TCP Initial Sequence Number (ISN) Sampling
- Different OS choose different ISN while initiating a connection request to send a data packet.
- Attackers find patterns in the initial sequence numbers chosen by TCP implementations when responding to a connection request.
- Many old UNIX boxes use the traditional 64K ISN, while newer versions of Solaris, IRIX, FreeBSD, Digital UNIX, Cray, and many others use Random increments, Linux 2.0, OpenVMS, use truely "random" ISNs.
- Windows boxes (and a few others) use a "time dependent" model where the ISN is incremented by a small fixed amount each time period.
- NMap provides the capability to use this technique for OS identification.
No comments:
Post a Comment