mirror of
https://github.com/telekom-security/tpotce.git
synced 2025-04-20 06:02:24 +00:00
29 lines
1.4 KiB
Text
29 lines
1.4 KiB
Text
-----------------------------
|
|
Some random food for thought:
|
|
-----------------------------
|
|
|
|
1) If you run p0f on any reasonably popular server, you will probably see quite
|
|
a few systems that seem to be leaking memory in TCP headers (e.g. ACK number
|
|
or second timestamp set on SYN packets, URG pointer without URG flag, etc).
|
|
You will also see HTTP traffic with non-stripped Proxy-Authorization headers
|
|
and other hilarious abnormalities.
|
|
|
|
Unfortunately, pinpointing the sources of many of these leaks is pretty hard;
|
|
they often trace to proprietary corporate proxies and firewalls, and unless
|
|
it's *your* proxy or firewall, you won't be finding out more. If you wish to
|
|
put some investigative effort into this, there are quite a few bugs waiting
|
|
to be tracked down, though :-)
|
|
|
|
2) After some hesitation, I decided *against* the inclusion of encrypted traffic
|
|
classification features into p0f. Timing, packet size, and direction
|
|
information lets you, for example, reliably differentiate between interactive
|
|
SSH sessions and SFTP uploads or downloads; automated and human password
|
|
entry attemps; or failed and successful auth.
|
|
|
|
The same goes for SSL: you can tell normal HTTPS browsing from file uploads,
|
|
from attempts to smuggle, say, PPP over SSL. In the end, however, it seems
|
|
like stretch to cram it into p0f; one day, I might improve my ancient 'fl0p'
|
|
tool, instead:
|
|
|
|
http://lcamtuf.coredump.cx/soft/fl0p-devel.tgz
|
|
|