Flux d'exécution
1) Explore
[Determine if timestamps are present.] The adversary sends a probe packet to the remote host to identify if timestamps are present.
2) Experiment
[Record and analyze timestamp values.] If the remote host is using timestamp, obtain several timestamps, analyze them and compare them to known values.
Technique
- The adversary sends several requests and records the timestamp values.
- The adversary analyzes the timestamp values and determines an average increments per second in the timestamps for the target.
- The adversary compares this result to a database of known TCP timestamp increments for a possible match.
Conditions préalables
The ability to monitor and interact with network communications.Access to at least one host, and the privileges to interface with the network interface card.The target OS must support the TCP timestamp option in order to obtain a fingerprint.
Ressources nécessaires
Array
Faiblesses connexes
| CWE-ID |
Nom de la faiblesse |
|
Exposure of Sensitive Information to an Unauthorized Actor The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Références
REF-33
Hacking Exposed: Network Security Secrets & Solutions
Stuart McClure, Joel Scambray, George Kurtz.
REF-128
RFC793 - Transmission Control Protocol
Defense Advanced Research Projects Agency Information Processing Techniques Office, Information Sciences Institute University of Southern California.
http://www.faqs.org/rfcs/rfc793.html REF-212
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Gordon "Fyodor" Lyon.
Soumission
| Nom |
Organisation |
Date |
Date de publication |
| CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modifications
| Nom |
Organisation |
Date |
Commentaire |
| CAPEC Content Team |
The MITRE Corporation |
2017-05-01 +00:00 |
Updated Attack_Motivation-Consequences, Attack_Prerequisites, Description, Related_Attack_Patterns, Resources_Required, Typical_Likelihood_of_Exploit |
| CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
Updated Attack_Phases, Description, Description Summary, Related_Weaknesses |