Securing Protocol Layers   «Prev  Next»

Lesson 4Internet layer (IP)
Objective Identify the Internet layer and its weaknesses.

Internet Protocol Layer

The next layer of the TCP/IP stack is the Internet layer.
The Internet layer is used primarily for addressing hosts and for routing. It does not provide any means for error correction or flow control. The IP layer uses best-effort services to deliver IP datagrams .
TCP/IP Internet layer
TCP/IP Protocol Layers consisting of 1) Application Layer 2) Transport Layer 3) Internet Layer 4) Network Layer
TCP/IP Protocol Layers consisting of 1) Application Layer 2) Transport Layer 3) Internet Layer 4) Network Layer

IP Layer Attacks

The open architecture of the IP layer makes it an easy target for hackers. Every IP datagram is an individual piece of information traveling from one host to another. The hosts compile the received IP datagrams into a usable form. Because so many protocols are in operation at once, it is easy to defeat the proper function of any one protocol.
  • IP spoofing: Hackers will often use a technique called IP spoofing, which is the process of replacing the source IP address with a false IP address. Because TCP/IP's open architecture has no built-in authentication, one host or machine can spoof another's identity. Source-routed IP datagrams, created to travel only a specific path, are used to circumvent security measures such as firewalls. Another type of IP spoofing is known as a Smurf attack. A Smurf attack sends out a series of pings to a large number of remote hosts. All the remote computers respond to the ping and reply to a targeted IP address instead of to the attacker's true IP address. The target IP address is then inundated with Internet Control Message Protocol (ICMP) packets and can no longer function properly. The ICMP is used to communicate errors or other conditions at the IP layer. For example, when a host is pinged to determine if it is operational, a ICMP message is generated.

The following section discusses more about attacks on the Internet control message protocol.

Internet Control Message Protocol

The Internet Control Message Protocol (ICMP), defined in RFC 792, is an integral part of the TCP/IP protocol suite. It is utilized by network devices, such as routers, to send error messages indicating, for instance, that a requested service is not available or a host or router could not be reached. While ICMP is fundamental for network diagnostics and troubleshooting, it also poses several vulnerabilities that can be exploited for nefarious activities.
  1. ICMP Flood (Ping Flood) Attack: In this type of Denial-of-Service (DoS) attack, the attacker overwhelms the victim's network or devices with ICMP Echo Request (Ping) packets. This excessive traffic can consume bandwidth, processing resources, or both, rendering the victim's system unresponsive to legitimate requests.
  2. ICMP Redirect Attack: In this attack, an adversary uses ICMP Redirect messages to alter the routing tables on the victim host. This enables the attacker to intercept packets intended for another host (Man-in-the-Middle attack) or send them in a loop (creating a DoS condition).
  3. ICMP Tunneling: ICMP tunneling can be used to encapsulate one protocol inside another. This can be a legitimate operation, such as when data is sent over an ICMP network for legitimate purposes, but it can also be used by attackers to send malicious data or bypass firewalls undetected.
  4. Ping of Death: An old, yet noteworthy attack, where the attacker sends malformed or oversized ICMP packets to crash or freeze the target system. However, most modern systems are now immune to this attack.
  5. Smurf Attack: An attacker uses a network vulnerability to make it appear that a ping packet is coming from another host (IP spoofing). The network amplifies the ping request to all devices on the network. When all those devices reply to the spoofed IP, it results in a significant traffic flood that can cause a DoS condition.
These vulnerabilities underline the importance of securing and managing ICMP traffic properly within a network. Network administrators should implement security measures, such as configuring firewalls to filter ICMP messages, conducting regular network audits, and deploying intrusion detection systems (IDS) to detect and mitigate ICMP-based attacks. Employing such strategies can greatly reduce the potential impact of attacks using the ICMP protocol.


Well-publicized ICMP Attack

A well-publicized ICMP attack occurred with the Microsoft TCP/IP stack.
A hacker generated a very specialized ICMP message in the form of a ping request. Any computer running earlier versions of the TCP/IP stack would not be able to properly address the modified ICMP request and would crash. The industry labeled this type of attack a Winnuke attack, after the program Winnuke, which issued this type of ICMP message. To this day, the Microsoft web site does not respond to pings because Microsoft has filtered all ICMP requests to the Web servers. Many companies now filter ICMP traffic at their firewalls.
  • ICMP: ICMP is a network protocol useful in Internet Protocol (IP) network management and administration and is a required element of IP implementations. ICMP is a control protocol, meaning that it does not carry application data, but rather information about the status of the network itself. Furthermore, ICMP can be used to report:
    1. errors in the underlying communications of network applications
    2. availability of remote hosts
    3. network congestion

TCP/IP Protocols

The following definitions hold true for TCP/ IP Protocols:
  1. Internet protocol, Uses addressing to find a route so that datagrams reach the correct destination
  2. Transport protocol, Breaks information into datagrams and ensures that all datagrams arrive correctly
  3. Address resolution protocol, Converts IP addresses to physical network addresses by broadcasting an address request
  4. Internet control message protocol, Used to communicate errors or other conditions at the IP layer

The Internet protocol suite is the networking model and a set of communications protocols used for the Internet and similar networks. It is commonly known as TCP/IP, because its most important protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP), were the first networking protocols defined in this standard. It is occasionally known as the DoD model, because the development of the networking model was funded by DARPA, an agency of the United States Department of Defense. TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved. From lowest to highest, the layers are the
  1. link layer,
  2. containing communication technologies for a single network segment (link),
  3. the internet layer,
  4. connecting independent networks,
  5. thus establishing internetworking,
  6. the transport layer handling process-to-process communication,
  7. and the application layer, which interfaces to the user and provides support services.

Smurf attacks are an example of a denial-of-service[1] attack.
Many companies now filter ICMP traffic at their firewalls. The WinNuke[2] refers to a remote denial-of-service attack (DoS) that affected the Microsoft Windows 95, Microsoft Windows NT and Microsoft Windows 3.1x computer operating systems. The exploit sent a string of OOB (out of band) data to the target computer on TCP port 139 (NetBIOS), causing it to lock up and display a Blue Screen of Death. This did not damage or change the data on the computer's hard disk, but any unsaved data would be lost.

[1]Denial-of-service:An attempt by attackers to prevent legitimate users of a service from using that service by flooding a network, or by disrupting connections or services.
[2]Winnuke: A program that exploits the Windows TCP/IP stack causing Windows machines running an older version of the TCP/IP protocol stack to either crash or lock up.

SEMrush Software4