[36616] in bugtraq

home help back first fref pref prev next nref lref last post

Re: ICMP spoofed source tunneling

daemon@ATHENA.MIT.EDU (fenfire@abwesend.de)
Wed Sep 22 17:25:48 2004

Date: Wed, 22 Sep 2004 12:33:50 +0200
From: fenfire@abwesend.de
To: bugtraq@securityfocus.com
Message-ID: <20040922103350.GA7688@nenya.lan>
Mail-Followup-To: bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <Pine.BSF.4.21.0409212053100.83510-100000@titan.parkline.ru>
Mail-Copies-To: nobody

On Tue, Sep 21, 2004 at 08:55:04PM +0400, Max Tulyev wrote:
> Let's imagine in Net a hacker having his source server(S), destination
> server(D), and a ip-capable device - victim(V). S sends to V spoofed ICMP
> echo request packet containing IP source address of D, and the data in
> Payload.
> 
> When V receiving that packet, it sends ICMP echo-reply packet to D, AND
> FORWARDS TO D ALL DATA IN PAYLOAD!

This could also be used by peer-to-peer networks to achieve sender
anonymity. (Of course you could also directly send UDP packets with forged
source addresses...)

home help back first fref pref prev next nref lref last post