SlideShare une entreprise Scribd logo
1  sur  35
Télécharger pour lire hors ligne
Diego Protta Casati
Leandro Spínola Rodrigues
Quem somos nós?
Como surgiu?



● Criar um Hackathon em Santa Rita do Sapucaí/MG
● 1° Hackathon: 07/03/2004

● Análise de pacotes TCP, utilizando OpenBSD, FreeBSD e

Windows XP, na tentativa de encerrar uma conexão de
Telnet
Uma breve explicação da falha


O que descobrimos?
● Condição anormal na pilha do TCP/IP
● Estado não previsto na implementação da pilha



Qual o problema disso?
● Aumento do consumo de CPU
● Queda de performance da rede



Quem esta vulnerável???
Sistemas Afetados
Microsoft Windows XP Professional SP2                         Microsoft Windows NT Enterprise Server 4.0 SP5
Microsoft Windows XP Professional SP1                         Microsoft Windows NT Enterprise Server 4.0 SP4
Microsoft Windows XP Professional                             Microsoft Windows NT Enterprise Server 4.0 SP3
Microsoft Windows XP Home SP2                                 Microsoft Windows NT Enterprise Server 4.0 SP2
Microsoft Windows XP Home SP1                                 Microsoft Windows NT Enterprise Server 4.0 SP1
Microsoft Windows XP Home                                     Microsoft Windows NT Enterprise Server 4.0
Microsoft Windows Server 2003 Web Edition SP1                 Microsoft Windows 98SE
Microsoft Windows Server 2003 Web Edition                     Microsoft Windows 2000 Server SP4
Microsoft Windows Server 2003 Standard x64 Edition            Microsoft Windows 2000 Server SP3
Microsoft Windows Server 2003 Standard Edition SP1            Microsoft Windows 2000 Server SP2
Microsoft Windows Server 2003 Standard Edition                Microsoft Windows 2000 Server SP1
Microsoft Windows Server 2003 Enterprise x64 Edition          Microsoft Windows 2000 Server
Microsoft Windows Server 2003 Enterprise Edition 64-bit SP1   + Avaya DefinityOne Media Servers
Microsoft Windows Server 2003 Enterprise Edition 64-bit       + Avaya IP600 Media Servers
Microsoft Windows Server 2003 Enterprise Edition SP1          + Avaya S3400 Message Application Server
Microsoft Windows Server 2003 Enterprise Edition              + Avaya S8100 Media Servers
Microsoft Windows Server 2003 Datacenter Edition 64-bit SP1   Microsoft Windows 2000 Professional SP4
Microsoft Windows Server 2003 Datacenter Edition 64-bit       Microsoft Windows 2000 Professional SP3
Microsoft Windows Server 2003 Datacenter Edition SP1          Microsoft Windows 2000 Professional SP2
Microsoft Windows Server 2003 Datacenter Edition              Microsoft Windows 2000 Professional SP1
Microsoft Windows NT Server 4.0 SP6a                          Microsoft Windows 2000 Professional
Microsoft Windows NT Server 4.0 SP6                           Microsoft Windows NT Workstation 4.0 SP6a
Microsoft Windows NT Server 4.0 SP5                           Microsoft Windows NT Workstation 4.0 SP6
Microsoft Windows NT Server 4.0 SP4                           Microsoft Windows NT Workstation 4.0 SP5
Microsoft Windows NT Server 4.0 SP3                           Microsoft Windows NT Workstation 4.0 SP4
Microsoft Windows NT Server 4.0 SP2                           Microsoft Windows NT Workstation 4.0 SP3
Microsoft Windows NT Server 4.0 SP1                           Microsoft Windows NT Workstation 4.0 SP2
Microsoft Windows NT Server 4.0                               Microsoft Windows NT Workstation 4.0 SP1
Microsoft Windows NT Enterprise Server 4.0 SP6a               Microsoft Windows NT Workstation 4.0
Microsoft Windows NT Enterprise Server 4.0 SP6
Microsoft Windows NT Terminal Server 4.0 SP6a   Linux kernel 2.6.9               Linux kernel 2.6
Microsoft Windows NT Terminal Server 4.0 SP6    Linux kernel 2.6.8 rc3           Linux kernel 2.4.30 rc3
Microsoft Windows NT Terminal Server 4.0 SP5    Linux kernel 2.6.8 rc2           Linux kernel 2.4.30 rc2
Microsoft Windows NT Terminal Server 4.0 SP4    Linux kernel 2.6.8 rc1           Linux kernel 2.4.30
Microsoft Windows NT Terminal Server 4.0 SP3    + Ubuntu Ubuntu Linux 4.1 ia32   Linux kernel 2.4.29 -rc2
Microsoft Windows NT Terminal Server 4.0 SP2    + Ubuntu Ubuntu Linux 4.1 ia64   Linux kernel 2.4.29 -rc1
Microsoft Windows NT Terminal Server 4.0 SP1    + Ubuntu Ubuntu Linux 4.1 ppc    Linux kernel 2.4.29
Microsoft Windows NT Terminal Server 4.0        Linux kernel 2.6.8               Linux kernel 2.4.28
Microsoft Windows 2000 Datacenter Server SP4    Linux kernel 2.6.7 rc1           Linux kernel 2.4.27 -pre5
Microsoft Windows 2000 Datacenter Server SP3    Linux kernel 2.6.7               Linux kernel 2.4.27 -pre4
Microsoft Windows 2000 Datacenter Server SP2    Linux kernel 2.6.6 rc1           Linux kernel 2.4.27 -pre3
Microsoft Windows 2000 Datacenter Server SP1    Linux kernel 2.6.6               Linux kernel 2.4.27 -pre2
Microsoft Windows 2000 Datacenter Server        Linux kernel 2.6.5               Linux kernel 2.4.27 -pre1
Microsoft Windows 2000 Advanced Server SP4      Linux kernel 2.6.4               Linux kernel 2.4.27
Microsoft Windows 2000 Advanced Server SP3      Linux kernel 2.6.3               Linux kernel 2.4.26
Microsoft Windows 2000 Advanced Server SP2      Linux kernel 2.6.2               Linux kernel 2.4.25
Microsoft Windows 2000 Advanced Server SP1      Linux kernel 2.6.1 -rc2          Linux kernel 2.4.24 -ow1
Microsoft Windows 2000 Advanced Server          Linux kernel 2.6.1 -rc1          Linux kernel 2.4.24
Linux kernel 2.6.11 .6                          Linux kernel 2.6.1               Linux kernel 2.4.23 -pre9
Linux kernel 2.6.11 .5                          Linux kernel 2.6 .10             Linux kernel 2.4.23 -ow2
Linux kernel 2.6.11 -rc4                        Linux kernel 2.6 -test9-CVS      Linux kernel 2.4.23
Linux kernel 2.6.11 -rc3                        Linux kernel 2.6 -test9          Linux kernel 2.4.22
Linux kernel 2.6.11 -rc2                        Linux kernel 2.6 -test8          + Devil-Linux Devil-Linux 1.0.4
Linux kernel 2.6.11                             Linux kernel 2.6 -test7          + Devil-Linux Devil-Linux 1.0.5
Linux kernel 2.6.10 rc2                         Linux kernel 2.6 -test6          + MandrakeSoft Linux Mandrake
Linux kernel 2.6.10                             Linux kernel 2.6 -test5          9.2
+ RedHat Fedora Core2                           Linux kernel 2.6 -test4          + MandrakeSoft Linux Mandrake
+ RedHat Fedora Core3                           Linux kernel 2.6 -test3          9.2 amd64
+ Ubuntu Ubuntu Linux 5.0 4 amd64               Linux kernel 2.6 -test2          + RedHat Fedora Core1
+ Ubuntu Ubuntu Linux 5.0 4 i386                Linux kernel 2.6 -test11         + Slackware Linux 9.1
+ Ubuntu Ubuntu Linux 5.0 4 powerpc             Linux kernel 2.6 -test10
                                                Linux kernel 2.6 -test1
Linux kernel 2.4.21 pre7                Linux kernel 2.4.19                     Linux kernel 2.4.6
Linux kernel 2.4.21 pre4                Linux kernel 2.4.18 pre-8               Linux kernel 2.4.5
+ MandrakeSoft Linux Mandrake 9.1       Linux kernel 2.4.18 pre-7               + Slackware Linux 8.0
+ MandrakeSoft Linux Mandrake 9.1 ppc   Linux kernel 2.4.18 pre-6               Linux kernel 2.4.4
Linux kernel 2.4.21 pre1                Linux kernel 2.4.18 pre-5               Linux kernel 2.4.3
Linux kernel 2.4.21                     Linux kernel 2.4.18 pre-4               Linux kernel 2.4.2
+ Conectiva Linux 9.0                   Linux kernel 2.4.18 pre-3               Linux kernel 2.4.1
+ MandrakeSoft Linux Mandrake 9.1       Linux kernel 2.4.18 pre-2               Linux kernel 2.4 .0-test9
+ MandrakeSoft Linux Mandrake 9.1 ppc   Linux kernel 2.4.18 pre-1               Linux kernel 2.4 .0-test8
+ RedHat Desktop 3.0                    Linux kernel 2.4.18 x86                 Linux kernel 2.4 .0-test7
+ RedHat Enterprise Linux AS 3          Linux kernel 2.4.18                     Linux kernel 2.4 .0-test6
+ RedHat Enterprise Linux ES 3          Linux kernel 2.4.17                     Linux kernel 2.4 .0-test5
+ RedHat Enterprise Linux WS 3          Linux kernel 2.4.16                     Linux kernel 2.4 .0-test4
+ S.u.S.E. Linux Enterprise Server 8    Linux kernel 2.4.15                     Linux kernel 2.4 .0-test3
+ S.u.S.E. Linux Personal 9.0           Linux kernel 2.4.14                     Linux kernel 2.4 .0-test2
+ S.u.S.E. Linux Personal 9.0 x86_64    Linux kernel 2.4.13                     Linux kernel 2.4 .0-test12
Linux kernel 2.4.20                     + Caldera OpenLinux Server 3.1.1        Linux kernel 2.4 .0-test11
+ CRUX CRUX Linux 1.0                   + Caldera OpenLinux Workstation 3.1.1   Linux kernel 2.4 .0-test10
+ Gentoo Linux 1.2                      Linux kernel 2.4.12                     Linux kernel 2.4 .0-test1
+ Gentoo Linux 1.4                      + Conectiva Linux 7.0                   Linux kernel 2.4
+ RedHat Linux 9.0 i386                 Linux kernel 2.4.11
+ Slackware Linux 9.0                   Linux kernel 2.4.10
+ WOLK WOLK 4.4 s                       Linux kernel 2.4.9
Linux kernel 2.4.19 -pre6               Linux kernel 2.4.8
Linux kernel 2.4.19 -pre5               Linux kernel 2.4.7
Linux kernel 2.4.19 -pre4               + RedHat Linux 7.2
Linux kernel 2.4.19 -pre3               + S.u.S.E. Linux 7.1
Linux kernel 2.4.19 -pre2               + S.u.S.E. Linux 7.2
Linux kernel 2.4.19 -pre1

                     Referência: www.securityfocus.com/bid/13215
Sistemas Não Afetados ....




                          OpenBSD

Único sistema operacional testado que não é afetado até o momento
Últimas Descobertas




● Mac OS X Tiger
● NetBSD 2.0

● FreeBSD 6.0 Beta

● Linux 2.6.13RC3




             Descobertos durante o What the Hack!
Advisories
http://nvd.nist.gov/nvd.cfm?cvename=CAN-2005-1184
www.securityfocus.com/bid/13215
Princípios básicos
Pacote Ethernet




* Tamanho [Bytes]
Pacote IP




* Tamanho [ bits]
Pacote TCP




* Tamanho [bits]
Three Way Handshake
A                                      B




                Conexão estabelecida
Encerramento de conexão
A                                      B




                   Conexão encerrada
TCP Keep Alive
A                                     B




                   Cenário anterior




           TCP Keep Alive concluído
O Ataque
O Ataque
A                                  B


     Detecta-se uma conexão TCP




                 Z


    Enxurrada de pacotes TCP ACK
Undead Attack
A                                          B




                        Cenário anterior
    Z




          Enxurrada de pacotes TCP ACK
Cenários de Ataque
Cenário I
    Denial of Service (DDoS)



Zumbi                     Alvo
Cenário II
        Distributed Denial of Service (DDoS)

                     Alvo



Zumbi                                     Zumbi




  Zumbi                               Zumbi

                    Zumbi
Como defender?




Pacote forjado é perfeitamente aceito pelo receptor!
Screenshots
Windows 98 – Second Edition
Windows 2000 Server
Windows XP – Service Pack 2
Windows 2003 Server
Microsoft




“... At this point, we have completed our initial investigation
of this issue and have determined that the most apropriate ship
vehicle to fix this issue is a Service Pack for the affected suported
plataforms. This decision was arrived at after weighing the
seriousness of the vulnerability as well as the likelihood of
exploitability. ...”
Referências




TCP/IP Illustrated – W. Richard Stevens

[Advisory] http://www.securityfocus.com/bid/13215
[Exploit] http://www.securityfocus.com/data/vulnerabilities/exploits/storm.c
[What the Hack] http://wiki.whatthehack.org/index.php?title=Undead_Attack
Segurança é um processo e não
         um produto
                 Bruce Schneier
                 Criador do Blowfish
E-mails



          Diego Protta Casati
                       diego-casati@inatel.br




                      Leandro Spínola Rodrigues


leandro-rodrigues@inatel.br

Contenu connexe

En vedette

Segurança de Redes
Segurança de RedesSegurança de Redes
Segurança de RedesDiego Casati
 
Valdir Adorni - Business Continuity Services Storage On Demand Storage Infrae...
Valdir Adorni - Business Continuity Services Storage On Demand Storage Infrae...Valdir Adorni - Business Continuity Services Storage On Demand Storage Infrae...
Valdir Adorni - Business Continuity Services Storage On Demand Storage Infrae...Valdir Adorni
 
Atm networks and intelligent packet filtering(synopsis)
Atm networks and intelligent packet filtering(synopsis)Atm networks and intelligent packet filtering(synopsis)
Atm networks and intelligent packet filtering(synopsis)Mumbai Academisc
 
OpenBSD Packet Filtering Internals
OpenBSD Packet Filtering InternalsOpenBSD Packet Filtering Internals
OpenBSD Packet Filtering InternalsDiego Casati
 
Network Security through IP Packet Filtering
Network Security through IP Packet FilteringNetwork Security through IP Packet Filtering
Network Security through IP Packet Filteringkarim baidar
 

En vedette (6)

Segurança de Redes
Segurança de RedesSegurança de Redes
Segurança de Redes
 
Valdir Adorni - Business Continuity Services Storage On Demand Storage Infrae...
Valdir Adorni - Business Continuity Services Storage On Demand Storage Infrae...Valdir Adorni - Business Continuity Services Storage On Demand Storage Infrae...
Valdir Adorni - Business Continuity Services Storage On Demand Storage Infrae...
 
Tempest
TempestTempest
Tempest
 
Atm networks and intelligent packet filtering(synopsis)
Atm networks and intelligent packet filtering(synopsis)Atm networks and intelligent packet filtering(synopsis)
Atm networks and intelligent packet filtering(synopsis)
 
OpenBSD Packet Filtering Internals
OpenBSD Packet Filtering InternalsOpenBSD Packet Filtering Internals
OpenBSD Packet Filtering Internals
 
Network Security through IP Packet Filtering
Network Security through IP Packet FilteringNetwork Security through IP Packet Filtering
Network Security through IP Packet Filtering
 

Similaire à Undead Attack

Volatility를 이용한 memory forensics
Volatility를 이용한 memory forensicsVolatility를 이용한 memory forensics
Volatility를 이용한 memory forensicsYoungjun Chang
 
Linux and SUSE
Linux and SUSELinux and SUSE
Linux and SUSELiang Yan
 
Red hat enterprise_linux-5-installation_guide-en-us
Red hat enterprise_linux-5-installation_guide-en-usRed hat enterprise_linux-5-installation_guide-en-us
Red hat enterprise_linux-5-installation_guide-en-usHari Krishna
 
Canonical ubuntu introduction_20170330
Canonical ubuntu introduction_20170330Canonical ubuntu introduction_20170330
Canonical ubuntu introduction_20170330Takaaki Suzuki
 
Deployment of WebObjects applications on FreeBSD
Deployment of WebObjects applications on FreeBSDDeployment of WebObjects applications on FreeBSD
Deployment of WebObjects applications on FreeBSDWO Community
 
Bloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase
 
Kwort Linux 4.3 the new stable version is released
Kwort Linux 4.3 the new stable version is releasedKwort Linux 4.3 the new stable version is released
Kwort Linux 4.3 the new stable version is releasedLinux Training Chennai
 
Install .Net Core, SQL Server V-Next on Linux and deploy .Net core applicatio...
Install .Net Core, SQL Server V-Next on Linux and deploy .Net core applicatio...Install .Net Core, SQL Server V-Next on Linux and deploy .Net core applicatio...
Install .Net Core, SQL Server V-Next on Linux and deploy .Net core applicatio...Ajith Ramawickrama
 
Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)Hari
 
Essay About ISS 418 Lab 7 And 8
Essay About ISS 418 Lab 7 And 8Essay About ISS 418 Lab 7 And 8
Essay About ISS 418 Lab 7 And 8Paula Smith
 
Enterprise manager cloud control 12c(12.1) &agent安装图文指南
Enterprise manager cloud control 12c(12.1) &agent安装图文指南Enterprise manager cloud control 12c(12.1) &agent安装图文指南
Enterprise manager cloud control 12c(12.1) &agent安装图文指南maclean liu
 
Chapter 1 part 2
Chapter 1 part 2Chapter 1 part 2
Chapter 1 part 2rohassanie
 
Isp Setup Red Hat Howto
Isp Setup Red Hat HowtoIsp Setup Red Hat Howto
Isp Setup Red Hat Howtoguest60864fc
 
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆวิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆlifestyle41
 

Similaire à Undead Attack (20)

Volatility를 이용한 memory forensics
Volatility를 이용한 memory forensicsVolatility를 이용한 memory forensics
Volatility를 이용한 memory forensics
 
Tested configuration for different Primavera versions
Tested configuration for different Primavera versionsTested configuration for different Primavera versions
Tested configuration for different Primavera versions
 
Linux Kernel Development
Linux Kernel DevelopmentLinux Kernel Development
Linux Kernel Development
 
Linux and SUSE
Linux and SUSELinux and SUSE
Linux and SUSE
 
Red hat enterprise_linux-5-installation_guide-en-us
Red hat enterprise_linux-5-installation_guide-en-usRed hat enterprise_linux-5-installation_guide-en-us
Red hat enterprise_linux-5-installation_guide-en-us
 
Rhce ppt
Rhce pptRhce ppt
Rhce ppt
 
Canonical ubuntu introduction_20170330
Canonical ubuntu introduction_20170330Canonical ubuntu introduction_20170330
Canonical ubuntu introduction_20170330
 
Deployment of WebObjects applications on FreeBSD
Deployment of WebObjects applications on FreeBSDDeployment of WebObjects applications on FreeBSD
Deployment of WebObjects applications on FreeBSD
 
Fusioninventory rmll-2011
Fusioninventory rmll-2011Fusioninventory rmll-2011
Fusioninventory rmll-2011
 
Bloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility Matrix
 
Kwort Linux 4.3 the new stable version is released
Kwort Linux 4.3 the new stable version is releasedKwort Linux 4.3 the new stable version is released
Kwort Linux 4.3 the new stable version is released
 
Rac on NFS
Rac on NFSRac on NFS
Rac on NFS
 
Install .Net Core, SQL Server V-Next on Linux and deploy .Net core applicatio...
Install .Net Core, SQL Server V-Next on Linux and deploy .Net core applicatio...Install .Net Core, SQL Server V-Next on Linux and deploy .Net core applicatio...
Install .Net Core, SQL Server V-Next on Linux and deploy .Net core applicatio...
 
Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)
 
Essay About ISS 418 Lab 7 And 8
Essay About ISS 418 Lab 7 And 8Essay About ISS 418 Lab 7 And 8
Essay About ISS 418 Lab 7 And 8
 
Enterprise manager cloud control 12c(12.1) &agent安装图文指南
Enterprise manager cloud control 12c(12.1) &agent安装图文指南Enterprise manager cloud control 12c(12.1) &agent安装图文指南
Enterprise manager cloud control 12c(12.1) &agent安装图文指南
 
SynapseIndia dotnet development
SynapseIndia dotnet developmentSynapseIndia dotnet development
SynapseIndia dotnet development
 
Chapter 1 part 2
Chapter 1 part 2Chapter 1 part 2
Chapter 1 part 2
 
Isp Setup Red Hat Howto
Isp Setup Red Hat HowtoIsp Setup Red Hat Howto
Isp Setup Red Hat Howto
 
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆวิวัฒนาการของ Microsoft windows รุ่นต่างๆ
วิวัฒนาการของ Microsoft windows รุ่นต่างๆ
 

Dernier

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Dernier (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Undead Attack

  • 1. Diego Protta Casati Leandro Spínola Rodrigues
  • 3. Como surgiu? ● Criar um Hackathon em Santa Rita do Sapucaí/MG ● 1° Hackathon: 07/03/2004 ● Análise de pacotes TCP, utilizando OpenBSD, FreeBSD e Windows XP, na tentativa de encerrar uma conexão de Telnet
  • 4. Uma breve explicação da falha O que descobrimos? ● Condição anormal na pilha do TCP/IP ● Estado não previsto na implementação da pilha Qual o problema disso? ● Aumento do consumo de CPU ● Queda de performance da rede Quem esta vulnerável???
  • 5. Sistemas Afetados Microsoft Windows XP Professional SP2 Microsoft Windows NT Enterprise Server 4.0 SP5 Microsoft Windows XP Professional SP1 Microsoft Windows NT Enterprise Server 4.0 SP4 Microsoft Windows XP Professional Microsoft Windows NT Enterprise Server 4.0 SP3 Microsoft Windows XP Home SP2 Microsoft Windows NT Enterprise Server 4.0 SP2 Microsoft Windows XP Home SP1 Microsoft Windows NT Enterprise Server 4.0 SP1 Microsoft Windows XP Home Microsoft Windows NT Enterprise Server 4.0 Microsoft Windows Server 2003 Web Edition SP1 Microsoft Windows 98SE Microsoft Windows Server 2003 Web Edition Microsoft Windows 2000 Server SP4 Microsoft Windows Server 2003 Standard x64 Edition Microsoft Windows 2000 Server SP3 Microsoft Windows Server 2003 Standard Edition SP1 Microsoft Windows 2000 Server SP2 Microsoft Windows Server 2003 Standard Edition Microsoft Windows 2000 Server SP1 Microsoft Windows Server 2003 Enterprise x64 Edition Microsoft Windows 2000 Server Microsoft Windows Server 2003 Enterprise Edition 64-bit SP1 + Avaya DefinityOne Media Servers Microsoft Windows Server 2003 Enterprise Edition 64-bit + Avaya IP600 Media Servers Microsoft Windows Server 2003 Enterprise Edition SP1 + Avaya S3400 Message Application Server Microsoft Windows Server 2003 Enterprise Edition + Avaya S8100 Media Servers Microsoft Windows Server 2003 Datacenter Edition 64-bit SP1 Microsoft Windows 2000 Professional SP4 Microsoft Windows Server 2003 Datacenter Edition 64-bit Microsoft Windows 2000 Professional SP3 Microsoft Windows Server 2003 Datacenter Edition SP1 Microsoft Windows 2000 Professional SP2 Microsoft Windows Server 2003 Datacenter Edition Microsoft Windows 2000 Professional SP1 Microsoft Windows NT Server 4.0 SP6a Microsoft Windows 2000 Professional Microsoft Windows NT Server 4.0 SP6 Microsoft Windows NT Workstation 4.0 SP6a Microsoft Windows NT Server 4.0 SP5 Microsoft Windows NT Workstation 4.0 SP6 Microsoft Windows NT Server 4.0 SP4 Microsoft Windows NT Workstation 4.0 SP5 Microsoft Windows NT Server 4.0 SP3 Microsoft Windows NT Workstation 4.0 SP4 Microsoft Windows NT Server 4.0 SP2 Microsoft Windows NT Workstation 4.0 SP3 Microsoft Windows NT Server 4.0 SP1 Microsoft Windows NT Workstation 4.0 SP2 Microsoft Windows NT Server 4.0 Microsoft Windows NT Workstation 4.0 SP1 Microsoft Windows NT Enterprise Server 4.0 SP6a Microsoft Windows NT Workstation 4.0 Microsoft Windows NT Enterprise Server 4.0 SP6
  • 6. Microsoft Windows NT Terminal Server 4.0 SP6a Linux kernel 2.6.9 Linux kernel 2.6 Microsoft Windows NT Terminal Server 4.0 SP6 Linux kernel 2.6.8 rc3 Linux kernel 2.4.30 rc3 Microsoft Windows NT Terminal Server 4.0 SP5 Linux kernel 2.6.8 rc2 Linux kernel 2.4.30 rc2 Microsoft Windows NT Terminal Server 4.0 SP4 Linux kernel 2.6.8 rc1 Linux kernel 2.4.30 Microsoft Windows NT Terminal Server 4.0 SP3 + Ubuntu Ubuntu Linux 4.1 ia32 Linux kernel 2.4.29 -rc2 Microsoft Windows NT Terminal Server 4.0 SP2 + Ubuntu Ubuntu Linux 4.1 ia64 Linux kernel 2.4.29 -rc1 Microsoft Windows NT Terminal Server 4.0 SP1 + Ubuntu Ubuntu Linux 4.1 ppc Linux kernel 2.4.29 Microsoft Windows NT Terminal Server 4.0 Linux kernel 2.6.8 Linux kernel 2.4.28 Microsoft Windows 2000 Datacenter Server SP4 Linux kernel 2.6.7 rc1 Linux kernel 2.4.27 -pre5 Microsoft Windows 2000 Datacenter Server SP3 Linux kernel 2.6.7 Linux kernel 2.4.27 -pre4 Microsoft Windows 2000 Datacenter Server SP2 Linux kernel 2.6.6 rc1 Linux kernel 2.4.27 -pre3 Microsoft Windows 2000 Datacenter Server SP1 Linux kernel 2.6.6 Linux kernel 2.4.27 -pre2 Microsoft Windows 2000 Datacenter Server Linux kernel 2.6.5 Linux kernel 2.4.27 -pre1 Microsoft Windows 2000 Advanced Server SP4 Linux kernel 2.6.4 Linux kernel 2.4.27 Microsoft Windows 2000 Advanced Server SP3 Linux kernel 2.6.3 Linux kernel 2.4.26 Microsoft Windows 2000 Advanced Server SP2 Linux kernel 2.6.2 Linux kernel 2.4.25 Microsoft Windows 2000 Advanced Server SP1 Linux kernel 2.6.1 -rc2 Linux kernel 2.4.24 -ow1 Microsoft Windows 2000 Advanced Server Linux kernel 2.6.1 -rc1 Linux kernel 2.4.24 Linux kernel 2.6.11 .6 Linux kernel 2.6.1 Linux kernel 2.4.23 -pre9 Linux kernel 2.6.11 .5 Linux kernel 2.6 .10 Linux kernel 2.4.23 -ow2 Linux kernel 2.6.11 -rc4 Linux kernel 2.6 -test9-CVS Linux kernel 2.4.23 Linux kernel 2.6.11 -rc3 Linux kernel 2.6 -test9 Linux kernel 2.4.22 Linux kernel 2.6.11 -rc2 Linux kernel 2.6 -test8 + Devil-Linux Devil-Linux 1.0.4 Linux kernel 2.6.11 Linux kernel 2.6 -test7 + Devil-Linux Devil-Linux 1.0.5 Linux kernel 2.6.10 rc2 Linux kernel 2.6 -test6 + MandrakeSoft Linux Mandrake Linux kernel 2.6.10 Linux kernel 2.6 -test5 9.2 + RedHat Fedora Core2 Linux kernel 2.6 -test4 + MandrakeSoft Linux Mandrake + RedHat Fedora Core3 Linux kernel 2.6 -test3 9.2 amd64 + Ubuntu Ubuntu Linux 5.0 4 amd64 Linux kernel 2.6 -test2 + RedHat Fedora Core1 + Ubuntu Ubuntu Linux 5.0 4 i386 Linux kernel 2.6 -test11 + Slackware Linux 9.1 + Ubuntu Ubuntu Linux 5.0 4 powerpc Linux kernel 2.6 -test10 Linux kernel 2.6 -test1
  • 7. Linux kernel 2.4.21 pre7 Linux kernel 2.4.19 Linux kernel 2.4.6 Linux kernel 2.4.21 pre4 Linux kernel 2.4.18 pre-8 Linux kernel 2.4.5 + MandrakeSoft Linux Mandrake 9.1 Linux kernel 2.4.18 pre-7 + Slackware Linux 8.0 + MandrakeSoft Linux Mandrake 9.1 ppc Linux kernel 2.4.18 pre-6 Linux kernel 2.4.4 Linux kernel 2.4.21 pre1 Linux kernel 2.4.18 pre-5 Linux kernel 2.4.3 Linux kernel 2.4.21 Linux kernel 2.4.18 pre-4 Linux kernel 2.4.2 + Conectiva Linux 9.0 Linux kernel 2.4.18 pre-3 Linux kernel 2.4.1 + MandrakeSoft Linux Mandrake 9.1 Linux kernel 2.4.18 pre-2 Linux kernel 2.4 .0-test9 + MandrakeSoft Linux Mandrake 9.1 ppc Linux kernel 2.4.18 pre-1 Linux kernel 2.4 .0-test8 + RedHat Desktop 3.0 Linux kernel 2.4.18 x86 Linux kernel 2.4 .0-test7 + RedHat Enterprise Linux AS 3 Linux kernel 2.4.18 Linux kernel 2.4 .0-test6 + RedHat Enterprise Linux ES 3 Linux kernel 2.4.17 Linux kernel 2.4 .0-test5 + RedHat Enterprise Linux WS 3 Linux kernel 2.4.16 Linux kernel 2.4 .0-test4 + S.u.S.E. Linux Enterprise Server 8 Linux kernel 2.4.15 Linux kernel 2.4 .0-test3 + S.u.S.E. Linux Personal 9.0 Linux kernel 2.4.14 Linux kernel 2.4 .0-test2 + S.u.S.E. Linux Personal 9.0 x86_64 Linux kernel 2.4.13 Linux kernel 2.4 .0-test12 Linux kernel 2.4.20 + Caldera OpenLinux Server 3.1.1 Linux kernel 2.4 .0-test11 + CRUX CRUX Linux 1.0 + Caldera OpenLinux Workstation 3.1.1 Linux kernel 2.4 .0-test10 + Gentoo Linux 1.2 Linux kernel 2.4.12 Linux kernel 2.4 .0-test1 + Gentoo Linux 1.4 + Conectiva Linux 7.0 Linux kernel 2.4 + RedHat Linux 9.0 i386 Linux kernel 2.4.11 + Slackware Linux 9.0 Linux kernel 2.4.10 + WOLK WOLK 4.4 s Linux kernel 2.4.9 Linux kernel 2.4.19 -pre6 Linux kernel 2.4.8 Linux kernel 2.4.19 -pre5 Linux kernel 2.4.7 Linux kernel 2.4.19 -pre4 + RedHat Linux 7.2 Linux kernel 2.4.19 -pre3 + S.u.S.E. Linux 7.1 Linux kernel 2.4.19 -pre2 + S.u.S.E. Linux 7.2 Linux kernel 2.4.19 -pre1 Referência: www.securityfocus.com/bid/13215
  • 8. Sistemas Não Afetados .... OpenBSD Único sistema operacional testado que não é afetado até o momento
  • 9. Últimas Descobertas ● Mac OS X Tiger ● NetBSD 2.0 ● FreeBSD 6.0 Beta ● Linux 2.6.13RC3 Descobertos durante o What the Hack!
  • 17. Three Way Handshake A B Conexão estabelecida
  • 18. Encerramento de conexão A B Conexão encerrada
  • 19. TCP Keep Alive A B Cenário anterior TCP Keep Alive concluído
  • 21. O Ataque A B Detecta-se uma conexão TCP Z Enxurrada de pacotes TCP ACK
  • 22. Undead Attack A B Cenário anterior Z Enxurrada de pacotes TCP ACK
  • 24. Cenário I Denial of Service (DDoS) Zumbi Alvo
  • 25. Cenário II Distributed Denial of Service (DDoS) Alvo Zumbi Zumbi Zumbi Zumbi Zumbi
  • 26. Como defender? Pacote forjado é perfeitamente aceito pelo receptor!
  • 28. Windows 98 – Second Edition
  • 30. Windows XP – Service Pack 2
  • 32. Microsoft “... At this point, we have completed our initial investigation of this issue and have determined that the most apropriate ship vehicle to fix this issue is a Service Pack for the affected suported plataforms. This decision was arrived at after weighing the seriousness of the vulnerability as well as the likelihood of exploitability. ...”
  • 33. Referências TCP/IP Illustrated – W. Richard Stevens [Advisory] http://www.securityfocus.com/bid/13215 [Exploit] http://www.securityfocus.com/data/vulnerabilities/exploits/storm.c [What the Hack] http://wiki.whatthehack.org/index.php?title=Undead_Attack
  • 34. Segurança é um processo e não um produto Bruce Schneier Criador do Blowfish
  • 35. E-mails Diego Protta Casati diego-casati@inatel.br Leandro Spínola Rodrigues leandro-rodrigues@inatel.br