Security Incidents mailing list archives
Host Unreachable Scan
From: "Penn, Toby (IT.Ops Security Services)" <TPenn () russell com>
Date: Thu, 19 Jul 2001 18:00:10 -0700
Some interesting traffic came through my firewall today. We allow the
following ICMP traffic:
outbound echo-request
inbound echo-reply
inbound dest-unreachable
inbound time-exceeded inbound
The interesting part is that there was a massive amount of destination
unreachable traffic coming into the network with NO originating
echo-request. Let me rephrase... I looked at one of the addresses that was
sending dest-unreachable packets... there was no originating or
corresponding echo-request to that IP address. For that matter, there was
no traffic initiated on my side to that address whatsoever.
The question now becomes... what exposure does this give me? What can be
gleaned from and ICMP dest-unreachable request? Are you able to map my
entire network using this technique? Enumeration only? Is there a
vulnerability out there using this technique?
-Toby Penn
----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management
and tracking system please see:
http://aris.securityfocus.com
Current thread:
- Host Unreachable Scan Penn, Toby (IT.Ops Security Services) (Jul 19)
- Re: Host Unreachable Scan Ian Jones (Jul 19)
