Re: All tcp ports open?

From: StoneBeat (stonebeat@ya.com)
Date: Wed Sep 01 2004 - 08:41:45 EDT


A few years ago i wrote a quick script that does something similar but doesn't
need tcpdump, nemesis or any external tool to work. It had tcpdump and
nemesis capabilities built-in

it accepts three parameters:
 -i (my own IP address)
-d (device, for example eth0)
-r (real open ports)

#./obfuscator-eth.pl -i 192.168.1.1 -d eth0 -r 21-20-6000

It appears to obfuscate Nmap Syn/Normal scan and fingerprint.

you can download here:
http://webs.ono.com/stonebeat/obfuscator-eth.pl.txt

El Lunes 30 Agosto 2004 23:00, sol seclists escribió:
> A script which does exactly what you desrcibe is mentioned in the book
> "hacking: the art of exploitation" by jon erickson only on a linux machine.
>
> the basic idea is something like:
>
> use tcpdump to monitor all incoming SYN packets not destined for any
> listening service and then use a packet generation tool (such as nemsis) to
> generate a packet with a seq#+1 and the SYN and ACK flags set.
>
> ----- Original Message -----
> From: "Ben Timby" <asp@webexc.com>
> To: <pen-test@securityfocus.com>
> Sent: Sunday, August 29, 2004 9:04 AM
> Subject: All tcp ports open?
>
> > I am not sure what is doing this, but I assume it is a software (or some
> > kind of) firewall/hids, can anybody point me in the right direction?
> >
> > I am pen-testing a Windows webserver, and a port scan reveals ALL tcp
> > ports open. hping also confirms that a SA is returned for any S packets
> > sent to any port I try. I can connect via netcat any of the ports, and
> > send data, but nothing is returned. In order to verify services, I am
> > required to connect and check for a banner or send appropriate protocol
> > commands to elicit a response.
> >
> > Has anyone seen this, or have any idea of what this is?
> >
> > Thanks.
> >
> > -------------------------------------------------------------------------
> >-
>
> ----
>
> > Ethical Hacking at the InfoSec Institute. All of our class sizes are
> > guaranteed to be 12 students or less to facilitate one-on-one interaction
> > with one of our expert instructors. Check out our Advanced Hacking
> > course, learn to write exploits and attack security infrastructure.
> > Attend a
>
> course
>
> > taught by an expert instructor with years of in-the-field pen testing
> > experience in our state of the art hacking lab. Master the skills of an
> > Ethical Hacker to better assess the security of your organization.
> >
> > http://www.infosecinstitute.com/courses/ethical_hacking_training.html
> > -------------------------------------------------------------------------
> >-
>
> -----
>
>
>
> ---------------------------------------------------------------------------
>--- Ethical Hacking at the InfoSec Institute. All of our class sizes are
> guaranteed to be 12 students or less to facilitate one-on-one interaction
> with one of our expert instructors. Check out our Advanced Hacking course,
> learn to write exploits and attack security infrastructure. Attend a course
> taught by an expert instructor with years of in-the-field pen testing
> experience in our state of the art hacking lab. Master the skills of an
> Ethical Hacker to better assess the security of your organization.
>
> http://www.infosecinstitute.com/courses/ethical_hacking_training.html
> ---------------------------------------------------------------------------
>----

------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:02 EDT