Home page logo
/

pen-test logo Penetration Testing mailing list archives

RE: Multiple Spoofed HTTP Requests
From: Kyle Starkey <kstarkey () siegeworks com>
Date: Sat, 03 Sep 2005 10:43:17 -0600

This can be done, but requires that you are talking to a webserver whose
sequence numbers are easily guessable and even then is going to be a blind
attack... You will have to send the packets from a spoofed source then
simply continue to have the conversation with the webserver without ever
hearing the Webserver side of it... However a few "standard" convo's with
the WS should tell you how it is going to react when you spoof the source
IP... It's a pretty tricky attack, but it can be done assuming the WS uses
easily guessable seq #'s and your source IP is something that is non-RFC1918
so the packet will get to the ws and not get blocked by FW's or border
router acls...

-K

-----Original Message-----
From: kuffya () gmail com [mailto:kuffya () gmail com] 
Sent: Friday, September 02, 2005 7:12 AM
To: pen-test () securityfocus com
Subject: Multiple Spoofed HTTP Requests


Hi list, 
I've used a variety of tools such as Nemesis, Packet Xcalibur & Libnet GUI
to craft customized packets. Using such tools, you can create packets at
layers 2 up to 5 possibly spoofing your source IP, port numbers or whatever
you see fit. 
The question is : Would it be possible to craft a HTTP request(or multiple
requests) using a spoofed IP address? I'm inclined to consider that it's
not, the reason being you must have a 3-way handshake established before you
can start talking application layer protocols (such as HTTP). If you use a
spoofed IP address, then there's no way of doing that. On the other hand, I
might be totally wrong, that's why I'm asking the list, for the list is
wise. 
If, however, it is possible could you please give me some directions on how
to do it? 

Thanks a lot
S.

----------------------------------------------------------------------------
--
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are

futile against web application hacking. Check your website for
vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers
do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
----------------------------------------------------------------------------
---



------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]