Security Basics mailing list archives
RE: Concepts: Security and Obscurity
From: "Craig Wright" <Craig.Wright () bdo com au>
Date: Wed, 18 Apr 2007 07:42:49 +1000
As I have previously stated this is not the only means of identifying a host. However, you will find that most routers at the ISP and other levels do send information. Most poeople do not go to this level however. This is not the same thing as the information not being available. What can be found rather quickly is any hidden gateway. A hidden gateway is (practically) always a security control. This than places a target to extrapolate the hosts that are behind it. It does not need to be a "true indictator", just a probabilistic function of of a possible security control. Other checks would than either confirm this or dispel it. True, multiple layers of stealthed firewalls would make a statistical analysis of return packets difficult and if done correctly, improbable. But what we are talking about is not a system that is likely to have multiple inline firewalls of differing variety/manufacture/ruleset. Again (and as a side point) this also comes down to assuming that you are not a target and that the major threat is a random script kiddie. This I would also dispute. Craig Craig Wright Manager of Information Systems Direct +61 2 9286 5497 Craig.Wright () bdo com au BDO Kendalls (NSW) Level 19, 2 Market Street Sydney NSW 2000 GPO Box 2551 Sydney NSW 2001 Fax +61 2 9993 9497 www.bdo.com.au Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within those States and Territories of Australia where such legislation exists. The information in this email and any attachments is confidential. If you are not the named addressee you must not read, print, copy, distribute, or use in any way this transmission or any information it contains. If you have received this message in error, please notify the sender by return email, destroy all copies and delete it from your system. Any views expressed in this message are those of the individual sender and not necessarily endorsed by BDO Kendalls. You may not rely on this message as advice unless subsequently confirmed by fax or letter signed by a Partner or Director of BDO Kendalls. It is your responsibility to scan this communication and any files attached for computer viruses and other defects. BDO Kendalls does not accept liability for any loss or damage however caused which may result from this communication or any files attached. A full version of the BDO Kendalls disclaimer, and our Privacy statement, can be found on the BDO Kendalls website at http://www.bdo.com.au or by emailing administrator () bdo com au. BDO Kendalls is a national association of separate partnerships and entities. -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Daniel Miessler Sent: Wednesday, 18 April 2007 3:42 AM To: Ansgar -59cobalt- Wiechers Cc: security-basics () securityfocus com Subject: Re: Concepts: Security and Obscurity On Apr 17, 2007, at 12:28 PM, Ansgar -59cobalt- Wiechers wrote:
So if I'm scanning a class B for port 22 in order to unleash a zero-day exploit, how do you propose I differentiate between the dead network space (i.e. there's nothing there) vs. the systems that just SEEM to not be there because I get no response?You differentiate by the fact that for the former you *do* get a response (destination-unreachable), whereas for the latter you don't. Please read up on how TCP/IP actually works.
Yes, we're aware of the basics here, and now I ask that you scan a class B and see if for every system that's NOT there you get back an ICMP message like you're supposed to. I think you'll find that reality doesn't correlate well with the RFC on this matter. Getting back proper ICMP responses from "somewhere upstream" is hit and miss, and therefore unreliable as a true indicator of a "hiding system". -- Daniel Miessler E: daniel () dmiessler com W: http://dmiessler.com G: 0xDA6D50EAC
Current thread:
- Re: RE: Re: Concepts: Security and Obscurity, (continued)
- Re: RE: Re: Concepts: Security and Obscurity levinson_k (Apr 16)
- Re: Concepts: Security and Obscurity Ansgar -59cobalt- Wiechers (Apr 17)
- RE: Re: Concepts: Security and Obscurity Craig Wright (Apr 16)
- Re: Concepts: Security and Obscurity Michael Rash (Apr 17)
- RE: Concepts: Security and Obscurity Craig Wright (Apr 17)
- Re: Concepts: Security and Obscurity Michael Rash (Apr 17)
- Re: Concepts: Security and Obscurity Michael Rash (Apr 17)
- Re: RE: Re: Concepts: Security and Obscurity levinson_k (Apr 16)
- Re: Re: Concepts: Security and Obscurity levinson_k (Apr 16)
- RE: Re: Concepts: Security and Obscurity Craig Wright (Apr 17)
- RE: Re: Concepts: Security and Obscurity Craig Wright (Apr 17)
- Re: Re: Concepts: Security and Obscurity TheGesus (Apr 17)
- RE: Concepts: Security and Obscurity Craig Wright (Apr 17)
- RE: RE: Re: Concepts: Security and Obscurity Craig Wright (Apr 17)
- RE: Re: Concepts: Security and Obscurity Craig Wright (Apr 17)
- Re: Re: Concepts: Security and Obscurity TheGesus (Apr 17)
- RE: Concepts: Security and Obscurity Craig Wright (Apr 17)
- RE: Re: Concepts: Security and Obscurity Craig Wright (Apr 17)
- Re: Re: Concepts: Security and Obscurity TheGesus (Apr 17)
- Re: Re: Concepts: Security and Obscurity levinson_k (Apr 17)
- RE: RE: Re: Concepts: Security and Obscurity Craig Wright (Apr 17)
- RE: Re: Concepts: Security and Obscurity Nhon Yeung (Apr 17)
- RE: Concepts: Security and Obscurity Craig Wright (Apr 17)