Hello All,
I have been seeing an odd number of false positive results with the Raptor Weak ISN 
generation
issue.  Windows XP hosts running the Symantec Client VPN software, with the Symantec 
Client VPN Driver bound to their NIC return that they have they generate weak ISNs.  
Now, I'm not expert 
enough to know if this is true based soley on the Nessus output, so I have attempted 
to validate
using NMAP.  The results are as such: (using the command nmap -O -vv -g 1025 hostname)

Test 1: (VPN Driver unbound from adaptor, no result from above plugin)

TCP Sequence Prediction: Class=random positive increments
                         Difficulty=14034 (Worthy challenge)
TCP ISN Seq. Numbers: 490E5E47 490F5374 491042DD 491156C8 4912DCED 4913EACD
IPID Sequence Generation: Incremental

Test 2: (VPN driver bound to adaptor, "hole" found) (2 NMAP runs done)

first:
>>
TCP Sequence Prediction: Class=truly random
                         Difficulty=9999999 (Good luck!)
TCP ISN Seq. Numbers: C458059D E7095EA7 B1C6EF5A 40A5E196 800D787B 35A38741
IPID Sequence Generation: Incremental
<<

second:
>>
TCP Sequence Prediction: Class=truly random
                         Difficulty=9999999 (Good luck!)
TCP ISN Seq. Numbers: 1DCEF56F 89249731 154D25F0 E76239A 359B366A 41119537
IPID Sequence Generation: Incremental
<<

Note, even though I specified an identical source port, and identical destination 
ports were used, the ISNs are not identical.  I surmise this to be an error in the 
plugin??

Has anyone seen this sort of thing before?

Rgds,
Ds


_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to