Create an Account
username: password:
 
  MemeStreams Logo

MemeStreams Discussion

search


This page contains all of the posts and discussion on MemeStreams referencing the following web page: Speaking at Shmoocon!. You can find discussions on MemeStreams as you surf the web, even if you aren't a MemeStreams member, using the Threads Bookmarklet.

Speaking at Shmoocon!
by Acidus at 4:48 pm EDT, Oct 7, 2005

I got an email approving my CFP to Shmoo! I got to meet all those folks out at Toorcon, and I am very excited about this chance.

Hopefully all the victims of hacker flight afflicting Atlanta right now will all meet up there.

Presentation Title: Covert Crawling: a wolf among lambs
Track Preference: Break it!
---

Web application IDS evasion techniques and countermeasures is a mature area of study. LibWhisker-based apps and Snort have been in a tug-of-war for years. However, the initial reconnaissance of a website or web app has been largely neglected. Its either done by hand (which is tedious) or with a traditional crawler like wget (which is very noisy). An automated crawl appears as an enormous spike in hit count and byte transfer that is well outside the bell-curve for normal users.

This presentation will discuss theories and methods to hide an intelligent automated crawl of a target website or application inside the buzz of normal user activity. Some techniques include:

-Spreading crawl across multiple IPs and time.
-Following paths to links -vs- deep links.
-Throttling crawl based on publicly available traffic stats and IP fragment ids.
-Dynamic creation of fake Google referrers to a deep linked pages based on content of that page -Intelligent selection of proxies based on target country and website type.
-Randomized link selection and overlap
-Filtering of link targets based on popularity.
-Intentional Traffic escalation (Slash-bombing)

This covert crawl will identify a subset of likely vulnerable pages that can later be attacked using IDS evasion techniques. You're attacking fewer pages, and there is no advanced warning that an attack is eminent.

Code for a covert crawler implementing these techniques will be released.
---


 
 
Powered By Industrial Memetics