[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:00.00,0:00:10.00,Default,,0000,0000,0000,,[Music] Dialogue: 0,0:00:10.00,0:00:19.00,Default,,0000,0000,0000,,[Laughter] Dialogue: 0,0:00:19.00,0:00:23.00,Default,,0000,0000,0000,,the Smurf attack is a distributed Dialogue: 0,0:00:23.00,0:00:26.00,Default,,0000,0000,0000,,denial-of-service attack in which large Dialogue: 0,0:00:26.00,0:00:30.00,Default,,0000,0000,0000,,numbers of Internet control message Dialogue: 0,0:00:30.00,0:00:35.00,Default,,0000,0000,0000,,protocol in packets with the intended Dialogue: 0,0:00:35.00,0:00:39.00,Default,,0000,0000,0000,,victim spoofed source IP are broadcast Dialogue: 0,0:00:39.00,0:00:44.00,Default,,0000,0000,0000,,to a computer network using an IP Dialogue: 0,0:00:44.00,0:00:50.00,Default,,0000,0000,0000,,broadcast address most devices on a Dialogue: 0,0:00:50.00,0:00:55.00,Default,,0000,0000,0000,,network will by default respond to this Dialogue: 0,0:00:55.00,0:00:59.00,Default,,0000,0000,0000,,by sending a reply to the source IP Dialogue: 0,0:00:59.00,0:01:03.00,Default,,0000,0000,0000,,address if the number of machines on the Dialogue: 0,0:01:03.00,0:01:07.00,Default,,0000,0000,0000,,network that receive and respond to Dialogue: 0,0:01:07.00,0:01:11.00,Default,,0000,0000,0000,,these packets is very large the victims Dialogue: 0,0:01:11.00,0:01:15.00,Default,,0000,0000,0000,,container will be flattered with traffic Dialogue: 0,0:01:15.00,0:01:19.00,Default,,0000,0000,0000,,this can slow down the victims computer Dialogue: 0,0:01:19.00,0:01:25.00,Default,,0000,0000,0000,,to the point where it becomes impossible Dialogue: 0,0:01:25.00,0:01:31.00,Default,,0000,0000,0000,,to work on in the late 1990s many IP Dialogue: 0,0:01:31.00,0:01:36.00,Default,,0000,0000,0000,,networks would participate in Smurf Dialogue: 0,0:01:36.00,0:01:40.00,Default,,0000,0000,0000,,attacks if prompted that is they would Dialogue: 0,0:01:40.00,0:01:44.00,Default,,0000,0000,0000,,respond to written requests sent to Dialogue: 0,0:01:44.00,0:01:49.00,Default,,0000,0000,0000,,broadcast addresses the name comes from Dialogue: 0,0:01:49.00,0:01:54.00,Default,,0000,0000,0000,,the idea of very small but numerous Dialogue: 0,0:01:54.00,0:02:00.00,Default,,0000,0000,0000,,attackers overwhelming a much larger Dialogue: 0,0:02:00.00,0:02:06.00,Default,,0000,0000,0000,,opponent see smurf today administrators Dialogue: 0,0:02:06.00,0:02:11.00,Default,,0000,0000,0000,,can make a network immune to such abuse Dialogue: 0,0:02:11.00,0:02:17.00,Default,,0000,0000,0000,,therefore very few networks remain Dialogue: 0,0:02:17.00,0:02:24.00,Default,,0000,0000,0000,,vulnerable to smurf attacks the fix is Dialogue: 0,0:02:24.00,0:02:30.00,Default,,0000,0000,0000,,twofold one configure individual hosts Dialogue: 0,0:02:30.00,0:02:36.00,Default,,0000,0000,0000,,and routers to not respond to the Dialogue: 0,0:02:36.00,0:02:43.00,Default,,0000,0000,0000,,requests or broadcasts or to configure Dialogue: 0,0:02:43.00,0:02:49.00,Default,,0000,0000,0000,,routers to not forward packets directed Dialogue: 0,0:02:49.00,0:02:55.00,Default,,0000,0000,0000,,to broadcast addresses until 1999 Dialogue: 0,0:02:55.00,0:03:01.00,Default,,0000,0000,0000,,standards required routers to forward Dialogue: 0,0:03:01.00,0:03:06.00,Default,,0000,0000,0000,,such packets by default since then the Dialogue: 0,0:03:06.00,0:03:11.00,Default,,0000,0000,0000,,default standard was changed to not Dialogue: 0,0:03:11.00,0:03:16.00,Default,,0000,0000,0000,,forward such packets another proposed Dialogue: 0,0:03:16.00,0:03:20.00,Default,,0000,0000,0000,,solution is network ingress filtering Dialogue: 0,0:03:20.00,0:03:24.00,Default,,0000,0000,0000,,which rejects the attacking packets on Dialogue: 0,0:03:24.00,0:03:29.00,Default,,0000,0000,0000,,the basis of the forged source address Dialogue: 0,0:03:29.00,0:03:34.00,Default,,0000,0000,0000,,an example of configuring a router so it Dialogue: 0,0:03:34.00,0:03:40.00,Default,,0000,0000,0000,,will not forward packets to broadcast Dialogue: 0,0:03:40.00,0:03:44.00,Default,,0000,0000,0000,,addresses for a Cisco router is router Dialogue: 0,0:03:44.00,0:03:48.00,Default,,0000,0000,0000,,can Dialogue: 0,0:03:48.00,0:03:54.00,Default,,0000,0000,0000,,pants I know if directed broadcast this Dialogue: 0,0:03:54.00,0:03:59.00,Default,,0000,0000,0000,,example does not protect a network from Dialogue: 0,0:03:59.00,0:04:03.00,Default,,0000,0000,0000,,becoming the target of Smurf attack it Dialogue: 0,0:04:03.00,0:04:07.00,Default,,0000,0000,0000,,merely prevents the network from Dialogue: 0,0:04:07.00,0:04:12.00,Default,,0000,0000,0000,,participating in a smurf attack a smurf Dialogue: 0,0:04:12.00,0:04:16.00,Default,,0000,0000,0000,,amplifier is a computer network that Dialogue: 0,0:04:16.00,0:04:21.00,Default,,0000,0000,0000,,lends itself to being used in a smurf Dialogue: 0,0:04:21.00,0:04:26.00,Default,,0000,0000,0000,,attack Smurfs amplifiers asked to worsen Dialogue: 0,0:04:26.00,0:04:29.00,Default,,0000,0000,0000,,the severity of a smurf attack because Dialogue: 0,0:04:29.00,0:04:32.00,Default,,0000,0000,0000,,they are configured in such a way that Dialogue: 0,0:04:32.00,0:04:36.00,Default,,0000,0000,0000,,they generate a large number of attempt Dialogue: 0,0:04:36.00,0:04:41.00,Default,,0000,0000,0000,,replies to the victim at the spoofed Dialogue: 0,0:04:41.00,0:04:46.00,Default,,0000,0000,0000,,source IP address a Fraggle attack is a Dialogue: 0,0:04:46.00,0:04:50.00,Default,,0000,0000,0000,,variation of a smurf attack where an Dialogue: 0,0:04:50.00,0:04:56.00,Default,,0000,0000,0000,,attacker sends a large amount of ugh Dialogue: 0,0:04:56.00,0:05:02.00,Default,,0000,0000,0000,,traffic to port 7 echo and 19 target to Dialogue: 0,0:05:02.00,0:05:06.00,Default,,0000,0000,0000,,an IP broadcast address with the Dialogue: 0,0:05:06.00,0:05:11.00,Default,,0000,0000,0000,,intended victim spoofed floors IP Dialogue: 0,0:05:11.00,0:05:16.00,Default,,0000,0000,0000,,address it works very similar to the Dialogue: 0,0:05:16.00,0:05:20.00,Default,,0000,0000,0000,,Smurf attack in that many computers on Dialogue: 0,0:05:20.00,0:05:24.00,Default,,0000,0000,0000,,the network will respond to this traffic Dialogue: 0,0:05:24.00,0:05:28.00,Default,,0000,0000,0000,,by sending traffic back to the spoofed Dialogue: 0,0:05:28.00,0:05:34.00,Default,,0000,0000,0000,,source IP of the victim flooding it with Dialogue: 0,0:05:34.00,0:05:42.00,Default,,0000,0000,0000,,traffic fraggle da see the source code Dialogue: 0,0:05:42.00,0:05:46.00,Default,,0000,0000,0000,,of the attack was also released by freak