Penetration Testing mailing list archives

RE: Finding multi-homed, internet connected, systems as potential point-of-entry.


From: "Royster, Keith" <Keith.Royster () bankofamerica com>
Date: Wed, 07 Dec 2005 10:24:50 -0500

I'm confused on how this testing method would work. My (potentially limited) understanding is that ICMP would not be 
routed between the two NICs, and so would not cross from the secure network out to the spoofed address on the external 
network.  Wouldn't routing have to be enabled on each system tested, and wouldn't you have to test with something that 
goes higher in the OSI stack than ICMP, for this to work?

Keith Royster

-----Original Message-----
From: MadHat [mailto:madhat () unspecific com] 
Sent: Tuesday, December 06, 2005 12:39 PM
To: Bongers, Coen
Cc: pen-test () securityfocus com
Subject: Re: Finding multi-homed, internet connected, systems as potential point-of-entry.

http://www.unspecific.com/.go/routedetector/

It uses ICMP and may or may not work depending on how the local network is set up.  It worked well at my last job.

On Dec 5, 2005, at 7:41 AM, Bongers, Coen wrote:

Hello,

Im asked to assess the existence of so-called multi-homed systems on 
the network of a customer, that are able to directly connect to the 
internet (and thus circomventing the proxy services), in order to 
reduce the risk of network compromise through this 'illegal' 
internet-access.

Any tips and/or help on how to approach this would be appriciated.

The following approach is my present idea;

-Send a spoofed (spoof an internet address under our control) message
(IP/ICMP/UDP,etc) to the target(s) from the internal network.
-Detect for the response of this message on the spoofed address at the 
internet.
-Log some identifiing information in the initial message, that will 
end up on the response so that the response can be correlated with the 
internal address of the system.

Questions for me now are;

-What are the risks of false negatives and false positives using this 
methode?
-What prerequisites are ther for thes methode to be succesfull?
-Are there any other ways of identifieing these 'illegal' internet 
connections?
-Are there any freeware/commercial tools that allready do the job?
-If so, how good of a job are they doing?


 p.s.> there is no administrative access to the target systems, so it 
has to be a black-box-approach.

Thank you.





Met vriendelijke groet / with kind regards,



Coen Bongers

Security Consultant

_________________________________________




______________________________________________________________________
__
______________________________________________________________________
__
____________________________________________________

The information contained in this email and its attachments (if
any) is
confidential and may be legally privileged. It is intended solely for 
the use of the individual or entity to whom it is addressed and others 
authorised to receive it. If you are not the intended recipient you 
are hereby notified that any disclosure, copying, distribution or 
action in reliance of the contents of this information is strictly 
prohibited and may be unlawful. LogicaCMG is neither liable for the 
proper and complete transmission of the information contained in this 
email nor for any delay in its receipt. If received in error, please 
contact LogicaCMG on
+31 (0)40 295 77 77 quoting the name of the sender and the
addressee and
then delete it from your system. LogicaCMG does not accept any 
responsibility for viruses and it is your responsibility to scan the 
email and attachments.

______________________________________________________________________
__
______________________________________________________________________
__
____________________________________________________







This e-mail and any attachment is for authorised use by the  
intended recipient(s) only. It may contain proprietary material,  
confidential information and/or be subject to legal privilege. It  
should not be copied, disclosed to, retained or used by, any other  
party. If you are not an intended recipient then please promptly  
delete this e-mail and any attachment and all copies and inform the  
sender. Thank you.

---------------------------------------------------------------------- 
--------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications  
on your
website. Up to 75% of cyber attacks are launched on shopping carts,  
forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down  
servers are
futile against web application hacking. Check your website for  
vulnerabilities
to SQL injection, Cross site scripting and other web attacks before  
hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
---------------------------------------------------------------------- 
---------


--
MadHat (at) Unspecific.com, CĀ²ISSP
E786 7B30 7534 DCC2 94D5  91DE E922 0B21 9DDC 3E98
gpg --keyserver wwwkeys.us.pgp.net --recv-keys 9DDC3E98


------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: