Analysing Network Attacks

Portfolio activities provided by Google Cybersecurity course 2024 | Completed by Emilio Mardones

View the Project on GitHub Ofendor/Portfolio2-Analysing-Network-Attacks

LinkedIn Badge GitHub Badge Contract, Education, Degree, Certificate, Diploma, - Certificate Icon @clipartmax.com Gmail Icon

Analysing Network Attacks

Portfolio Activity 2 - TCP protocol & SYN Handshake log analysis with Wireshark

In this project, I used the information learned from known network attacks like DoS Attack, DDoS, SYN Flood Attacks, Ping of Death, and more. I also referenced material provided by:

Understanding how attacks impact networks from the target’s perspective helped me troubleshoot issues and respond in time, taking the right steps to mitigate damage and protect the network from future attacks.

All portfolio items represent fictional companies, IP addresses, websites, and emails, used strictly for educational purposes; and provided hands-on experience in real-world cybersecurity practices.

Activity Overview

In this scenario, working as a security analyst for a travel agency that advertises sales and promotions on the company’s website, I receive an automated alert from a monitoring system (Wireshark) indicating a problem with the web server. I attempt to visit the company’s website, but I get the message: “timeout error”. After using a packet sniffer to capture data packets in transit to and from the web server, I noticed a large number of TCP SYN requests coming from an unfamiliar IP address.

Wireshark Report - SYN Flood Attack

The web server appears to be overwhelmed by the volume of incoming traffic and is losing its ability to respond to the abnormally large number of SYN requests. This gave me a clear indication that the server is under attack by a malicious actor.

The next task was to quickly alert the managers about the problem by elaborating a report on the type of attack I discovered and how it was affecting the web server and employees.

Report

PDF Report

Summary of the Problem
Today, we intercepted an alert from our traffic monitoring systems indicating a potential DoS attack. We filtered some of the data logs provided by Wireshark and discovered the reasons why the systems weren’t responding smoothly. After further investigation, the team concluded that the issues were linked to a foreign IP address that had been sending SYN packet requests, overwhelming our company’s network. I attempted to visit the company’s website, but my request was denied with the message “timeout error”. The team decided to take the server offline temporarily so the machine could recover and return to normal operating status. We configured the company's firewall to block the IP address that was sending the attack. We are aware that blocking this IP is a temporary solution, as the hacker could employ different techniques, such as spoofing other IP addresses, to initiate a new attack.
Note: Network interception attacks work by intercepting network traffic and stealing valuable information, or interfering with transmissions, causing extensive damage to a company’s assets.
Website Function Explained
When the website visitors try to establish a connection with the web server, there is a three-way handshake that occurs using the TCP Protocol. The TCP Protocol is part of the Transport Layer in the TCP/IP Model and is in charge of all internet communications that allow two devices to form a connection and stream data. This protocol ensures that the data is reliable and is transmitted to the destination service without any issues using the ‘Handshake’ process. This ‘Handshake’ consists of the following steps:
  • From a source IP address, a user sends a request to access systems that possess a different destination IP address. The request consists of a data packet containing a flag called SYN (Synchronisation) located in the header, along with a sequence number that helps facilitate communication.
  • After receiving the request, the destination IP address replies to the source IP address with another TCP packet carrying the SYN-ACK flag, acknowledging the connection and accepting the request to access the network. It also adds a number to the previous sequence to maintain a proper order during the communication exchange.
  • The third step finalises the Handshake. In this step, the source IP address sends another data packet back with an ACK flag, confirming that the TCP connection has been successfully established, allowing both systems to begin sending data packets reliably over the network.

A normal transaction between a website visitor and the web server would be like:

Network Traffic Log

Normal traffic on a TCP SYN-AKL request

The Attack Explained
According to CISA, a DoS Attack involves a single source used to overwhelm the target system with a flood of traffic or resource-consuming requests. The malicious actor typically uses one computer or a small network to generate the attack. The goal is to render the target system unavailable to its intended users and deny access to resources or services.

A malicious actor can take advantage of the TCP protocol by flooding a server with SYN requests for the first part of the handshake, as shown in the Wireshark captures. If the number of SYN packets is greater than the server resources available to handle them, the server will become overwhelmed and unable to respond. This is a Protocol-Based Attack, also known as a SYN Flooding Attack, that exploits vulnerabilities in the network protocols to disrupt their targets. These types of attacks normally target the bandwidth of the Network Layer from the TCP/IP Domain and the Transport Layer in the OSI Model.

The interactions with the attacker’s IP address 203.0.113.0 are shown in red in the Wireshark graphic. Initially, the SYN requests are answered normally by the web server (log items 52-54). However, the attacker continues sending SYN requests, creating an abnormal environment for the network.

The green colored log entries show the responses to normal visitor traffic, which means that until this point the server is still capable of managing its bandwidth and providing access to the network for the source IP address 198.51.100.14 (check log items 55, 56, 58, 60, 62 in the graphic). In the next rows, the log begins to show the struggles the web service is having to keep up with the number of SYN requests coming in at a rapid pace, generating the following log errors:
  • An getaway server message displaying: HTTP/1.1 504 Gateway Time-out (text/html). This error message is sent as a timeout error for the requesting browser. (check log 77)
  • An [RST, ACK] packet, a ‘reset, acknowledge’ packet that will show an error message in the browser and will drop the connection.

Wireshark Report - SYN Flood Attack part 1

Wireshark Report - SYN Flood Attack part 2

Steps to Follow

In the event of an issue of this magnitude, there are a series of steps that the organisation should take both during and before the attack to demonstrate its resilience.
During a DoS attack, we have to focus on how to respond. According to NIST and their Incident Response Recommendations and Considerations for Cybersecurity Risk Management, the main steps to consider are:

Since the organisation can’t predict when a DoS attack will occur, it is imperative that our network defenders implement best practices to minimise the potential damage of these types of attacks:

Key Takeaways

In response to today's DoS attack, our network analyzers (Wireshark) identified traffic anomalies linked to an unknown IP address, causing customer service disruptions. As a result, a SYN flood attack overwhelmed the company’s network. The temporary solution of configuring the Firewall to block the IP address allowed the server to recover, but it is critical that we implement immediate and robust defensive measures to prevent future incidents.
Moving forward, strategies such as proper firewall configuration, employee training, regular backups, and a comprehensive incident response plan are critical to safeguarding information and ensuring availability against future attacks.
We recommend conducting a post-incident analysis to patch vulnerabilities and strengthen resilience against TCP protocol exploitation and other similar cyber threats.