Remote Network Analysis - I know what you know - Torsten Hfler - - PowerPoint PPT Presentation

remote network analysis
SMART_READER_LITE
LIVE PREVIEW

Remote Network Analysis - I know what you know - Torsten Hfler - - PowerPoint PPT Presentation

Remote Network Analysis - I know what you know - Torsten Hfler htor@cs.tu-chemnitz.de Torsten Hfler, 21. November 2004 Remote Network Analysis - p. 1/41 Outline Outline 1. Introduction Introduction 2. Passive Analysis Passive


slide-1
SLIDE 1

Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 1/41

Remote Network Analysis

  • I know what you know -

Torsten Höfler

htor@cs.tu-chemnitz.de

slide-2
SLIDE 2
  • Outline

Introduction Passive Analysis Active Analysis Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 2/41

Outline

  • 1. Introduction
  • 2. Passive Analysis
  • 3. Active Analysis
  • 4. Advanced Scanning
  • 5. Prevention
  • 6. Questions
slide-3
SLIDE 3

Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 3/41

Introduction

slide-4
SLIDE 4
  • Outline

Introduction

  • Motivation
  • Typical Targets
  • Structure of FW Systems
  • Structure of FW Systems
  • Possible Attacks

Passive Analysis Active Analysis Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 4/41

Motivation

  • play instinct :o)
  • explore a remote network
  • find backdoors
  • check weaknesses
  • prepare an attack
  • fool IDS systems
  • see which software your bank runs
  • ...
slide-5
SLIDE 5
  • Outline

Introduction

  • Motivation
  • Typical Targets
  • Structure of FW Systems
  • Structure of FW Systems
  • Possible Attacks

Passive Analysis Active Analysis Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 5/41

Typical Targets

  • Router / Firewalls / Packetfilter
  • Intrusion Detection Systems
  • Loghosts (to hide traces)
  • servers - from the outside accessible

(DMZ?)

  • Client-Systems / Workstations
  • Hardware-Systems (e.g. Access Points,

Routers ...)

slide-6
SLIDE 6
  • Outline

Introduction

  • Motivation
  • Typical Targets
  • Structure of FW Systems
  • Structure of FW Systems
  • Possible Attacks

Passive Analysis Active Analysis Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 6/41

Structure of FW Systems

easy layout:

slide-7
SLIDE 7
  • Outline

Introduction

  • Motivation
  • Typical Targets
  • Structure of FW Systems
  • Structure of FW Systems
  • Possible Attacks

Passive Analysis Active Analysis Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 7/41

Structure of FW Systems

more complex layout(s):

slide-8
SLIDE 8
  • Outline

Introduction

  • Motivation
  • Typical Targets
  • Structure of FW Systems
  • Structure of FW Systems
  • Possible Attacks

Passive Analysis Active Analysis Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 8/41

Possible Attacks

⇒ attacker (we) located in the Internet ⇒ attacks performed from outside

  • passive analysis (e.g. sniffing)
  • noticeable active analysis (e.g. scanning)
  • hidden active analysis (e.g.

fingerprinting)

  • analysis of topology (e.g. firewalking,

tracing)

  • social engineering
slide-9
SLIDE 9

Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 9/41

Passive Analysis

slide-10
SLIDE 10
  • Outline

Introduction Passive Analysis

  • Layer 2/3/4
  • Header-Analysis
  • Header-Fields
  • Header-Information
  • Header-Analysis (example)
  • Header-Analysis (example)
  • Example
  • More Examples
  • Summary

Active Analysis Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 10/41

Layer 2/3/4

⇒ different possibilities:

  • passive fi ngerprinting (without sending anything)
  • Layer 4 (versions of used software products)
  • Payload Analysis (not widely used, no tools

available)

  • Layer 2/3 (OS’s TCP/IP implementation)
  • Header-Analysis (widely used, tools available)
slide-11
SLIDE 11
  • Outline

Introduction Passive Analysis

  • Layer 2/3/4
  • Header-Analysis
  • Header-Fields
  • Header-Information
  • Header-Analysis (example)
  • Header-Analysis (example)
  • Example
  • More Examples
  • Summary

Active Analysis Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 11/41

Header-Analysis

  • gives information about deployed

topology:

  • TTL: OS usually starts with ”typical”

values (255, 128, 64 ...) -> difference equals Hop-Count

  • be aware of exceptions (e.g.

traceroute)!

  • offered or used services e.g.:
  • analyse source or/and destination port
slide-12
SLIDE 12
  • Outline

Introduction Passive Analysis

  • Layer 2/3/4
  • Header-Analysis
  • Header-Fields
  • Header-Information
  • Header-Analysis (example)
  • Header-Analysis (example)
  • Example
  • More Examples
  • Summary

Active Analysis Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 12/41

Header-Fields

slide-13
SLIDE 13
  • Outline

Introduction Passive Analysis

  • Layer 2/3/4
  • Header-Analysis
  • Header-Fields
  • Header-Information
  • Header-Analysis (example)
  • Header-Analysis (example)
  • Example
  • More Examples
  • Summary

Active Analysis Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 13/41

Header-Information

much information can be gained from the header fi elds: Field Location Tools? What? TTL IP x OS + Topology Fragmentation IP x OS + Topology Header Length IP x OS TOS IP

  • OS

ID IP

  • OS + Traffi c

Source Port TCP

  • OS + Traffi c

Window Size TCP/Opt x OS

  • Max. Segmentsz.

TCP/Opt x OS ... ...

  • OS
slide-14
SLIDE 14
  • Outline

Introduction Passive Analysis

  • Layer 2/3/4
  • Header-Analysis
  • Header-Fields
  • Header-Information
  • Header-Analysis (example)
  • Header-Analysis (example)
  • Example
  • More Examples
  • Summary

Active Analysis Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 14/41

Header-Analysis (example)

SYN/ACK Header from www.ccc.de:80

slide-15
SLIDE 15
  • Outline

Introduction Passive Analysis

  • Layer 2/3/4
  • Header-Analysis
  • Header-Fields
  • Header-Information
  • Header-Analysis (example)
  • Header-Analysis (example)
  • Example
  • More Examples
  • Summary

Active Analysis Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 15/41

Header-Analysis (example)

SYN/ACK Header from www.microsoft.de:80

slide-16
SLIDE 16
  • Outline

Introduction Passive Analysis

  • Layer 2/3/4
  • Header-Analysis
  • Header-Fields
  • Header-Information
  • Header-Analysis (example)
  • Header-Analysis (example)
  • Example
  • More Examples
  • Summary

Active Analysis Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 16/41

Example

practical values: OS TOS DF TTL Window Options Win2000 1 128 65535 tsval=0, SACK Win98 1 128 8760 SACK Linux 2.2 1 64 32210 tsval>0, SACK Linux 2.4 1 64 5792 tsval>0, SACK Linux 2.6 1 64 5792 tsval>0, SACK FreeBSD 4.6 1 64 57344 tsval>0 FreeBSD 5.0 1 64 65535 tsval>0 OpenBSD 2.x 16 64 17520 tsval=0, SACK ... ... ... ... ... ...

slide-17
SLIDE 17
  • Outline

Introduction Passive Analysis

  • Layer 2/3/4
  • Header-Analysis
  • Header-Fields
  • Header-Information
  • Header-Analysis (example)
  • Header-Analysis (example)
  • Example
  • More Examples
  • Summary

Active Analysis Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 17/41

More Examples

examples (p0f - SYN/ACK analysis):

  • www.metro.de - Windows 2000 SP4
  • www.ebay.de - unknown
  • www.heise.de - NetApp Data OnTap 6.x
  • www.microsoft.de:80 - Windows 2000 (SP1+) (fi rewall!)
  • www.openbsd.org:80 - Solaris 7 (up: 2533 hrs)
  • www.freebsd.org:80 - FreeBSD 4.6-4.8 (up: 9 hrs)
  • www.mcafee.com:80 - Windows 2000 SP4
  • www.georgewbush.com:80 - Windows 2000 SP4
  • www.bundeskanzler.de:80 - Linux recent 2.4 (1) (up:

11405 hrs)

  • www.nsa.gov:80 - Linux recent 2.4 (1) (up: 5664 hrs)
  • www.dod.gov:80 - Linux recent 2.4 (up: 2804 hrs)
  • ...
slide-18
SLIDE 18
  • Outline

Introduction Passive Analysis

  • Layer 2/3/4
  • Header-Analysis
  • Header-Fields
  • Header-Information
  • Header-Analysis (example)
  • Header-Analysis (example)
  • Example
  • More Examples
  • Summary

Active Analysis Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 18/41

Summary

fi ngerprinting without sending any data

  • utilizes imprecise standard defi nitions ...
  • ... or deviations of OSes from standards (RFC)
  • cumulative analysis of different header fi elds
  • manually nearly impossible (huge information

databases)

  • ⇒ automated tools (ettercap, siphon, p0f)
  • BUT: very slow / imprecise! ⇒ active analysis is

more accurate

  • new techniques (AI / Fuzzy Match) improve

accurancy

slide-19
SLIDE 19

Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 19/41

Active Analysis

slide-20
SLIDE 20
  • Outline

Introduction Passive Analysis Active Analysis

  • Layer 4 (Application Level)
  • Layer 2/3 (OS Level)
  • OS Detection Tools

Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 20/41

Layer 4 (Application Level)

sending packets and analysing the response

  • ”classical manual banner grabbing”
  • e.g. FTP

, HTTP , POP , IMAP , SMTP , SSH, NNTP , Finger ...

  • binary analysis
  • e.g. /bin/ls from FTP server (which binary

format (ELF , COFF) → OS)

  • well known ports
  • e.g. 80 → HTTP

, 22 → SSH, ...

  • ⇒ easy to prevent/fake
  • e.g. 222 → SSH (ipcop)
  • → application fi ngerprinting (sending special

requests, evaluate (error) responses)

  • automated tools: thc-amap, nmap (-sV)
slide-21
SLIDE 21
  • Outline

Introduction Passive Analysis Active Analysis

  • Layer 4 (Application Level)
  • Layer 2/3 (OS Level)
  • OS Detection Tools

Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 21/41

Layer 2/3 (OS Level)

  • send ”special” crafted IP packets and analyse

the response

  • ⇒ easy to detect
  • e.g. IDS notifi es attempts (see portscan)
  • ⇒ fi rewall can block results
  • e.g. stateful fi rewalls block connectionless

FIN packets

  • ⇒ fi rewall can modify results
  • e.g. change TTL, TOS or fi lter out Options

with iptables

slide-22
SLIDE 22
  • Outline

Introduction Passive Analysis Active Analysis

  • Layer 4 (Application Level)
  • Layer 2/3 (OS Level)
  • OS Detection Tools

Advanced Methods Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 22/41

OS Detection Tools

  • de-facto standard: nmap from Fyodor
  • a lot of active fi ngerprinting techniques (FIN to
  • pen port, ISN Sampling, ICMP Tests, TCP

Options, Fragmentation Handling ...)

  • is recognized by many IDS or packetfi lters and

can be fi ltered easily

  • nmap needs one opened and one closed

TCP-Port + one closed UDP-Port (often not possible → fi rewall)

  • ⇒ other metrics have to be found
  • others:
  • xprobe2 - fuzzy logic, similar to nmap
  • queso - no further development
slide-23
SLIDE 23

Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 23/41

Advanced Methods

slide-24
SLIDE 24
  • Outline

Introduction Passive Analysis Active Analysis Advanced Methods

  • Old Techniques
  • RING
  • RING - Examples
  • Overview Fingerprinting
  • Idle Scan
  • Idle Scan - Example
  • Finding Zombies
  • Firewalking
  • Firewalking - Example
  • Firewalking (2)

Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 24/41

Old Techniques

Inverse Mapping

  • normal ”inconspicuous” packets to different IP’s
  • e.g. FIN, ACK, DNS-Reply
  • → only for stateless fi rewalls / IDS
  • non existing hosts: router sends ICMP host

unreachable -> attacker concludes network structure / used addresses Slow Scan

  • packet-rate < 1 packet/hour
  • very hard to detect automatically
slide-25
SLIDE 25
  • Outline

Introduction Passive Analysis Active Analysis Advanced Methods

  • Old Techniques
  • RING
  • RING - Examples
  • Overview Fingerprinting
  • Idle Scan
  • Idle Scan - Example
  • Finding Zombies
  • Firewalking
  • Firewalking - Example
  • Firewalking (2)

Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 25/41

RING

  • ⇒ RING (Remote Identifi cation Next Generation)
  • TCP retransmissioncount and -time is used!
  • deviations from RFC2988 (defi nes a

retransmission algorithm)

  • tools: snacktime, Cron-OS, tbit
slide-26
SLIDE 26
  • Outline

Introduction Passive Analysis Active Analysis Advanced Methods

  • Old Techniques
  • RING
  • RING - Examples
  • Overview Fingerprinting
  • Idle Scan
  • Idle Scan - Example
  • Finding Zombies
  • Firewalking
  • Firewalking - Example
  • Firewalking (2)

Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 26/41

RING - Examples

snacktime evaluation:

  • www.metro.de:80 - Windows_2000_Server_SP3
  • www.ebay.de:80 - Windows_XP_Professional
  • www.heise.de:80 - no retransmission
  • www.microsoft.de:80 - no retransmission
  • www.openbsd.org:80 - Linux_2.4.9_Alpha (???)
  • www.freebsd.org:80 - Generic_BSD_Stack
  • www.mcafee.com:80 - no retransmission
  • www.georgewbush.com:80 - RST after fi rst retrans!
  • www.bundeskanzler.de:80 - Linux_2.4.18
  • www.nsa.gov:80 - no retransmission
  • www.dod.gov:80 - Linux_2.4.18
  • ...
slide-27
SLIDE 27
  • Outline

Introduction Passive Analysis Active Analysis Advanced Methods

  • Old Techniques
  • RING
  • RING - Examples
  • Overview Fingerprinting
  • Idle Scan
  • Idle Scan - Example
  • Finding Zombies
  • Firewalking
  • Firewalking - Example
  • Firewalking (2)

Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 27/41

Overview Fingerprinting

slide-28
SLIDE 28
  • Outline

Introduction Passive Analysis Active Analysis Advanced Methods

  • Old Techniques
  • RING
  • RING - Examples
  • Overview Fingerprinting
  • Idle Scan
  • Idle Scan - Example
  • Finding Zombies
  • Firewalking
  • Firewalking - Example
  • Firewalking (2)

Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 28/41

Idle Scan

  • no packet sent directly → sending through ”zombie”

hosts

  • using predictable IP fragment-numbers
  • suitable for testing IP-based fi lter-rules
  • IDS sees ”zombie” as attacker
  • tool: nmap (-D) - decoy scan

protect own hosts from being used as zombies:

  • stateful fi rewall
  • OS with unpredictable or constant fragment-numbers
slide-29
SLIDE 29
  • Outline

Introduction Passive Analysis Active Analysis Advanced Methods

  • Old Techniques
  • RING
  • RING - Examples
  • Overview Fingerprinting
  • Idle Scan
  • Idle Scan - Example
  • Finding Zombies
  • Firewalking
  • Firewalking - Example
  • Firewalking (2)

Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 29/41

Idle Scan - Example

slide-30
SLIDE 30
  • Outline

Introduction Passive Analysis Active Analysis Advanced Methods

  • Old Techniques
  • RING
  • RING - Examples
  • Overview Fingerprinting
  • Idle Scan
  • Idle Scan - Example
  • Finding Zombies
  • Firewalking
  • Firewalking - Example
  • Firewalking (2)

Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 30/41

Finding Zombies

chance to fi nd zombies is relatively high! htor@archimedes: $ hping2 -SA -p 80 www.tu-dresden.de len=46 ip=141.30.66.151 ttl=46 DF id=216 sport=80 ... len=46 ip=141.30.66.151 ttl=46 DF id=217 sport=80 ... len=46 ip=141.30.66.151 ttl=46 DF id=218 sport=80 ... htor@archimedes: $ ping -c1 www.tu-dresden.de htor@archimedes: $ hping2 -SA -p 80 www.tu-dresden.de len=46 ip=141.30.66.151 ttl=46 DF id=220 sport=80 ...

→ IP-ID counts up globally!

more useable zombies:

  • www.tu-dresden.de
  • 64.203.100.217 (hosting georgewbush.com :)
  • mx2.freebsd.org
  • www.openbsd.org
  • ...
slide-31
SLIDE 31
  • Outline

Introduction Passive Analysis Active Analysis Advanced Methods

  • Old Techniques
  • RING
  • RING - Examples
  • Overview Fingerprinting
  • Idle Scan
  • Idle Scan - Example
  • Finding Zombies
  • Firewalking
  • Firewalking - Example
  • Firewalking (2)

Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 31/41

Firewalking

= analyze the hosts behind a firewall e.g. test if IP is up:

  • SYN-packets are dropped by firewall
  • SYN/ACK not (only stateful FWs)
  • use SYN/ACK packets to scan IP’s

behind FW

  • ruleset of the FW can be guessed
slide-32
SLIDE 32
  • Outline

Introduction Passive Analysis Active Analysis Advanced Methods

  • Old Techniques
  • RING
  • RING - Examples
  • Overview Fingerprinting
  • Idle Scan
  • Idle Scan - Example
  • Finding Zombies
  • Firewalking
  • Firewalking - Example
  • Firewalking (2)

Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 32/41

Firewalking - Example

e.g. portscan of wald.informatik.tu-chemnitz.de (134.109.184.40): archimedes: # hping2 wald.informatik.tu-chemnitz.de -p 22 -A HPING wald.informatik.tu-chemnitz.de (eth0 134.109.184.40): A set ... len=46 ip=134.109.184.40 ttl=55 DF id=0 sport=22 fl ags=R seq=0 win=0 rtt=64.3 ms len=46 ip=134.109.184.40 ttl=55 DF id=0 sport=22 fl ags=R seq=1 win=0 rtt=64.8 ms

⇒ port 22 (ssh) open

archimedes: # hping2 wald.informatik.tu-chemnitz.de -p 81 -A HPING wald.informatik.tu-chemnitz.de (eth0 134.109.184.40): A set ... ICMP Port Unreachable from ip=134.109.184.40 name=wald ICMP Port Unreachable from ip=134.109.184.40 name=wald

⇒ port 81 closed

are the pool-computers switched on during the weekend? HPING donau.hrz.tu-chemnitz.de (eth0 134.109.72.177): SA set ... len=46 ip=134.109.72.177 ttl=55 DF id=0 sport=82 fl ags=R seq=0 win=0 rtt=62.5 ms len=46 ip=134.109.72.177 ttl=55 DF id=0 sport=82 fl ags=R seq=1 win=0 rtt=65.4 ms

⇒ yes ;o)

slide-33
SLIDE 33
  • Outline

Introduction Passive Analysis Active Analysis Advanced Methods

  • Old Techniques
  • RING
  • RING - Examples
  • Overview Fingerprinting
  • Idle Scan
  • Idle Scan - Example
  • Finding Zombies
  • Firewalking
  • Firewalking - Example
  • Firewalking (2)

Prevention Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 33/41

Firewalking (2)

Cambridge Technology Partners: ”A Traceroute-Like Analysis of IP Packet Responses to determine Gateway Access Control Lists.”

  • newer development
  • phase 1: determine hop-count to FW (Gateway) =

HC(FW)

  • phase 2: packets with TTL=HC(GW)+1 for SYN scan
  • if HC(target) > HC(GW)+1 → no packet reaches target
  • open port: ICMP Time exceed
  • closed Port: no answer (timeout)
  • prevention:
  • drop outgoing ICMP time exceed packets
  • application proxy
slide-34
SLIDE 34

Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 34/41

Prevention

slide-35
SLIDE 35
  • Outline

Introduction Passive Analysis Active Analysis Advanced Methods Prevention

  • TCP/IP Stack Tuning
  • Linux Kernel Modifi cations
  • Deep Packet Inspection
  • DPI - Example

Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 35/41

TCP/IP Stack Tuning

Linux (adjustment of kernel parameters):

  • /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts = 1
  • /proc/sys/net/ipv4/conf/*/accept_source_route = 0
  • /proc/sys/net/ipv4/conf/*/rp_fi lter = 1 (prevent spoofi ng)
  • /proc/sys/net/ipv4/ipfrag_high_thresh = ? (fragments will

be dropped when this valua is reached - Rose Attacks?)

  • /proc/sys/net/ipv4/ipfrag_low_thresh = ? (fragments will

be accepted again under this level)

  • /proc/sys/net/ipv4/conf/*/log_martians (log packets with

unusual addresses)

  • /proc/sys/net/ipv4/ip_default_ttl = ? (confuses simple OS

detection)

⇒ appropriate values on other Operating Systems (e.g.

sysctl with BSD)

slide-36
SLIDE 36
  • Outline

Introduction Passive Analysis Active Analysis Advanced Methods Prevention

  • TCP/IP Stack Tuning
  • Linux Kernel Modifi cations
  • Deep Packet Inspection
  • DPI - Example

Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 36/41

Linux Kernel Modifications

⇒ Grsecurity

  • larger entropy pools (better random numbers)
  • randomized TCP Initial Sequence Numbers (confuses

OS detection)

  • randomized IP IDs (prevents ”zombie”-scans)
  • randomized TCP source ports (confuses OS detection)

⇒ IP Personality

  • changeable characteristics to pretend other TCP/IP

stacks

  • nice tool, but only up to kernel 2.4.18 :-(

⇒ own modifi cations in kernel sources

  • z.B. no answer to illegal packets:

/usr/src/linux/net/ipv4/*

  • change the window size:

/usr/src/linux/include/net/tcp.h (MAX_TCP_WINDOW)

  • ...
slide-37
SLIDE 37
  • Outline

Introduction Passive Analysis Active Analysis Advanced Methods Prevention

  • TCP/IP Stack Tuning
  • Linux Kernel Modifi cations
  • Deep Packet Inspection
  • DPI - Example

Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 37/41

Deep Packet Inspection

Firewall Evolution

  • Firewall - protect
  • IDS - observe
  • today: manual adding of fi rewall rules after notifi cation

from IDS

  • problem: fast attacks (Code Red, Nimda)
  • → deep packet inspection = FW + IDS coupled
  • exploits and scan attempts can be interrupted

automatically e.g. layer 4 monitoring (see PIX ”fi xup” command) ⇒ next slide

slide-38
SLIDE 38
  • Outline

Introduction Passive Analysis Active Analysis Advanced Methods Prevention

  • TCP/IP Stack Tuning
  • Linux Kernel Modifi cations
  • Deep Packet Inspection
  • DPI - Example

Questions Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 38/41

DPI - Example

slide-39
SLIDE 39

Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 39/41

Questions

slide-40
SLIDE 40
  • Outline

Introduction Passive Analysis Active Analysis Advanced Methods Prevention Questions

  • Questions?
  • Sources

Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 40/41

Questions?

slide-41
SLIDE 41
  • Outline

Introduction Passive Analysis Active Analysis Advanced Methods Prevention Questions

  • Questions?
  • Sources

Torsten Höfler, 21. November 2004 Remote Network Analysis - p. 41/41

Sources

  • own experience :o)
  • Laurent Joncheray: Simple Active Attack Against TCP

, 1995

  • Kevin Timm: Passive Network Traffi c Analysis, 2003
  • Lance Spitzner: Passive Fingerprinting, 2000
  • Fyodor: Remote OS detection via TCP/IP Stack

FingerPrinting, 1998

  • Intranode Research: RING - Full Paper, 2002
  • Synnergy Networks: Advanced Host Detection, 2001
  • Cambridge Technology Partners: Firewalking, 1998
  • Ido Dubrawsky: Firewall Evolution - Deep Packet

Inspection, 2003