ICMP Usage in Scanning(1).pdf

(5527 KB) Pobierz
ICMP Usage in Scanning
ICMP Usage in Scanning – The Complete Know How
Version 3.0
ICMP Usage in Scanning
The Complete Know-How
Ofir Arkin
Founder
The Sys-Security Group
http
://
www
.
sys
-
.
com
-
.
com
Version 3.0
June 2001
1
Copyright © Ofir Arkin 2000-2001
http://www.sys-security.com
119485531.001.png 119485531.002.png
ICMP Usage in Scanning – The Complete Know How
Version 3.0
Trust No One
2
Copyright © Ofir Arkin 2000-2001
http://www.sys-security.com
ICMP Usage in Scanning – The Complete Know How
Version 3.0
Table of Contents
Destination Unreachable (Type 3).............................................................. 18
2.2.1.1.1
Source Quench (Type 4) ............................................................................ 20
Redirect (Type 5) ....................................................................................... 21
Time Exceeded (Type 11) .......................................................................... 23
Timestamp Request (Type 13) and Timestamp Reply (Type 14) .............. 28
Information Request (Type 15) and Reply (Type 16) ................................. 29
I CMP Address Mask Request (Type 17) and Reply (Type 18) .................. 30
3
Copyright © Ofir Arkin 2000-2001
http://www.sys-security.com
1.1
1.3
1.4
2.0
2.1
2.2
Parameter Problem (Type 12).................................................................... 24
2.3
3.0
3.2
3.3
ICMP Usage in Scanning – The Complete Know How
Version 3.0
ACL Detection - An example with ICMP as the underlying Protocol ......... 58
`
Protocol Scan` .......................................................................................... 60
Copyright © Ofir Arkin 2000-2001
http://www.sys-security.com
3.4
3.5
3.6
3.7
4.0
4.1
ACL Detection – An example with TCP/UDP as the underlying protocol. 58
4.2
Detecting if a Filtering Device is present ............................................. 60
4.3
4.4
4.5
5.0
5.1
5.2
5.3
6.0
6.1
7.0
7.1
ICMP Usage in Scanning – The Complete Know How
Version 3.0
Detection Avoidance .................................................................................. 92
Sun Solaris .......................................................................................... 92
Linux Kernel 2.4.x................................................................................ 93
IP TTL Field Value with ICMP Query Replies ............................................ 94
IP TTL Field Value with ICMP ECHO Requests......................................... 97
Correlating the Information......................................................................... 99
The use of the Type-of-Service field with the ICMP Protocol................... 113
DF Bit Echoing with the ICMP Address Mask request ............................. 126
DF Bit Echoing with the ICMP Timestamp request .................................. 126
Why this will work (for the skeptical) ........................................................ 126
7.2.7.2
The non-answering Operating Systems ................................................... 131
5
Copyright © Ofir Arkin 2000-2001
http://www.sys-security.com
7.2
Changed Pattern with Other ICMP Message Types ................................ 117
Combining all together ............................................................................. 128
7.3
Zgłoś jeśli naruszono regulamin