Forums

Skip to content

Advanced search
  • Quick links
    • Unanswered topics
    • Active topics
    • Search
  • FAQ
  • Login
  • Register
  • Board index Assistance Networking & Security
  • Search

nmap scan - remoteanything?

Having problems getting connected to the internet or running a server? Wondering about securing your box? Ask here.
Post Reply
Advanced search
9 posts • Page 1 of 1
Author
Message
miunk
Apprentice
Apprentice
User avatar
Posts: 199
Joined: Tue Sep 24, 2002 3:00 pm

nmap scan - remoteanything?

  • Quote

Post by miunk » Wed Aug 20, 2003 6:38 pm

Anyone know what "remoteanything" listening on port 4000 is? Is the fact that this is open cause for concern?
Top
amne
Bodhisattva
Bodhisattva
User avatar
Posts: 6378
Joined: Sun Nov 17, 2002 6:00 pm
Location: Graz / EU

  • Quote

Post by amne » Wed Aug 20, 2003 7:05 pm

are you running mldonkey? if yes:

Code: Select all

telnet 0 4000
and you have a text-interface.
if you didn't mess up with the config file, it should allow connections from localhost only :)
Top
miunk
Apprentice
Apprentice
User avatar
Posts: 199
Joined: Tue Sep 24, 2002 3:00 pm

  • Quote

Post by miunk » Wed Aug 20, 2003 7:35 pm

Yes I am constantly running mldonkey. And it seems that I am safe - telnet connections to my ip port 4000 from the outside fail.

Is there any danger that someone could spoof that they are actually connecting from localhost?
Top
zhenlin
Veteran
Veteran
Posts: 1361
Joined: Sat Nov 09, 2002 4:38 pm

  • Quote

Post by zhenlin » Thu Aug 21, 2003 2:05 am

No. Even if they did, the recieving end would be at 127.0.0.1 as well.

That's the thing about TCP/IP. Spoofing your IP is only good for DoS attacks.
Top
devon
l33t
l33t
Posts: 943
Joined: Mon Jun 23, 2003 9:24 pm

  • Quote

Post by devon » Thu Aug 21, 2003 7:02 am

If the person knew the commands and what happens, he/she doesn't need output from the server. I can telnet to a mail server and make a message without ever seeing the response from the server since I know what I am doing. :)

So if there was a buffer overflow exploit, I don't care what the servers tells me. I would just craft a packet from 127.0.0.1 with the proper data and be done.
Top
zhenlin
Veteran
Veteran
Posts: 1361
Joined: Sat Nov 09, 2002 4:38 pm

  • Quote

Post by zhenlin » Thu Aug 21, 2003 3:09 pm

Yes... But, watch :-

Code: Select all

Legitmate:
xxx.xxx.xxx.xxx -> SYN(xxx.xxx.xxx.xxx, Ack: 0, Seq: CSEQ1) -> yyy.yyy.yyy.yyy
yyy.yyy.yyy.yyy -> SYN/ACK(yyy.yyy.yyy.yyy, Ack: CSEQ1, Seq: SSEQ1) -> xxx.xxx.xxx.xxx
xxx.xxx.xxx.xxx -> SYN(xxx.xxx.xxx.xxx, Ack: SSEQ1, Seq: CSEQ1) -> yyy.yyy.yyy.yyy

Connection established.

DoS:

mmm.mmm.mmm.mmm -> SYN(xxx.xxx.xxx.xxx, Ack: 0, Seq: MSEQ1) -> yyy.yyy.yyy.yyy
yyy.yyy.yyy.yyy -> SYN/ACK(yyy.yyy.yyy.yyy, Ack: MSEQ1, VSEQ1) -> xxx.xxx.xxx.xxx
xxx.xxx.xxx.xxx : Huh? I never sent a SYN with sequence number MSEQ1.

Connection failed.
So, you cannot even establish a connection if you spoof your IP - let alone send a malicious packet.

In any case, a good firewall should block packets claiming to have originated from 127.0.0.1
Top
devon
l33t
l33t
Posts: 943
Joined: Mon Jun 23, 2003 9:24 pm

  • Quote

Post by devon » Thu Aug 21, 2003 4:30 pm

zhenlin wrote:So, you cannot even establish a connection if you spoof your IP - let alone send a malicious packet.
While a TCP connection would fail (assuming you cannot intercept the SYN/ACK somehow), I don't think a UDP connection would have that problem. If I am wrong, please let me know. This is all conjecture as I don't actively try to attack hosts. ;)
Top
viperlin
Veteran
Veteran
Posts: 1319
Joined: Tue Apr 15, 2003 5:50 pm
Location: UK

  • Quote

Post by viperlin » Sun Aug 31, 2003 2:15 am

i've been thinking about this alot since the SoBig virus came out (fakes the e-mail address and sending IP and everything in the headers)
i was wondering how it does it really.
I know how it can fake most info but how does it fake the "Received:" bit?
i assumed it was some form of IP spoof by entering your network card into promiscuous mode and changing the source address (like nmap does with the -S flag)
i've been trying it for fun but still no luck, i've been using my own smtp server and sending them to my other e-mail account and looking at the headers.
i can't figure out how i put my network card into Promiscuous mode and specify the source IP (it's done with ifconfig i think, it has the option) but cannot find the method or command to do it.
don't supose anyones played with this.
Top
SpinDizzy
n00b
n00b
Posts: 63
Joined: Wed May 28, 2003 10:54 am
Location: Moss Vale, Australia

  • Quote

Post by SpinDizzy » Sun Aug 31, 2003 3:28 am

AFAIK sobig doesn't fake the sending IP headers, just the senders address. You can inject fake received headers, but they are usually easily spotted by eyeball...
Top
Post Reply

9 posts • Page 1 of 1

Return to “Networking & Security”

Jump to
  • Assistance
  • ↳   News & Announcements
  • ↳   Frequently Asked Questions
  • ↳   Installing Gentoo
  • ↳   Multimedia
  • ↳   Desktop Environments
  • ↳   Networking & Security
  • ↳   Kernel & Hardware
  • ↳   Portage & Programming
  • ↳   Gamers & Players
  • ↳   Other Things Gentoo
  • ↳   Unsupported Software
  • Discussion & Documentation
  • ↳   Documentation, Tips & Tricks
  • ↳   Gentoo Chat
  • ↳   Gentoo Forums Feedback
  • ↳   Duplicate Threads
  • International Gentoo Users
  • ↳   中文 (Chinese)
  • ↳   Dutch
  • ↳   Finnish
  • ↳   French
  • ↳   Deutsches Forum (German)
  • ↳   Diskussionsforum
  • ↳   Deutsche Dokumentation
  • ↳   Greek
  • ↳   Forum italiano (Italian)
  • ↳   Forum di discussione italiano
  • ↳   Risorse italiane (documentazione e tools)
  • ↳   Polskie forum (Polish)
  • ↳   Instalacja i sprzęt
  • ↳   Polish OTW
  • ↳   Portuguese
  • ↳   Documentação, Ferramentas e Dicas
  • ↳   Russian
  • ↳   Scandinavian
  • ↳   Spanish
  • ↳   Other Languages
  • Architectures & Platforms
  • ↳   Gentoo on ARM
  • ↳   Gentoo on PPC
  • ↳   Gentoo on Sparc
  • ↳   Gentoo on Alternative Architectures
  • ↳   Gentoo on AMD64
  • ↳   Gentoo for Mac OS X (Portage for Mac OS X)
  • Board index
  • All times are UTC
  • Delete cookies

© 2001–2026 Gentoo Foundation, Inc.

Powered by phpBB® Forum Software © phpBB Limited

Privacy Policy

 

 

magic