Re: T-Pot (TCP HoneyPot) idea

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On Thu, 10 Apr 2003 waltdnes@xxxxxxxxxxxx wrote:

>   I'm sure every here has seens lots of SYN-packets in their logs,
> trying to connect to various ports they shouldn't be talking to.  I
> don't run any public servers, and I use passive ftp, so I simply block
> all connection attempts.  The general procedure is to drop the packet,
> and ignore it.  What would be the effect of sending back a SYN-ACK
> packet (and anything else necessary?) to fake the setting up of a
> connection... and then dropping the packet and ignoring it ?
>
>   Would an infected machine scanning the net eventually run into
> resource limits and DOS itself ?  I'm sure that professional crackers
> can work around this, but if we can make things a bit more painful for
> skiddies and automatic worms, then let's do it.
>
>   Can such trickery be pulled off with a current bog-standard iptables,
> or does someone need to write a new "target"?

This is sort of similar to the NAPTHA program I wrote a couple of years
ago to demonstrate a resource DoS attack.
http://razor.bindview.com/publish/advisories/adv_NAPTHA.html
http://packetstormsecurity.org/0101-exploits/naptha-1.1.tgz
(I have a more recent version if anyone cares)
The program could easily be run with command line options to accomplish
exactly what you are proposing. However it is also fairly easy to defeat
this sort of attack by not keeping state. I have written a port scanner
that does exactly that, it is very fast and effective.

An interesting attack might be to hang all IDENT queries sent back by an
IDS that tries to find out who is scanning them.




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux