LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-26-2010, 02:56 PM   #1
allied air
LQ Newbie
 
Registered: Feb 2008
Distribution: Slackware
Posts: 16

Rep: Reputation: 0
OS fingerprint spoofing through sysctl; possible/practical?


I've been researching a bit of stack fingerprinting for fun and profit, but have found precious little in the way of stack spoofing tech.

Basically, i'ma running nmap against a dummy box and trying to make it look like a bluetooth fridge (for example), as opposed to the slackware box that it actually is.

I came across two dead projects (morph & ip personalities) which have not been updated since 2k5 that purported to do this very thing, but I could not get either of 'em to work.There is a windaes version here which i intend to try asap, and possibly steal some of the configs from.

I did however find on here a mention of using sysctl to perform the exact same function, and while it wasn't perfect, it did generate some confusion from nmap. Made sense to me that the projects have been terminated due to a much simpler method of adjusting 'nix stack handling procedures in the form of sysctl.

so the queries:
Anyone used sysctl extensively for this purpose, and have amusing or useful anecdotes to share?
Can nmap's funky fingerprint db be auto converted into human readable form/sysctl quick script?

cheers

a a

Last edited by allied air; 02-26-2010 at 03:03 PM.
 
Old 02-26-2010, 07:22 PM   #2
Mr-Bisquit
Member
 
Registered: Feb 2009
Distribution: FreeBSD, OpenBSD, NetBSD, Debian, Fedora
Posts: 770
Blog Entries: 52

Rep: Reputation: 68
Why not run the services chrooted or on a vm?
 
Old 02-27-2010, 05:01 AM   #3
allied air
LQ Newbie
 
Registered: Feb 2008
Distribution: Slackware
Posts: 16

Original Poster
Rep: Reputation: 0
The vm method;
1. I hadn't thought of that, thanks for the alternative.
2. it requires significantly more resources than I have to play with (cyrix p266, 64 meg ram).

the chroot method;
1. i've only used chroot for switching between root directories for os installation cloning and setup, how could it help?

The intended purpose is to make John A. Black-Hat or Jim T. Script-Kidd waste time trying to determine the os and thusly try methods more likely to be detected as anomalous.

Peripherally, the windaes spoofer works remarkably well, nmap hadn't a clue as to what it was looking at.

Last edited by allied air; 02-27-2010 at 05:15 AM.
 
Old 02-27-2010, 09:21 AM   #4
allied air
LQ Newbie
 
Registered: Feb 2008
Distribution: Slackware
Posts: 16

Original Poster
Rep: Reputation: 0
this does not carry out any automatic error checking or allow for specified reset, so use with caution.
Code:
#!/bin/bash
#27/02/2010 "Osfigment"
#linux os spoofing kludge using systcl 
#written by submitting student (in vi!) for Network security 4 CA resit
#concept and file format based on osfuscate[http://www.irongeek.com/i.php?page=security/osfuscate-change-your-windows-os-tcp-ip-fingerprint-to-confuse-p0f-networkminer-ettercap-nmap-and-other-os-detection-tools] by anonymous  
#use at own risk; potentially dangerous, badly written, and only nominally tested.

ospro="$1" #get profile
oldifs="$IFS" #store Interfield separator for later reset
IFS=' = ' #set IFS for  a space = space delimeter
if [ ! -e "$ospro" ]; then
	echo "pass an os profile to the script"
	exit
fi
while read parm val # cycle through profile entries
do 
	case $parm in
		ttl)
			kattl=$val ;;
		stamp)
			kastamp=$val ;;
		pmtu)
			kapmtu=$val ;;
		urg)
			kaurg=$val ;;
		window)
			kawindow=$val ;;
		sack)
			kasack=$val ;;
		mtu)
			kamtu=$val ;;  
esac
done < "$ospro"
echo "ttl =" $kattl
echo "stamp ="$kastamp
echo "pmtu =" $kapmtu
echo "arg =" $kaurg
echo "window =" $kawindow
echo "sack =" $kasack
echo "these are the values found; check and "yes" to continue,"
read amen
if [ ! $amen = yes ]; then
	echo wise
	IFS="$oldifs" # just in case it doesnt reset properly <.<
	exit 
else 
	echo "using sysctl and /proc/sys/net to screw up your system; startup system configuration is not affected"
	#default time to live
	sysctl net.ipv4.ip_default_ttl="$kattl"
	sysctl net.ipv4.tcp_timestamps="$kastamp"
	#MTU discovery value
	sysctl net.ipv4.ip_no_pmtu_disc="$kapmtu"
	#urgent traffic flag
	sysctl net.ipv4.tcp_stdurg="$kaurg"
	#Selective Acknowledgement (rfc2018)
	sysctl net.ipv4.tcp_sack="$kasack"
	#modifies default and max receive and transmit window size
	if [ "$kawindow" != 'x' ]; then 
		echo $kawindow > /proc/sys/net/core/rmem_max
		echo $kawindow > /proc/sys/net/core/wmem_max
		echo $kawindow > /proc/sys/net/core/rmem_default
		echo $kawindow > /proc/sys/net/core/wmem_default
	fi
	#MTU is imprudent to mess with, and does little good either way
fi
IFS="$oldifs"
and some references

Josefsson B, TCP tuning cookbook, SUNET, 2004 [online] Available:
http://proj.sunet.se/E2E/tcptune.html [Accessed : 01/03/2010]
Lal Jangir M, Linux Network Stack Administration: A Developer's Approach, Linux For You
[online] http://www.linuxforu.com/teach-me/li...-a-developers-
approach/[Accessed : 17/03/2010]
Morizot S, Easy Firewall Generator for iptables, 05/11/2005 [online] Available :
http://easyfwgen.morizot.net/gen/ [Accessed : 17/03/2010

if you cant tell this file works with the original osfuscate profile files, so you'll need a copy of them too.

Sadly I only got 58% on this assessment :/

Last edited by allied air; 12-14-2010 at 02:25 PM.
 
Old 02-28-2010, 04:26 PM   #5
warezwaldo
LQ Newbie
 
Registered: Feb 2010
Posts: 1

Rep: Reputation: 0
I was actually for the same thing today. I recently found of that sysctl can do this but i just don't know what parameters accomplish this. If you can please provide what parameters you used to fool nmap that would be awesome.
 
Old 04-29-2010, 08:56 PM   #6
do0b
LQ Newbie
 
Registered: Apr 2010
Posts: 7

Rep: Reputation: 0
hey allied air,

is it possible to send me that windows spoofer? i'm really interested.
 
  


Reply

Tags
nmap, sysctl



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
USB fingerprint PlatinumX Linux - Hardware 1 06-07-2009 07:51 AM
Need help on sysctl hiteshnimbark Linux - Networking 2 10-20-2008 04:06 AM
Fingerprint authentication? DaBlade Linux - Hardware 5 06-12-2008 02:47 PM
fingerprint--- help? shagan Linux - General 0 09-23-2004 01:02 AM
sysctl nullpt *BSD 3 08-06-2003 01:14 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 09:20 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration