Intrusion Detection Systems mailing list archives
Re: Fw: blackice ignoring port 113
From: "Talisker" <Talisker () networkintrusion co uk>
Date: Tue, 25 Jul 2000 07:03:22 +0100
Archive: http://msgs.securepoint.com/ids FAQ: http://www.ticm.com/kb/faq/idsfaq.html IDS: http://www-rnks.informatik.tu-cottbus.de/~sobirey/ids.html HELP: Having problems... email questions to ids-owner () uow edu au NOTE: Remove this section from reply msgs otherwise the msg will bounce. SPAM: DO NOT send unsolicted mail to this list. UNSUBSCRIBE: email "unsubscribe ids" to majordomo () uow edu au ----------------------------------------------------------------------------- Jim Read down it's a forwarded message :o) now I look it could be confusing Andy
----- Original Message ----- From: "vali" <vali () iname com> To: <BUGTRAQ () securityfocus com> Sent: Saturday, July 22, 2000 5:27 PM Subject: blackice ignoring port 113It's as simple as that, blackice (a somehow popular windowsfirewall) isignoring TCP trafic with destination port 113 (even with "paranoid"seting).The most simple way to try this is nmap -sS -p 113 -P0 victim (victim's blackice is silent) nmap -sS -p any_other_port -P0 victim (blackice says "tcpport probe").Tried with blackice 2.1.x (blackice.exe & vxd = 2.1.25, blackicd and blackdll.dll = 2.1.22) on both win95 OSR 2 ans win98 SE. This is not much, but is a simple way to flood a computerwithout blackicereacting in any way. Also, if somebody is using a buggyident server this isfatal (irc clients install sometimes ident servers, without usersknowledge).Other comments regarding BlackIce: Blackice is doing a good job in stoping malformed packets "bad" forMicrosoftIP stacks (including IGMP, fragmented ICMP aka teardrop,etc, etc). Can detectnmap stealth scan but there is no simple way to tell fromthe interface theport scaned (if the port is not a "standard" port). Anyway, it has extensive logging capabilities. In fact with "logging" and "evidencelogging"enabled sniffed sessions can linger in Blackice folder,alongside withsensitive information like passwords. Blackice can do (automatic) DNS reverse lookup and aNetbios scan for theatackers (wich can be a *very* bad thing). I think thisfeature is enabled bydefault. Blackice seems to have some limits for the number ofpackets loged and for thealerts displayed. This is a good thing and a bad thing.This limit the memoryused but some packets can go unnoticed (and if someone send a lot ofspoofedpackets the real atack will go unnoticed).
Current thread:
- Fw: blackice ignoring port 113 Talisker (Jul 23)
- <Possible follow-ups>
- Fw: Re: blackice ignoring port 113 Talisker (Jul 23)
- RE: Fw: blackice ignoring port 113 Meritt, Jim (Jul 24)
- Re: Fw: blackice ignoring port 113 Talisker (Jul 25)
