1.7 KiB
Vulnerable Application
This auxiliary/scanner/ip/ipidseq
module will probe hosts' IPID sequences and classify them
using the same method Nmap uses when it's performing its IPID Idle Scan (-sI) and OS Detection (-O).
The module should only be used in internal networks. Additionally, administrative/root permissions are required to successfully capture on the device/interface.
Possible methods of IPID generation:
- Unknown
- Randomized
- All zeros
- Random positive increments
- Constant
- Broken little-endian incremental
- Incremental
Nmap Idle Scan
Nmap's probes are SYN/ACKs while this module's are SYNs. While this does not change the underlying functionality, it does change the chance of whether or not the probe will be stopped by a firewall.
Nmap's Idle Scan can use hosts whose IPID sequences are classified as "Incremental" or "Broken little-endian incremental".
More information: https://nmap.org/book/idlescan.html
Verification Steps
- Start msfconsole
- Do:
use auxiliary/scanner/ip/ipidseq
- Do:
set RHOSTS [ip]
- Do:
run
Options
SNAPLEN
The number of bytes to capture. Defaults to 65535
.
GATEWAY_PROBE_HOST
Send a TTL=1 random UDP datagram to this host to discover the default gateway's MAC. Defaults to 8.8.8.8
.
SAMPLES
The IPID sample size. Must be greater than 2
. Defaults to 6
.
SECRET
A 32-bit cookie for probe requests. Defaults to 1297303073
.
Scenarios
Example Incremental
msf6 auxiliary(scanner/ip/ipidseq) > set RHOSTS 10.0.20.254
RHOSTS => 10.0.20.254
msf6 auxiliary(scanner/ip/ipidseq) > exploit
[*] 10.0.20.254's IPID sequence class: Incremental!
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed