|
Hi
Rick,
there
are a number of important points missing here...any responses to the
spoofed addresses may as you indicate be directed at the Internet by
default routes on your host systems but presumably you
have firewalls in place (good one's I hope !) - these spoofed packets
will therefore be blocked because there will be an outbound TCP ACK packet
with no corresponding inbound session entry on the firewall itself (basic
firewall stuff) - the packet should be dropped immediately.
Even
if the ISS stealth scan is modifying the flags/ packet structure & doing
clever things etc it should not be getting past your firewall. If the port is
closed on your host and you happen to send back
ICMP unreachable's then even this should not be allowed from your
internal system via the firewall (and again a good rulebase will stop
this). If UDP scanning is implemented in the ISS scanner
(not sure if it is or not) then your rulebase should be blocking the
majority of outbound ports anyway, for the packets
that may get through they will be heading for a specific address and just
be dropped by that targets address ! It may be possible that there would be a
small amount of info.leakage through the firewall but you would need to be
sniffing at the right time & in the right place on the network to
gleen this info. & even then you will be sending from the source IP
address of the firewall itself - this should just not be an an
issue if you have the right network / security infra-structure in
place.
Adrian
Brindley
CGE&Y
-----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: 17 July 2003 13:51 To: [EMAIL PROTECTED] Subject: RE: [ISSForum] Internet Scanner 7 - IP Spoofing
|
Title: Message
- [ISSForum] Internet Scanner 7 - IP Spoofing issforum-admin
- RE: [ISSForum] Internet Scanner 7 - IP Spoofing issforum-admin
- RE: [ISSForum] Internet Scanner 7 - IP Spoofing issforum-admin
- RE: [ISSForum] Internet Scanner 7 - IP Spoofing issforum-admin
