Re: The Art of Unspoofing

2002-09-19 Thread Euan

This is just simplistic, ill conceived rubbish. There is absolutely no
way to guarantee that you are tracking down the correct IP or the
correct person. How can you possibly rely on the TTL to distinguish the
address of the attacker among thousands of DNS requests? The TTL can
be forged on spoofed packets - and they may come from a completely
different source than the attacker itself... Is it safe to assume an
attacker is going to use the generic public smurf.c tool etc, is it safe
to assume the attacker is going to use traceroute or ping to test if the
victim host is alive? Is it safe to assume the attacker wont use blind
spoofed IP ID techniques or some other method to test if the victim host
is alive? No.

 At the beginning of your post you mention the raw interface to the
networking.. - yet you simply ignore or do not realise that the
flexibility and multitude of ways to use and abuse tcp/ip makes this
whole art of unspoofing nothing but presumptious rubbish that will
waste peoples time and help them catch none but the most ignorant and
useless of attackers. (People this stupid are unlikely to be a danger to
your network in the first place). Whats to stop an attacker spoofing dns
lookups and pings from another host in order to incriminate it?

What it comes down to is - it is  easy  for a semi-intelligent attacker
to cause a denial of service attack that is completely untraceable from
the target side, grasping at straws like this wont do much good atall
except waste a lot of your time.

Euan

[EMAIL PROTECTED] wrote:

 I found this on a site today, thought it might be of some intrest:

 The Art of Unspoofing








Re: The Art of Unspoofing

2002-09-19 Thread Darren Reed

In some mail from [EMAIL PROTECTED], sie said:
[...]
 The Resolution Theory 
  
   The idea is simple. Usually, when a denial of service attack is 
 initiated against a target host, it's something like: 
   
   # ./attack target.com
 
   In order to send the spoofed packets to target.com, the attackers 
 nameserver has to resolve its domain name to an IP address, and only 
 then can it inject the malicious packets. In theory, the nameservers 
 for target.com will receive packets originating from the true source 
 host of the attack or their nameserver.
[...]

An adjunct to this is that nearly all applications will only ever resolve
a hostname _once_.  So if ./attack will start an attack that lasts for
8 hours (say) but our DNS TTL is only 1 hour, we can change the IP# of
target.com and the attack can be deflected.  How low do you go with a
TTL in DNS so you can react in this manner without pushing too much work
back on to DNS ?  Don't know.  I'm sure this is well know, though ?

Darren