exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

openbsdportscan.txt

openbsdportscan.txt
Posted Jun 29, 2003
Authored by STE Jones | Site networkpenetration.com

By using the OpenBSD packet filter pf, one can utilize the NAT address pools added into OpenBSD 3.3 to aid in distributed port scanning.

tags | tool, scanner
systems | unix, openbsd
SHA-256 | 8a31bcc028af2e38e08d090044b50741b4a83069781ec6191a41a5c751b115ab

openbsdportscan.txt

Change Mirror Download
Network Penetration
networkpenetration.com
Copyright (c) 2003 Ste Jones
root@networkpenetration.com

Distributed port scanning using OpenBSD's packet filter (Another good reason to use OpenBSD)
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::


By using openBSD's packet filter pf one can utilize the NAT address pools added into OpenBSD 3.3 to aid in distributed port scanning.

How it works
::::::::::::

http://www.openbsd.org/faq/pf/pools.html#nat - NAT Address Pool

As the text explains NAT can be used in a large network to split outgoing connections over multiple source IP addresses. Under normal circumstances NAT is
normally used to hide a internal network behind a single external public IP address. By using multiple external IP addresses a host on the internal network
can port scan with multiple source IP's.


Technical Breakdown
::::::::::::::::::-

1. Port scan from internal network: send a SYN packet to a target to initiate a connection. The packets source IP address for example 192.168.0.1.

2. Packet passes through NAT gateway: The packets source IP address is now changed to the external IP assigned to the NAT gateway. Each new connection passing
through the gateway has its source IP address translated to the one / many IP addresses assigned to the NAT gateway. For example 1.1.1.*

3. The packet reaches the host and reply is returned to the NAT gateway. The packet returned has a destination IP address of the external interface on the NAT
gateway. So in this example 1.1.1.1

4. The NAT gateway translates this packets destination IP address back to 192.168.0.1 and the packet is sent to the source.


OpenBSD 3.3 Pf setup
::::::::::::::::::::

Replace your existing NAT rule for the one below. This enables PF to do NAT translation over multiple source IP addresses. It has its problems with things
such as web page connection tracking. Check the OpenBSD FAQ for more info.

nat on $ext_if inet from any to any -> { x.x.x.a, x.x.x.b, x.x.x.c }


You will probably have to tweak some of your other rules to get it working correctly


You will also need to edit your /etc/hostname.interface file

inet x.x.x.a 255.255.255.0 NONE
inet alias x.x.x.b 255.255.255.0 NONE
inet alias x.x.x.c 255.255.255.0 NONE


This is all performed by PF's stateful connection tracking.... thanks guys
Note: I presume this would also work on a single machine running pf :)

Thanks to HacK of LuB for letting me abuse his firewall


Original Document can be found at http://www.networkpenetration.com/pfdistnatscan.html


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close