Difference between revisions of "Summerschool Aachen 2004/Project Days"

From C4 Wiki
Jump to: navigation, search
 
m (Reverted edits by Oxudocopaj (talk) to last revision by Tobias)
 
(29 intermediate revisions by 16 users not shown)
Line 7: Line 7:
 
Feel free to ask us for help if you lack of ideas.
 
Feel free to ask us for help if you lack of ideas.
  
--[[User:Cklein|Cklein]] 23:24, 23 Sep 2004 (CEST) ChristianKlein
+
--[[User:Cklein|Christian Klein]] 23:24, 23 Sep 2004 (CEST)
 +
 
 +
[[Category:Summerschools]]
 +
 
 +
== Scan of the Month 32 ==
 +
 
 +
Yesterday I started to work on the [http://project.honeynet.org/scans/scan32/ Scan of the Month] Challenge by the Honeynet Project and I decided to continue it during the project days, and possibly submit a solution before the deadline (which is Friday 23:00 CET).
 +
 
 +
-- [[Summerschool Aachen 2004/Participants/Lisa Thalheim|Lisa Thalheim]]
 +
 
 +
== Marp ==
 +
 
 +
Me and Mario planned to try and finish a (non-working) perl module he made a while ago
 +
which allows you to forge arp packets. (this module is called Marp).
 +
 
 +
-- Ilja van Sprundel
 +
 
 +
edited:
 +
I just send the report of my 2 days of projects to christian, and as it turned out I didn't
 +
make the arp library (also, mario wasn't at the university then due to illness).
 +
I did make the summerschool advisory, and some work on a paper and a talk me and Max are
 +
(probably) going to present at the congress this yea (it's about fingerprinting).
 +
I also watched a movie of gobbles at defcon 10 which could also be seen as research, and I
 +
will shortly post something about that on the blog.
 +
 
 +
== Shotgun ==
 +
 
 +
I am planning on continue developping the generic automatic feature extraction tool for fingerprinting protocols. I have already some code from the network Recon Lab, but I still need to code a classification engine, and solidify the code so that it is useable by others.
 +
 
 +
-- [[User:George|George]]
 +
 
 +
== arpangel ==
 +
 
 +
I will write a program that looks for ARP replies on a network and
 +
compares the data with a local database. In case of a mismatch, it will
 +
send out a packet with the correct info.
 +
 
 +
This is meant to defend against ARP spoofing where an attacker
 +
periodically sends out unsolicited ARP replies to poison the cache of
 +
other machines. The aim is to update the cache of victim machines as
 +
quickly as possible, so that the forged information will be kept in the
 +
cache as shortly as possible.
 +
 
 +
The other aim of the project is for me to play with libnet and libpcap.
 +
 
 +
''Update'': [http://www.kawo2.rwth-aachen.de/~abecher/arpangel.c] is the
 +
latest version. It works well for ARP/IPv4, although I had hoped for a
 +
faster reaction. IPv6 support is not there yet, but some framework for
 +
handling IPv6 packets is there.
 +
 
 +
-- [[Summerschool Aachen 2004/Participants/Alexander Becher|Alexander Becher]]
 +
 
 +
== DeNtiSt ==
 +
 
 +
We are working on a DNS tunnel (hence that stupid name, you know about drilling and stuff ;-). We want to keep it simple, so this will be just a point-to-point connection to get data across the network. At a later time this might be usable to implement some other protocol on top of that.
 +
 
 +
We spent most of our time so far working out the basics of the DNS protocol and think we have now actually come up with a way of achieving what we want, simply using the encoded domain names to push data and using RDATA TXT fields for retrieval. We first thought about using CNAME chains, but are not really sure whether this would work, since the specs are a little unclear about it. Besides, RDATA TXT offers a lot more space to put stuff into.
 +
 
 +
An interesting point about it will be to poll data from our "fake" nameserver, we will probably have to play with the correct TTL and use some sort of sequence numbers to avoid caching problems.
 +
 
 +
Our first milestone was to actually come up with a basic idea of how to implement this, which we just achieved. By
 +
this time tomorrow, we should have basic implementations of the server as well as the client, so we have some spare time to actually get it working and enhance with features that come to our minds.
 +
 
 +
-- [[Summerschool Aachen 2004/Participants/Ernest Hammerschmidt|Ernest Hammerschmidt]] and [[Summerschool Aachen 2004/Participants/Lutz Böhne|Lutz Böhne]]
 +
 
 +
== Fingerprinting Tool in perl ==
 +
 
 +
I decided to continue working on the fingerprinting tool I started on monday. Currently it works pretty well for DNS, using djb's database.
 +
 
 +
This is the current version of the [[Summerschool Aachen 2004/Fingerprinting Tool|fingerprint tool]], I'm working on.
 +
 
 +
--[[User:Cpunkt|Cpunkt]] 18:16, 30 Sep 2004 (CEST)
 +
 
 +
== warpainting ==
 +
 
 +
At the wardriving days we played around with kismet, gpsdrive and gpsmap and we all felt the need to improve  this tools. We are writing an enhanced viewer for the XML output of Kismet in Java. It will have different views with different graphic layers. If there is time left we want to enhance Kismet so that it looks into the just scanned networks for standard services like dhcp etc. Maybe connected to a file with default passwords for APs.
 +
 
 +
-- [[Summerschool Aachen 2004/Participants/Boris Leidner|Boris Leidner]], [[Summerschool Aachen 2004/Participants/Christian Dietrich|Christian Dietrich]], [[Summerschool Aachen 2004/Participants/Jan Gall|Jan Gall]], [[Summerschool Aachen 2004/Participants/Sami Okasha|Sami Okasha]]
 +
 
 +
== 3Com Switch 3300 ==
 +
 
 +
I am continuing my reverse engineering of the firmware in 3Com's Switch 3300. My aim is to produce some evidence that it is possible to make the switch execute arbitrary Motorola 68020 code, as proof of concept of a possible embedded device based attack vector.
 +
 
 +
--[[User:Slewis|Slewis]] 12:08, 1 Oct 2004 (CEST)
 +
 
 +
== HTTP Tunnelling ==
 +
I was planning to implement in my project first a simple program and then extend it to a more "advanced" program:
 +
Assume we have a host H1 behind a firewall F who wants to communicate with a host H2 who is outside the firewall.
 +
Let us further assume that the firewall F only lets HTTP packets through, i.e. packets with destination port 80, and assume that host H1 wants to build up an SSH connection with host H2. I want first to write a (static) C program run on a host X between host H1 and H2, such that H1 can contact build up an SSH connection with X at port 80 (meaning that the traffic will be let through by F) and X forwards the traffic to H2 at port 22. F should also forward the traffic from H2 to H1.
 +
Later I want to extend to a more generic prgram which cannot only forward SSH traffic but also telnet traffic and other kinds of traffic.
 +
If there is still some time left (which I hope there will be :)) I would like to extend that program to a more dynamic program in a way that H1 can tell X with whom he wants to build up an SSH connection and X does this.
 +
I know that there are probably already many tunnelling programs doing such kinds of things. However, as I don't have that much experience of network programming (except a small webserver I have once set up in Java) I think that such a project will help me to improve my skills in network programming.
 +
 +
--[[Summerschool Aachen 2004/Participants/Samad Nasserian|Samad Nasserian]]
 +
 
 +
== Wardriving evaluation software ==
 +
----
 +
Christian (Dietrich), Jan, Sammy and I try to develop a wardriving evaluation software called ''warpaint''. The tool should be able to read kismet XML files and present the information on a map. We think that ''gpsdrive'' and ''gpsmap'' do not show much information of WLAN hotspots, so ''warpaint'' should make the difference in that.
 +
For the project days we hope top finish at least a basic part that can draw GPS guided paths and the WLAM hotspots on a local map. We will develop Warpaint in Java.
 +
Yesterday, I finished the XML parser, so this should already work.
 +
 
 +
Some features of ''warpaint'':
 +
 
 +
...
 +
 
 +
--[[User:Feanor|Boris Leidner]] 08:00, 1 Oct 2004 (CEST)
 +
 
 +
== ssa-01 (summserschool security advisory one) ==
 +
 
 +
I spend most of the first project day working on the summerschool security adivsory.
 +
which will be made public shortly (hopefully). I also looked at a video of gobbles at
 +
defcon 10 (where he basicly dissed everyone). I suppose you can also look at this as
 +
research and i'll post something about this on the blog.
 +
 
 +
-- Ilja van Sprundel
 +
 
 +
== Some prepartion for a talk at the congress == 
 +
I spend most of the day trying to figure out exactly what parts
 +
of fingerprinting Max and I will talk about at the congress
 +
(assuming that we're allowed to give a talk). We'll mostly
 +
talk about application fingerprinting and some (hopefully) nice
 +
algortihms for matching it against a database. If all goes well
 +
there will also be a tool released for automating this kind of
 +
stuff. So I've spend most of this day documenting this.
 +
 
 +
-- Ilja van Sprundel
 +
 
 +
== Arp Library for Perl ==
 +
I wasn't exactly there at project day, but i updated  the libnet based arp library for perl.
 +
I put a perlxs and a swig version [http://manno.name/files/arpNG/ arpNG here].
 +
Before I can upload to cpan i'll have to do some documentation and maybe a wrapper for the interface.
 +
 
 +
--[[User:Mario Manno|MM]] 17:02, 5 Oct 2004 (CEST)
 +
 
 +
[[Category:Hacks]] [[Category:Summerschools]]

Latest revision as of 17:36, 24 November 2010

As you all should know, on Friday, Octobre 1st, we have a Project Day. Everybody should work all day on a project that he can choose (more or less) freely.

Please make sure to inform us about your project and your goal until Wednesday, Septembre 29th!

Feel free to ask us for help if you lack of ideas.

--Christian Klein 23:24, 23 Sep 2004 (CEST)

Scan of the Month 32

Yesterday I started to work on the Scan of the Month Challenge by the Honeynet Project and I decided to continue it during the project days, and possibly submit a solution before the deadline (which is Friday 23:00 CET).

-- Lisa Thalheim

Marp

Me and Mario planned to try and finish a (non-working) perl module he made a while ago which allows you to forge arp packets. (this module is called Marp).

-- Ilja van Sprundel

edited: I just send the report of my 2 days of projects to christian, and as it turned out I didn't make the arp library (also, mario wasn't at the university then due to illness). I did make the summerschool advisory, and some work on a paper and a talk me and Max are (probably) going to present at the congress this yea (it's about fingerprinting). I also watched a movie of gobbles at defcon 10 which could also be seen as research, and I will shortly post something about that on the blog.

Shotgun

I am planning on continue developping the generic automatic feature extraction tool for fingerprinting protocols. I have already some code from the network Recon Lab, but I still need to code a classification engine, and solidify the code so that it is useable by others.

-- George

arpangel

I will write a program that looks for ARP replies on a network and compares the data with a local database. In case of a mismatch, it will send out a packet with the correct info.

This is meant to defend against ARP spoofing where an attacker periodically sends out unsolicited ARP replies to poison the cache of other machines. The aim is to update the cache of victim machines as quickly as possible, so that the forged information will be kept in the cache as shortly as possible.

The other aim of the project is for me to play with libnet and libpcap.

Update: [1] is the latest version. It works well for ARP/IPv4, although I had hoped for a faster reaction. IPv6 support is not there yet, but some framework for handling IPv6 packets is there.

-- Alexander Becher

DeNtiSt

We are working on a DNS tunnel (hence that stupid name, you know about drilling and stuff ;-). We want to keep it simple, so this will be just a point-to-point connection to get data across the network. At a later time this might be usable to implement some other protocol on top of that.

We spent most of our time so far working out the basics of the DNS protocol and think we have now actually come up with a way of achieving what we want, simply using the encoded domain names to push data and using RDATA TXT fields for retrieval. We first thought about using CNAME chains, but are not really sure whether this would work, since the specs are a little unclear about it. Besides, RDATA TXT offers a lot more space to put stuff into.

An interesting point about it will be to poll data from our "fake" nameserver, we will probably have to play with the correct TTL and use some sort of sequence numbers to avoid caching problems.

Our first milestone was to actually come up with a basic idea of how to implement this, which we just achieved. By this time tomorrow, we should have basic implementations of the server as well as the client, so we have some spare time to actually get it working and enhance with features that come to our minds.

-- Ernest Hammerschmidt and Lutz Böhne

Fingerprinting Tool in perl

I decided to continue working on the fingerprinting tool I started on monday. Currently it works pretty well for DNS, using djb's database.

This is the current version of the fingerprint tool, I'm working on.

--Cpunkt 18:16, 30 Sep 2004 (CEST)

warpainting

At the wardriving days we played around with kismet, gpsdrive and gpsmap and we all felt the need to improve this tools. We are writing an enhanced viewer for the XML output of Kismet in Java. It will have different views with different graphic layers. If there is time left we want to enhance Kismet so that it looks into the just scanned networks for standard services like dhcp etc. Maybe connected to a file with default passwords for APs.

-- Boris Leidner, Christian Dietrich, Jan Gall, Sami Okasha

3Com Switch 3300

I am continuing my reverse engineering of the firmware in 3Com's Switch 3300. My aim is to produce some evidence that it is possible to make the switch execute arbitrary Motorola 68020 code, as proof of concept of a possible embedded device based attack vector.

--Slewis 12:08, 1 Oct 2004 (CEST)

HTTP Tunnelling

I was planning to implement in my project first a simple program and then extend it to a more "advanced" program: Assume we have a host H1 behind a firewall F who wants to communicate with a host H2 who is outside the firewall. Let us further assume that the firewall F only lets HTTP packets through, i.e. packets with destination port 80, and assume that host H1 wants to build up an SSH connection with host H2. I want first to write a (static) C program run on a host X between host H1 and H2, such that H1 can contact build up an SSH connection with X at port 80 (meaning that the traffic will be let through by F) and X forwards the traffic to H2 at port 22. F should also forward the traffic from H2 to H1. Later I want to extend to a more generic prgram which cannot only forward SSH traffic but also telnet traffic and other kinds of traffic. If there is still some time left (which I hope there will be :)) I would like to extend that program to a more dynamic program in a way that H1 can tell X with whom he wants to build up an SSH connection and X does this. I know that there are probably already many tunnelling programs doing such kinds of things. However, as I don't have that much experience of network programming (except a small webserver I have once set up in Java) I think that such a project will help me to improve my skills in network programming.

--Samad Nasserian

Wardriving evaluation software


Christian (Dietrich), Jan, Sammy and I try to develop a wardriving evaluation software called warpaint. The tool should be able to read kismet XML files and present the information on a map. We think that gpsdrive and gpsmap do not show much information of WLAN hotspots, so warpaint should make the difference in that. For the project days we hope top finish at least a basic part that can draw GPS guided paths and the WLAM hotspots on a local map. We will develop Warpaint in Java. Yesterday, I finished the XML parser, so this should already work.

Some features of warpaint:

...

--Boris Leidner 08:00, 1 Oct 2004 (CEST)

ssa-01 (summserschool security advisory one)

I spend most of the first project day working on the summerschool security adivsory. which will be made public shortly (hopefully). I also looked at a video of gobbles at defcon 10 (where he basicly dissed everyone). I suppose you can also look at this as research and i'll post something about this on the blog.

-- Ilja van Sprundel

Some prepartion for a talk at the congress

I spend most of the day trying to figure out exactly what parts of fingerprinting Max and I will talk about at the congress (assuming that we're allowed to give a talk). We'll mostly talk about application fingerprinting and some (hopefully) nice algortihms for matching it against a database. If all goes well there will also be a tool released for automating this kind of stuff. So I've spend most of this day documenting this.

-- Ilja van Sprundel

Arp Library for Perl

I wasn't exactly there at project day, but i updated the libnet based arp library for perl. I put a perlxs and a swig version arpNG here. Before I can upload to cpan i'll have to do some documentation and maybe a wrapper for the interface.

--MM 17:02, 5 Oct 2004 (CEST)