[iwar] [fc:Steve.Gibson.accidentally.creates.DoS.tool]

From: Fred Cohen (fc@all.net)
Date: 2001-11-26 16:38:10


Return-Path: <sentto-279987-3955-1006821390-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 26 Nov 2001 16:40:12 -0800 (PST)
Received: (qmail 32726 invoked by uid 510); 27 Nov 2001 00:36:54 -0000
Received: from n3.groups.yahoo.com (216.115.96.53) by all.net with SMTP; 27 Nov 2001 00:36:54 -0000
X-eGroups-Return: sentto-279987-3955-1006821390-fc=all.net@returns.groups.yahoo.com
Received: from [10.1.4.55] by n3.groups.yahoo.com with NNFMP; 27 Nov 2001 00:36:30 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 27 Nov 2001 00:36:30 -0000
Received: (qmail 9386 invoked from network); 27 Nov 2001 00:36:30 -0000
Received: from unknown (216.115.97.172) by m11.grp.snv.yahoo.com with QMQP; 27 Nov 2001 00:36:30 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta2.grp.snv.yahoo.com with SMTP; 27 Nov 2001 00:36:29 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fAR0cBi17837 for iwar@onelist.com; Mon, 26 Nov 2001 16:38:11 -0800
Message-Id: <200111270038.fAR0cBi17837@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 26 Nov 2001 16:38:10 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Steve.Gibson.accidentally.creates.DoS.tool]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 8bit

Steve Gibson accidentally creates DoS tool
By Thomas C Greene in Washington
Posted: 26/11/2001 at 21:00 GMT

Techno hypemeister Steve Gibson, who clamored for headlines some months back
with a dramatic prediction that the misuse of Win-XP's raw sockets would
destabilize the entire Internet, has made his own inadvertent contribution
to the malicious hackers' tool chest.

Gibson's Web site is littered with hyped-up bells and whistles to mystify
the unsophisticated technophile, most of which are harmless; but one of his
little magicians' props can be misused to launch a denial of service attack,
a security researcher has discovered.

It turns out that his port scanner, ShieldsUp , can easily be directed at
arbitrary IP addresses while returning the scan results to the initial user.
Thus the tool would become an effective proxy for performing anonymous port
scans. Even better, if such an attack were scripted, it would be possible to
tie up a Web site with a torrent of Gibson's mighty NanoProbes.

The ShieldsUp flaw was mentioned briefly during a recent Blackhat session
regarding the secure development of Web applications by researcher 'Thor'
from HammerOfGod.com.

How it works
The problem here is a weak method of determining the ShieldsUp user's IP,
which Gibson alludes to in his instructions. "If your IP address is
incorrectly determined the wrong machine will be mistakenly tested," he
warns. [Gibson's emphasis]

So it's clear that Stevarino can foresee the problem; he just doesn't care
enough, or know enough, to fix it properly.

"Gibson has chosen to use a simple hidden tag in the client-side HTML code
to identify the IP address that is passed to the scanning engine. Though the
client's IP address is hashed, it is trivial to alter the value of the
hidden tag in order to request that a different IP address be scanned. The
true IP address is never checked in the HTTP header during the scan, and
ShieldsUp happily scans the other box while returning the result set into
browser of the box the called for the scan," Thor says.

But it gets better. Gibson's finger-in-the-dike solution is a little
download called "IP Agent" which will ensure that ShieldsUp gets your IP
right. Ironically, this little toy makes it even easier to misuse the
scanning service.

"We can easily bypass the need to crack the hash by simply using the 'IP
Agent' supplied by Gibson....the IP Agent now supports multiple client IP
addresses. One simply needs to bind arbitrary IP addresses to a local
interface, and perform a scan request. In this case, ShieldsUp presents
friendly command buttons listing the IP addresses bound to the local
interfaces, and allows you to select any one that you want scanned. Again,
no other checking is done, and SheildsUp will scan whatever IP address you
ask it to, and report the results into your own browser," Thor observes.

Furthermore, "multiple post requests can be easily scripted to perform scans
against a site in attempts to perform a denial of service attack against a
host. In these cases, with sufficient requests generated, one could ask
grc.com to attack another site, and it will comply."

The IP Agent doesn't even need to be hacked. It will accommodate malicious
users straight out of the box.

"One would have hoped that instead of spending so much time expounding on
the theoretical denial of service capabilities of Raw Sockets, [Gibson would
have used] that time to properly develop his own application in order to
prevent the same. In order to prevent the malicious use of Gibson's site to
attack our systems, we have blocked Gibson's subnet at the border."

Perhaps you should do the same. ®

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Break free. Great
American Smokeout
http://us.click.yahoo.com/3vN8tD/.pSDAA/ySSFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:59 PST