Global Information Assurance Certification Paper - GIAC Certifications
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission. Interested in learning more? Check out the list of upcoming events offering "Security Essentials Bootcamp Style (Security 401)" at http://www.giac.org/registration/gsec
NAPSTER – Should You Be Worried About It? By: Thomas Kasmir Level One SANS GIAC Napster in case you didn’t know, is a server-based s. distributed file-sharing system designed primarily to allow ht clients to download, as well as serve, MP3 encoded music files. The program is available at http://www.napster.com/ rig for Windows 95/98/NT; and alternative implementations of "Napster-compatible" programs are also available, including ull "open source" Napster-compatible clients for Amiga, BeOS, f Java, Linux, and MacOSX (see http://opennap.source- ns forge.net/ )1 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 tai How It Works: Let’s say that you are looking for “Fields of re Gold” by Sting. You first make a request for that song in a search sent to a Napster server. The server would then or search its index of files and return to you a list of th matches. This returned list is actually a list of other Au clients like yourself, who claim to have that song on their systems. By connecting to one of their systems you could 2, then download Sting’s hit onto your own system. If you wish, when you first connect to Napster you could offer up 00 a list of MP3 files that you would like to add to the -2 server’s index thus availing your collection to the rest of the Napster community. 00 20 A New Breed of Denial of Services? te Now legal consideration aside (of which there are many), tu you should know what the security ramifications are should sti any of your network users be Napster aficionados. If you are administering a network of any kind at an educational In facility you already know how popular, and thus how much of a problem, the program can be. According to a report by NS Computerworld’s Mitch Betts, many universities have banned SA student access to Napster.com after finding that 20% to 60% of their network bandwidth was being eaten up by the MP3 traffic at peak times.2 So on this count we could feasibly © categorize Napster as being guilty of Denial of Services. This new breed of DOS “attacks” however being of a kind that is initiated from within our networks by users seeking data from outside the network, as opposed to the traditional Key model fingerprint = AF19 wherein FA27 outside 2F94 998D hackers FDB5 DE3D seekA169 F8B5 06E4 to 4E46 disrupt our services by attacking various vulnerabilities on our servers or routers. 1 © SANS Institute 2000 - 2002 As part of GIAC practical repository. Author retains full rights.
A Secure Musical Community or Network Neighborhood For The Masses? By now you may be wondering about the inherent dangers of your users converting portions of their hard drives into servers in order to share their musical libraries with the s. rest of the world. And here is where the controversy begins ht – you as the network administrator must weigh the evidence rig and decide what is right for your system. Let’s begin with Napster’s claim concerning the safety of its product. ull Napster maintains that its systems are safe and that there f haven’t been any security issues to date. In fact one of ns its chief engineers, Key fingerprint Eddie = AF19 FA27 2F94 998DKessler, FDB5 DE3Ddirector F8B5 06E4 of engineering A169 4E46 tai for Napster, maintains that any references to security problems are simply that - allusions with no basis in fact: re or "These kind of veiled security risk references have come up since nine months ago when I joined the company. They are th usually about what kind of security problem Napster could Au potentially have, but so far all such discussions haven't led to any real security hole." 3 2, 00 What makes such a claim possible is that it is Napster’s policy to not allow any executable files to be traded on -2 its systems, and in fact only accommodates files having legitimate MP3 headers.4 There are ways to circumvent this 00 directive however as we shall soon see. 20 te Exploring The Risks tu Chris Rouland, director of research at Atlanta-based sti Internet Security Systems, a leading computer security firm, considers the use of Napster “risky Internet In behaviour”.4 If Napster’s assertion that non-executable NS files are barred from its systems is true, then does the fact that users are opening up their computers to anonymous SA Web surfers constitute a real security risk? © Many a network or security administrator may consider that question a no-brainer as in, ‘no way are we going to allow universal shares on user’s PCs in our organization’. In some places however users exert tremendous pressure to be allowed to have their fun, and in the absence of any as of Key yet fingerprint unreported= AF19security FA27 2F94 998D holesFDB5 in DE3D F8B5 06E4 Napster, A169 4E46 a network admin may become convinced to allow the traffic in through the firewall, if at least only during after work hours. What about that aforementioned ability to circumvent Napster’s no-executables policy? Can such file types be 2 © SANS Institute 2000 - 2002 As part of GIAC practical repository. Author retains full rights.
planted and thus downloaded from the Napster system? Enter Wrapster - a program that will wrap any files – vbs and other executables included – in MP3 camouflage. According to the download blurb on ZDNet for Wrapster v.2.0: “This great, free file-sharing tool lets you archive any s. type of file into a bogus .mp3 file that shows up on the ht Napster Network as having a bit rate of 32kps and a rig frequency of 32,000Hz. Even though your file might contain pictures, documents, or movies, Napster is fooled into ull thinking it's a normal .mp3 file. The special bit rate/frequency lets anyone easily search for any Wrapster f files that may be hiding on Napster servers.”5 ns Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 tai Now before you jump to the conclusion that your users may have directories full of viruses waiting to spring into re action instead of what they thought were Metallica’s or greatest hits, realize that it’s not that simple for a malicious Napsterite to trick another client into th downloading his viral payload. Both parties must have Au Wrapster installed on their PCs and be using it to both wrap as well as unwrap the bogus MP3 tracks in order for 2, this to happen. So while Microsoft Outlook may be an easier 00 and more fertile platform than Napster when it comes to delivering malicious code, one cannot rule out the -2 possibility of Napster as perhaps evolving towards a similar infamous fate based on its popularity and present 00 intrusion into our systems. 20 It’s also worth noting here that in one reported case a te security expert has claimed to have found a way to exploit tu another Napster client’s PC into exposing directories that sti it otherwise shouldn’t have. Bruce Hubbert, director of West Coast operations at IFSec Inc., a security consulting In group in New York, states that by using a buffer overflow NS (confusing command buffers with unacceptably high numbers the client PC can't understand) he was able to “trick SA Napster into displaying remote file directories that it shouldn't”.6 © Locking Out Napster The most commonly used ports Napster uses are 4444, 5555, 6666, 7777, 8888, 8875. At the end of this paper I have included some sample packet captures of my own in order to Key fingerprint see if these = AF19 are FA27 2F94 998D indeed FDB5ports. default DE3D F8B5 Now06E4 youA169 4E46try might blocking these ports at your firewall if you want to prohibit Napster traffic, but this is a far from foolproof since newer versions of Napster supposedly are designed to search for alternative open/unfiltered ports if the default Napster ones are blocked, and OpenNapster (an extension to 3 © SANS Institute 2000 - 2002 As part of GIAC practical repository. Author retains full rights.
the Napster protocol7) clients can be configured to use virtually any arbitrary port8. If port filtering proves ineffective perhaps a better method is to block the two main IP addresses that all s. Napster clients contact before being redirected to other ht subsidiary Napster servers. It’s the job of these central rig servers to locate for the users the most optimal host on which they may begin querying the MP3 indices. ull These servers are: 208.184.216.222 f 208.184.216.2239 ns Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 tai If the client cannot reach those two IP Addresses there supposedly is no way for them to directly connect to any re other Napster server. However for every hole plugged there or will always be another one discovered, and in this case the way around this sort of IP blocking comes in the form of th another program called Napigator. Napigator allows a client Au to locate other servers that pretty much function in the same capacity as Napster, but otherwise are non-Napster and 2, have nothing to do with those above IP addresses. Since 00 anyone can host a Napigator server you can see it’s a battle of Sisyphean proportions should one elect to embark -2 down the road of blocking access. 00 It’s also worth mentioning that another way around port 20 blocking or IP blocking is the use of Proxy servers. Here is a snippet from an online student guide geared to outwit te the network admin who has successfully blocked the Napster tu protocol: sti “The way this hack works is a bit round-about, but simple. Virtually no college worth its .edu blocks its FTP port 21. In Building on this tidbit, an off-site friend installs on a NS spare PC copies of Napster, an FTP server (included with older versions of Windows' Personal Web Server) and a copy SA of VNC, a free remote-control program. With this infrastructure in place, whenever the Napster-blocked © students feel the urge for an MP3 splurge, they can fire up their own VNC client and remotely direct the friend's PC to download MP3s to its local FTP directory. The students can then tap into their friend's FTP server and by circumventing their college firewall, scoop up all the MP3 Key fingerprint files they =just AF19 downloaded FA27 2F94 998Dremotely.” FDB5 DE3D 10 F8B5 06E4 A169 4E46 4 © SANS Institute 2000 - 2002 As part of GIAC practical repository. Author retains full rights.
Packet Captures done on a Windows 2000 Pro PC using WINDUMP mid-October 2000 (I am on machine cs-gk-900) Here is an initial 3-Way Handshake to Napster. Napster is defaulting to Port 7777 in this case, while also maintaining a Port 80 HTTP connection --- ------------------------ s. 09:17:01.658216 cs-gk-900.1118 > 64.124.41.237.napster.com.7777: S 4081311328:4081311328(0) win ht 16384 (DF) 09:17:01.950577 64.124.41.35.napster.com.80 > cs-gk-900.1117: S 1999408833:1999408833(0) ack rig 4081259428 win 16060 (DF) 09:17:01.950642 cs-gk-900.1117 > 64.124.41.35.napster.com.80: . ack 1 win 17520 (DF) ull ------------------------ Napster now Pushes out some data during this same session but is also seen to use Port 8875 --- f ns 09:17:01.951017 cs-gk-900.1117 > 64.124.41.35.napster.com.80: P 1:304(303) ack 1 win 17520 (DF) Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 tai 09:17:01.951175 64.124.41.16.napster.com.8875 > cs-gk-900.1116: . ack 2 win 16060 (DF) 09:17:01.953201 64.124.41.237.napster.com.7777 > cs-gk-900.1118: S 1829715417:1829715417(0) ack re 4081311329 win 32120 (DF) 09:17:01.953249 cs-gk-900.1118 > 64.124.41.237.napster.com.7777: . ack 1 win 17520 (DF) or 09:17:01.953779 cs-gk-900.1118 > 64.124.41.237.napster.com.7777: P 1:46(45) ack 1 win 17520 (DF) ------------------------ th Finally, the session is closed --- Au 09:38:40.397100 cs-gk-900.1118 > 64.124.41.237.napster.com.7777: F 2699:2699(0) ack 18336 win 17088 (DF) 2, 09:38:40.629078 64.124.41.237.napster.com.7777 > cs-gk-900.1118: . ack 2700 win 32120 (DF) 00 09:38:40.645464 64.124.41.237.napster.com.7777 > cs-gk-900.1118: F 18336:18336(0) ack 2700 win 32120 (DF) -2 09:38:40.645537 cs-gk-900.1118 > 64.124.41.237.napster.com.7777: . ack 18337 win 17088 (DF) 00 Here’s some traffic from a different session, this time with Napster defaulting to Port 8888. 20 In these packets you can observe Napster negotiating a song download from another client (cr3907-a.pr1.on.wave.home.com), to my machine (cs-gk-900) . te Note that the other client is using Port 6699. Napster allows you to change this default port for downloading music if you wish. In the Napster program tu see the Preferences section: “ Share files With Napster Users on TCP Port: XXXX” The default is Port sti 6699, but you can change that. Also, even if you choose to NOT serve up any MP3 files, you still need to declare a directory as a Napster Share in order to be able to download any music. In 16:40:20.377427 64.124.41.227.napster.com.8888 > cs-gk-900.1126: . ack 152 win 31968 (DF) NS 16:40:20.377481 cs-gk-900.1594 > cr3907-a.pr1.on.wave.home.com.6699: . ack 264536 win 17520 (DF) SA 16:40:20.377494 cs-gk-900.1126 > 64.124.41.227.napster.com.8888: P 152:252(100) ack 1 win 17480 (DF) 16:40:20.397308 cr3907-a.pr1.on.wave.home.com.6699 > cs-gk-900.1594: P 272728:273316(588) ack 1 © win 8662 (DF) 16:40:20.397376 cs-gk-900.1594 > cr3907-a.pr1.on.wave.home.com.6699: . ack 264536 win 17520 (DF) 16:40:20.417475 cr3907-a.pr1.on.wave.home.com.6699 > cs-gk-900.1594: P 264536:265124(588) ack 1 win 8662 (DF) Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 So we earlier said that -- “The most commonly used ports Napster uses are 4444, 5555, 6666, 7777, 8888, 8875”. We can see that this much is true, and in these scans we can also add at least a few more to the list: 8875, & 6699. 5 © SANS Institute 2000 - 2002 As part of GIAC practical repository. Author retains full rights.
Conclusion – Allow It At Your Own Risk If it’s all beginning to sound like a losing battle, the network administrator can take heart in knowing that Napster traffic can at least be minimized. The savviest of users who can circumvent filtering or construct proxy s. servers are also unlikely to ever be fooled into running a ht VBS script folded into an MP3 wrapper. If your policy rig dictates that you must do all you can do to minimize risk, then it may serve you well to keep abreast of Napster and ull all its offspring. f While we have mostly discussed what Napster is as well as ns what you can Key fingerprint do to = AF19 FA27try 2F94and 998Dblock it, there FDB5 DE3D hasn’t F8B5 06E4 been a A169 4E46 tai lot of hard data showing it to be a bona fide security risk. If and until some incident takes place and receives re ample press coverage, only the most proactive or administrators may wish to presently consider it thus. Bandwidth saturation & MP3 storage requirements as well as th legal considerations aside, Napster may not be on your security radar presently, but consider yourself warned. A Au program this ubiquitous, this powerful, and one that 2, especially appeals to the enterprising spirit of today’s 00 young technically knowledgeable crowd bears careful watching. -2 00 20 1 Computing News. “Napster/Napster-like Programs Not Music to All Ears” Spring 2000 URL: http://cc.uoregon.edu/cnews/spring2000/napster.html te 2 tu Betts, Mitch. “Internet Webcasts become corporate bandwidth hogs” 5 May 2000 URL: http://www.cnn.com/2000/TECH/computing/05/25/webcast.jam.idg/ sti 3Reuters. “Security Guru: Napster A Security Risk” 20 July 2000 URL: In http://www.zdnet.co.uk/news/2000/28/ns-16736.html NS 4 ibid SA 5 ZDNet. Wrapster download URL: http://www.zdnet.com/downloads/stories/info/0,,0018RM,.html 6 © Computerworld. “Napster Gaffes” 17v July 2000. URL: http://www.computerworld.com/cwi/story/0,1199,NAV47_STO47133,00.html 7 OpenNap. “Open Source Napster Server” URL: http://opennap.sourceforge.net/ 8 Computing News. “Napster/Napster-like Programs Not Music to All Ears” Spring 2000 URL: Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 http://cc.uoregon.edu/cnews/spring2000/napster.html 9 david.weekly.org. “The Napster Protocol” 4 October 2000 URL: http://david.weekly.org/code/napster.php3 10 How-To-Guides. Top Secret Napster Tricks” URL: http://music.zdnet.com/guides/napstersecrets/page2.html 6 © SANS Institute 2000 - 2002 As part of GIAC practical repository. Author retains full rights.
Last Updated: January 4th, 2021 Upcoming Training SANS Security East 2021 , Jan 11, 2021 - Jan 16, 2021 CyberCon SANS Security Fundamentals 2021 , Netherlands Jan 18, 2021 - Jan 29, 2021 CyberCon Cyber Threat Intelligence Summit & Training 2021 Virtual - US Eastern, Jan 21, 2021 - Feb 01, 2021 CyberCon SANS Cyber Security West: Feb 2021 , Feb 01, 2021 - Feb 06, 2021 CyberCon Open-Source Intelligence Summit & Training 2021 Virtual - US Eastern, Feb 08, 2021 - Feb 23, 2021 CyberCon SANS Essentials Australia 2021 - Live Online , Australia Feb 15, 2021 - Feb 20, 2021 CyberCon SANS Essentials Australia 2021 Melbourne, Australia Feb 15, 2021 - Feb 20, 2021 Live Event SANS London February 2021 , United Kingdom Feb 22, 2021 - Feb 27, 2021 CyberCon SANS Secure Japan 2021 , Japan Feb 22, 2021 - Mar 13, 2021 CyberCon SANS Scottsdale: Virtual Edition 2021 , Feb 22, 2021 - Feb 27, 2021 CyberCon SANS Cyber Security East: March 2021 , Mar 01, 2021 - Mar 06, 2021 CyberCon SANS Secure Asia Pacific 2021 Singapore, Singapore Mar 08, 2021 - Mar 20, 2021 Live Event SANS Secure Asia Pacific 2021 , Singapore Mar 08, 2021 - Mar 20, 2021 CyberCon SANS Cyber Security West: March 2021 , Mar 15, 2021 - Mar 20, 2021 CyberCon SANS Riyadh March 2021 , Kingdom Of Saudi Mar 20, 2021 - Apr 01, 2021 CyberCon Arabia SANS Secure Australia 2021 Canberra, Australia Mar 22, 2021 - Mar 27, 2021 Live Event SANS Secure Australia 2021 Live Online , Australia Mar 22, 2021 - Mar 27, 2021 CyberCon SANS 2021 , Mar 22, 2021 - Mar 27, 2021 CyberCon SANS Munich March 2021 , Germany Mar 22, 2021 - Mar 27, 2021 CyberCon SANS Cyber Security Mountain: April 2021 , Apr 05, 2021 - Apr 10, 2021 CyberCon SANS London April 2021 , United Kingdom Apr 12, 2021 - Apr 17, 2021 CyberCon SANS Autumn Australia 2021 - Live Online , Australia Apr 12, 2021 - Apr 17, 2021 CyberCon SANS Autumn Australia 2021 Sydney, Australia Apr 12, 2021 - Apr 17, 2021 Live Event SANS SEC401 (In Spanish) April 2021 , Spain Apr 12, 2021 - Apr 23, 2021 CyberCon SANS Cyber Security East: April 2021 , Apr 12, 2021 - Apr 17, 2021 CyberCon SANS Secure India 2021 , Singapore Apr 19, 2021 - Apr 24, 2021 CyberCon SANS Baltimore Spring: Virtual Edition 2021 , Apr 26, 2021 - May 01, 2021 CyberCon SANS Cyber Security Central: May 2021 , May 03, 2021 - May 08, 2021 CyberCon SANS Security West 2021 , May 10, 2021 - May 15, 2021 CyberCon SANS Stockholm May 2021 , Sweden May 31, 2021 - Jun 05, 2021 CyberCon SANS In French May 2021 , France May 31, 2021 - Jun 05, 2021 CyberCon
You can also read