Intrusion Detection Systems mailing list archives
Re: Passive Mapping: An Offensive Use of IDS
From: rgula () network-defense com (Ron Gula)
Date: Fri, 14 Apr 2000 17:31:19 -0700
Archive: http://msgs.securepoint.com/ids FAQ: http://www.ticm.com/kb/faq/idsfaq.html IDS: http://www-rnks.informatik.tu-cottbus.de/~sobirey/ids.html UNSUBSCRIBE: email "unsubscribe ids" to majordomo () uow edu au I'm not so sure I would call this "offensive use of an IDS". It's really offensive use of a sniffer. There are a variety of protocols such as SNMP and OSPF/RIP/BGP which can be used to figure out the topology and services available on a target network. Even DNS and "ping's" from a network management system can also be used. One of my all time favorites was to intercept an X session which contained an HP Openview session with active network maps.
From a commercial IDS point of view, I think this information has
obvious security value. For example, in the Dragon IDS, you can search through a complex ACL of SYN-ACKs from servers on your network and also for responses from servers that your folks are visiting. This means you can say neat things like "I have 5 DNS servers so I will ignore port 53 traffic SYN/ACK traffic from them, but alert on port 53 SYN/ACKs from other servers that may be unauthorized ports". The same thing goes for general rules which say, show me a SYN/ACK for any of my machines above port 1024 which may indicate backdoor traffic. There will be some false alarms from FTP transfers, but a consistent port such as a proxy or IRC server will stand out. Ron Gula, CTO Network Security Wizards
Current thread:
- Re: [Fwd: [Fwd: Fwd: Emergency...Pls Forward This To Everyone You Know]] cy bear (Apr 13)
- Re: the "please forward to everyone email" walter sulym (Apr 13)
- Passive Mapping: An Offensive Use of IDS Martins, Fernando (Lisbon) (Apr 14)
- Re: Passive Mapping: An Offensive Use of IDS Ron Gula (Apr 14)
- Last call for extended abstracts - Raid 2000 - Deadline is April 30th Herve Debar (Apr 18)
- Last call for extended abstracts - Raid 2000 - Deadline is April 30th Herve Debar (Apr 18)
- implications of recent legal trends Stuart Staniford-Chen (Apr 18)
- Re: implications of recent legal trends Shafik Yaghmour (Apr 19)
- Re: implications of recent legal trends Roelof JT Jonkman (Apr 21)
- Passive Fingerprinting Lance Spitzner (Apr 22)
- Syslogd whith secure options ? bruno.pradal () free fr (Apr 14)
