Malicious use of grc.com

From: Magniat_private
Date: Mon Nov 26 2001 - 11:53:52 PST

  • Next message: Ryan Tucker: "Re: W32.Badtrans.B@mm storming my mailservers..."

    Greetings:
    
    ShieldsUp(tm) is an application developed by Steve Gibson of Gibson
    Research Corporation that allows a web user to request a remote port scan
    of their local system via the GRC.Com web site
    (https://grc.com/x/ne.dll?bh0bkyd2).
    The "Probe my Ports" option performs a scan of many common tcp ports
    and reports the status of each port back to the user's browser.
    
    The development of the application and its method of identifying the
    client IP address is quite insecure.  As a result, ShieldsUp! allows the web
    user to
    perform a port scan against any other machine on the Internet and return the
    results to the web user.  The remote system will log the scan as having
    originated from one of Steve Gibson's machines.
    
    Gibson has chosen to use a simple hidden tag in the client-side HTML code
    to identify the IP address that is passed to the scanning engine.  Though
    the client's IP address is hashed, it is trivial to alter the value of the
    hidden tag in order to request that a different IP address be scanned.  The
    true IP address is never checked in the HTTP header during the scan -
    ShieldsUp happily scans the other box while returning the result set into
    the
    browser of the box that requested the scan.
    
    Fenris, The Wolf, a member of Hammer of God, quickly reviewed
    the hash algorithm used to represent the IP address and found it weak;
    therefore, one can easily submit requests, via the Shields Up web page,
    for specific IP addresses to be scanned.  These findings are not my own,
    and I have not included the details of the hash here as it is used to
    display a copyrighted page.  The Wolf may post his findings if he chooses
    to do so, but I will not make that choice for him.
    
    Instead, we can easily bypass the need to crack the hash by simply using
    the "IP Agent" supplied by Gibson.  Over a year ago, a hacked version of IP
    Agent was published that allowed one to supply an address to scan-- Gibson
    discounted this as a non-issue, but reportedly fixed IP Agent to perform a
    check to prevent this from happening.
    
    However, IP Agent now supports multiple client IP addresses.  One simply
    needs to bind the targeted IP addresses to a local interface and perform a
    scan request.  In this case, ShieldsUp presents friendly command buttons
    listing the IP addresses bound to the local interfaces and allows you to
    select any one that you want scanned.  Again, no other checking is done,
    and ShieldsUp will scan whatever IP address you ask it to and display the
    results in your own browser.
    
    According to the scanning page, "Information gained will NOT be retained,
    viewed, or used by us in any way for any purpose whatsoever" which
    basically invites anyone to use Gibson's site to do port scans of other
    people's boxes without fear of detection.
    
    Additionally, multiple post requests can be easily scripted to perform
    scans against a site in attempts to perform a denial of service attack
    against a host. In these cases, with sufficient requests generated, one
    could ask grc.com to attack another site and it will comply.
    
    One would have hoped that instead of Mr. Gibson spending so much time
    expounding on the theoretical DoS capabilities of Raw
    Sockets, that he instead had used that time to properly develop his own
    application in order to prevent the same.  Those concerned with malicious
    attacks from grc.com should block Gibson's netblock at the border.
    
    Cheers,
    Magni
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Mon Nov 26 2001 - 13:01:20 PST