Analyzing Network Attacks

Analyzing network attacks is a critical aspect of cybersecurity that requires a combination of technical expertise, attention to detail, and a deep understanding of network protocols and security principles. By examining the intricacies of network attacks, security professionals can gain valuable insights into the tactics, techniques, and vulnerabilities exploited by adversaries. Through meticulous analysis and investigation, they can uncover the root causes, assess the impact, and develop effective countermeasures to mitigate future risks. In this field, the ability to detect, analyze, and respond to network attacks plays a pivotal role in safeguarding digital assets and maintaining the integrity of networks in an ever-evolving threat landscape.

Scenario

You work as a security analyst for a travel agency that advertises sales and promotions on the company’s website. The employees of the company regularly access the company’s sales webpage to search for vacation packages their customers might like. 

One afternoon, you receive an automated alert from your monitoring system indicating a problem with the web server. You attempt to visit the company’s website, but you receive a connection timeout error message in your browser.

You use a packet sniffer to capture data packets in transit to and from the web server. You notice a large number of TCP SYN requests coming from an unfamiliar IP address. The web server appears to be overwhelmed by the volume of incoming traffic and is losing its ability to respond to the abnormally large number of SYN requests. You suspect the server is under attack by a malicious actor.

You take the server offline temporarily so that the machine can recover and return to a normal operating status. You also configure the company’s firewall to block the IP address that was sending the abnormal number of SYN requests. You know that your IP blocking solution won’t last long, as an attacker can spoof other IP addresses to get around this block. You need to alert your manager about this problem quickly and discuss the next steps to stop this attack and prevent this problem from happening again. You will need to be prepared to tell your boss about the type of attack you discovered and how it was affecting the web server and employees.

What We Know

  • IP Address 192.0.2.1 belongs to the company’s web server.
  • The IP Address range for employee’s computers is 198.51.100.0/24
  • Port 443 is used for encrypted web traffic.
  • Port 443 belongs to the web server.
  • The 3-way handshake [SYN] – [SYN,ACK] – [ACK]

Wireshark TCP HTTP log

No.TimeSourceDestinationProtocolInfo
473.144521198.51.100.23192.0.2.1TCP42584->443 [SYN] Seq=0 Win-5792 Len=120…
483.195755192.0.2.1198.51.100.23TCP443->42584 [SYN, ACK] Seq=0 Win-5792 Len=120…
493.246989198.51.100.23192.0.2.1TCP42584->443 [ACK] Seq=1 Win-5792 Len=120…
503.298223198.51.100.23192.0.2.1HTTPGET  /sales.html HTTP/1.1
513.349457192.0.2.1198.51.100.23HTTPHTTP/1.1 200 OK (text/html)
523.390692203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
533.441926192.0.2.1203.0.113.0TCP443->54770 [SYN, ACK] Seq=0 Win-5792 Len=120…
543.49316203.0.113.0192.0.2.1TCP54770->443 [ACK Seq=1 Win=5792 Len=0…
553.544394198.51.100.14192.0.2.1TCP14785->443 [SYN] Seq=0 Win-5792 Len=120…
563.599628192.0.2.1198.51.100.14TCP443->14785 [SYN, ACK] Seq=0 Win-5792 Len=120…
573.664863203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
583.730097198.51.100.14192.0.2.1TCP14785->443 [ACK] Seq=1 Win-5792 Len=120…
593.795332203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win-5792 Len=120…
603.860567198.51.100.14192.0.2.1HTTPGET  /sales.html HTTP/1.1
613.939499203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win-5792 Len=120…
624.018431192.0.2.1198.51.100.14HTTPHTTP/1.1 200 OK (text/html)
634.097363198.51.100.5192.0.2.1TCP33638->443 [SYN] Seq=0 Win-5792 Len=120…
644.176295192.0.2.1203.0.113.0TCP443->54770 [SYN, ACK] Seq=0 Win-5792 Len=120…
654.255227192.0.2.1198.51.100.5TCP443->33638 [SYN, ACK] Seq=0 Win-5792 Len=120…
664.256159203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
675.235091198.51.100.5192.0.2.1TCP33638->443 [ACK] Seq=1 Win-5792 Len=120…
685.236023203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
695.236955198.51.100.16192.0.2.1TCP32641->443 [SYN] Seq=0 Win-5792 Len=120…
705.237887203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
716.228728198.51.100.5192.0.2.1HTTPGET  /sales.html HTTP/1.1
726.229638203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
736.230548192.0.2.1198.51.100.16TCP443->32641 [RST, ACK] Seq=0 Win-5792 Len=120…
746.330539203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
756.330885198.51.100.7192.0.2.1TCP42584->443 [SYN] Seq=0 Win=5792 Len=0…
766.331231203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
777.330577192.0.2.1198.51.100.5TCPHTTP/1.1 504 Gateway Time-out (text/html)
787.351323203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
797.360768198.51.100.22192.0.2.1TCP6345->443 [SYN] Seq=0 Win=5792 Len=0…
807.380773192.0.2.1198.51.100.7TCP443->42584 [RST, ACK] Seq=1 Win-5792 Len=120…
817.380878203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
827.383879203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
837.482754192.0.2.1203.0.113.0TCP443->54770 [RST, ACK] Seq=1 Win=5792 Len=0…
847.581629203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
857.680504192.0.2.1198.51.100.22TCP443->6345 [RST, ACK] Seq=1 Win=5792 Len=0…
867.709377203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
877.738241203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
887.767105203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
8913.895969192.0.2.1203.0.113.0TCP443->54770 [RST, ACK] Seq=1 Win=5792 Len=0…
9013.919832203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
9113.943695203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
9213.967558192.0.2.1198.51.100.16TCP443->32641 [RST, ACK] Seq=1 Win-5792 Len=120…
9313.991421203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
9414.015245203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
9514.439072192.0.2.1203.0.113.0TCP443->54770 [RST, ACK] Seq=1 Win=5792 Len=0…
9614.862899203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
9714.886727198.51.100.9192.0.2.1TCP4631->443 [SYN] Seq=0 Win=5792 Len=0…
9815.310554203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
9915.734381203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
10016.158208192.0.2.1203.0.113.0TCP443->54770 [RST, ACK] Seq=1 Win=5792 Len=0…
10116.582035203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
10217.005862203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
10317.429678192.0.2.1203.0.113.0TCP443->54770 [RST, ACK] Seq=1 Win=5792 Len=0…
10417.452693203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
10517.475708203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
10617.498723203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
10717.521738203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
10817.544753203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
10917.567768192.0.2.1203.0.113.0TCP443->54770 [RST, ACK] Seq=1 Win=5792 Len=0…
11017.590783203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
11118.413795203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
11218.436807203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
11318.459819203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
11418.482831203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
11518.506655203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
11618.529667203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
11718.552679192.0.2.1203.0.113.0TCP443->54770 [RST, ACK] Seq=1 Win=5792 Len=0…
11818.875692203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
11919.198705203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
12019.521718203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
12119.844731192.0.2.1198.51.100.9TCP443->4631 [RST, ACK] Seq=1 Win=5792 Len=0…
12220.167744203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
12320.490757203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
12420.81377192.0.2.1203.0.113.0TCP443->54770 [RST, ACK] Seq=1 Win=5792 Len=0…
12521.136783203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
12621.459796203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
12721.782809203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
12822.105822203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
12922.428835203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
13022.751848203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
13123.074861203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
13223.397874203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
13323.720887203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
13424.0439203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
13524.366913203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
13624.689926203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
13725.012939203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
13825.335952203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
13925.658965203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
14025.981978203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
14126.304991203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
14226.628004203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
14326.951017203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
14427.27403203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
14527.597043203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
14627.920056203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
14728.243069203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
14828.566082203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
14928.889095203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
15029.212108203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
15129.535121203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
15229.858134203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
15330.181147203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
15430.50416203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
15530.827173203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
15631.150186203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
15731.473199203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
15831.796212203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
15932.119225203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
16032.442238203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
16132.765251203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
16233.088264203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
16333.411277203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
16433.73429203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
16534.057303203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
16634.380316203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
16734.703329203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
16835.026342203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
16935.349355203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
17035.672368203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
17135.995381203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
17236.318394203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
17336.641407203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
17436.96442203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
17537.287433203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
17637.610446203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
17737.933459203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
17838.256472203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
17938.579485203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
18038.902498203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
18139.225511203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
18239.548524203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
18339.871537203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
18440.19455203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
18540.517563203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
18640.840576203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
18741.163589203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
18841.486602203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
18941.809615203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
19042.132628203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
19142.455641203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
19242.778654203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
19343.101667203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
19443.42468203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
19543.747693203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
19644.070706203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
19744.393719203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
19844.716732203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
19945.039745203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
20045.362758203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
20145.685771203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
20246.008784203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
20346.331797203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
20446.65481203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
20546.977823203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
20647.300836203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
20747.623849203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
20847.946862203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
20948.269875203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
21048.592888203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
21148.915901203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
21249.238914203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
21349.561927203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
21449.88494203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
21450.207953203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
21450.530966203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
21450.853979203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
21451.176992203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
21451.500005203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…
21451.823018203.0.113.0192.0.2.1TCP54770->443 [SYN] Seq=0 Win=5792 Len=0…

What to Do

First, we need to identify the type of attack that may have caused the network interruption. To figure that out we first need to find anything out of the abnormal. We can see that line 52 an IP Address, outside of the companies IP range, attempts to initiate a Handshake with the company’s server

Initially, the attacker’s SYN request is answered normally by the web server.

The attacker then continues to keep sending SYN requests, which at this point the web server is still able to respond to

From lines 63 – 83, the web server begins to struggle to keep up with all the [SYN] requests and will begin to send out timeout error messages to those requestion the browser

As the attacker sends more [SYN] requests the web server stops responding to employee traffic, which intern employees receive more error messages.

From line 125 onward the web server stops responding altogether, only logging the attack.

So, what was it?

Since there is only one IP Address attacking the web server, it is safe to say that this was a DoS attack. Since it flooded the web server with [SYN] request it is safe to assume it’s a [SYN] flood attack. In total, it was a DoS [SYN] flood attack.

*Scenario presented by Coursera’s Google Cybersecurity certification course

Leave a Comment

Your email address will not be published. Required fields are marked *