Penetration Testing mailing list archives

Re: an anternative to port-knoking using the OpenBSD pf only


From: gimeshell () web de
Date: Fri, 17 Feb 2006 09:52:03 +0100

On Mon, 23 Jan 2006 22:44:52 +0100
poplix <poplix () papuasia org> wrote:

   OUT (tcp.flags='syn')
    set(
     tcp.win='8192',ip.ttl='128',ip.flags.df='0',
     tcp.options='mss=3884+noop+wss=0+noop+noop+ts=TS'
    );

   This rule tells tripp to rewrite all outgoing tcp packets with
the SYN
   flag set only allowing my first handshake packet to match "poplix"
   fingerprint.

Does an attacker who wants to attack a server include aspect that
this maybe a system utilizing port knocking in this way?
Perhaps if he has focused at this system?

Am i right to say, your invented os fingerprint is random and unique 
and because of unlimited IP option field's length there's no
chance left for attacker to brute force ports with different option
field values et cetera to get correct option field + window size + ttl +
flag?

regards

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: