Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

2/3/2012
02:19 PM
John H. Sawyer
John H. Sawyer
Commentary
50%
50%

Passive Network Fingerprinting; p0f Gets Fresh Rewrite

Passive network analysis can reveal OS, service, and even vulnerabilities -- just by sniffing the network

In the network security world, nmap is the king for fingerprinting systems and services over the network. It can help identify the operating system (OS), type, and version of a network service, and vulnerabilities that might be present. The problem with nmap is that it generates a lot of "noise" when it performs those activities because it has to send out packets to the system in question to learn more about it. Nmap is an example of an active fingerprinting tool.

There are less noisy alternatives to nmap that fall into the passive fingerprinting category. Instead of actively sending packets to a host and service, they passively analyze network traffic to identify unique characteristics for particular operating systems, client applications, and network services. Their strength is based on the breadth of their signature database, which is not always great. To date, the majority of free and open-source passive fingerprinting tools have focused on OS fingerprinting

Passive fingerprinting can go way beyond just identifying the operating system. Web and mail servers often give up more information than necessary when communicating with clients, and in general, as long as that traffic is unique and can be sniffed, a fingerprint can be created to identify it. The same goes for Web browsers, email clients, and any other application that communicates over the network. Often their version numbers are passed as part of their communications with servers. Tie that version information with a vulnerability database and vulnerable systems can start being identified without ever interacting with the system.

To date, PRADS is the one of the few open-source tools I've found that currently includes fingerprinting additional things like services; however, Michal Zalewski announced on Jan. 10 the availability of p0f v3, which includes the ability to fingerprint TCP services. This is the first release in about six years and is a complete rewrite. This new version currently supports HTTP response and request signatures, but additional protocols are expected to be added in the future.

The obvious difficulty with passive fingerprinting is the need to sniff the traffic, but if you're just monitoring traffic between yourself and another system, that's not an issue. In larger environments, you'll want to leverage a mirror port on a network switch or a network tap in order to see as much traffic as possible. The cool thing about p0f is that it can help find NAT devices in large environments where you might have users plugging in wireless routers.

There's a lot of value and fun that can be had through passive fingerprinting. I'll be discussing it more in the future as I start working on a project specific to mobile devices and application fingerprinting. For a quick preview and review on passive fingerprinting, check out my FireTalk, "Passive Aggressive Pwnage," at ShmooCon 2012.

John Sawyer is a Senior Security Analyst with InGuardians. The views and opinions expressed in this blog are his own and do not represent the views and opinions of his employer. He can be reached at [email protected] and found on Twitter @johnhsawyer.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Exploiting Google Cloud Platform With Ease
Dark Reading Staff 8/6/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16219
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. An out-of-bounds read may be exploited by processing specially crafted project files. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16221
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A stack-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16223
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A heap-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16225
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A write-what-where condition may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16227
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. An improper input validation may be exploited by processing a specially crafted project file not validated when the data is entered by a user. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute a...