Welcome!

Cloud Security Authors: Harry Trott, Kevin Jackson, Elizabeth White, Nishanth Kadiyala, Stackify Blog

Related Topics: Cloud Security, Mobile IoT

Cloud Security: Article

Network Security: Arp Cache Poisoning and Sniffing Packets

ARP Cache Poisoning allows any computer on the local area network to obtain one of the most powerful attack postures in network

In a switched network environment packets are sent to their destination port by MAC address. This requires that hardware be able to create and maintain a table associating MAC addresses to ports. In a switched environment packets are only sent to devices that they are meant for. Even in this switched environment there are ways to sniff other devices' packets. One such way is to spoof your MAC address and poison the arp table. Since there is no state information about ARP traffic kept, as it's a simple protocol, the arp cache can be overwritten (unless the entry was explicitly marked as permanent).

Arp cache poisoning puts the attacker in position to intercept communications between the two computers. Computer A believes it is communicating with Computer B, but because of the poisoned arp table, the communication actually goes to the attacker's computer. The attacker can then either respond to computer A (pretending to be computer B), or simply forward the packets to its intended destination, but only after the packet information is captured and logged for later sue by the attacker. Likewise, the response from Computer B can be captured and logged by the attacker, who has also used Arp poisoning to make Computer B think its Computer A. this type of attack is known as Man in the Middle attack.

This article will cover a number of tools used in arp cache poisoning including ettercap, arpspoof, nemesis, p0f, dsniff, and scapy.

Running Ettercap
For arp cache poisoning to take place the attacker needs to be in the same network segment as the systems that are to communicate between each other. The first step is to obtain a list of IP addresses and the associated MAC. This can be accomplished a couple of different ways, one with a tool called ettercap. Ettercap is a suite for man in the middle attacks on your local LAN. It features sniffing of live connections, content filtering on the fly and more. It supports active and passive dissection of many protocols some of them we will cover in this paper.

# ettercap -T -M arp:remote //

This command will quickly sniff all hosts within your subnet, to view the results type L or hit h for the help menu and you will be given a list of commands.

Arp Cache DOS
To arp poison a given IP address to knock them off line so they cant communicate with anyone use arpspoof from the dsniff suite. Arpspoof is much simpler than ettercap to redirect packets, here is an example:

# arpspoof -i eth0 -t <target> host

Specifying the interface is optional but required if more than one interface is present. The -t specifies the particular host to ARP poison and if not specified all hosts on the LAN will be poisoned. The host can be the default gateway and this will keep the target from communicating beyond the local segment. Arpspoof redirects packets from a target host or all hosts on the LAN intended for another host on the LAN by forging ARP replies. The beauty of this program comes from the arp_send() function, which also uses libnet to spoof packets. The arp_send() sends out one ARP packet with source/target IP and Ethernet hardware addresses supplied by the user. Libnet is a generic networking API that provides access to several protocols.

To better understand how this works lets look at another tool called nemesis. If we have the IP and MAC of the intended target and host we can use nemesis to arp poison our target and leave them with a denial of service. Nemesis is a command-line network packet crafting and injection utility. Nemesis can craft and inject ARP, DNS, ETHERNET, ICMP, IGMP, IP, OSPF, RIP, TCP and UDP packets. By crafting your own packet using nemesis you can see how the arp cache poisoning works.

$ sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E -H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E

Then we create a packet to send in the other direction.

$ sudo nemesis arp -v -r -d eth0 -S 192.168.1.133 -D 192.168.1.2 -h 00:22:6E:71:04:BB -m 00:22:6B:7E:AD:7C -H 00:22:6E:71:04:BB -M 00:22:6B:7E:AD:7C

These two commands spoof ARP replies from 192.168.1.2 to 192.168.1.133 then from 192.168.1.33 to 192.168.1.2. The nemesis arp options -S specifies the source IP address, -D the destination IP address, -h the senders MAC address, -m the target MAC address, -H the source MAC address, and -M the destination MAC address. These two commands send bogus ARP replies to keep the ARP caches poisoned and traffic redirected. I find understanding this aspect allows you a better understanding of how the arp cache poisoning works. Lets replay them every 10 seconds with a loop.

$ while true

> do

> sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E -H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E

> sudo nemesis arp -v -r -d eth0 -S 192.168.1.133 -D 192.168.1.2 -h 00:22:6E:71:04:BB -m 00:22:6B:7E:AD:7C -H 00:22:6E:71:04:BB -M 00:22:6B:7E:AD:7C

> echo "Redirecting"

> sleep 10

> done

Once this is done the targeted box will be off-line and unable to communicate with the rest of the network. I made a video on my site that demonstrates this attack and is available at http://pbnetworks.net.

Sniffing the LAN
The bridge mode in ettercap requires two interfaces that are placed in the network segment. If you setup in-line with network bridge mode you are very hard to detect. In bridge mode you intercept packets and can read, sniff, or change them before sending them on to the victim. This mode is stealthy because you don't send out ARP packets on the LAN.

# ettercap -Tq -i eth0 -B eth1

The -i sets the primary interface as eth0, the -B sets the second bridging interface (see Figure #1).

If you run in GTK+ user interface you can do this by Sniff => Bridged sniffing

Figure 1: Sniffing traffic

Logging data
If you would like to log all the packets in a file you can use a number of different tools such as p0f which is a versatile passive OS fingerprinting and masquerade detection utility. It can be used for evidence or information gathering on servers, firewalls, and intrusion detection systems. Ettercap can also fingerprint hosts (find the Operating System running) with the -P option, just need to specify an open port. Once we find out what Operating system we are dealing with then it we can anticipate how the system will react.

# ettercap -Tq -P finger /192.168.1.121/22

To allow the p0f utility to write packets to tcpdump snapshot use the -w option.

p0f -w dumpfile.pcap

dsniff has a collection of tools used for network penetration testing and audits. These tools include dsniff, filesnarf, mailsnarf, nsgsnarf, urlsnard, and webspy passively monitor a network for interesting data. Arpspoof, dnsspoof, and macof tools facilitate the interception of network traffic normally unavailable to an attacker due to layer-2 switching. Below we are using the -w option to to write packets to file.

dsniff -w dumpfile.pcap

Ettercap allows dumping packet data to file with the -w option as well.

ettercap -T -M arp:remote /192.168.1.1/ /192.168.1.130/ -w dumpfile.pcap

It is easier and less intrusive if you specify a specific box to sniff traffic and write to a file then trying to sniff the whole LAN segment. Otherwise you may crash ettercap. You can then view the output in Scapy if you have a graphical PostScript/PDF. Scapy is a powerful interactive packet manipulation program that has the ability to forge or decode packets of a wide number of protocols. It can perform tasks like scanning, tracerouting, probing, unit tests, network discovery, tcpdump, tethereal, p0f and much more. Start by typing scapy at the terminal prompt.

$ scapy

>>> a=rdpcap("/home/cr0wn/dumpfile.pcap")

>>> a

<dumpfile.pcap: TCP:9522 UDP:2386 IMCP:15 Other:611>

>>> a[423].pdfdump(layer_shift=1)

See Figure 2

Figure 2 Scapy graphical output

A good way to protect yourself while you are web-browsing is to use HTTP Everywhere by the Electronic Frontier Foundation (EFF). This will allow https to be used instead of http which passes information in clear-text and would be read by an attacker that is sniffing the local network segment. This is becomes more significant when using unknown wireless networks like at coffee shops or airports.

Sniffing with Scapy
The ability to capture packets and clone tcpdump is possible with scapy. Here we find a host that we want to sniff traffic on and use this command:

>>> sniff(filter="tcp and hsot 192.168.1.131", count=50)

>>> a=_

>>> a.nsummary()

Here we are sniffing the next 50 packets traveling the network on the host 192.168.1.131

(see Figure 3).

Figure 3 sniffing 50 packets

If we use the sprintf() function we can get even more control over what is displayed.

>>> pkts = sniff(prn=lambda x:x.sprintf("{IP:%IP.src% → %IP.dst%\n}{Raw:%Raw.load%\n}"))

(see Figure 4).

Figure #4 different control displays in scapy

If we use the sprintf() function we can get even more control over what is displayed.

>>> pkts = sniff(prn=lambda x:x.sprintf("{IP:%IP.src% → %IP.dst%\n}{Raw:%Raw.load%\n}"))

see Figure #4).

We can narrow down the ports that we sniff on such as port 25 and 110, common ports for mail client. Enter the following command in scapy:

>>> a=sniff(filter="tcp and ( port 25 or port 110 )",

prn=lambda x: x.sprintf(%IP.src%:TCP.sport% → %IP.dst%:%TCP.dport% %2s,TCP.flags% : %TCP.payload%"))

In the above we are sniffing for tcp on ports 25 and 110 and using the lambda operator, used to denote anonymous functions, with the sprintf() function for more control over displayed information.

The above can be viewed in Figure 5.

Figure 5 sniffing user names and passwords using Scapy

Scapy can also graph what you are sniffing on the network by producing a simple diagram of packet flow. The conversations() method will create a conversation graph which requires graphviz and ImageMagick to work. Here I am using scapy to sniff the wireless interface (wlan0) that is connected to a foreign network, all displayed in a graphic format.

>>> a=sniff(iface="wlan0", prn=lambda x: x.summary())

>>> a.conversations()

The output above can be seen in Figure 6.

Figure 6 graphical output with Scapy

Conclusion
ARP Cache Poisoning allows any computer on the local area network to obtain one of the most powerful attack postures in network security called "Man in the Middle" (MITM). MITM is able to monitor, filter, modify and edit any and all network traffic moving between LANs. In this article we have identified some open source tools that can be used to launch attacks on switched networks. We have identified some easy ways to prevent data loss by using a browser add-on. By making yourself aware and familiar with some of these tools you can see how secure your network really is. A good solution is to provide port security integrated into your switches and by running arpwatch to monitor address resolution protocol traffic on your network.

This article appears in Admin Network & Security Magazine on-line edition.  They had a difficult time getting all the .jpgs to work with their web application so I am publishing the article here as well.

Let pbnetworks get your pen test on target

Visit us and learn how http://pbnetworks.net

How secure is your network?

More Stories By David Dodd

David J. Dodd is currently in the United States and holds a current 'Top Secret' DoD Clearance and is available for consulting on various Information Assurance projects. A former U.S. Marine with Avionics background in Electronic Countermeasures Systems. David has given talks at the San Diego Regional Security Conference and SDISSA, is a member of InfraGard, and contributes to Secure our eCity http://securingourecity.org. He works for Xerox as Information Security Officer City of San Diego & pbnetworks Inc. http://pbnetworks.net a Service Disabled Veteran Owned Small Business (SDVOSB) located in San Diego, CA and can be contacted by emailing: dave at pbnetworks.net.

@ThingsExpo Stories
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
SYS-CON Events announced today that Datanami has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Datanami is a communication channel dedicated to providing insight, analysis and up-to-the-minute information about emerging trends and solutions in Big Data. The publication sheds light on all cutting-edge technologies including networking, storage and applications, and the...
SYS-CON Events announced today that EnterpriseTech has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. EnterpriseTech is a professional resource for news and intelligence covering the migration of high-end technologies into the enterprise and business-IT industry, with a special focus on high-tech solutions in new product development, workload management, increased effi...
SYS-CON Events announced today that MobiDev, a client-oriented software development company, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex software systems for startups and enterprises. Since 2009 it has grown from a small group of passionate engineers and business...
SYS-CON Events announced today that GrapeUp, the leading provider of rapid product development at the speed of business, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company, specialized in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market acr...
SYS-CON Events announced today that Ayehu will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on October 31 - November 2, 2017 at the Santa Clara Convention Center in Santa Clara California. Ayehu provides IT Process Automation & Orchestration solutions for IT and Security professionals to identify and resolve critical incidents and enable rapid containment, eradication, and recovery from cyber security breaches. Ayehu provides customers greater control over IT infras...
Artificial intelligence, machine learning, neural networks. We’re in the midst of a wave of excitement around AI such as hasn’t been seen for a few decades. But those previous periods of inflated expectations led to troughs of disappointment. Will this time be different? Most likely. Applications of AI such as predictive analytics are already decreasing costs and improving reliability of industrial machinery. Furthermore, the funding and research going into AI now comes from a wide range of com...
In this presentation, Striim CTO and founder Steve Wilkes will discuss practical strategies for counteracting fraud and cyberattacks by leveraging real-time streaming analytics. In his session at @ThingsExpo, Steve Wilkes, Founder and Chief Technology Officer at Striim, will provide a detailed look into leveraging streaming data management to correlate events in real time, and identify potential breaches across IoT and non-IoT systems throughout the enterprise. Strategies for processing massive ...
SYS-CON Events announced today that Conference Guru has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. A valuable conference experience generates new contacts, sales leads, potential strategic partners and potential investors; helps gather competitive intelligence and even provides inspiration for new products and services. Conference Guru works with conference organi...
SYS-CON Events announced today that Cloud Academy named "Bronze Sponsor" of 21st International Cloud Expo which will take place October 31 - November 2, 2017 at the Santa Clara Convention Center in Santa Clara, CA. Cloud Academy is the industry’s most innovative, vendor-neutral cloud technology training platform. Cloud Academy provides continuous learning solutions for individuals and enterprise teams for Amazon Web Services, Microsoft Azure, Google Cloud Platform, and the most popular cloud com...
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business - from apparel to energy - is being rewritten by software. From planning to development to management to security, CA creates software that fuels transformation for companies in the applic...
SYS-CON Events announced today that TMC has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo and Big Data at Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Global buyers rely on TMC’s content-driven marketplaces to make purchase decisions and navigate markets. Learn how we can help you reach your marketing goals.
Internet of @ThingsExpo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devic...
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Telecom Reseller has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA
SYS-CON Events announced today that IBM has been named “Diamond Sponsor” of SYS-CON's 21st Cloud Expo, which will take place on October 31 through November 2nd 2017 at the Santa Clara Convention Center in Santa Clara, California.
Multiple data types are pouring into IoT deployments. Data is coming in small packages as well as enormous files and data streams of many sizes. Widespread use of mobile devices adds to the total. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists looked at the tools and environments that are being put to use in IoT deployments, as well as the team skills a modern enterprise IT shop needs to keep things running, get a handle on all this data, and deliver...
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
SYS-CON Events announced today that Enzu will exhibit at SYS-CON's 21st Int\ernational Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to focus on the core of their ...