28.06.2014 Views

Learning by Doing: CISCO Certified Network ... - SCN Research

Learning by Doing: CISCO Certified Network ... - SCN Research

Learning by Doing: CISCO Certified Network ... - SCN Research

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

actually build a mini-protocol inspector to help us detect these three types of DoS attacks<br />

when other equipment is not available.<br />

Allow me to “set the stage…”<br />

You are the network administrator in a small company…you do not have the big<br />

bucks to buy those expensive protocol analyzers and network inspectors.<br />

However, you have noticed your internet speeds, while guaranteed at T-1 for your<br />

38 users, has actually been extremely slow. In fact, everyday it seems to get<br />

slower. Also the computers have been randomly crashing and being disconnected<br />

from the network with no clear indications why they have been doing that. You<br />

are really starting to rack your brain over this one…<br />

What is happening is your network is the victim of one of these denial of service attacks.<br />

You can put a small acl which acts like a protocol inspector. Let’s see how.<br />

Step-By-Step Instructions:<br />

1. Set up and cable the lab as shown.<br />

2. Add in our “mini-protocol inspector”<br />

goodguys(config)#access-list 100 permit icmp any any echo<br />

goodguys(config)#access-list 100 permit icmp any any echo-reply<br />

goodguys(config)#access-list 100 permit udp any any eq echo<br />

goodguys(config)#access-list 100 permit udp any eq echo any<br />

goodguys(config)#access-list 100 permit tcp any any established<br />

goodguys(config)#access-list 100 permit tcp any any<br />

goodguys(config)#access-list 100 permit ip any any<br />

goodguys(config)#int s0/1<br />

goodguys(config-if)#ip access-group 100 in<br />

The first two lines helps us monitor and record Smurf attacks, the next two helps<br />

us monitor and record fraggle attacks, and the next two help us monitor for sync<br />

attacks. Once we know where the attacks are coming from we can write other<br />

acl’s to stop them (and to tell the authorities).<br />

3. Let’s use the “evil” workstation to launch a vicious icmp flood to our goody two<br />

shoes network using DOS<br />

***Remember this is highly illegal…do not do this outside of lab conditions***<br />

Ping 192.168.1.2 –t –l 50000 (or try 500 then 5000)<br />

4. Then let’s up it a bit <strong>by</strong> opening more DOS windows and slamming goody some<br />

more…three or four windows should suffice.<br />

5. When we have had our fun we can use control+C to stop the ping storm.<br />

6. Next we can use the show access-list command to look for matches (and potential<br />

attacks).<br />

355

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!