Annotation of embedaddon/hping2/docs/MORE-FUN-WITH-IPID, revision 1.1.1.1
1.1 misho 1: Posted to bugtraq mailing list (20 Nov 1999):
2:
3: ---
4: Hi,
5:
6: some little new ideas about IP ID issue:
7:
8: The first is about linux firewalling: since it increase IP ID global counter
9: even if an outgoing packet will be filtered we are able, for example, to
10: scan UDP ports even if ICMP type 3 output is DENY, and in general it is possibleto know when TCP/IP stack reply a packet even if the reply is dropped.
11: I think (but not tested) that this is true for almost all firewalls.
12:
13: The second issue concern the ability to uncover firewall rules. For example
14: it is travial to know if host A filter packets from the IP X.Y.Z.W monitoring
15: IP ID incresing of host A or host with X.Y.Z.W address (this changes if we are
16: interested to know input or output rules) and sending packets that suppose
17: some reply. Also this is related with the ability to scan the ports of hosts
18: that drop all packets with a source different than host.trusted.com.
19: There are others stuff like this but they are only different faces of the
20: same concepts.
21:
22: Some people thinks that this kind of attacks isn't a "real world" attacks,
23: I'm strongly interested to know what's bugtraq readers opinion (IMO this
24: kind of attacks are feasible and usefull for an attacker. For exaple the
25: ability to scan the ports with only spoofed packets and the ability to
26: guess remote hosts traffic are a lot real).
27:
28: ciao,
29: antirez
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>