 10.1.1.5 icmp_seq=3 ttl=64 time=25.769 ms
84 bytes from 10.1.1.5 icmp_seq=4 ttl=64 time=10.434 ms
84 bytes from 10.1.1.5 icmp_seq=5 ttl=64 time=18.360 ms
PC1 : 10.1.1.5 255.0.0.0 gateway 10.1.1.1
PC3> ping 10.1.1.6
84 bytes from 10.1.1.6 icmp_seq=1 ttl=64 time=13.186 ms
84 bytes from 10.1.1.6 icmp_seq=2 ttl=64 time=12.276 ms
84 bytes from 10.1.1.6 icmp_seq=3 ttl=64 time=38.496 ms
84 bytes from 10.1.1.6 icmp_seq=4 ttl=64 time=34.286 ms
84 bytes from 10.1.1.6 icmp_seq=5 ttl=64 time=15.887 ms
PC4> ping 10.1.1.7
84 bytes from 10.1.1.7 icmp_seq=1 ttl=64 time=26.638 ms
84 bytes from 10.1.1.7 icmp_seq=2 ttl=64 time=10.758 ms
84 bytes from 10.1.1.7 icmp_seq=3 ttl=64 time=48.530 ms
84 bytes from 10.1.1.7 icmp_seq=4 ttl=64 time=81.011 ms
84 bytes from 10.1.1.7 icmp_seq=5 ttl=64 time=60.035 ms
PC5> ping 10.1.1.3
84 bytes from 10.1.1.3 icmp_seq=1 ttl=64 time=20.204 ms
84 bytes from 10.1.1.3 icmp_seq=2 ttl=64 time=61.496 ms
84 bytes from 10.1.1.3 icmp_seq=3 ttl=64 time=15.266 ms
84 bytes from 10.1.1.3 icmp_seq=4 ttl=64 time=19.207 ms
84 bytes from 10.1.1.3 icmp_seq=5 ttl=64 time=10.576 ms
{now ping from Kali}
(Now let's take a look at the switch MAC table we have 6 PCs)
vIOS-L2-01#show mac address-table
Mac Address Table
-------------------------------------------
Vlan Mac Address Type Ports
---- ----------- -------- -----
1 0050.7966.6800 DYNAMIC Gi0/1
1 0050.7966.6801 DYNAMIC Gi0/2
1 0050.7966.6802 DYNAMIC Gi0/3
1 0050.7966.6803 DYNAMIC Gi1/0
1 0050.7966.6804 DYNAMIC Gi1/1
1 0c67.5676.0000 DYNAMIC Gi0/0
Total Mac Addresses for this criterion: 6
(As of now everything is working good now let configure MAC flooding ATTACK)
configure Wireshark on the KALI machine for ICMP capture)
{now configure MAC flooding ATTACK}
(As you can see from the above image our machine sending fake MAC address continuously now let's take a look on Wireshark)
{now let's take a look at our switch MAC address table}
(As you can see from the above output, the MAC address table is getting full by FAKE MAC addresses and it's getting from Gig 0/0 which is connected with the KALI machine)
configure port security on a switch and make sure will not happen again.
vIOS-L2-01(config)#interface gigabitEthernet 0/0
vIOS-L2-01(config-if)#switchport
vIOS-L2-01(config-if)#switchport mode access
vIOS-L2-01(config-if)#switch port-security
vIOS-L2-01(config-if)#switch port-security maximum 2
Total Addresses in System (excluding one mac per port) : 0
Max Addresses limit in System (excluding one mac per port) : 4096
{try again MAC flooding ATTACK and make sure to switch take action shutdown attacking port}
(Now let's see the switch is taking action or not)
*Jun 13 07:36:41.843: %PM-4-ERR_DISABLE: psecure-violation error detected on Gi0/0, putting Gi0/0 in err-disable state
vIOS-L2-01(config)#
*Jun 13 07:36:41.848: %PORT_SECURITY-2-PSECURE_VIOLATION: Security violation occurred, caused by MAC address bebc.f55f.9ae2 on port GigabitEthernet0/0.
vIOS-L2-01(config)#
*Jun 13 07:36:42.844: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0, changed state to down
vIOS-L2-01(config)#
*Jun 13 07:36:43.848: %LINK-3-UPDOWN: Interface GigabitEthernet0/0, changed state to down
(As you can see the switch is shutdown the violation hacker port. this is how we can prevent MAC flooding attacks)
vIOS-L2-01#show mac address-table
Mac Address Table
-------------------------------------------
Vlan Mac Address Type Ports
---- ----------- -------- -----
1 0050.7966.6800 DYNAMIC Gi0/1
Total Mac Addresses for this criterion: 1
thank you so much for visiting, please visit our YouTube video
NAT (Network Address Translation) is used to translate private IP addresses into public IP addresses. NAT changes the source and destination IP addresses and ports. NAT Address translation reduces the need for IPv4 public addresses and it also hides private network address ranges. NAT generally operates on a router or firewall. previously we configure SNAT, DNAT, and PAT on the router now we are going to configure PAT on the ASA firewall.
Port Address Translation (PAT)- This NAT is also known as dynamic NAT overload. PAT allows thousands of users can access to the internet using only one real global registered public IP address. PAT maps thousands to one by using ports. PAT is the only reason or solution we have not run out of valid IP addresses on the internet. This PAT is cost-effective because of single public IP is used; the port number is used to distinguish the traffic means which traffic belongs to which IP address.
let's configure PAT on the ASA firewall:
Topology: -
configure the topology as per the diagram
configure the IP addresses as per the topology
configure the Access-list permit ICMP traffic from lower level to higher level.
configure access-list on the interface
configure network object
configure PAT statement
(On ASA)
ciscoasa(config)# int Gig 0
ciscoasa(config-if)# no shut
ciscoasa(config-if)# ip address 192.168.1.1 255.255.255.0
ciscoasa(config-if)# nameif INSIDE
ciscoasa(config-if)# security-level 100
ciscoasa(config-if)# exit
ciscoasa(config)# int Gig 1
ciscoasa(config-if)# no shut
ciscoasa(config-if)# ip address 192.168.2.1 255.255.255.0
ciscoasa(config-if)# nameif DMZ
ciscoasa(config-if)# security-level 50
ciscoasa(config-if)# exit
ciscoasa(config)# int Gig 2
ciscoasa(config-if)# no shut
ciscoasa(config-if)# ip address 101.1.1.1 255.255.255.0
Cisco
Catalyst Switches have a feature called SPAN (Switch Port Analyzer). This feature is used for directing all traffic from a source port or source VLAN to a single port.
Or in other words this feature copies all traffic from a source port or source VLAN
to a destination interface. sometimes SPAN is referred to as session monitoring
because of the commands used to configure SPAN.
Switch Port
Analyzer is very useful for many applications and also a number of reasons:
SPAN is
useful for data collection purposes.
If you want to use Wireshark to capture traffic from an interface that is
connected to a workstation, server, phone, or anything else you want to sniff.
all traffic
from VoIP VLAN can be delivered to a single switch port to so you can record
the calls in a VoIP network.
Another common use of this feature is to (IDS/IPS)
SPAN session source can be a port or ports and VLAN. This is
why this offers us great flexibility in monitoring traffic. we can be transmitted,
received, or both directions to the destination interface.
If the destination port for SPAN is on the Local switch (same switch) this we call SPAN. If the
destination SPAN is on a different switch, then we call this remote SPAN or
RSPAN.
In RSPAN, a specific VLAN need to be configured across
the entire switching path from the source port or VLAN to the RSPAN destination
port to carry the traffic that you are copying. So, the traffic can travel
from the source switch to the destination switch. This requires that the RSPAN VLAN
be included in any trunk in that path too.
Restriction of
SPAN and RSPAN.
You can
configure the source interface whatever you want switch port, routed port,
access port, trunk port, EtherChannel, etc but you can’t mix interfaces and VLANs.
Do not
overload an interface with the entire VLAN.
When you
configure the destination interface (port). The previous configuration is
overwritten. When you remove the SPAN configuration the original configuration is restored.
Destination
port do not support any layer 2 protocol like STP, CDP, VTP, DTP, etc.