
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 193
Attacking–theIPFragmentroute:
ThisattackallowsustobogdownFW1.
CheckPointhasadmittedthatanIPfragmentrelatedvulnerabilityexistsinFW14.0
and4.1.AccordingtoCheckPoint:
“Ithasbeendeterminedthatastreamof largeIPfragmentscancausetheFireWall1
codethatlogsthefragmentationeventtoconsumemostavailablehost systemCPU
cycles.Itshouldbenotedthatnounauthorizedaccess,informationleakage,or
fragmentpassingoccurs.….Forsecurityreasons(e.g.,overlayattacks)FireWall1
reassemblesallIPfragmentsofadatagrampriortoinspectionagainstthesecurity
policy.Afterreassembly,thepacketisprocessedbytheFireWall1StatefulInspection
engine,andifallowedbythe securitypolicytoproceed,thepacketisrefragmented
andforwarded.Toidentif yandauditattackssuchasPingofDeath,CheckPoint
addedamechanismtoFireWall1outsideofitsstandard loggingcapability tolog
certaineventsthatoccurduringtheFireWall1virtualreassemblyprocess.This
fragmentationloggingtakesplaceonthegatewayitselfandnotonthemanagement
station(relevantf or distributedmanagementdeployments).”
66
Tobeabletolaunchthisattack,weneedatool capableof manipulatingtheICMP
packetsize.Hping
67
isanidealtoolforthispurpose,althoughitrunsonly onLinux
andUnix.If theattackistobelaunchedfromaWindowsbasedmachine,SMURF
2K/XPisrecommended.
SMURF2K/XP,asdescribedbyitsauthorattheRealCoders,allowsustofreely
configurethefollowingoptions:
“
Packets: Number of packets to send.
Source: This is the address, the packets get labeled to 'come from'. If an
internet address can't resolved, you will see a message. If this address
66
http://www.checkpoint.com/techsupport/alerts/ipfrag_dos.html
67
http://www.hping.org/
Comentários a estes Manuais