(100 points) This continues our penetration testing of
pacific-hts. In the last exercise you hypothesized flaws in the system's
networking implementation. Now it is time to test them!
- In each of your three vulnerability descriptions was a short item
about how to test for the vulnerability (at least, there was supposed to
be!) Expand each of these into a full description, as follows:
- your name;
- server with the vulnerability;
- how to verify the vulnerability if you have source code. What would
you look for? You are free to describe some hypothetical code. For
example, if a buffer overflow might occur on input, you would say
something like "look for the input functions, and see if they (1)
respect buffer boundaries or (2) if they are in a loop that does not
check bounds." (The idea here is if you acquire source code, you'll
have a starting point.) If you can get the source code and check it, so
much the better!
- how to verify the vulnerability in the absense of source code (if an
"attack program" is required, you may use pseudocode to
describe the attack program). Be very detailed here; what would
"correct" behavior be, and what would erroneous behavior be?
If you did this in the previous assignment, you may repeat it here, but
please be sure that any competent programmer could reproduce what you
plan to do.
- effects of exploiting the vulnerability; would you gain access?
would you simply deny service or affect the response speed?
- disruptions caused by exploiting the vulnerability: would you
interfere with normal use of the network? Could you accidentally (or
intentionally) interrupt or disrupt others' use of the network, or
others' systems?
- If possible, check to see if the vulnerability exists. Act ethically
- if disruptions could occur other than to the users of pacific-hts,
don't launch the attack!!! (If your attack could disrupt the network,
please wait ... we will have a Windows 2000 system set up in the
security lab next week, on a network you can use to launch attacks. If
you need a gullible systems administrator, please let me know and I'll
"turn off" my cynicism for the test.)
For part a, please submit each description in a file labeled with a
short name of the vulnerability, and place any exploit tools you need or
would like to use into your homework directory. Include a README file
identifying what you submit. For part b, please submit the results of
running your tool or checking for the exploit, and say whether
pacific-hts is vulnerable, and what the consequences would be if this
were exploited.