
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 200
stepsbelow:
1. Writeasimpleprogramthatallowsustosetthenumberofpingattemptsandthe
useofspoofedsourceaddress.Makesurethatthissmallprogramworkswellon
the50compromisedsystems.Ifitisquitecertainthatallthesecompromised
hosts(aswellasourownhost)areWindowsbased,wecansimplyuseSMURF
2K/XPinsteadofwritingourown.
2. Setthesourceaddresstothevictim’sIP.
3. Uploadthisprogramtothe50compromisedsystems.
4. Havethempingeachothersrepeatedly,orhavethempingtheSARlistof
amplifiers.
AgainstSmurfAttack
Ciscosuggeststhefollowingwaystoprotecta networkagainstDoSandSmurf
attacks:
“
Usetheipverify unicast reversepathinterfacecommandontheinputinterf aceonthe
routerattheupstreamendoftheconnection.
FilterallRFC1918addressspaceusingaccesscontrollists.
Applyingressandegressfiltering(seeRFC2267)usingACL.
UseCARtoratelimitICMPpackets.
”
75
Althoughthesesuggestionswerepreparedwith Ciscogearsinmind,otherrouter
vendorsdo offertheirownversionsofthesestrategies.ThepointI am tryingtomake
hereis,suchattacksshouldbestoppedatorbeforetherouter.DoNOTletthemreach
thefirewall.Thefirewallisbusyatinspectingtoomanythingsalready.
AmorestraightforwardapproachistodisallowICMPentirelyattheborderrouter.
Thatmeans,noICMPgoinginandoutofthenetwork.Bydoingthis,devicesbehind
theborderrouterarefrom freefromsuch attack.However,internaluserswillnotbe
abletopingtheoutsideworldanymore(nomorepingforever).Well,therearealways
75
http://www.cisco.com/warp/public/707/newsflash.html
Comentários a estes Manuais