Intrusion Detection Systems mailing list archives
Passive Mapping: An Offensive Use of IDS
From: FMartins () pt imshealth com (Martins, Fernando (Lisbon))
Date: Fri, 14 Apr 2000 10:22:31 +0100
Archive: http://msgs.securepoint.com/ids FAQ: http://www.ticm.com/kb/faq/idsfaq.html IDS: http://www-rnks.informatik.tu-cottbus.de/~sobirey/ids.html UNSUBSCRIBE: email "unsubscribe ids" to majordomo () uow edu au Hi2all This from www.securityfocus.com ... lets see the comments =;o) Kind Regards Fernando Martins fmartins () pt imshealth com http://www.imshealth.com Passive Mapping: An Offensive Use of IDS by Coretez Giovanni Tue Apr 11 2000 Passive Mapping: An Offensive Use of IDS By Coretez Giovanni Intrusion Detection Systems (IDS) are used to help defend domains by sitting on network choke points and recording all inbound and outbound packet traffic. These well-positioned tools have always been thought of as a defense weapon against cyber crime. But a tool has no say in how it is used. Passive mapping is a technique of listening to a choke point in the network and using the data to map a network. IDS naturally can perform this function. Passive mapping differs from active mapping where the software sends packets out and listens to the response to determine a network layout. NMAP is an active mapping piece of software. The Air Force was looking into passive mapping techniques some time ago but nothing seemed to happen with it. What are the advantages of passive mapping over that of active mapping that someone would spend research money on it? There are three discriminators between active and passive techniques: low uptime discovery, unusual port discovery and loss of illumination. Low Uptime Discovery Passive mapping is quite useful in finding and analyzing systems that might only be on for a matter of seconds while they transmit and receive data. If the system talks past the choke point then passive mapping will find it. This has strengths over an active mapping system where it discovers only systems that happen to be on during that time period. Therefore, passive mapping discovery is related to information sent, while active mapping discovery is related to uptime. Discovery of Services Scanning a network for all possible ports can take some time. And scanning reduces the network bandwidth while making its presence known. Passive mapping can be used for services discovery, especially those hard to find services that hide in the upper port numbers or only talk after being triggered. There has been much in the press over the years about security companies using the default ports to find tools like TFN and BO2K. As Dr. Mudge might say, "Snake Oil". One can easily change the default ports in the code, change procedure names and pad the file. These techniques will help avert being detected by cheap scans and low grade system checkers. If one intends to find backdoors into the network, then the use of passive mapping is essential. One example of service finding is in TCP. In a TCP handshake there is an initial SYN-ACK package by the receiver. Simply searching the TCPDUMP for SYN-ACK connections will get a list of active listening ports. If TCP is used for a high port backdoor, then the SYN-ACK from a port greater than 1024 (might want to take out ports like 8080 if user defined services are allowed) is a good clue that there is a TCP service on the box. By using the SYN-ACK, and not high-low schema, you bypass the problem of low initiating source (especially in high port Trojans). And the SYN-ACK search helps reduce redundant data sets. Reduction of Illumination One of the side effects of passive mapping is that it is invisible to the users on the network. Anti-Sniff (www.l0pht.com) demonstrates a capability of finding sniffers, but compared to active mapping techniques the illumination is negligible. However, the moving of the results across the network however will still cause illumination in a distributed sniffer configuration. Corollaries: Reverse Mapping Occurs So what, what about the offensive use of passive mapping? Well, passive mapping not only maps your network, but it slowly maps the network that your users are going to. This means that a large distributed network of filters could collect "good" maps of networks. Not only will it record normal traffic results, but if there are other scanners and mappers running on the network by those nasty users, you get their maps too. Examples "... a government official for the first time publicly acknowledged the existence of the Internet control project, called the System of Operative and Investigative Procedures or SORM-2, its Russian acronym." -SERGEI SHARGORODSKY, Associated Press, February 21, 2000 SORM-2 could be used to map networks inside and outside Russia. The shear size of data from 350 service providers produces a low illumination mapping capability that is worth being envious of having. It is not always possible to place sniffers on some one else's turf. Packets flow, unless programmed otherwise, through the quickest route. By increasing speed and bandwidth of their countries, German and French organizations can map other countries in the EU and also in the US by creating quicker routes through their countries. It may be worth some good intelligence money spent to see where high speed fiber is being placed and who is spending the money. Conclusion With the demonstration of distributed denial of service attacks, many people are asking what is next. One logical step would be to actually use these collections of compromised systems in other than denial of service techniques. These techniques are however easier to implement and have a larger scale of use by organized financed groups. The information contained in this paper is for education purposes only. This paper is the property of Endeavor Systems, Inc., and is not to be replicated for commercial advertisement or gain without the written permission of Endeavor Systems, Inc. Thanks to Johnny "Mind Thief" Anonymous for pointing out the great example of the Russian IDS constellation as a premo example using this technique. A side note: I was talking with Simple Nomad during a lunch. We were sharing ideas when he brought up passive mapping. I showed him this paper and some other material I had handy, but I wanted to make a note here so others know that Simple Nomad has also been working on the same lines and wanted to ensure that he receives equal credit in this technique. Derrick Jamison made the passive mapping filter quicker with the following tcpdump filter: tcpdump -q -n 'tcp[13] = 18'
From the line above it should be noted that this technique is not theory,
but it works. We have tested it and find it has many uses.
Current thread:
- Re: [Fwd: [Fwd: Fwd: Emergency...Pls Forward This To Everyone You Know]] cy bear (Apr 13)
- Re: the "please forward to everyone email" walter sulym (Apr 13)
- Passive Mapping: An Offensive Use of IDS Martins, Fernando (Lisbon) (Apr 14)
- Re: Passive Mapping: An Offensive Use of IDS Ron Gula (Apr 14)
- Last call for extended abstracts - Raid 2000 - Deadline is April 30th Herve Debar (Apr 18)
- Last call for extended abstracts - Raid 2000 - Deadline is April 30th Herve Debar (Apr 18)
- implications of recent legal trends Stuart Staniford-Chen (Apr 18)
- Re: implications of recent legal trends Shafik Yaghmour (Apr 19)
- Re: implications of recent legal trends Roelof JT Jonkman (Apr 21)
- Passive Fingerprinting Lance Spitzner (Apr 22)
- Syslogd whith secure options ? bruno.pradal () free fr (Apr 14)
