Penetration Testing mailing list archives

RE: Multiple Spoofed HTTP Requests


From: "Omar A. Herrera" <omar.herrera () oissg org>
Date: Fri, 2 Sep 2005 23:00:56 -0500


Hi Kuyffya,

-----Original Message-----
From: kuffya () gmail com [mailto:kuffya () gmail com]

Hi list,
I've used a variety of tools such as Nemesis, Packet Xcalibur & Libnet GUI
to craft customized packets. Using such tools, you can create packets at
layers 2 up to 5 possibly spoofing your source IP, port numbers or
whatever you see fit.
The question is : Would it be possible to craft a HTTP request(or multiple
requests) using a spoofed IP address? I'm inclined to consider that it's
not, the reason being you must have a 3-way handshake established before
you can start talking application layer protocols (such as HTTP). If you
use a spoofed IP address, then there's no way of doing that. On the other
hand, I might be totally wrong, that's why I'm asking the list, for the
list is wise.
If, however, it is possible could you please give me some directions on
how to do it?

Yes you can, it is not easy though. The theory of this attacks is old
actually, they are called blind attacks, and you should be careful with 3
things: a) that the spoofed address does not respond and b) that the timing
of your responses is adequate c) You need to have some way to capture their
responses, in order to keep up with the sequence numbers of packets and
other stuff.

For example, if a hacker manages to compromise a router at their target's
perimeter, she/he would be in a good position to accomplish this.

Regards,
Omar Herrera


------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: