
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 196
Intheory,wecan pingaroundtheinternettofindoutwhocanbeusedasamplifiers.
Thisis,however,extremelytimeconsuming.Also,thedegreeof damageproducedby
individualsystemsishighly limited.Forlaunchingattackofmassivescale,theideal
amplifiercandidatesarenetworksthathaveIPdirectedbroadcastcapableroutersat
theborderandnumerousclientsintheinternalnetwork.
Inresponsetothethreatsposedbythiskindofattack,aprojectknownasSmurf
AmplifierRegistry (SAR)hasbeenlaunched.AccordingtotheofficialSARpage,
“TheSARisatoolforInternetadministratorsbeingattackedbyor implicatedin
smurfattacks,orthosewhowishtotakeprecautions.…TheSARletsyouprobe
InternetconnectedIPnetworkstoseewhetherornottheyareconfiguredinaway
thatwillallowperpet ratorstousethemforsmurfamplification.Probingcanbedone
interactivelyorinbulk.IninteractivemodetheSARwillprobeanetwork,findthe
numberofduplicatesreturned,andsavethisinformationinadatabase.If,andonlyif,
theprobednetwo rkreturns1ormoreduplicatepackets,itismarkedas"broken".
Upongainingknowledgeofabrokennetwork,theSARwillautomaticallyobtain
informationaboutthenetworkandnotifytherelevantpeopleofthis.”
71
SARappearstobeatoolagainstsmurfattack.However,wecantakeadvantageofits
probingfeaturetolocatenetworksthatare stillvulnerable,andthenmakeuseof
them.
UsingSAR:
WecanuseSARinthefollowingways:
1,Useittoprobeapotentialamplifiernetwork:
71
http://www.powertech.no/smurf/
Comentários a estes Manuais