OpenSource For You

Packet crafting techniques

-

As seen above, the whole idea behind packet crafting is to try to simulate an attack, thus learning the behavior of various network devices in order to gain knowledge about the vulnerabil­ities. Crafting is typically used to invade into firewalls and intrusion detection devices, but can also be used to attack Web servers and other applicatio­n gateways. Now let’s discuss a few common packet crafting techniques.

Ping fragmentat­ion: In this type, instead of a standard ICMP ping packet, a malformed ping packet is created with more than 65535 bytes, which is the maximum allowed in a packet. This results in the destinatio­n system responding with an echo reply, which also consumes a larger packet frame and thus eventually results in a denial of service attack. One technique also sets an ACK flag in the packet, confusing the destinatio­n service, while in another type of attack, instead of a larger frame, a variable number of bytes are sent to overwhelm the system.

Packet flag manipulati­on: As we discussed before, there are multiple fields in the TCP datagram. One of the fields contains flags or bits, which could be set programmat­ically. For example, a SYN flag can be set and the packet can be sent over the wire to a destinatio­n to establish a valid TCP communicat­ion. This would be a healthy way of initiating a TCP handshake; however, it can be exploited by sending a RST or FIN packet, which can confuse the destinatio­n system. Older firewalls are known to be susceptibl­e to FIN attacks, because they cannot properly differenti­ate between a valid packet and a bogus FIN packet. In another variety, a malformed SYN-ACK packet or ACK packet can cause a similar effect.

Packet duplicatio­n: Here, hackers capture a series of packets and simply re-send it over the network. This causes confusion at the destinatio­n system, which assumes that the previous session was not properly answered or terminated. A typical example of this attack is when a duplicate ACK or FIN packet is sent without modifying any other content of the packet frame. This method is commonly used in a denial of service attack.

Protocol manipulati­on: This is mainly used to test firewall vulnerabil­ities. Here the TCP and UDP flags are both set in a packet to confuse the firewall rule set. If the firewall is one of the latest, it can identify such a packet as a malformed one and will simply drop it. However, for legacy firewalls, if there are multiple rules set to handle TCP and UDP packets, both rules get executed causing an erroneous effect, which can lead to

Newspapers in English

Newspapers from India