Feeds

Steve Gibson accidentally creates DoS tool

ShieldsUp ripe for malicious use

  • alert
  • submit to reddit

New hybrid storage solutions

Techno hypemeister Steve Gibson, who clamored for headlines some months back with a dramatic prediction that the misuse of Win-XP's raw sockets would destabilize the entire Internet, has made his own inadvertent contribution to the malicious hackers' tool chest.

Gibson's Web site is littered with hyped-up bells and whistles to mystify the unsophisticated technophile, most of which are harmless; but one of his little magicians' props can be misused to launch a denial of service attack, a security researcher has discovered.

It turns out that his port scanner, ShieldsUp, can easily be directed at arbitrary IP addresses while returning the scan results to the initial user. Thus the tool would become an effective proxy for performing anonymous port scans. Even better, if such an attack were scripted, it would be possible to tie up a Web site with a torrent of Gibson's mighty NanoProbes.

The ShieldsUp flaw was mentioned briefly during a recent Blackhat session regarding the secure development of Web applications by researcher 'Thor' from HammerOfGod.com.

How it works

The problem here is a weak method of determining the ShieldsUp user's IP, which Gibson alludes to in his instructions. "If your IP address is incorrectly determined the wrong machine will be mistakenly tested," he warns. [Gibson's emphasis]

So it's clear that Stevarino can foresee the problem; he just doesn't care enough, or know enough, to fix it properly.

"Gibson has chosen to use a simple hidden tag in the client-side HTML code to identify the IP address that is passed to the scanning engine. Though the client's IP address is hashed, it is trivial to alter the value of the hidden tag in order to request that a different IP address be scanned. The true IP address is never checked in the HTTP header during the scan, and ShieldsUp happily scans the other box while returning the result set into browser of the box the called for the scan," HammerOfGod member 'Magni' says.

But it gets better. Gibson's finger-in-the-dike solution is a little download called "IP Agent" which will ensure that ShieldsUp gets your IP right. Ironically, this little toy makes it even easier to misuse the scanning service.

"We can easily bypass the need to crack the hash by simply using the 'IP Agent' supplied by Gibson....the IP Agent now supports multiple client IP addresses. One simply needs to bind arbitrary IP addresses to a local interface, and perform a scan request. In this case, ShieldsUp presents friendly command buttons listing the IP addresses bound to the local interfaces, and allows you to select any one that you want scanned. Again, no other checking is done, and SheildsUp will scan whatever IP address you ask it to, and report the results into your own browser," Magni observes.

Furthermore, "multiple post requests can be easily scripted to perform scans against a site in attempts to perform a denial of service attack against a host. In these cases, with sufficient requests generated, one could ask grc.com to attack another site, and it will comply."

The IP Agent doesn't even need to be hacked. It will accommodate malicious users straight out of the box.

"One would have hoped that instead of spending so much time expounding on the theoretical denial of service capabilities of Raw Sockets, [Gibson would have used] that time to properly develop his own application in order to prevent the same. In order to prevent the malicious use of Gibson's site to attack our systems, we have blocked Gibson's subnet at the border."

We found this exploit preposterously easy to execute, so perhaps you should do the same. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Leak of '5 MEELLLION Gmail passwords' creates security flap
You should be OK if you're not using ANCIENT password
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
Enigmail PGP plugin forgets to encrypt mail sent as blind copies
User now 'waiting for the bad guys come and get me with their water-boards'
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.