[TriLUG] Promiscuous mode on open network (nc.rr.com)?

David R. Matusiak dave at matusiak.org
Wed Jul 2 10:13:00 EDT 2003


what if there is no X running on the target system?

can you still pull up a remote xterm on your attack box?

On Wednesday, July 2, 2003, at 09:54  AM, Ryan Leathers wrote:

> I hate to always be the naysayer about this sort of thing, so I was
> holding off looking for someone else to comment thusly:
>
> The common wisdom is that the network based (not host based) IDS should
> be transparent.  When putting the NIC in promiscuous mode you will also
> be taking care to not bind an IP address, and obviously there will be 
> no
> listening services.  This sort of network based IDS is transparent 
> which
> makes it more powerful / dangerous depending on your perspective.
>
> Consider what could happen if you had an IP address bound to a NIC that
> was in promiscuous mode.  The host could be reached, and the NIC would
> accept everything on the wire.  This is a rootkit waiting to happen.  I
> have in my bag of tricks some binaries for those occasions when I
> discover an unauthorized IDS on my network.  One nifty example is a
> tcpdump exploit which returns an xterm from the target to my attack
> box.  Its accomplished through a buffer overflow of tcpdump.  This
> particular exploit is only possible because of the combination of three
> factors: tcpdump is running, the NIC is in promiscuous mode, an IP
> address is bound to this NIC. Also note that I generally get the xterm
> back as root.  (Yes, similar exploits exist for other applications 
> which
> use promiscuous mode... and yes the original tcpdump BO exploit was
> patched with 3.6.1 but the subsequent BO2 sploit is still zero day to 
> my
> knowledge)  The point is DON'T put interfaces you care about in
> promiscuous mode unless they are transparent.
>
>
> The matter of what will be seen on the wire (what a provider filters,
> what gets matched, what you care to see) is a separate concern
> altogether, but just as important.  This idea got some earlier 
> responses
> so I'll leave it alone.
>
> Ryan
>
> On Tue, 2003-07-01 at 10:56, lfwelty wrote:
>> Hi all,
>>
>> I'm setting up ntop and snort to watch what's coming at (and
>> through) my firewall. Their are options to run without enabling
>> promiscuous mode on the monitored NIC, but it would be interesting
>> to see what's floating by.
>>
>> Has anyone done this on their isp's net?
>> Or nc.rr.com in particular?
>>
>> Did you have any problems?
>> Has anyone's isp scanned for nic's in promiscuous mode?
>>
>> Thanks,
>>
>> F.
> -- 
> Ryan Leathers <ryan.leathers at globalknowledge.com>
> Global Knowledge
> <signature.asc>




More information about the TriLUG mailing list