bypassingintrusiondetectionsystems内容摘要:

IDS WWW Segment with MTU = 1300 1350 byte packet with DF = 1 Bypassing NIDS HTTP Proto • „/‟ padding: “/cgibin///phf” • Self referencing directories: “/cgi bin/./phf” • URL Encoding: “%2fcgibin/phf” • Reverse Traversal: “/cgibin/here/../phf” • TAB instead of spaces removal • DOS/Win syntax: “/cgibin\phf” • Null method: “GET%00/cgibin/phf” Bypassing NIDS Tel Proto • Strip out Tel codes • Automatic proxies which add random characters followed by backspace –“su X{backspace}root” Bypassing NIDS Resources • Tools – Whisker Rain Forest Puppy – Fragrouter Dug Song – Congestant horizon, Phrack 54 • Papers – “Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection”, Tom Ptacek, Timothy Newsham – Bro information: Bypassing HIDS Kernel Hacks • Windows NT – 4 byte patch that removes all security restrictions from objects within the NT domain. – Could use access to disable or manipulate HIDS • Linux “” kernel module not in /proc/modules hides a sniffer hides files hides processes redirects execve() socket backdoor magic setuid gets root Bypassing HIDS Stack Protection • Stackguard –A „canary‟ is placed next to return address – Program halts and logs if canary is altered – Canary can be random or terminating – Bypass: overwrite return address without touching canary – Fix: XOR the return address and the canary – Point: Yet another example of an arms race Bypassing HIDS Library Hacks • Environment variables which redirect shared library locations • Library has a „wrapper‟ run by a p。
阅读剩余 0%
本站所有文章资讯、展示的图片素材等内容均为注册用户上传(部分报媒/平媒内容转载自网络合作媒体),仅供学习参考。 用户通过本站上传、发布的任何内容的知识产权归属用户或原始著作权人所有。如有侵犯您的版权,请联系我们反馈本站将在三个工作日内改正。