Use of the Exploit
An attack may be initiated against Firewall-1 using any tool capable ofissuing IP fragmented packets, jolt2.c is a well known example.
Shortly after initiating a jolt2.c attack against a Firewall-1 with kernel
logging enabled, the CPU is seen to rise to 100% and performance
though the device is greatly reduced. In some cases, the Firewall host
crashes altogether, denying access through it.
Example
In the sample network, the disgruntled attacker, unable to progress
further into the LAN initiates a local DoS attack on the Firewall from
one of the compromised Linux hosts.
No comments:
Post a Comment