home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker's Secrets 4
/
Hacker's Secrets 4.iso
/
internet
/
passivep.txt
< prev
next >
Wrap
Text File
|
1995-12-04
|
8KB
|
167 lines
Stealth Scanning - Bypassing Firewalls and SATAN Detectors
----------------------------------------------------------
Administrators need tools to find out what is going on in their network.
Maybe an internal employee has installed a unauthorized web server and
put proprietary information online allowing anyone to access it, how
does an administrator find out that there is even a web server running on
their network? Many administrators use tools called TCP Port scanners.
These programs which try to connect to all possible ports on a machine
find which services are running. This information gives a network
administrator better ability to understand and be aware of how his or her
network is configured. Unfortunately, this technology is a double-edge
sword because intruders can scan other networks and be able to gather
information that helps better mount an attack. The intruder now knows
which machines are running and what services are available. TCP port
scanning is built into shareware auditing tools, such as
ISS (Internet Security Scanner) and SATAN. These tools were intended
to help administrators correct security risks in their network, but
unfortunately they are just as useful to the bad guys.
Because TCP port scanning is like knocking on the door of many services,
people have written tools like SATAN detectors which notify administrators
when outside people are knocking on their network. This has made the
administrator feel like they are getting a good alarm notice if a hacker
decides to attack their network.
Here is a problem that we want to educate people about and possibly
come up with some better solutions to addressing this problem.
Most of the TCP port scanning technology relies on making an established
connection with a port to determine if it is active or not. Many
of the SATAN/Port Scanning Detectors rely on this fact. They record
the connections and if a connection happens to a wrong port or the
number of connections within a certian time reaches a threshhold, an alarm
goes off. TCP_wrappers will also keep a record of any estblished
connection which helps administrators find where an intruder came from.
One problem which exists is that intruders can scan without establishing a
connection. There is a technique for doing a half-open scan. The intruder
can send a SYN packet that starts a connection, and if the port is active,
it will respond with a SYN|ACK and the intruder records these packets,
determining which ports were active now. In a typical established
connection, the host responds to the SYN|ACK to finish completing the
connection. The intruder can now send a reset packet removing from the
kernel that a connection was half open.
Here's the interesting information. ---- We do not even need to use
a SYN packet to scan. Many firewalls block outside networks from
sending in a SYN packet and that stops initiating a connection.
So even the half-open scan won't work past a firewall. But we have
tried other TCP flags and found many other packets will do the trick
just as good, and if not better.
Here's a table of the packets and response types to determine active ports.
Flag Active Port Response Non-active Port Response
SYN SYN|ACK Reset or Nothing
SYN|FIN ACK or SYN|ACK* Reset
ACK Nothing Reset
0 flag Nothing Reset
* Depends on the TCP implementation. Windows 95 returned SYN|ACK while most
Unix platforms return an ACK.
We have picked the most interesting flags. You can also add URG and PUSH
flags to any of the above flags and get the same response. The SYN|FIN
is an illegal type of flags that contradict themselves, but a few router based
firewalls that were blocking the other type packets allow this one through.
The 0 flag packets are packets that designate the packet type as 0, which
some packet filter based firewalls may allow through.
Some firewalls allow ACK packets through as well. Using these type
of packets, we called this a "stealth scan" because typically most
TCP port scan detectors do not catch this type of activity and the scan
enables you to bypass a firewall and see what services are running on
the inside machines.
Denial of Service Attacks
-------------------------
In coming up with developing this code, we are able to do 2 types of
denial of service attacks that people should be aware of and at some
point, we need to have vendors fix the problems.
1) By scanning with all these different types of packets, we were able
to crash a few popular type routers that could not handle these packets.
We reported the problem back to the vendors.
2) By scanning with half-opens and not sending a RESET, the kernel's
cache of half-open connections get full and will no longer accept any more
connection. This would be a quick and easy way to cause a high connection
rate machine to no longer provide any more connections, denying anyone
from access to a machine, including a Web server.
Solutions
---------
Do not rely completely on SATAN detectors. Most of them are designed
to only signal alarms if a full established connection is made.
Courtney.pl is the only SATAN detector that we found that actually looked
at the packets themselves looking for SYN packets. To detect a stealth
scan, we need to come up with some heuristics for detecting an anomly
of the number of reset packets generated as well.
For denial of service attacks, if a device can't handle the packets
it will be up to the vendor to provide a patch to fix this.
Vendors need to look at potential solutions for half open attacks
such as increasing in the kernel the number of half open connections
possible, decreasing the time that the cached half opens stay in the memory,
possibly logging when a particular host has filled up the half open
cache and ignoring further half open packets from the offending host.
Firewalls
---------
The more secure setup of firewalls tend to be a combination of both
packet filter / proxy server type firewalls that would prevent
scanning past the firewall if configured properly.
-------------------------------------------------------------------------------
Copyright
This paper is Copyright (c) 1994, 1995
by Christopher Klaus of Internet Security Systems, Inc.
Permission is hereby granted to give away free copies electronically. You may
distribute, transfer, or spread this paper electronically. You may not pretend
that you wrote it. This copyright notice must be maintained in any copy made.
If you wish to reprint the whole or any part of this paper in any other medium
excluding electronic medium, please ask the author for permission.
Disclaimer
The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There are NO
warranties with regard to this information. In no event shall the author be
liable for any damages whatsoever arising out of or in connection with the use
or spread of this information. Any use of this information is at the user's own
risk.
Address of Author
Please send suggestions, updates, and comments to:
Christopher Klaus <cklaus@iss.net>
of Internet Security Systems, Inc. <iss@iss.net>
Internet Security Systems, Inc.
Internet Security Systems, Inc, located in Atlanta, Ga., specializes in the
developement of security scanning software tools. Its flagship product,
Internet Scanner, is software that learns an organization's network and probes
every device on that network for security holes. It is the most comprehensive
"attack simulator" available, checking for over 100 security vulnerabilities.
--
Christopher William Klaus Voice: (770)441-2531. Fax: (770)441-2431
Internet Security Systems, Inc. "Internet Scanner lets you find
2000 Miller Court West, Norcross, GA 30071 your network security holes
Web: http://iss.net/ Email: cklaus@iss.net before the hackers do."