SlideShare a Scribd company logo
0Document Title
NTP in Amplification Inferno
Sriram Krishnan
1Document Title
To Introduce Myself...
 Sriram Krishnan
 Senior Manager, Security Solutions, Group Information Security - Scope International
Pvt. Ltd. (A wholly owned subsidiary of Standard Chartered Bank)
 Over 9 years of experience in Information Security
2Document Title
Agenda
 Why NTP Amplification?
 Demystifying DDoS
 Time to Deep Dive
 NTP Amplification Attack – Demo
 Challenges & Countermeasures
3Document Title
Why NTP Amplification?
4Document Title
A Background
5Document Title
Why NTP?
 Why NTP is targeted
 Ease of attack:
 Small request may lead to relatively large response
 Evade Detection:
 Spoofing of IP Address due to lack of handshake process– as
it is a UDP based protocol
 Availability:
 Essential service with large clusters of public timeservers
available in internet
 Traffic Volume:
 Potential to generate from 200 to 400Gbps of traffic that will
shutdown a network
Targeted Industries
 Internet Service
Providers,
 Banks and
Financial Services,
 Managed Services
(Including SaaS),
 Critical
Infrastructure of
countries
 e-Commerce
6Document Title
Demystifying DDoS
7Document Title
Understanding DDoS Terminology
 Master / Handler
Compromised system in the interest used by the attacker to launch attacks.
 Slave / Agent:
System that responds to the instructions of Master which are controlled by the attacker. Slave
serves as the amplifiers for DDos attacks.
 Daemon:
Process running the Slave, executing the commands for amplification.
 Reflector
Systems that respond to instructions of Master, without the awareness of participating in DRDoS
attack.
 Victim
Target host or network for the DDoS attack.
8Document Title
DDoS Categorized Based on Attack Method
Conventional DDoS Attack:
 Attacker takes control of master system to send instructions to slaves running the affected
daemon.
 The slaves will execute the command and amplify the traffic to finally send it to victims.
Compromised Systems
Fig 1: Distributed Denial of Service (DDOS) Attack
9Document Title
DDoS Categorized Based on Attack Method
Distributed Reflective Denial of Service Attack
 Attacker takes control of the master system and sends instruction to reflector running the
vulnerable daemon.
 Reflectors executes the command and amplifies the traffic to finally send it to victims.
 Host of both categories (Master and Slave) are compromised in DDoS, but in DRDoS attack the
reflector is not compromised.
Compromised Systems
Fig 2: Distributed Reflective Denial of Service (DRDOS) Attack
10Document Title
DDoS Categorized Based on Impact
 Volume / Bandwidth Based Attacks
 Chokes victim’s network bandwidth
 Measured in bits per second (Bps)
 Example: UDP Flood, ICMP Flood
 Protocol Based Attacks
 Exhaust the system / network device resources and shutdown the service or systems
 Measured as packets per second
 Example: SYN Flood, Ping of Death, Smurf DDoS
 Application Layer Based Attacks
 Shutdown application layer resources / services
 Example: Slowloris, HTTP Flood.
11Document Title
Time to Deep Dive
12Document Title
Vulnerability Details
 NTP allows administrators to monitor service via ntpd daemon – by executing remote commands
 Affected command is monlist
 monlist command operates in mode 7 – private use (which allows remote administration).
 Purpose of this command is to obtain details about NTP Associations (up to 600) from NTP server
 NTP Associations are formed when two peers exchange messages, and this transaction is
maintained in the Most Recently Used (MRU) list.
 NTP Associations details are stored in ntp.conf file. Example, in unix-based OS this file is stored in
</etc/ntp.conf>
 Attacker sends a request (get_monlist ) to public NTP Server (in internet) with spoofed IP of the
victim
 Response to this request generates enormous traffic towards the victim’s network
13Document Title
Monlist Command – Understanding the Details
14Document Title
Examining the Source Code
Let’s examine the source code that defines the structure and executes the monlist command
 ntp_request.c - respond to information requests
 ntp_monitor.c - monitor who is using the ntpd server
ntp_request.c
 mon_getlist_1 function obtains MRU list from the NTP server.
 Arrow indicates structure of mon_data that defines the maximum number of NTP associations.
 The keyword “extern” is used as this variable has already been defined in ntp_monitor.c.
15Document Title
Examining the Source Code (Contd..)
ntp_monitor.c
 First arrow - defines the number of structure to be allocated - 600
 Second arrow - declares and defines the mon_data that updates the statistics of the monitoring data.
16Document Title
NTP Amplification Attack
Spoofed IP Address of Victim
monlist
NTP Associations
MRU List
17Document Title
Demo
18Document Title
Challenges & Countermeasures
19Document Title
Challenges in Defence
 Arresting Help
 DDoS attack floods victim’s network / systems with malicious packets.
 Traffic flow increases rapidly within a quick span of time and without any prior warning or alert.
 This prevents systems to send SoS and are arrested from the attack.
 Filtering of Traffic
 Any attempts made to filter the traffic, hampers service rendered
 All legitimate traffic may be filtered / rejected thus denying service
 Evade Detection
 Generally attackers spoof the IP address of the attack packets.
 Attack triggered from distributed compromised systems
 Heterogeneous Environment:
 Systems with multiple software and diverse architecture are deployed.
20Document Title
Countermeasures
So what is required?
Robust & effective defensive mechanism
How?
Enhancing the protocol design
21Document Title
Countermeasures – NTP Amplification Attacks
 Upgrade the ntpd version to 4.2.7
 If the ntpd version cannot be updated, add the “noquery” directive to the “restrict default”
line in the ntp.conf file.
22Document Title
Countermeasures - DDoS Attacks
 Response Rate Limitation (RRL)
 Limits number of packets issued to a target at a given time interval
 Excess data over the limit is truncated
 Works best when the attack source is limited
 Already implemented in DNS protocol
 Protocol Harding
 Session handling mechanism - requests to be processed only post session initiation
 For example, DTLS (RFC 4347), a UDP-variant of TLS, implements a stateless cookie exchange
mechanism in order to avoid DDoS attacks.
 Response Size Limitation
 Protocol to be designed to:
 Limit the output (packet size) for every request, and
 Demand session initiation before releasing the rest of the output
23Document Title
To Sum Up!
 UDP based network services - easy target for attackers
 Other UDP based services such as SNMP, SSDP, NetBIOS targeted
 Pressing need to harden such protocol design
 Need for investments in preventive defence mechanism pertinent
24Document Title
Thankyou

More Related Content

PDF
Paper id 41201622
PDF
Cldap threat-advisory
PDF
Ix3615551559
PDF
1766 1770
PPT
透视消费者.ppt
PDF
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
PDF
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
PPT
Chapter 04
Paper id 41201622
Cldap threat-advisory
Ix3615551559
1766 1770
透视消费者.ppt
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
Chapter 04

What's hot (15)

PPTX
Low Rate DDoS attack using Improved Robust Random Early Detection
PDF
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
PDF
Thesis11
PDF
A Comparative Approach to Handle Ddos Attacks
PDF
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
DOCX
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PDF
Irm 4-ddos
PPTX
DepenDNS Analysis
PDF
A Statistical Approach to Adaptive Playout Scheduling in Voice Over Internet ...
PDF
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
PDF
Securing cloud computing environment against d do s attacks
PDF
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
PDF
DETECTION OF ALGORITHMICALLYGENERATED MALICIOUS DOMAIN USING FREQUENCY ANALYSIS
PPTX
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
PDF
International Journal of Computer Science, Engineering and Information Techno...
Low Rate DDoS attack using Improved Robust Random Early Detection
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
Thesis11
A Comparative Approach to Handle Ddos Attacks
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
Irm 4-ddos
DepenDNS Analysis
A Statistical Approach to Adaptive Playout Scheduling in Voice Over Internet ...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Securing cloud computing environment against d do s attacks
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
DETECTION OF ALGORITHMICALLYGENERATED MALICIOUS DOMAIN USING FREQUENCY ANALYSIS
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
International Journal of Computer Science, Engineering and Information Techno...
Ad

Similar to Ntp in Amplification Inferno (20)

PPTX
Denial of Service Attacks (DoS/DDoS)
PDF
DDoS-bdNOG
PDF
Ddos and mitigation methods.pptx
PDF
denialofservice.pdfdos attacck basic details with interactive design
PPTX
Denial of service
PPTX
Ddos and mitigation methods.pptx (1)
PPTX
DDoS Mitigation on the Front Line with RedShield
PPTX
DDoS attacks
PPTX
Denial of-service (do s) attack
PDF
ECE560 Denial of Service Attacks Fall2020.pdf
PPTX
Denial of Service (DoS) and Distributed DoS (DDoS) Attacks
PPTX
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PPTX
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PDF
Distributed Denial of Services (DDoS) Attacks Conceptual Intro
PPTX
DDoS - Distributed Denial of Service
PPTX
minor final
PDF
A041201010
PDF
A vivacious approach to detect and prevent d do s attack
PPTX
ITMSS March 4th NTP DDoS
PPTX
DrupalCon Vienna 2017 - Anatomy of DDoS
Denial of Service Attacks (DoS/DDoS)
DDoS-bdNOG
Ddos and mitigation methods.pptx
denialofservice.pdfdos attacck basic details with interactive design
Denial of service
Ddos and mitigation methods.pptx (1)
DDoS Mitigation on the Front Line with RedShield
DDoS attacks
Denial of-service (do s) attack
ECE560 Denial of Service Attacks Fall2020.pdf
Denial of Service (DoS) and Distributed DoS (DDoS) Attacks
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
Distributed Denial of Services (DDoS) Attacks Conceptual Intro
DDoS - Distributed Denial of Service
minor final
A041201010
A vivacious approach to detect and prevent d do s attack
ITMSS March 4th NTP DDoS
DrupalCon Vienna 2017 - Anatomy of DDoS
Ad

Recently uploaded (20)

PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
August Patch Tuesday
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPTX
Benefits of Physical activity for teenagers.pptx
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Five Habits of High-Impact Board Members
PPTX
Modernising the Digital Integration Hub
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Unlock new opportunities with location data.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
Chapter 5: Probability Theory and Statistics
PDF
CloudStack 4.21: First Look Webinar slides
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
observCloud-Native Containerability and monitoring.pptx
Developing a website for English-speaking practice to English as a foreign la...
WOOl fibre morphology and structure.pdf for textiles
August Patch Tuesday
Final SEM Unit 1 for mit wpu at pune .pptx
Web Crawler for Trend Tracking Gen Z Insights.pptx
Benefits of Physical activity for teenagers.pptx
O2C Customer Invoices to Receipt V15A.pptx
Five Habits of High-Impact Board Members
Modernising the Digital Integration Hub
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A review of recent deep learning applications in wood surface defect identifi...
Unlock new opportunities with location data.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
Chapter 5: Probability Theory and Statistics
CloudStack 4.21: First Look Webinar slides
A novel scalable deep ensemble learning framework for big data classification...
Assigned Numbers - 2025 - Bluetooth® Document

Ntp in Amplification Inferno

  • 1. 0Document Title NTP in Amplification Inferno Sriram Krishnan
  • 2. 1Document Title To Introduce Myself...  Sriram Krishnan  Senior Manager, Security Solutions, Group Information Security - Scope International Pvt. Ltd. (A wholly owned subsidiary of Standard Chartered Bank)  Over 9 years of experience in Information Security
  • 3. 2Document Title Agenda  Why NTP Amplification?  Demystifying DDoS  Time to Deep Dive  NTP Amplification Attack – Demo  Challenges & Countermeasures
  • 4. 3Document Title Why NTP Amplification?
  • 6. 5Document Title Why NTP?  Why NTP is targeted  Ease of attack:  Small request may lead to relatively large response  Evade Detection:  Spoofing of IP Address due to lack of handshake process– as it is a UDP based protocol  Availability:  Essential service with large clusters of public timeservers available in internet  Traffic Volume:  Potential to generate from 200 to 400Gbps of traffic that will shutdown a network Targeted Industries  Internet Service Providers,  Banks and Financial Services,  Managed Services (Including SaaS),  Critical Infrastructure of countries  e-Commerce
  • 8. 7Document Title Understanding DDoS Terminology  Master / Handler Compromised system in the interest used by the attacker to launch attacks.  Slave / Agent: System that responds to the instructions of Master which are controlled by the attacker. Slave serves as the amplifiers for DDos attacks.  Daemon: Process running the Slave, executing the commands for amplification.  Reflector Systems that respond to instructions of Master, without the awareness of participating in DRDoS attack.  Victim Target host or network for the DDoS attack.
  • 9. 8Document Title DDoS Categorized Based on Attack Method Conventional DDoS Attack:  Attacker takes control of master system to send instructions to slaves running the affected daemon.  The slaves will execute the command and amplify the traffic to finally send it to victims. Compromised Systems Fig 1: Distributed Denial of Service (DDOS) Attack
  • 10. 9Document Title DDoS Categorized Based on Attack Method Distributed Reflective Denial of Service Attack  Attacker takes control of the master system and sends instruction to reflector running the vulnerable daemon.  Reflectors executes the command and amplifies the traffic to finally send it to victims.  Host of both categories (Master and Slave) are compromised in DDoS, but in DRDoS attack the reflector is not compromised. Compromised Systems Fig 2: Distributed Reflective Denial of Service (DRDOS) Attack
  • 11. 10Document Title DDoS Categorized Based on Impact  Volume / Bandwidth Based Attacks  Chokes victim’s network bandwidth  Measured in bits per second (Bps)  Example: UDP Flood, ICMP Flood  Protocol Based Attacks  Exhaust the system / network device resources and shutdown the service or systems  Measured as packets per second  Example: SYN Flood, Ping of Death, Smurf DDoS  Application Layer Based Attacks  Shutdown application layer resources / services  Example: Slowloris, HTTP Flood.
  • 13. 12Document Title Vulnerability Details  NTP allows administrators to monitor service via ntpd daemon – by executing remote commands  Affected command is monlist  monlist command operates in mode 7 – private use (which allows remote administration).  Purpose of this command is to obtain details about NTP Associations (up to 600) from NTP server  NTP Associations are formed when two peers exchange messages, and this transaction is maintained in the Most Recently Used (MRU) list.  NTP Associations details are stored in ntp.conf file. Example, in unix-based OS this file is stored in </etc/ntp.conf>  Attacker sends a request (get_monlist ) to public NTP Server (in internet) with spoofed IP of the victim  Response to this request generates enormous traffic towards the victim’s network
  • 14. 13Document Title Monlist Command – Understanding the Details
  • 15. 14Document Title Examining the Source Code Let’s examine the source code that defines the structure and executes the monlist command  ntp_request.c - respond to information requests  ntp_monitor.c - monitor who is using the ntpd server ntp_request.c  mon_getlist_1 function obtains MRU list from the NTP server.  Arrow indicates structure of mon_data that defines the maximum number of NTP associations.  The keyword “extern” is used as this variable has already been defined in ntp_monitor.c.
  • 16. 15Document Title Examining the Source Code (Contd..) ntp_monitor.c  First arrow - defines the number of structure to be allocated - 600  Second arrow - declares and defines the mon_data that updates the statistics of the monitoring data.
  • 17. 16Document Title NTP Amplification Attack Spoofed IP Address of Victim monlist NTP Associations MRU List
  • 19. 18Document Title Challenges & Countermeasures
  • 20. 19Document Title Challenges in Defence  Arresting Help  DDoS attack floods victim’s network / systems with malicious packets.  Traffic flow increases rapidly within a quick span of time and without any prior warning or alert.  This prevents systems to send SoS and are arrested from the attack.  Filtering of Traffic  Any attempts made to filter the traffic, hampers service rendered  All legitimate traffic may be filtered / rejected thus denying service  Evade Detection  Generally attackers spoof the IP address of the attack packets.  Attack triggered from distributed compromised systems  Heterogeneous Environment:  Systems with multiple software and diverse architecture are deployed.
  • 21. 20Document Title Countermeasures So what is required? Robust & effective defensive mechanism How? Enhancing the protocol design
  • 22. 21Document Title Countermeasures – NTP Amplification Attacks  Upgrade the ntpd version to 4.2.7  If the ntpd version cannot be updated, add the “noquery” directive to the “restrict default” line in the ntp.conf file.
  • 23. 22Document Title Countermeasures - DDoS Attacks  Response Rate Limitation (RRL)  Limits number of packets issued to a target at a given time interval  Excess data over the limit is truncated  Works best when the attack source is limited  Already implemented in DNS protocol  Protocol Harding  Session handling mechanism - requests to be processed only post session initiation  For example, DTLS (RFC 4347), a UDP-variant of TLS, implements a stateless cookie exchange mechanism in order to avoid DDoS attacks.  Response Size Limitation  Protocol to be designed to:  Limit the output (packet size) for every request, and  Demand session initiation before releasing the rest of the output
  • 24. 23Document Title To Sum Up!  UDP based network services - easy target for attackers  Other UDP based services such as SNMP, SSDP, NetBIOS targeted  Pressing need to harden such protocol design  Need for investments in preventive defence mechanism pertinent