what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

tcp.acknowledgement.txt

tcp.acknowledgement.txt
Posted Oct 10, 2002
Authored by Rohits

This paper describes how it is possible to send data in TCP headers using the acknowledgment numbers.

tags | paper, tcp
systems | unix
SHA-256 | 7d3622c2a90e4c221166d445cceb86235ad4192fe69fee022fc63d44f568f214

tcp.acknowledgement.txt

Change Mirror Download


Fun under the nose:::

Am not sure if this has been discussed anytime before
but whatever !!! May sound bit silly :D, but it is
very much
possible....

This possibly explains how a spyware module can
communicate with the other host and may send some
confidential data without actually putting anything in
the payload, right under administrator's eyes.
Neither am I sure if it has been
implemented before but something like this is easy to
implement in my opinion.

Imagine a Watchdog client(WDC) probing some XYZ host
after every 30 seconds for some service etc... Attach
to the WDClient is nothing but a spyware module, now
since WDClient generally runs in superuser mode as it
has to alert or log etc it is easy for WDC... to make
use of all those restircted resources. After it has
the confidential text it can encrypt it in some
number form and send it in the TCP Header and not the
payload. Yes TCP header as the acknowledgement number.

It need not modify the payload or the actual data
content. If the Text is too big simply fragment it and

put it across as the different tcp acks and number the

sequence number accordingly to reassemble the text
properly. Actually this sounds funny or not possible
but for any watchdog that may work over tcp it can be
very simply implemented.

You will say that on the receiving end the tcp/kernel
stack maintaining any connections will simply drop
this packet as the ack number is bogus, but what if we
are using some sniffer made with libpcap and sniffing
the packets at the ethernet layer etc.

Here in the libnet generated packet I am simply
sending the text "Rohit" TCP header. Look at the
acknowledgement field each char is it's actual
position in the alphabetic list. R-18 o-15 etc...
Similary in the next packet I can send something Like
"Sharma" but with the Sequence nos 11112

from the test example from the libnet project
/*
* Build the TCP header.
*/
libnet_build_tcp(src_prt, /* Source
TCP port */
dst_prt, /*
Destination TCP port */
11111, /*
Sequence number */
1815080920, /*
Acknowledgement number */
TH_SYN, /* Control

flags */
1024, /* Window
size */
0, /* Urgent
pointer */
NULL, /* Pointer

to payload (none) */
0,
buf + LIBNET_IP_H); /* Packet
header memory */



It is very much possible that the administrator will
never look at the ack field for any packet that is
generating after every 30 seconds or so. The other end

will simply read such a packet ... to differentiate
among the other normal packets the sequence nos
starting with all 1's or 2's etc can differentiate
well.

__________________________________________________
Do you Yahoo!?
Faith Hill - Exclusive Performances, Videos & More
http://faith.yahoo.com
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close