Dark Mode

Settings

Capec-330 Detail

ICMP Error Message Echoing Integrity Probe

Detailed Software Likelihood: Medium Typical Severity: Low

Parents: 312

Threats: T60 T80 T258 T288 T291 T302 T334 T392 T407

Description

An adversary uses a technique to generate an ICMP Error message (Port Unreachable, Destination Unreachable, Redirect, Source Quench, Time Exceeded, Parameter Problem) from a target and then analyze the integrity of data returned or "Quoted" from the originating request that generated the error message.

Extended Description

A tremendous amount of information about the host operating system can be deduced from its 'echoing' characteristics. Notably, inspection of key protocol header fields, including the echoed header fields of the encapsulating protocol can yield a wealth of data about the host operating system or firmware version. For this purpose "Port Unreachable" error messages are often used, as generating them requires the adversary to send a UDP datagram to a closed port on the target. When replying with an ICMP error message some IP/ICMP stack implementations change aspects of the IP header, change or reverse certain byte orders, reset certain field values to default values which differ between operating system and firmware implementations, and make other changes. Some IP/ICMP stacks are decidedly broken, indicating an idiosyncratic behavior that differs from the RFC specifications, such as the case when miscalculations affect a field value.
External ID Source Link Description
CAPEC-330 capec https://capec.mitre.org/data/definitions/330.html
CWE-200 cwe http://cwe.mitre.org/data/definitions/200.html
REF-33 reference_from_CAPEC Stuart McClure, Joel Scambray, George Kurtz, Hacking Exposed: Network Security Secrets & Solutions (6th Edition), 2009, McGraw Hill
REF-123 reference_from_CAPEC http://www.faqs.org/rfcs/rfc792.html J. Postel, RFC792 - Internet Control Messaging Protocol, 1981--09, Defense Advanced Research Projects Agency (DARPA)
REF-124 reference_from_CAPEC http://www.faqs.org/rfcs/rfc1122.html R. Braden, Ed., RFC1122 - Requirements for Internet Hosts - Communication Layers, 1989--10
REF-262 reference_from_CAPEC http://ofirarkin.files.wordpress.com/2008/11/login.pdf Ofir Arkin, A Remote Active OS Fingerprinting Tool using ICMP, 2002--04, The Sys-Security Group

Not present

  1. The ability to monitor and interact with network communications.Access to at least one host, and the privileges to interface with the network interface card.
  1. A tool capable of sending/receiving UDP datagram packets from a remote system to a closed port and receive an ICMP Error Message Type 3, "Port Unreachable..

Not present

Authorization Access Control Confidentiality
Bypass Protection Mechanism Bypass Protection Mechanism Read Data
Hide Activities Hide Activities Bypass Protection Mechanism
Hide Activities

Not present