13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

(HTTP) traffic (port 80), port scans search<strong>in</strong>g for reachable active devices are <strong>in</strong>creas<strong>in</strong>gly<br />

target<strong>in</strong>g Port 80 as a mechanism for defeat<strong>in</strong>g <strong>in</strong>termediate firewalls.<br />

Several types of port scann<strong>in</strong>g approaches exist to exploit weaknesses with<strong>in</strong> the Internet’s<br />

historic Transport Layer Protocols (i.e., TCP and UDP) to learn <strong>in</strong>formation about remote<br />

systems from transport layer responses, and these types <strong>in</strong>clude:<br />

• The transmission control protocol (TCP) connect scan (i.e., connects to the target port by<br />

complet<strong>in</strong>g the three-way TCP handshake: SYN, SYN/ACK, and ACK).<br />

• The TCP SYN scan (i.e., only partially connects to the port—enough so that it knows that<br />

the port is there and is active).<br />

• TCP FIN scan (sends FIN packets to the target port, i.e., see RFC 793).<br />

• TCP Xmas tree scan (Sends FIN, URG, and PUSH packets to the target port).<br />

• The TCP Null scan (the technique turns off all flags. Based upon RFC 793, the target<br />

system should respond by send<strong>in</strong>g back a RST for all closed ports).<br />

• User Datagram Protocol (UDP) scan (that is look<strong>in</strong>g for an ICMP port unreachable<br />

message—if no such reply, then the port is open).<br />

Once it is determ<strong>in</strong>ed that an active device is reachable, the attacker may want to scan the target<br />

device to discover what services it provides. The strobe, sc, netcat, portpro, portscan, nmap, and<br />

udp_scan tools are very useful for do<strong>in</strong>g this. (Note: the latter was an element with<strong>in</strong><br />

“SATAN,” which has subsequently been updated to become “SARA” and “SAINT.”) Nmap is<br />

perhaps the most powerful of these tools s<strong>in</strong>ce it performs many other functions and also<br />

provides decoy capabilities with<strong>in</strong> its scans.<br />

Target Unix systems may support port 113, mak<strong>in</strong>g them vulnerable to ident scann<strong>in</strong>g (see RFC<br />

1413). In such systems, queries to port 113 will reveal all of the active ports with<strong>in</strong> that system,<br />

the protocol (TCP and UDP) be<strong>in</strong>g used by that port, the service us<strong>in</strong>g that port (i.e., the identity<br />

of the application layer daemon), and the owner (e.g., root) of the daemon that is listen<strong>in</strong>g on<br />

that port. All of this <strong>in</strong>formation is very useful to an attacker.<br />

Many other scann<strong>in</strong>g attacks and exploits exist, <strong>in</strong>clud<strong>in</strong>g the file transfer protocol (<strong>FTP</strong>) bounce<br />

attack, which leverages the <strong>in</strong>herent security vulnerabilities of <strong>FTP</strong> to post virtually untraceable<br />

volumes of documents (e.g., mail and news) onto a third site, potentially fill<strong>in</strong>g up the disks of<br />

that third site, thereby creat<strong>in</strong>g a denial of service (DoS) attack. All other IP Advance Research<br />

Projects Agency (ARPA) services (as well as the Unix r- services) were similarly designed for<br />

trusted environments and are therefore similarly characterized by hav<strong>in</strong>g <strong>in</strong>effective security.<br />

The ARPA services <strong>in</strong>clude <strong>FTP</strong> (RFC 2228), trivial file transfer protocol (T<strong>FTP</strong>) (RFC 1782),<br />

Telnet (RFC 854), and SMTP (RFC 1652). For example, SMTP (port 25, i.e., Internet<br />

Electronic Mail) is so completely barefoot that one can readily spoof any aspect of the SMTP<br />

electronic mail header from one’s own mach<strong>in</strong>e’s port 25. However, the <strong>FTP</strong> is unique <strong>in</strong> that it<br />

A-4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!