Sunday, 3 February 2013

Use of the Exploit


Use of the Exploit

An attack may be initiated against Firewall-1 using any tool capable of
issuing IP fragmented packets, jolt2.c is a well known example.

Shortly after initiating a jolt2.c attack against a Firewall-1 with kernel
logging enabled, the CPU is seen to rise to 100% and performance
though the device is greatly reduced. In some cases, the Firewall host
crashes altogether, denying access through it.
Example
In the sample network, the disgruntled attacker, unable to progress
further into the LAN initiates a local DoS attack on the Firewall from
one of the compromised Linux hosts.

No comments:

Post a Comment