SlideShare une entreprise Scribd logo
1  sur  35
Télécharger pour lire hors ligne
Diego Protta Casati
Leandro Spínola Rodrigues
Quem somos nós?
Como surgiu?



● Criar um Hackathon em Santa Rita do Sapucaí/MG
● 1° Hackathon: 07/03/2004

● Análise de pacotes TCP, utilizando OpenBSD, FreeBSD e

Windows XP, na tentativa de encerrar uma conexão de
Telnet
Uma breve explicação da falha


O que descobrimos?
● Condição anormal na pilha do TCP/IP
● Estado não previsto na implementação da pilha



Qual o problema disso?
● Aumento do consumo de CPU
● Queda de performance da rede



Quem esta vulnerável???
Sistemas Afetados
Microsoft Windows XP Professional SP2                         Microsoft Windows NT Enterprise Server 4.0 SP5
Microsoft Windows XP Professional SP1                         Microsoft Windows NT Enterprise Server 4.0 SP4
Microsoft Windows XP Professional                             Microsoft Windows NT Enterprise Server 4.0 SP3
Microsoft Windows XP Home SP2                                 Microsoft Windows NT Enterprise Server 4.0 SP2
Microsoft Windows XP Home SP1                                 Microsoft Windows NT Enterprise Server 4.0 SP1
Microsoft Windows XP Home                                     Microsoft Windows NT Enterprise Server 4.0
Microsoft Windows Server 2003 Web Edition SP1                 Microsoft Windows 98SE
Microsoft Windows Server 2003 Web Edition                     Microsoft Windows 2000 Server SP4
Microsoft Windows Server 2003 Standard x64 Edition            Microsoft Windows 2000 Server SP3
Microsoft Windows Server 2003 Standard Edition SP1            Microsoft Windows 2000 Server SP2
Microsoft Windows Server 2003 Standard Edition                Microsoft Windows 2000 Server SP1
Microsoft Windows Server 2003 Enterprise x64 Edition          Microsoft Windows 2000 Server
Microsoft Windows Server 2003 Enterprise Edition 64-bit SP1   + Avaya DefinityOne Media Servers
Microsoft Windows Server 2003 Enterprise Edition 64-bit       + Avaya IP600 Media Servers
Microsoft Windows Server 2003 Enterprise Edition SP1          + Avaya S3400 Message Application Server
Microsoft Windows Server 2003 Enterprise Edition              + Avaya S8100 Media Servers
Microsoft Windows Server 2003 Datacenter Edition 64-bit SP1   Microsoft Windows 2000 Professional SP4
Microsoft Windows Server 2003 Datacenter Edition 64-bit       Microsoft Windows 2000 Professional SP3
Microsoft Windows Server 2003 Datacenter Edition SP1          Microsoft Windows 2000 Professional SP2
Microsoft Windows Server 2003 Datacenter Edition              Microsoft Windows 2000 Professional SP1
Microsoft Windows NT Server 4.0 SP6a                          Microsoft Windows 2000 Professional
Microsoft Windows NT Server 4.0 SP6                           Microsoft Windows NT Workstation 4.0 SP6a
Microsoft Windows NT Server 4.0 SP5                           Microsoft Windows NT Workstation 4.0 SP6
Microsoft Windows NT Server 4.0 SP4                           Microsoft Windows NT Workstation 4.0 SP5
Microsoft Windows NT Server 4.0 SP3                           Microsoft Windows NT Workstation 4.0 SP4
Microsoft Windows NT Server 4.0 SP2                           Microsoft Windows NT Workstation 4.0 SP3
Microsoft Windows NT Server 4.0 SP1                           Microsoft Windows NT Workstation 4.0 SP2
Microsoft Windows NT Server 4.0                               Microsoft Windows NT Workstation 4.0 SP1
Microsoft Windows NT Enterprise Server 4.0 SP6a               Microsoft Windows NT Workstation 4.0
Microsoft Windows NT Enterprise Server 4.0 SP6
Microsoft Windows NT Terminal Server 4.0 SP6a   Linux kernel 2.6.9               Linux kernel 2.6
Microsoft Windows NT Terminal Server 4.0 SP6    Linux kernel 2.6.8 rc3           Linux kernel 2.4.30 rc3
Microsoft Windows NT Terminal Server 4.0 SP5    Linux kernel 2.6.8 rc2           Linux kernel 2.4.30 rc2
Microsoft Windows NT Terminal Server 4.0 SP4    Linux kernel 2.6.8 rc1           Linux kernel 2.4.30
Microsoft Windows NT Terminal Server 4.0 SP3    + Ubuntu Ubuntu Linux 4.1 ia32   Linux kernel 2.4.29 -rc2
Microsoft Windows NT Terminal Server 4.0 SP2    + Ubuntu Ubuntu Linux 4.1 ia64   Linux kernel 2.4.29 -rc1
Microsoft Windows NT Terminal Server 4.0 SP1    + Ubuntu Ubuntu Linux 4.1 ppc    Linux kernel 2.4.29
Microsoft Windows NT Terminal Server 4.0        Linux kernel 2.6.8               Linux kernel 2.4.28
Microsoft Windows 2000 Datacenter Server SP4    Linux kernel 2.6.7 rc1           Linux kernel 2.4.27 -pre5
Microsoft Windows 2000 Datacenter Server SP3    Linux kernel 2.6.7               Linux kernel 2.4.27 -pre4
Microsoft Windows 2000 Datacenter Server SP2    Linux kernel 2.6.6 rc1           Linux kernel 2.4.27 -pre3
Microsoft Windows 2000 Datacenter Server SP1    Linux kernel 2.6.6               Linux kernel 2.4.27 -pre2
Microsoft Windows 2000 Datacenter Server        Linux kernel 2.6.5               Linux kernel 2.4.27 -pre1
Microsoft Windows 2000 Advanced Server SP4      Linux kernel 2.6.4               Linux kernel 2.4.27
Microsoft Windows 2000 Advanced Server SP3      Linux kernel 2.6.3               Linux kernel 2.4.26
Microsoft Windows 2000 Advanced Server SP2      Linux kernel 2.6.2               Linux kernel 2.4.25
Microsoft Windows 2000 Advanced Server SP1      Linux kernel 2.6.1 -rc2          Linux kernel 2.4.24 -ow1
Microsoft Windows 2000 Advanced Server          Linux kernel 2.6.1 -rc1          Linux kernel 2.4.24
Linux kernel 2.6.11 .6                          Linux kernel 2.6.1               Linux kernel 2.4.23 -pre9
Linux kernel 2.6.11 .5                          Linux kernel 2.6 .10             Linux kernel 2.4.23 -ow2
Linux kernel 2.6.11 -rc4                        Linux kernel 2.6 -test9-CVS      Linux kernel 2.4.23
Linux kernel 2.6.11 -rc3                        Linux kernel 2.6 -test9          Linux kernel 2.4.22
Linux kernel 2.6.11 -rc2                        Linux kernel 2.6 -test8          + Devil-Linux Devil-Linux 1.0.4
Linux kernel 2.6.11                             Linux kernel 2.6 -test7          + Devil-Linux Devil-Linux 1.0.5
Linux kernel 2.6.10 rc2                         Linux kernel 2.6 -test6          + MandrakeSoft Linux Mandrake
Linux kernel 2.6.10                             Linux kernel 2.6 -test5          9.2
+ RedHat Fedora Core2                           Linux kernel 2.6 -test4          + MandrakeSoft Linux Mandrake
+ RedHat Fedora Core3                           Linux kernel 2.6 -test3          9.2 amd64
+ Ubuntu Ubuntu Linux 5.0 4 amd64               Linux kernel 2.6 -test2          + RedHat Fedora Core1
+ Ubuntu Ubuntu Linux 5.0 4 i386                Linux kernel 2.6 -test11         + Slackware Linux 9.1
+ Ubuntu Ubuntu Linux 5.0 4 powerpc             Linux kernel 2.6 -test10
                                                Linux kernel 2.6 -test1
Linux kernel 2.4.21 pre7                Linux kernel 2.4.19                     Linux kernel 2.4.6
Linux kernel 2.4.21 pre4                Linux kernel 2.4.18 pre-8               Linux kernel 2.4.5
+ MandrakeSoft Linux Mandrake 9.1       Linux kernel 2.4.18 pre-7               + Slackware Linux 8.0
+ MandrakeSoft Linux Mandrake 9.1 ppc   Linux kernel 2.4.18 pre-6               Linux kernel 2.4.4
Linux kernel 2.4.21 pre1                Linux kernel 2.4.18 pre-5               Linux kernel 2.4.3
Linux kernel 2.4.21                     Linux kernel 2.4.18 pre-4               Linux kernel 2.4.2
+ Conectiva Linux 9.0                   Linux kernel 2.4.18 pre-3               Linux kernel 2.4.1
+ MandrakeSoft Linux Mandrake 9.1       Linux kernel 2.4.18 pre-2               Linux kernel 2.4 .0-test9
+ MandrakeSoft Linux Mandrake 9.1 ppc   Linux kernel 2.4.18 pre-1               Linux kernel 2.4 .0-test8
+ RedHat Desktop 3.0                    Linux kernel 2.4.18 x86                 Linux kernel 2.4 .0-test7
+ RedHat Enterprise Linux AS 3          Linux kernel 2.4.18                     Linux kernel 2.4 .0-test6
+ RedHat Enterprise Linux ES 3          Linux kernel 2.4.17                     Linux kernel 2.4 .0-test5
+ RedHat Enterprise Linux WS 3          Linux kernel 2.4.16                     Linux kernel 2.4 .0-test4
+ S.u.S.E. Linux Enterprise Server 8    Linux kernel 2.4.15                     Linux kernel 2.4 .0-test3
+ S.u.S.E. Linux Personal 9.0           Linux kernel 2.4.14                     Linux kernel 2.4 .0-test2
+ S.u.S.E. Linux Personal 9.0 x86_64    Linux kernel 2.4.13                     Linux kernel 2.4 .0-test12
Linux kernel 2.4.20                     + Caldera OpenLinux Server 3.1.1        Linux kernel 2.4 .0-test11
+ CRUX CRUX Linux 1.0                   + Caldera OpenLinux Workstation 3.1.1   Linux kernel 2.4 .0-test10
+ Gentoo Linux 1.2                      Linux kernel 2.4.12                     Linux kernel 2.4 .0-test1
+ Gentoo Linux 1.4                      + Conectiva Linux 7.0                   Linux kernel 2.4
+ RedHat Linux 9.0 i386                 Linux kernel 2.4.11
+ Slackware Linux 9.0                   Linux kernel 2.4.10
+ WOLK WOLK 4.4 s                       Linux kernel 2.4.9
Linux kernel 2.4.19 -pre6               Linux kernel 2.4.8
Linux kernel 2.4.19 -pre5               Linux kernel 2.4.7
Linux kernel 2.4.19 -pre4               + RedHat Linux 7.2
Linux kernel 2.4.19 -pre3               + S.u.S.E. Linux 7.1
Linux kernel 2.4.19 -pre2               + S.u.S.E. Linux 7.2
Linux kernel 2.4.19 -pre1

                     Referência: www.securityfocus.com/bid/13215
Sistemas Não Afetados ....




                          OpenBSD

Único sistema operacional testado que não é afetado até o momento
Últimas Descobertas




● Mac OS X Tiger
● NetBSD 2.0

● FreeBSD 6.0 Beta

● Linux 2.6.13RC3




             Descobertos durante o What the Hack!
Advisories
http://nvd.nist.gov/nvd.cfm?cvename=CAN-2005-1184
www.securityfocus.com/bid/13215
Princípios básicos
Pacote Ethernet




* Tamanho [Bytes]
Pacote IP




* Tamanho [ bits]
Pacote TCP




* Tamanho [bits]
Three Way Handshake
A                                      B




                Conexão estabelecida
Encerramento de conexão
A                                      B




                   Conexão encerrada
TCP Keep Alive
A                                     B




                   Cenário anterior




           TCP Keep Alive concluído
O Ataque
O Ataque
A                                  B


     Detecta-se uma conexão TCP




                 Z


    Enxurrada de pacotes TCP ACK
Undead Attack
A                                          B




                        Cenário anterior
    Z




          Enxurrada de pacotes TCP ACK
Cenários de Ataque
Cenário I
    Denial of Service (DDoS)



Zumbi                     Alvo
Cenário II
        Distributed Denial of Service (DDoS)

                     Alvo



Zumbi                                     Zumbi




  Zumbi                               Zumbi

                    Zumbi
Como defender?




Pacote forjado é perfeitamente aceito pelo receptor!
Screenshots
Windows 98 – Second Edition
Windows 2000 Server
Windows XP – Service Pack 2
Windows 2003 Server
Microsoft




“... At this point, we have completed our initial investigation
of this issue and have determined that the most apropriate ship
vehicle to fix this issue is a Service Pack for the affected suported
plataforms. This decision was arrived at after weighing the
seriousness of the vulnerability as well as the likelihood of
exploitability. ...”
Referências




TCP/IP Illustrated – W. Richard Stevens

[Advisory] http://www.securityfocus.com/bid/13215
[Exploit] http://www.securityfocus.com/data/vulnerabilities/exploits/storm.c
[What the Hack] http://wiki.whatthehack.org/index.php?title=Undead_Attack
Segurança é um processo e não
         um produto
                 Bruce Schneier
                 Criador do Blowfish
E-mails



          Diego Protta Casati
                       diego-casati@inatel.br




                      Leandro Spínola Rodrigues


leandro-rodrigues@inatel.br

Contenu connexe

En vedette (6)

Segurança de Redes
Segurança de RedesSegurança de Redes
Segurança de Redes
 
Valdir Adorni - Business Continuity Services Storage On Demand Storage Infrae...
Valdir Adorni - Business Continuity Services Storage On Demand Storage Infrae...Valdir Adorni - Business Continuity Services Storage On Demand Storage Infrae...
Valdir Adorni - Business Continuity Services Storage On Demand Storage Infrae...
 
Tempest
TempestTempest
Tempest
 
Atm networks and intelligent packet filtering(synopsis)
Atm networks and intelligent packet filtering(synopsis)Atm networks and intelligent packet filtering(synopsis)
Atm networks and intelligent packet filtering(synopsis)
 
OpenBSD Packet Filtering Internals
OpenBSD Packet Filtering InternalsOpenBSD Packet Filtering Internals
OpenBSD Packet Filtering Internals
 
Network Security through IP Packet Filtering
Network Security through IP Packet FilteringNetwork Security through IP Packet Filtering
Network Security through IP Packet Filtering
 

Similaire à Undead Attack

Red hat enterprise_linux-5-installation_guide-en-us
Red hat enterprise_linux-5-installation_guide-en-usRed hat enterprise_linux-5-installation_guide-en-us
Red hat enterprise_linux-5-installation_guide-en-us
Hari Krishna
 
Bloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility Matrix
Bloombase
 
Essay About ISS 418 Lab 7 And 8
Essay About ISS 418 Lab 7 And 8Essay About ISS 418 Lab 7 And 8
Essay About ISS 418 Lab 7 And 8
Paula Smith
 
Chapter 1 part 2
Chapter 1 part 2Chapter 1 part 2
Chapter 1 part 2
rohassanie
 
Isp Setup Red Hat Howto
Isp Setup Red Hat HowtoIsp Setup Red Hat Howto
Isp Setup Red Hat Howto
guest60864fc
 
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆวิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
lifestyle41
 

Similaire à Undead Attack (20)

Volatility를 이용한 memory forensics
Volatility를 이용한 memory forensicsVolatility를 이용한 memory forensics
Volatility를 이용한 memory forensics
 
Tested configuration for different Primavera versions
Tested configuration for different Primavera versionsTested configuration for different Primavera versions
Tested configuration for different Primavera versions
 
Linux Kernel Development
Linux Kernel DevelopmentLinux Kernel Development
Linux Kernel Development
 
Linux and SUSE
Linux and SUSELinux and SUSE
Linux and SUSE
 
Red hat enterprise_linux-5-installation_guide-en-us
Red hat enterprise_linux-5-installation_guide-en-usRed hat enterprise_linux-5-installation_guide-en-us
Red hat enterprise_linux-5-installation_guide-en-us
 
Rhce ppt
Rhce pptRhce ppt
Rhce ppt
 
Canonical ubuntu introduction_20170330
Canonical ubuntu introduction_20170330Canonical ubuntu introduction_20170330
Canonical ubuntu introduction_20170330
 
Deployment of WebObjects applications on FreeBSD
Deployment of WebObjects applications on FreeBSDDeployment of WebObjects applications on FreeBSD
Deployment of WebObjects applications on FreeBSD
 
Fusioninventory rmll-2011
Fusioninventory rmll-2011Fusioninventory rmll-2011
Fusioninventory rmll-2011
 
Bloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility Matrix
 
Kwort Linux 4.3 the new stable version is released
Kwort Linux 4.3 the new stable version is releasedKwort Linux 4.3 the new stable version is released
Kwort Linux 4.3 the new stable version is released
 
Rac on NFS
Rac on NFSRac on NFS
Rac on NFS
 
Install .Net Core, SQL Server V-Next on Linux and deploy .Net core applicatio...
Install .Net Core, SQL Server V-Next on Linux and deploy .Net core applicatio...Install .Net Core, SQL Server V-Next on Linux and deploy .Net core applicatio...
Install .Net Core, SQL Server V-Next on Linux and deploy .Net core applicatio...
 
Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)
 
Essay About ISS 418 Lab 7 And 8
Essay About ISS 418 Lab 7 And 8Essay About ISS 418 Lab 7 And 8
Essay About ISS 418 Lab 7 And 8
 
Enterprise manager cloud control 12c(12.1) &agent安装图文指南
Enterprise manager cloud control 12c(12.1) &agent安装图文指南Enterprise manager cloud control 12c(12.1) &agent安装图文指南
Enterprise manager cloud control 12c(12.1) &agent安装图文指南
 
SynapseIndia dotnet development
SynapseIndia dotnet developmentSynapseIndia dotnet development
SynapseIndia dotnet development
 
Chapter 1 part 2
Chapter 1 part 2Chapter 1 part 2
Chapter 1 part 2
 
Isp Setup Red Hat Howto
Isp Setup Red Hat HowtoIsp Setup Red Hat Howto
Isp Setup Red Hat Howto
 
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆวิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Undead Attack

  • 1. Diego Protta Casati Leandro Spínola Rodrigues
  • 3. Como surgiu? ● Criar um Hackathon em Santa Rita do Sapucaí/MG ● 1° Hackathon: 07/03/2004 ● Análise de pacotes TCP, utilizando OpenBSD, FreeBSD e Windows XP, na tentativa de encerrar uma conexão de Telnet
  • 4. Uma breve explicação da falha O que descobrimos? ● Condição anormal na pilha do TCP/IP ● Estado não previsto na implementação da pilha Qual o problema disso? ● Aumento do consumo de CPU ● Queda de performance da rede Quem esta vulnerável???
  • 5. Sistemas Afetados Microsoft Windows XP Professional SP2 Microsoft Windows NT Enterprise Server 4.0 SP5 Microsoft Windows XP Professional SP1 Microsoft Windows NT Enterprise Server 4.0 SP4 Microsoft Windows XP Professional Microsoft Windows NT Enterprise Server 4.0 SP3 Microsoft Windows XP Home SP2 Microsoft Windows NT Enterprise Server 4.0 SP2 Microsoft Windows XP Home SP1 Microsoft Windows NT Enterprise Server 4.0 SP1 Microsoft Windows XP Home Microsoft Windows NT Enterprise Server 4.0 Microsoft Windows Server 2003 Web Edition SP1 Microsoft Windows 98SE Microsoft Windows Server 2003 Web Edition Microsoft Windows 2000 Server SP4 Microsoft Windows Server 2003 Standard x64 Edition Microsoft Windows 2000 Server SP3 Microsoft Windows Server 2003 Standard Edition SP1 Microsoft Windows 2000 Server SP2 Microsoft Windows Server 2003 Standard Edition Microsoft Windows 2000 Server SP1 Microsoft Windows Server 2003 Enterprise x64 Edition Microsoft Windows 2000 Server Microsoft Windows Server 2003 Enterprise Edition 64-bit SP1 + Avaya DefinityOne Media Servers Microsoft Windows Server 2003 Enterprise Edition 64-bit + Avaya IP600 Media Servers Microsoft Windows Server 2003 Enterprise Edition SP1 + Avaya S3400 Message Application Server Microsoft Windows Server 2003 Enterprise Edition + Avaya S8100 Media Servers Microsoft Windows Server 2003 Datacenter Edition 64-bit SP1 Microsoft Windows 2000 Professional SP4 Microsoft Windows Server 2003 Datacenter Edition 64-bit Microsoft Windows 2000 Professional SP3 Microsoft Windows Server 2003 Datacenter Edition SP1 Microsoft Windows 2000 Professional SP2 Microsoft Windows Server 2003 Datacenter Edition Microsoft Windows 2000 Professional SP1 Microsoft Windows NT Server 4.0 SP6a Microsoft Windows 2000 Professional Microsoft Windows NT Server 4.0 SP6 Microsoft Windows NT Workstation 4.0 SP6a Microsoft Windows NT Server 4.0 SP5 Microsoft Windows NT Workstation 4.0 SP6 Microsoft Windows NT Server 4.0 SP4 Microsoft Windows NT Workstation 4.0 SP5 Microsoft Windows NT Server 4.0 SP3 Microsoft Windows NT Workstation 4.0 SP4 Microsoft Windows NT Server 4.0 SP2 Microsoft Windows NT Workstation 4.0 SP3 Microsoft Windows NT Server 4.0 SP1 Microsoft Windows NT Workstation 4.0 SP2 Microsoft Windows NT Server 4.0 Microsoft Windows NT Workstation 4.0 SP1 Microsoft Windows NT Enterprise Server 4.0 SP6a Microsoft Windows NT Workstation 4.0 Microsoft Windows NT Enterprise Server 4.0 SP6
  • 6. Microsoft Windows NT Terminal Server 4.0 SP6a Linux kernel 2.6.9 Linux kernel 2.6 Microsoft Windows NT Terminal Server 4.0 SP6 Linux kernel 2.6.8 rc3 Linux kernel 2.4.30 rc3 Microsoft Windows NT Terminal Server 4.0 SP5 Linux kernel 2.6.8 rc2 Linux kernel 2.4.30 rc2 Microsoft Windows NT Terminal Server 4.0 SP4 Linux kernel 2.6.8 rc1 Linux kernel 2.4.30 Microsoft Windows NT Terminal Server 4.0 SP3 + Ubuntu Ubuntu Linux 4.1 ia32 Linux kernel 2.4.29 -rc2 Microsoft Windows NT Terminal Server 4.0 SP2 + Ubuntu Ubuntu Linux 4.1 ia64 Linux kernel 2.4.29 -rc1 Microsoft Windows NT Terminal Server 4.0 SP1 + Ubuntu Ubuntu Linux 4.1 ppc Linux kernel 2.4.29 Microsoft Windows NT Terminal Server 4.0 Linux kernel 2.6.8 Linux kernel 2.4.28 Microsoft Windows 2000 Datacenter Server SP4 Linux kernel 2.6.7 rc1 Linux kernel 2.4.27 -pre5 Microsoft Windows 2000 Datacenter Server SP3 Linux kernel 2.6.7 Linux kernel 2.4.27 -pre4 Microsoft Windows 2000 Datacenter Server SP2 Linux kernel 2.6.6 rc1 Linux kernel 2.4.27 -pre3 Microsoft Windows 2000 Datacenter Server SP1 Linux kernel 2.6.6 Linux kernel 2.4.27 -pre2 Microsoft Windows 2000 Datacenter Server Linux kernel 2.6.5 Linux kernel 2.4.27 -pre1 Microsoft Windows 2000 Advanced Server SP4 Linux kernel 2.6.4 Linux kernel 2.4.27 Microsoft Windows 2000 Advanced Server SP3 Linux kernel 2.6.3 Linux kernel 2.4.26 Microsoft Windows 2000 Advanced Server SP2 Linux kernel 2.6.2 Linux kernel 2.4.25 Microsoft Windows 2000 Advanced Server SP1 Linux kernel 2.6.1 -rc2 Linux kernel 2.4.24 -ow1 Microsoft Windows 2000 Advanced Server Linux kernel 2.6.1 -rc1 Linux kernel 2.4.24 Linux kernel 2.6.11 .6 Linux kernel 2.6.1 Linux kernel 2.4.23 -pre9 Linux kernel 2.6.11 .5 Linux kernel 2.6 .10 Linux kernel 2.4.23 -ow2 Linux kernel 2.6.11 -rc4 Linux kernel 2.6 -test9-CVS Linux kernel 2.4.23 Linux kernel 2.6.11 -rc3 Linux kernel 2.6 -test9 Linux kernel 2.4.22 Linux kernel 2.6.11 -rc2 Linux kernel 2.6 -test8 + Devil-Linux Devil-Linux 1.0.4 Linux kernel 2.6.11 Linux kernel 2.6 -test7 + Devil-Linux Devil-Linux 1.0.5 Linux kernel 2.6.10 rc2 Linux kernel 2.6 -test6 + MandrakeSoft Linux Mandrake Linux kernel 2.6.10 Linux kernel 2.6 -test5 9.2 + RedHat Fedora Core2 Linux kernel 2.6 -test4 + MandrakeSoft Linux Mandrake + RedHat Fedora Core3 Linux kernel 2.6 -test3 9.2 amd64 + Ubuntu Ubuntu Linux 5.0 4 amd64 Linux kernel 2.6 -test2 + RedHat Fedora Core1 + Ubuntu Ubuntu Linux 5.0 4 i386 Linux kernel 2.6 -test11 + Slackware Linux 9.1 + Ubuntu Ubuntu Linux 5.0 4 powerpc Linux kernel 2.6 -test10 Linux kernel 2.6 -test1
  • 7. Linux kernel 2.4.21 pre7 Linux kernel 2.4.19 Linux kernel 2.4.6 Linux kernel 2.4.21 pre4 Linux kernel 2.4.18 pre-8 Linux kernel 2.4.5 + MandrakeSoft Linux Mandrake 9.1 Linux kernel 2.4.18 pre-7 + Slackware Linux 8.0 + MandrakeSoft Linux Mandrake 9.1 ppc Linux kernel 2.4.18 pre-6 Linux kernel 2.4.4 Linux kernel 2.4.21 pre1 Linux kernel 2.4.18 pre-5 Linux kernel 2.4.3 Linux kernel 2.4.21 Linux kernel 2.4.18 pre-4 Linux kernel 2.4.2 + Conectiva Linux 9.0 Linux kernel 2.4.18 pre-3 Linux kernel 2.4.1 + MandrakeSoft Linux Mandrake 9.1 Linux kernel 2.4.18 pre-2 Linux kernel 2.4 .0-test9 + MandrakeSoft Linux Mandrake 9.1 ppc Linux kernel 2.4.18 pre-1 Linux kernel 2.4 .0-test8 + RedHat Desktop 3.0 Linux kernel 2.4.18 x86 Linux kernel 2.4 .0-test7 + RedHat Enterprise Linux AS 3 Linux kernel 2.4.18 Linux kernel 2.4 .0-test6 + RedHat Enterprise Linux ES 3 Linux kernel 2.4.17 Linux kernel 2.4 .0-test5 + RedHat Enterprise Linux WS 3 Linux kernel 2.4.16 Linux kernel 2.4 .0-test4 + S.u.S.E. Linux Enterprise Server 8 Linux kernel 2.4.15 Linux kernel 2.4 .0-test3 + S.u.S.E. Linux Personal 9.0 Linux kernel 2.4.14 Linux kernel 2.4 .0-test2 + S.u.S.E. Linux Personal 9.0 x86_64 Linux kernel 2.4.13 Linux kernel 2.4 .0-test12 Linux kernel 2.4.20 + Caldera OpenLinux Server 3.1.1 Linux kernel 2.4 .0-test11 + CRUX CRUX Linux 1.0 + Caldera OpenLinux Workstation 3.1.1 Linux kernel 2.4 .0-test10 + Gentoo Linux 1.2 Linux kernel 2.4.12 Linux kernel 2.4 .0-test1 + Gentoo Linux 1.4 + Conectiva Linux 7.0 Linux kernel 2.4 + RedHat Linux 9.0 i386 Linux kernel 2.4.11 + Slackware Linux 9.0 Linux kernel 2.4.10 + WOLK WOLK 4.4 s Linux kernel 2.4.9 Linux kernel 2.4.19 -pre6 Linux kernel 2.4.8 Linux kernel 2.4.19 -pre5 Linux kernel 2.4.7 Linux kernel 2.4.19 -pre4 + RedHat Linux 7.2 Linux kernel 2.4.19 -pre3 + S.u.S.E. Linux 7.1 Linux kernel 2.4.19 -pre2 + S.u.S.E. Linux 7.2 Linux kernel 2.4.19 -pre1 Referência: www.securityfocus.com/bid/13215
  • 8. Sistemas Não Afetados .... OpenBSD Único sistema operacional testado que não é afetado até o momento
  • 9. Últimas Descobertas ● Mac OS X Tiger ● NetBSD 2.0 ● FreeBSD 6.0 Beta ● Linux 2.6.13RC3 Descobertos durante o What the Hack!
  • 17. Three Way Handshake A B Conexão estabelecida
  • 18. Encerramento de conexão A B Conexão encerrada
  • 19. TCP Keep Alive A B Cenário anterior TCP Keep Alive concluído
  • 21. O Ataque A B Detecta-se uma conexão TCP Z Enxurrada de pacotes TCP ACK
  • 22. Undead Attack A B Cenário anterior Z Enxurrada de pacotes TCP ACK
  • 24. Cenário I Denial of Service (DDoS) Zumbi Alvo
  • 25. Cenário II Distributed Denial of Service (DDoS) Alvo Zumbi Zumbi Zumbi Zumbi Zumbi
  • 26. Como defender? Pacote forjado é perfeitamente aceito pelo receptor!
  • 28. Windows 98 – Second Edition
  • 30. Windows XP – Service Pack 2
  • 32. Microsoft “... At this point, we have completed our initial investigation of this issue and have determined that the most apropriate ship vehicle to fix this issue is a Service Pack for the affected suported plataforms. This decision was arrived at after weighing the seriousness of the vulnerability as well as the likelihood of exploitability. ...”
  • 33. Referências TCP/IP Illustrated – W. Richard Stevens [Advisory] http://www.securityfocus.com/bid/13215 [Exploit] http://www.securityfocus.com/data/vulnerabilities/exploits/storm.c [What the Hack] http://wiki.whatthehack.org/index.php?title=Undead_Attack
  • 34. Segurança é um processo e não um produto Bruce Schneier Criador do Blowfish
  • 35. E-mails Diego Protta Casati diego-casati@inatel.br Leandro Spínola Rodrigues leandro-rodrigues@inatel.br