Ver Mensaje Individual
  #8 (permalink)  
Antiguo 14/03/2003, 11:37
Avatar de Necros
Necros
 
Fecha de Ingreso: enero-2002
Ubicación: Catalunya
Mensajes: 431
Antigüedad: 23 años
Puntos: 0
Cuidado con este ultimo Alfon :

Related by: Abraham Lincoln.


Vulnerable systems:
* Sygate Personal Firewall version 5.0

Test diagram:
[*Nix b0x with IP Spoofing scanner / Flooder] <===[10/100mbps switch===> [Host with SPF]

1] IP Spoofing Vulnerability Default Installation
- SPF is vulnerable with IP Spoofing attack by Scanning the host with a source IP address 127.0.0.1 or network address 127.0.0.0. The Attacker could scan or attack the target host without being detected by the personal firewall. This vulnerability is very serious w/c an attacker could start a Denial of Service attack against the SPF protected host and launch any form of attack.

- To those who wants to try to simulate the vulnerability, you may use source address 127.0.0.1 - 127.0.0.255.

Workaround:
1] Set the SPF to BLOCK ALL mode setting which Abraham does not think the user would do. This type of setting would block everything all incoming request and outgoing.

2] Block source address 127.0.0.1 or 127.0.0.0 network address manually in Advance rules section.
__________________
By NeCrOS
FrEe WoRlD is FrEe CoDE
http://www.NeCrOS.com