Attacks on TCP/IP Protocols: A Comprehensive Analysis

Verified

Added on  2025/06/23

|9
|1666
|206
AI Summary
Desklib provides solved assignments and past papers to help students understand complex topics.
Document Page
Studying Attacks On TCP/IP Protocols
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Question-1 Identify the vulnerabilities involved in the following network application protocol-. .4
Task 3...............................................................................................................................................8
References......................................................................................................................................10
Table of figures
Figure 1encryption...........................................................................................................................4
Figure 2 decryption..........................................................................................................................4
Figure 3: TCP..................................................................................................................................7
Document Page
s
Question-1 Identify the vulnerabilities involved in the following network
application protocol-
DNS-Domain Name Service
Introduction-The domain name service is a distributed directory that resolve human –
readable host name, such as www.xyz.in or www.abc.com , into machine readable IP
addresses like 50.16.85.209. DNS is able to handle the attack or failure.
DNS Vulnerabilities-briefly review some of the most attacks on DNS and the problem in
this article. These are the points-
1. Man in the middle (MITM) attacks- Authentication for DNS name server has no
way, it can be verify by its integrity because DNS does not have any specific
mechanism for server and server provide only authentication details for the data
which use for clients. Resolver cannot verify integrity of sent data on server and the
authentication also. Using the source IP address, resolver can authenticate the origin
of DNS reply on DNS server.
Packet sniffing-In the packet sniffing, entire query or response in a single
unsigned, unencrypted UDP packet sent by DNS, which make it easy to
handle the packet. A wrong generated answer can be reach resolve in
comparison of a right generated answer.
Transaction Id Guessing- data name server transaction ID is 16 bit and UDP
port is 53. For the ID (2 power 16) combination is possible for (2 power 36)
clients. UDP port number increase the resolver behavior which help to
predicate.ID guessing is not enough to allow attacker to inject the packet of
data, it combined the queries and queries type (Ariyapperuma, 2012).
2. Caching problems – use of cache, increase the chances of attack and DNs always
comprise with reduced access time. It cause of inconsistency and staleness of data and
stale information can include security critical information also. It include two main
issue on attack
Cache poisoning using name chaining
Cache poisoning using Transaction ID predication
Document Page
3. DDoS attacks- in this attack, DNS database and DNS clients can have impact
globally and usually directed at root server.in this attack because loss of availability
of name resolution services to the internet community.
4. Other significant DNS attacks- there are other attack which are cause loss of
important information and usage of vulnerabilities.
Information Leakage- important information be revealed by internetwork
configuration.
DNS Dynamic update vulnerabilities- on the basis of demand, DHCP
(dynamic host configuration protocol) make use of DNS for dynamic update
and add or delete data.
a) WEP-Wireless Equivalent Protocol-
Introduction-wireless security protocol (WSP) were developed for to protect wireless
network which include WEP, WPA and WPA2. Generally wireless network are insecure
and manufactures tried to make easy for user as possible.
WPE is developed for wireless network and it is also known as original encryption
protocol. At its name, WEP designed to provide the best security as wired network
provide.in WEP configure is hard and easily broken. Data will be send or received in
encryption and decryption form. Example of encryption and decryption for data.
Figure 1encryption
Figure 2 decryption
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
WEP Vulnerabilities- WLAN have become more prevalent and used in many popular places
like – airport, university residences, cafes etc. and with the growing popularity also cause of
insecure network so for secure network ,secure mechanism are WEP. Aim is here to discuss, how
an attack can be made on system. Data flow in encryption can be understand by the diagram.
First plain text covert in CRC and goes through by Xor gate and on Secret key is coming from
another side which provide the security of data. Receiver side cannot do decryption without
using that secret key. The implementation of secret key mechanisms in WEP has use to oppose
to strength of protocol vulnerability. The purpose of using secret key by a RC4 is to ensure that
secret key will not repeat but in WEP guidelines, there is no clear details about how to choose
the secret key for data, it can be choose randomly. RC4 work like a filter in the case of secret
key. 104 bit protection with 24 bit use for secret key in WEP. If 24 bit secret key space is used,
in that case RC4 help to declare the repeated key and show the error. Secret key sent in plain text
which help to identify the key to attacker and it’s because of secret key collision. Secret key
collision help to identify the key stream and analyzing the two packets derived from the same
secret key (Vibhuti, 2005).
b) SMTP-Simple Mail Transfer Protocol
Introduction- SMPT protocol known as a communication protocol for electronic email
transmission. There are many application layer protocol which are used on the internet on
TCP IP., IP refer the Internet Protocol. Today’s time electronic mail are very important to
send data from one device to another device to make life easy. SMPT use for send the
email from a mail client using the pop (Post office protocol) or internet.
Document Page
SMPT Vulnerabilities finding and resolve the issue:- the processing of retrieving the
email from servers by a communication through the internet are cause of multiple
attacks.it can be grouped and together and generate high risk categories like- buffer,
piping etc.
1. Vital information on this issue- vulnerabilities in SMPT server on a non-default port
is a way of risk vulnerabilities which is one of the most frequently found in different
network around the world (Ariyapperuma, 2012).
2. Scanning for finding the vulnerabilities in SMPT server listening on a non-
default port- use of vulnerabilities tools like AVDS, are standards tools which help
to discover this kind of vulnerabilities. The primary key of failure of VA is finding
the vulnerability setting for scope of networks.
3. Penetration testing for this SMPT vulnerabilities- AVDS is alone doing testing to
eliminate the issue. VA tools are secure and highly configure.
4. Security update on vulnerabilities in SMPT server listening for a non-default
port- here the most frequently vulnerabilities are found, sample information can be
mitigate and fixed here.
5. Confirming the presence of vulnerabilities in SMPT listening on a non- default
port- In this step testing and finding the vulnerabilities is performed with zero fals
positives.
Document Page
Task 3
Studying Attacks On TCP/IP Protocols
TCP/IP protocol is the backbone of the internet for any kind of transmission structure. The
TCP/IP is the prime target for the exploitive attacks which might have vector attacks. The
vulnerabilities of the TCP/IP protocols have the genre protocols which are designed and
implemented into the invaluable lesson. The TCP/IP attack is against the telnet which for the
transmission and this must be terminated. The netwox transmit the TCP packet flagged at RST
which have the successful attack (Kak, 2019).
Figure 3: TCP
There are several attacks for the TCP’/IP which are specified with the defined protocols. The IP
address includes the TP spoofing, DNS misuse, and other java related attacks. The attack on
which the system has done is the victim and this can be named as the two things that are
spoofing and victims. The most vital attack which the TCP/IP faced is the denial attack which
means the one who visits the website will get the delay information and the virus will attack the
visitor’s system and will fetch all the data and this will lead to cyber-attack. The person has to
attack the tie-up service provider which have the unreliable or may be unusable data (Kak,
2019). This attack is done on a particular website and then the visitor who visits that website will
get the information processing system. This consists of the CHARGEN and ECHO which means
that there will be diagnosing purpose which the visitor will have the malicious denial-of-service
attack (Steffen, 2019). The chain between CHARGEN services and ECHO services have a large
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
number of packets. There is a machine who offers the service of the DOS. This also includes the
SYN flooding which consumes the entire network which is connected to that particular system.
This has the two particular memory structure which means the connection has the simple
meaning of TCP which states the information, connection, buffer, and flags, etc. TCP control
block waits for the packets to be removed from the RST which is used to the client process. If the
server process is located then there will no backlogs in the queue. This also has the memory
structures which are divided into the connection such as SYN_ACK . This is the packet which
will send the continuous timer (Steffen, 2019).
There is an issue for the attack which will be an unreachable source of the IP address and the
packet will have followed some patterns for the hackers they are:
1. Short List: There is a small area for the packet to go with the chosen IP address.
2. No list: There is no defined address present for the packets to go.
3. Single Address: This means the attacking packet should have the same IP address for the
packet.
There are some basic IP addresses which are not provided by the strong authentication of the
control packets. According to the current technologies, there is very difficult to trace the original
IP address.
Document Page
References
Steffen, J., Salem, A.S., Leicht, H., Mertens, M. and Khalil, M., Intel IP Corp,
2019, Technologies for managing tcp/ip packet delivery’. U.S. Patent Application 15/941,428.
Kak, A., 2019. Lecture 16: ‘TCP/IP Vulnerabilities and DoS Attacks: IP Spoofing, SYN
Flooding, and The Shrew DoS Attack’.
Vibhuti, S., 2005, WEP (wired Equivalent privacy) concept and vulnerability.
Kumkar, V., Tiwari, A., Tiwari, P., and Shrawne, S., 2012, Vulnerabilities of wireless security
protocols, international journal of advanced research in computer engineering & technology,
volume 1, Issue 2.
Ariyapperuma, S., and Mitchell, C, J., 2012, Security vulnerabilities in DNS and DNSSEC.
Beyond security, finding and fixing the vulnerabilities in SMPT, [online], beyond
security,Available at:
https://www.beyondsecurity.com/scan_pentest_network_vulnerabilities_smtp_service_starttls_c
ommand_support [Accessed on : 10 august 2019].
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]