Penetration Testing
an anternative to port-knoking using the OpenBSD pf only Jan 23 2006 09:44PM
poplix (poplix papuasia org) (2 replies)
Re: an anternative to port-knoking using the OpenBSD pf only Feb 17 2006 08:52AM
gimeshell web de (1 replies)
Re: an anternative to port-knoking using the OpenBSD pf only Feb 20 2006 09:58PM
poplix (poplix papuasia org) (1 replies)
If an attacker has targetted your system, port-knocking and this
alternative are totally useless. Knokcing sequences (and os
fingerprints) are not encrypted so their content can be easly
sniffed out. Port knocking increases sealthness (so it can probably
be considered a security measure) but cannot be used to make a system
safe.
I've noted that many people misunderstand the port-knocking's
meaning, it's not a security layer and doesn't prevent security
holes, it can only make your system quite harder to hack.
Anyway the use of port-knocking to make a system safer can be a bad
solution, because it's just like wrapping a vault with cellophane.
You can use it to hide a computer in internet, or to keep your
logfiles clean as you can use cellophane to protect iron against rain.

Gimeshell, it's not right to consider tcp options size unlimited, and
I think the real port-knoking is harder to brutefoce. Authentication
through os fingerprints cannot use all tcp options (p0f doesn't
analyze them all) and, anyway, it must fit tcp options structure and
respect the protocol rules.

poplix

On 17 Feb 2006, at 9:52 AM, gimeshell (at) web (dot) de [email concealed] wrote:

> On Mon, 23 Jan 2006 22:44:52 +0100
> poplix <poplix (at) papuasia (dot) org [email concealed]> wrote:
>>
>> OUT (tcp.flags='syn')
>> set(
>> tcp.win='8192',ip.ttl='128',ip.flags.df='0',
>> tcp.options='mss=3884+noop+wss=0+noop+noop+ts=TS'
>> );
>>
>> This rule tells tripp to rewrite all outgoing tcp packets with
>> the SYN
>> flag set only allowing my first handshake packet to match "poplix"
>> fingerprint.
>
> Does an attacker who wants to attack a server include aspect that
> this maybe a system utilizing port knocking in this way?
> Perhaps if he has focused at this system?
>
> Am i right to say, your invented os fingerprint is random and unique
> and because of unlimited IP option field's length there's no
> chance left for attacker to brute force ports with different option
> field values et cetera to get correct option field + window size +
> ttl +
> flag?
>
> regards
>
> ----------------------------------------------------------------------
> --------
> Audit your website security with Acunetix Web Vulnerability Scanner:
>
> Hackers are concentrating their efforts on attacking applications
> on your
> website. Up to 75% of cyber attacks are launched on shopping carts,
> forms,
> login pages, dynamic content etc. Firewalls, SSL and locked-down
> servers are
> futile against web application hacking. Check your website for
> vulnerabilities
> to SQL injection, Cross site scripting and other web attacks before
> hackers do!
> Download Trial at:
>
> http://www.securityfocus.com/sponsor/pen-test_050831
> ----------------------------------------------------------------------
> ---------

------------------------------------------------------------------------
------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
------------------------------------------------------------------------
-------

[ reply ]
Re: an anternative to port-knoking using the OpenBSD pf only Feb 22 2006 10:00AM
Pete Herzog (lists isecom org) (1 replies)
Re: an anternative to port-knoking using the OpenBSD pf only Feb 27 2006 11:09PM
poplix (poplix papuasia org) (1 replies)
Re: an anternative to port-knoking using the OpenBSD pf only Jan 24 2006 09:56AM
Joachim Schipper (j schipper math uu nl) (1 replies)


 

Privacy Statement
Copyright 2010, SecurityFocus