Re: [Full-disclosure] 0trace - traceroute on established connections

2007-01-24 Thread Jon Oberheide
On Sun, 2007-01-14 at 00:49 +0100, Robert Święcki wrote: Michal Zalewski wrote: Note: this is a 30-minute hack that involves C code coupled with a cheesy shellscript. It may not work on non-Linux systems, and may fail on some Linuxes, too. It could be improved in a number of ways - so if

Re: [Full-disclosure] 0trace - traceroute on established connections

2007-01-14 Thread 3APA3A
Dear Robert Swiecki, --Sunday, January 14, 2007, 2:49:58 AM, you wrote to bugtraq@securityfocus.com: RS User-Agent: *^ VDjh; RS olsMoasdasdzilla2%$(ls)2=++/-2121%^#%^@37.0 (X1230#$(ls)`ls`) RS asd%^*%^dasdnhy/ Mnenhy/0.7.4.0 H. It doesn't seems like attempt to exploit

Re: [Full-disclosure] 0trace - traceroute on established connections

2007-01-13 Thread Robert Święcki
Michal Zalewski wrote: Note: this is a 30-minute hack that involves C code coupled with a cheesy shellscript. It may not work on non-Linux systems, and may fail on some Linuxes, too. It could be improved in a number of ways - so if you like it, rewrite it. Slightly rewritten version in C,

Re: [Full-disclosure] 0trace - traceroute on established connections

2007-01-09 Thread Alessandro Dellavedova
Hi, am I wrong or the mechanism that you implement is similar to the one implemented in lft (Layer Four Traceroute http://pwhois.org/lft/ ) ? From the homepage: LFT is the all-in-one traceroute tool because it can launch a variety of different probes using both UDP and TCP layer-4

Re: [Full-disclosure] 0trace - traceroute on established connections

2007-01-09 Thread Jon Oberheide
LFT is similar to tcptraceroute in that it uses TCP SYN probes. As Michal stated in his original message, 0trace is different as it piggybacks on an already established TCP connection. Regards, Jon Oberheide On Tue, 2007-01-09 at 09:03 +0100, Alessandro Dellavedova wrote: Hi, am I wrong

Re: [Full-disclosure] 0trace - traceroute on established connections

2007-01-09 Thread Michal Zalewski
On Tue, 9 Jan 2007, Alessandro Dellavedova wrote: am I wrong or the mechanism that you implement is similar to the one implemented in lft (Layer Four Traceroute http://pwhois.org/lft/ ) ? No, what you describe is similar to tcptraceroute, from what I understand (they use stray SYNs or RSTs or

Re: [Full-disclosure] 0trace - traceroute on established connections

2007-01-08 Thread Matthew Flaschen
Michal Zalewski wrote: I'd like to announce the availability of a free security reconnaissance / firewall bypassing tool called 0trace. Good work. Are you going to put it under a free license? Enough chatter - the tool is available here (Linux version):

Re: [Full-disclosure] 0trace - traceroute on established connections

2007-01-08 Thread Brendan Dolan-Gavitt
A much easier way is to write your own usleep and drop it in /bin: ---usleep.c--- #include stdio.h #include stdlib.h #include unistd.h int main (int argc, char **argv) { usleep(atoi(argv[1])); return 0; } ---usleep.c--- [note: doesn't check error conditions] 0trace worked brilliantly

[Full-disclosure] 0trace - traceroute on established connections

2007-01-06 Thread Michal Zalewski
I'd like to announce the availability of a free security reconnaissance / firewall bypassing tool called 0trace. This tool enables the user to perform hop enumeration (traceroute) within an established TCP connection, such as a HTTP or SMTP session. This is opposed to sending stray packets, as

Re: [Full-disclosure] 0trace - traceroute on established connections

2007-01-06 Thread Michal Zalewski
On Sun, 7 Jan 2007, Michal Zalewski wrote: [ Of course, I might be wrong, but Google seems to agree with my assessment. A related use of this idea is 'firewalk' by Schiffman and Goldsmith, a tool to probe firewall ACLs; another utility called 'tcptraceroute' by Michael C. Toren