Penetration Testing mailing list archives
RE: Multiple Spoofed HTTP Requests
From: Kyle Starkey <kstarkey () siegeworks com>
Date: Sat, 03 Sep 2005 10:43:17 -0600
This can be done, but requires that you are talking to a webserver whose sequence numbers are easily guessable and even then is going to be a blind attack... You will have to send the packets from a spoofed source then simply continue to have the conversation with the webserver without ever hearing the Webserver side of it... However a few "standard" convo's with the WS should tell you how it is going to react when you spoof the source IP... It's a pretty tricky attack, but it can be done assuming the WS uses easily guessable seq #'s and your source IP is something that is non-RFC1918 so the packet will get to the ws and not get blocked by FW's or border router acls... -K -----Original Message----- From: kuffya () gmail com [mailto:kuffya () gmail com] Sent: Friday, September 02, 2005 7:12 AM To: pen-test () securityfocus com Subject: Multiple Spoofed HTTP Requests Hi list, I've used a variety of tools such as Nemesis, Packet Xcalibur & Libnet GUI to craft customized packets. Using such tools, you can create packets at layers 2 up to 5 possibly spoofing your source IP, port numbers or whatever you see fit. The question is : Would it be possible to craft a HTTP request(or multiple requests) using a spoofed IP address? I'm inclined to consider that it's not, the reason being you must have a 3-way handshake established before you can start talking application layer protocols (such as HTTP). If you use a spoofed IP address, then there's no way of doing that. On the other hand, I might be totally wrong, that's why I'm asking the list, for the list is wise. If, however, it is possible could you please give me some directions on how to do it? Thanks a lot S. ---------------------------------------------------------------------------- -- Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 ---------------------------------------------------------------------------- --- ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- Multiple Spoofed HTTP Requests kuffya (Sep 02)
- RE: Multiple Spoofed HTTP Requests Omar A. Herrera (Sep 03)
- Re: Multiple Spoofed HTTP Requests Jayson Anderson (Sep 03)
- RE: Multiple Spoofed HTTP Requests Kyle Starkey (Sep 03)
- Re: Multiple Spoofed HTTP Requests Kaj Huisman (Sep 03)
- <Possible follow-ups>
- RE: Multiple Spoofed HTTP Requests Payton, Zack (Sep 03)
- Re: Multiple Spoofed HTTP Requests Marco Ivaldi (Sep 05)
- Whitespace in passwords bryan allott (Sep 06)
- Re: Whitespace in passwords Bruce K. Marshall (Sep 07)
- Re: Whitespace in passwords Anurag Joshi (Sep 11)
- Re: Whitespace in passwords Bruce K. Marshall (Sep 12)
- Whitespace in passwords bryan allott (Sep 06)