[774] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Blind IP Spoofing Attacks.

daemon@ATHENA.MIT.EDU (Timothy Newsham)
Wed Jan 25 17:52:47 1995

From: newsham@aloha.net (Timothy Newsham)
To: jmason@iona.ie (Justin Mason)
Date: Wed, 25 Jan 1995 10:04:18 -1000 (HST)
Cc: bugtraq@fc.net, newsham@aloha.net
In-Reply-To: <199501251234.MAA05640@destructor.iona.ie> from "Justin Mason" at Jan 25, 95 12:34:13 pm

> 
> >They mention that NFS and Sun RPC in general are
> >vulnerable to the sequence number attack.  It is true that
> >nfs and other rpc's do rely on IP address for authentication
> >but I dont see how they are vulnerable to an attack.  You
> >need to see the reply in order to get a filehandle in order
> >to do anything with nfs.
> 
> If you can guess the filehandle, you don't need the reply
> packet.

why would anyone do this with TCP sequence number guessing where
the fake connections can only be made for a small fraction of
total attempts when they can spoof udp 100% of the time?

> Also, using rsh to do 'echo "+ +" > /.rhosts' would be a hell of
> a lot easier... ;)

This is the only viable attack with sequence numbers I can think
of, and it relies on a hosts.equiv or .rhosts already being
in place.

> --j.

home help back first fref pref prev next nref lref last post