ersion is the 2.0.0-beta52 and is downloadable from
http://www.kyuzz.org/antirez/hping2.html
bye,
antirez
>From hping2 README:
DESCRIPTION
hping2 is a network tool able to send custom ICMP/UDP/TCP
packets and to display target replies like ping do with
ICMP replies. hp
For exaple the
ability to scan the ports with only spoofed packets and the ability to
guess remote hosts traffic are a lot real).
ciao,
antirez
lts in the
ability to perform this kind of DoS against a very big server using little
resources.
antirez
ept2 that return just after SYN
was received so we can obtain the IP address and then use
accpet2_reset() to RST or accept2_ok() to follow the threeway
handshake. Since this can be implemented using new syscall
API compatibility is preserved, but this seems a lot better
than modify on the fly firewalling rules.
antirez
OS TCP/IP stacks synchronization is so hard to reached maybe
we need some RFC that comments all not clear TCP/IP issue? I want hope
that vendors (except Microsoft...) will follow the RFC.
antirez
used to pool from
/dev/random remotely. An example? the old TERM="../../../bla" problem.
antirez
ase don't claim
you have discovered it (see BUGTRAQ archive).
antirez
--
Salvatore Sanfilippo, Open Source Developer, Linuxcare Italia spa
+39.049.8024648 tel, +39.049.8036484 fax
[EMAIL PROTECTED], http://www.linuxcare.com/
Linuxcare. Support for the revolution.
very query a 128-bit ID as 'echo response',
so that I'll search it as 'echo reply' in the response.
You aren't paranoic? Just use your resolvers without any changes.
It's just an idea.
regards,
antirez
--
Salvatore Sanfilippo, Open Source Developer,
oit just to confirm this, don't ship
it to lame people. I want not to release my proof-of-concepts
code.
That's all, can someone confirm this?
regards,
antirez
--
Salvatore Sanfilippo | <[EMAIL PROTECTED]>
http://www.kyuzz.org/antirez | PGP: finger [EMAIL PROTECTED]
ttacker send some packet, get the HMAC and use it
in the quoted packet) and a random number.
Or some other way that can ensure that the given packet was
sent by one end to another end.
Note that this is pretty different from the IPSEC stuff.
antirez
--
Salvatore Sanfilippo
On Sun, Jan 21, 2001 at 04:40:53PM +0100, Pavel Kankovsky wrote:
> On Mon, 15 Jan 2001, antirez wrote:
>
> > It's possible to slowdown (a lot) connections between two
> > arbirary hosts (but at least one with the PMTU discovery enabled)
> > using some spoofed TC
ignore the option, that contains the HMAC,
but unfortunatelly all kinds of firewalls will drop this packets.
With IPv6 the clearest way seems a new next-header with the HMAC
that provide the autentication. No key exchange is needed,
you just sign your own packets to recognize it later.
antirez
-
,
expecially about the concepts, not the implementation.
For example cryptographers shoud be able to suggest a better
(faster, less CPU consuming) way to mark the packets.
I don't guarranty that this module will not crash your
linux 2.4 box, and that it really works. See yourself.
antirez
--
Salv
n security.
Sure, there are operating system extensions that
can handle the problem better, like capabilities, but
maybe is important to remember that often setuid() & co.
are a way to reach a similar effect in a portable way.
regards,
antirez
--
Salvatore Sanfilippo <[EMAIL PROTECTE
y), if you find
some problem please send me an email.
The patch is for linux 2.2.13.
regards,
antirez
--
Salvatore Sanfilippo [EMAIL PROTECTED] [EMAIL PROTECTED]
ALICOM snc Tel: +39-0871-403522 Fax: +39-0871-41960 Web: www.alicom.com
pgp key: finger [EMAIL PROTECTED] [2852F54A49653
hostlookup(hdr.ip.ip_src.s_addr, (syncount != SYN_FLOOD)),
inet_ntoa(hdr.ip.ip_src));
}
ciao,
antirez
--
Salvatore Sanfilippo - antirez - [EMAIL PROTECTED]
try hping: http://www.kyuzz.org/antirez [EMAIL PROTECTED]
if the port is open, like win*.
If an attacker scans a patched host it gets all
ports are open, so it gets nothing.
The patch is tested on linux 2.0.36, maybe it's
good even for 2.0.37.
bye,
antirez
--
Salvatore Sanfilippo - antirez -
_REPLY packets is equal to (the
> number of packets sent by A in x second) +1. "Idle portscan" by antirez uses
> this technique.
Re,
i think that a consecutive IP id now can be considered
a weakness in IP stacks. Using it you today are able
at least to scan spoofed
to predict
RNG send me an email.
antirez
On Sat, Aug 07, 1999 at 09:58:10AM -0700, David Wagner wrote:
> In article <[EMAIL PROTECTED]>,
> Salvatore Sanfilippo -antirez- <[EMAIL PROTECTED]> wrote:
> > i think that a consecutive IP id now can be considered
> >
19 matches
Mail list logo