13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

exist to perform these network enumeration functions 6 . Of particular note is Cheops-ng 7 , a l<strong>in</strong>k<br />

for open source software that maps and monitors a network.<br />

A.1.3 SCANNING.<br />

Once the larger network environment has been identified, potential targets with<strong>in</strong> that<br />

environment are scanned. The goal here is to learn useful <strong>in</strong>formation such as specific user<br />

names and phone numbers; IP address ranges; and the identities of DNS servers, Web servers,<br />

document/file repositories, and e-mail servers with<strong>in</strong> the doma<strong>in</strong>. The attacker also seeks to<br />

“rattle doors and check w<strong>in</strong>dows” to identify preferential attack po<strong>in</strong>ts. Dur<strong>in</strong>g the scann<strong>in</strong>g<br />

phase, an explicit goal is to learn what systems are alive and reachable from wherever the<br />

attacker is located. Tools used <strong>in</strong>clude war-dialers, p<strong>in</strong>g sweeps, port scans, and automated<br />

hacker discovery tools.<br />

War dial<strong>in</strong>g refers to us<strong>in</strong>g automated tools 8 to call all of an organization’s telephone numbers to<br />

enumerate and identify the repeat dial tones and modems that are supported by that organization.<br />

P<strong>in</strong>g sweeps systematically send Internet control message protocol (ICMP) (see request for<br />

comment (RFC) 791) Echo packets to systematically p<strong>in</strong>g every IP address with<strong>in</strong> a specified<br />

range of addresses to determ<strong>in</strong>e which active addresses can be reached from the attack<strong>in</strong>g<br />

location. Tools like fp<strong>in</strong>g and shell scripts with gp<strong>in</strong>g are commonly used to conduct p<strong>in</strong>g<br />

sweeps from Unix ® devices and p<strong>in</strong>ger, WS_P<strong>in</strong>gProPack and other tools, such as Netscan, are<br />

available for Microsoft ® W<strong>in</strong>dows ® devices. Because of this, firewalls and border routers need<br />

to be configured to block all <strong>in</strong>com<strong>in</strong>g ICMP traffic so that p<strong>in</strong>g sweeps orig<strong>in</strong>at<strong>in</strong>g outside of<br />

the autonomous system (AS) cannot penetrate <strong>in</strong>side that networked environment.<br />

Should a device be reachable via ICMP Echo packets, then the attacker can learn a great deal<br />

about that device merely by send<strong>in</strong>g ICMP packets to it. For example, icmpquery and icmpush<br />

are tools that the attacker can use to learn the current time on the system (ICMP type 13<br />

message) or the device’s netmask value (ICMP type 17 message). The former tells the time zone<br />

where the device is deployed, and the latter helps the attacker learn important <strong>in</strong>formation about<br />

how the subnetwork is configured where the target device is deployed.<br />

Because of the grow<strong>in</strong>g prevalence of ICMP block<strong>in</strong>g (e.g., hopefully at firewalls and border<br />

routers), attackers have resorted to do<strong>in</strong>g port scans at the transport layer <strong>in</strong>stead of p<strong>in</strong>g sweeps<br />

at the network layer. Tools such as nmap (us<strong>in</strong>g the (-PT) option 9 ) and hp<strong>in</strong>g have automated<br />

port scann<strong>in</strong>g capabilities. Because few, if any, firewalls filter hypertext transfer protocol<br />

6 see http://www.samspade.org/, http://www.network-tools.com/, http://www.cotse.com/iptools.html,<br />

http://www.securityspace.com/sspace/<strong>in</strong>dex.html, http://crypto.yashy.com/, https://grc.com/x/ne.dll?bh0bkyd2,<br />

and others.<br />

7 see http://cheops-ng.sourceforge.net/<br />

8 e.g., THC-Scan 2.0; see http://freeworld.thc.org/thc-scan/<br />

9 The -PT option means <strong>in</strong>vok<strong>in</strong>g nmap on the operat<strong>in</strong>g system’s command l<strong>in</strong>e as “nmap –PT”. This means that<br />

nmap will execute us<strong>in</strong>g its P and the T directives, which will change its execution behavior to do what those<br />

options signify.<br />

A-3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!