LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 11-21-2001, 07:55 PM   #1
gonz
LQ Newbie
 
Registered: Nov 2001
Posts: 8

Rep: Reputation: 0
Question server hacking


Can a hacker attach to a proprietary server port with a generic client source high port and somehow be able to utilise the other services running on that server?
 
Old 11-22-2001, 01:14 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Technically speaking any port can be used. You'd have to look at port/address changes or packet flags to find out if it's automated or human.
Reaching other services can be done when the privileges of the user are elevated to something usefull (fi, let daemon account execute code to spawn shell), which btw is a different issue from which *port* is used.
 
Old 11-23-2001, 04:13 AM   #3
raz
Member
 
Registered: Apr 2001
Location: London
Posts: 408

Rep: Reputation: 31
just to build on unSpawn's answer,
Yes due to the design of TCP/IP any connectivity can take place between any client ports to any server ports, that are in a passive open state.

However it's up to the receiving port to parse and authenticate the connection correctly.

For example: If you simply connected to a Netbios service on port 137 with something like a telnet client, Then the following would take place:

You Telnet to the NT server on port 137.
Telnetd is on the Application layer of the OSI.
The App layer talks to the Session layer to establish a connection to the Transport layer and Network layer and data-link layer.
A packet is then sent to the Server requesting a Virtual circuit to be opened, with a SYS flag and a seq id number.
The server then replies with a SYS / Ack flag and it's own seq id number, virtual circuit is now open. "a socket".
The Telnetd service is now in direct contact with the NT servers Netbios service at the Application level on the server.
You input some more text into telnet, the Netbios service receives this data and parses it. It doesn't conform to the netbios RFC, so it sends a FIN packet or RST flag depending on the nature of the request, requesting the virtual circuit to be closed. etc etc Your client responds with FIN / ack and circuit is closed.
The Telnet app show you a connection reset by peer message.

/Raz
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Hacking Exposed Wireless Hacking Chapter prompt Linux - Wireless Networking 0 05-08-2004 02:44 PM
hacking narendra_i Linux - Security 2 11-15-2003 02:53 AM
hacking moeminhtun General 1 01-09-2003 04:39 AM
server hacking gonz Linux - Software 1 11-21-2001 11:02 PM
in how many was hacking is done ashis Linux - Security 5 06-15-2001 05:31 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 04:51 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration