summaryrefslogtreecommitdiff
path: root/informationals/teso-i0008.txt
diff options
context:
space:
mode:
Diffstat (limited to 'informationals/teso-i0008.txt')
-rw-r--r--informationals/teso-i0008.txt57
1 files changed, 57 insertions, 0 deletions
diff --git a/informationals/teso-i0008.txt b/informationals/teso-i0008.txt
new file mode 100644
index 0000000..aa5bc9c
--- /dev/null
+++ b/informationals/teso-i0008.txt
@@ -0,0 +1,57 @@
10008 2000/01/24 Check for IP spoofing abilities for a local IP address
2
3==== TESO Informational =======================================================
4This piece of information is to be kept confidential.
5===============================================================================
6
7Description ..........: Check for IP spoofing abilities for a local IP address
8Date .................: 2000/01/24 18:15
9Author ...............: scut
10Publicity level ......: public, but not widely known
11Affected .............: IP
12Type of entity .......: Protocol
13Type of discovery ....: interesting information
14Severity/Importance ..: low
15Found by .............: scut
16
17Information ===================================================================
18
19The ability to IP spoof has drastically decreased over the last years, mainly
20to hinder either denial of service attacks to be executed or to stop
21sophisticated attacks which involve IP spoofing. While in general IP spoofing
22is a bad thing, sometimes you need to be capable to send spoofed datagrams.
23While there are still numerous hosts on the Internet that can set arbitrary IP
24source addresses, you often need to tell whether you can spoof from a host you
25have superuser access on.
26
27The only way to tell whether you can spoof from a host is to try sending of a
28frame which has a source IP address that is not used within that network and is
29not one of the reserved private addresses. The other part of the problem
30is how we can check whether the spoofed packet got through all the routers to
31it's destination.
32
33In general we can only tell this if the packet we send has a noticeable effect.
34This can be for example if we spoof a packet which triggers an attack signature
35in some IDS system, where the log is displayed publically on the web (www.
36antionline.com does this), or we can just send the packet to some other IP
37where we can receive the packet and display it. This is the first method:
38
391) Send a spoofed packet to another IP not on the local network and see if the
40 packet arrives. Optionally put the real source IP into the packet and send
41 an answer packet back to this IP, so the source host knows whether it can
42 spoof or not.
43
44Another method is similar to the first, but only needs the local host and a
45domain NS entry for the local IP or a sniffable IP. It works like this:
46
472) Send a spoofed DNS query for a host inside your local domain, which you
48 have an NS entry for on your local host or on a host in the local network,
49 that is sniffable. Send the query to a public usable nameserver outside
50 your local network, then see if some nameservers issues a query for the
51 host you originally asked for, if it does, you can spoof.
52
53Method 2) is used by the DNS spoofing program "zodiac" to determine if it can
54spoof from the current network it is running on.
55
56===============================================================================
57