Steve Gibson accidentally creates DoS tool

ShieldsUp ripe for malicious use

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

Techno hypemeister Steve Gibson, who clamored for headlines some months back with a dramatic prediction that the misuse of Win-XP's raw sockets would destabilize the entire Internet, has made his own inadvertent contribution to the malicious hackers' tool chest.

Gibson's Web site is littered with hyped-up bells and whistles to mystify the unsophisticated technophile, most of which are harmless; but one of his little magicians' props can be misused to launch a denial of service attack, a security researcher has discovered.

It turns out that his port scanner, ShieldsUp, can easily be directed at arbitrary IP addresses while returning the scan results to the initial user. Thus the tool would become an effective proxy for performing anonymous port scans. Even better, if such an attack were scripted, it would be possible to tie up a Web site with a torrent of Gibson's mighty NanoProbes.

The ShieldsUp flaw was mentioned briefly during a recent Blackhat session regarding the secure development of Web applications by researcher 'Thor' from HammerOfGod.com.

How it works

The problem here is a weak method of determining the ShieldsUp user's IP, which Gibson alludes to in his instructions. "If your IP address is incorrectly determined the wrong machine will be mistakenly tested," he warns. [Gibson's emphasis]

So it's clear that Stevarino can foresee the problem; he just doesn't care enough, or know enough, to fix it properly.

"Gibson has chosen to use a simple hidden tag in the client-side HTML code to identify the IP address that is passed to the scanning engine. Though the client's IP address is hashed, it is trivial to alter the value of the hidden tag in order to request that a different IP address be scanned. The true IP address is never checked in the HTTP header during the scan, and ShieldsUp happily scans the other box while returning the result set into browser of the box the called for the scan," HammerOfGod member 'Magni' says.

But it gets better. Gibson's finger-in-the-dike solution is a little download called "IP Agent" which will ensure that ShieldsUp gets your IP right. Ironically, this little toy makes it even easier to misuse the scanning service.

"We can easily bypass the need to crack the hash by simply using the 'IP Agent' supplied by Gibson....the IP Agent now supports multiple client IP addresses. One simply needs to bind arbitrary IP addresses to a local interface, and perform a scan request. In this case, ShieldsUp presents friendly command buttons listing the IP addresses bound to the local interfaces, and allows you to select any one that you want scanned. Again, no other checking is done, and SheildsUp will scan whatever IP address you ask it to, and report the results into your own browser," Magni observes.

Furthermore, "multiple post requests can be easily scripted to perform scans against a site in attempts to perform a denial of service attack against a host. In these cases, with sufficient requests generated, one could ask grc.com to attack another site, and it will comply."

The IP Agent doesn't even need to be hacked. It will accommodate malicious users straight out of the box.

"One would have hoped that instead of spending so much time expounding on the theoretical denial of service capabilities of Raw Sockets, [Gibson would have used] that time to properly develop his own application in order to prevent the same. In order to prevent the malicious use of Gibson's site to attack our systems, we have blocked Gibson's subnet at the border."

We found this exploit preposterously easy to execute, so perhaps you should do the same. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story


A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.