>
>http://www.securityfocus.com/templates/forum_message.html?forum=2&head=32&id=32
>
>
>            forum - Guest Feature: The Internet Auditing Project (p1 of 7)
>
>   Thu Aug 19 1999
>   Cautionary Tales: Stealth Coordinated Attack HOWTO
>
>
>It's buried kinda deep in the article, under; E) Embedding, and then down
>some, on my lynx browser it's at the botom of the 28th page and the top of
>the 29th page:
>
>
>   Another clever exploit is to store a piece of your attack bot
>   bootstrap sequence on the network card itself. Most modern network
>   cards have 64 bytes (or more) of EEPROM that are used to store the 6
>   byte hardware MAC address, leaving the majority of the space unused.
>   More sophisticated server network cards even have more space for
>   downloadable firmware. The mostly unused network card EEPROM is
>   typically loaded by OS drivers in its entirety - usually to a fixed
>   address static buffer. A small segment of code could be programmed
>   into the card and executed from this buffer by an exploit. The
>   advantages to storing a portion of the attack code in the NIC is that
>   it makes tracing the activity of the exploit difficult for someone
>   trying to reverse engineer the code, and more importantly, a short
>   program installed here will survive a disk formatting and OS
>   re-install. This kind of exploit will lead to a lot of head scratching
>   and questions about "How the hell do they keep getting back in after a
>   disk wipe?" at the target.
>

Yeah, but how do you program the eeprom on the card without having root
access on the machine first? A: not very easily (frankly, I doubt it's
possible). Theoretically, one could use this as a back door to get in
AFTER one has already hacked the machine, but using this as an apriori
vulnerability is a bit of a jump, IMHO.


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to