mirror of
https://github.com/telekom-security/tpotce.git
synced 2025-04-20 06:02:24 +00:00
30 lines
1.4 KiB
Text
30 lines
1.4 KiB
Text
![]() |
-----------------------------
|
||
|
Some random food for thought:
|
||
|
-----------------------------
|
||
|
|
||
|
1) If you run p0f on any reasonably popular server, you will probably see quite
|
||
|
a few systems that seem to be leaking memory in TCP headers (e.g. ACK number
|
||
|
or second timestamp set on SYN packets, URG pointer without URG flag, etc).
|
||
|
You will also see HTTP traffic with non-stripped Proxy-Authorization headers
|
||
|
and other hilarious abnormalities.
|
||
|
|
||
|
Unfortunately, pinpointing the sources of many of these leaks is pretty hard;
|
||
|
they often trace to proprietary corporate proxies and firewalls, and unless
|
||
|
it's *your* proxy or firewall, you won't be finding out more. If you wish to
|
||
|
put some investigative effort into this, there are quite a few bugs waiting
|
||
|
to be tracked down, though :-)
|
||
|
|
||
|
2) After some hesitation, I decided *against* the inclusion of encrypted traffic
|
||
|
classification features into p0f. Timing, packet size, and direction
|
||
|
information lets you, for example, reliably differentiate between interactive
|
||
|
SSH sessions and SFTP uploads or downloads; automated and human password
|
||
|
entry attemps; or failed and successful auth.
|
||
|
|
||
|
The same goes for SSL: you can tell normal HTTPS browsing from file uploads,
|
||
|
from attempts to smuggle, say, PPP over SSL. In the end, however, it seems
|
||
|
like stretch to cram it into p0f; one day, I might improve my ancient 'fl0p'
|
||
|
tool, instead:
|
||
|
|
||
|
http://lcamtuf.coredump.cx/soft/fl0p-devel.tgz
|
||
|
|