Dailydave mailing list archives

Re: DNS and other fun.


From: marc_bevand () rapid7 com
Date: Tue, 29 Jul 2008 17:10:36 -0700

dailydave-bounces () lists immunitysec com wrote on 07/29/2008 01:59:51 PM:

If you're mucking with Marc Bevand's exploit in order to do some speed 
comparisons you may want to fix this line:
(sizeof(buf) is 4 since buf is a pointer, of course).

~   dns_response(buf + IP_HDR_LEN + UDP_HDR_LEN,
~         (unsigned)(IP_LEN_MAX - (IP_HDR_LEN + UDP_HDR_LEN)), <--fixed.

Correct. BTW the same bug exists in build_query().

I'm not sure how having tcpreplay helps since all your packets are 
different (via TXID incrementing, which of course means you have to do 
your UDP checksum over). Is packet-loss the big problem you're seeing?

The Python exploit worked just fine, it was just slow... So slow at 
sending
spoofed replies it couldn't possibly cause packet loss. Although I have
never used tcpreplay, I assume it would help because what is slow is not
building/checksuming the packets but actually sending them, and to send
them tcpreplay probably issues a simple series of consecutive sendto()
calls without all the overhead imposed by scapy.

Importing psyco should make your Python code faster as well, although 
still REALLY slow compared to C (so far in my testing). People say that 
the public exploits don't work with Bind9 (even unpatched). Go Vixie and 

Co! :>

I have had success exploiting BIND 9.3.4 and 9.5.0 in my lab. In my
experience the 2 most likely causes of exploit failures are:

o Domains with many authoritative servers are a bit harder to poison:
  try poisoning example.com (2) before yahoo.com (7). My exploit requires
  the attacker to predict which one is going to be used. The metasploit
  module spoofs replies from all of the authoritative servers, but this
  reduces the number of TXIDs it can bruteforce per DNS request.
o When the NS record is poisoned, the victim caching resolver will
  start to use it, but if it is unresponsive (eg. was poisoned with
  a dummy IP), the resolver will quickly re-fetch the legitimate NS
  records. The attacker might not even notice the poisoning was
  successful for a short period of time.

-marc
_______________________________________________
Dailydave mailing list
Dailydave () lists immunitysec com
http://lists.immunitysec.com/mailman/listinfo/dailydave


Current thread: