|
 |
Introduction |
|
|
Listed below are all the software projects i have
developed till now . Though all the source code as well as the relevant
presentations are ready to be published on this website , due to the fact
that most of the code might be considered malicious and might be used
for illegal purposes , i have refrained from putting them up .
In case the sources are required for educational
purposes contact me at vivek_ece_iitg@yahoo.co.in
.
|
|
Field |
|
|
Project
Description ( Software ) |
|
|
|
|
|
|
|
|
|
|
|
Network
Intrusion Detection |
|
|
- I am currently working on an anomalies based network
intrusion detection system .
The test data set is being taken from the MIT Lincoln Lab at http://www.ll.mit.edu/IST/ideval/
Right now i am classifying the attacks so that i can prepare my network
test bed accordingly . Updates will be available here as soon as more
work is done .
|
|
Security
Analysis Of ARP |
|
|
- An arp man-in-the-middle spoofer which works
by sending periodic spoofed arp replies to both the victims .
- An arp switch overflow tool , which overflows
the arp cache of switches by sending thousands of spoofed arp replies
to the switch , putting the switch in fail open mode .
- An arp flooder which performs a dos on xp pc's
by sending sending spoofed gratitious arp with source address of the
victim . XP complains about an ip conflict and the pop up messages crash
it .
- Arp Spoofing detection based on an active method
as documented in this file
.
|
|
|
|
|
|
|
Sniffers |
|
|
- A sniffer which decodes arp , ip , tcp , udp and
icmp traffic and use arp spoofing to sniff on switches .
- A sniffer which searches for a specific data
pattern in the ip traffic it sniffs of the line . It takes a phrase
as an input and searches for it in the data payload .
- A yahoo messenger sniffer which decodes all messenger
sessions taking place in the same broadcast network and shows a real
time decoding . A combination of arp spoofing allows sessions to be
decoded even in the presence of switches .
|
|
|
|
|
|
|
Sniffer
Detection |
|
|
- A sniffer detection tool which uses the
ARP and ICMP methods to detect sniffers .
|
|
|
|
|
|
|
HoneyPot |
|
|
- Fake host : The exact description of this
tool is documented here .
One could mention certain services which could be kept on on these fake
hosts .
|
|
|
|
|
|
|
Covert
Channel |
|
|
- Icmp covert channel based on the echo request
and response packets , it hides the encrypted data by appending it to
the requests and responses . It uses a symmetric key for encryption
/ decryption .
- A root shell which binds to a specified port .
- A portless backdoor which sniffs the network for
a particular pattern in the packet and executes commands encoded in
it .
|
|
|
|
|
|
|
Denial
Of Service |
|
|
- SYN , ACK and RST flooders
- Smurf , Land , Ping Of Death and Teardrop reimplemented
.
- Xerox : A new tool written by me which picks
up all the network traffic it sniffs , and redirects it towards the
victim , by changing the destination ip , recomputing the checksum and
then sending it back on the network . The new thing is that as the tool
is sending random traffic which it sniffs of the wire hence there is
no pattern which can be observed in the traffic , making it quite tough
to implement an ACL ( Access Control List ) .
- A Samba worm : Based on the latest ........vulnerability
, this proof of concept code just spreads ! nothing else ...no payload
included :-) !
|
|
|
|
|
|
|
Port
Scanner |
|
|
- I have implemented a port scanner using vanilla
, SYN , FIN , RST , XMAS , NULL , UDP and Fragmentation scanning techniques
. I have also added the recently publicized port 0 and idle scan techniques
.
- A Stateless syn scanner on the lines of the
latest scanrand . Here the sending and receiving processes are separate
. It is called stateless as the sender does not have to keep a record
of the probes it sent out .
The sequence no = f(source ip, source port
, destination ip , destination port ). The receiver checks if ( ACK
- 1 ) is same as the above for the reply it receives to know if it the
reply to an actual probe .
|
|
|
|
|
|
|
Wireless
Lan Security |
|
|
- WLAN Security analysis
paper .
- A wireless sniffer which decodes control , data
and management frames .
- A stealth SSID sniffer which uses active and passive
techniques to get the ssid of non broadcasting networks .
- MAC Address spoofer to penetrate networks using
MAC filters on their Access Points .
- A keystream recovery tool for Shared key auth.
It sniffs the challenge as well as the encrypted challenge and thus
have the keystream , which could be used for replay attacks .
- A wireless network mapper which shows all the
STA's and the respective AP's they are connected to . Also it recognizes
STA's working in the ad-hoc mode .
- My wireless sniffer writing tutorial available
here .
- Replay as well bit flipping attacks on wireless
networks by injecting traffic .
This was all part of my summer internship at the
University of Applied Sciences , Rapperswil , Switzerland under
Prof. Beat Stettler .
|
|
|
|
|
|
|
ICMP
ATTACKS |
|
|
- ICMP redirection by sending a forged icmp redirect
message to the victim .
- OS fingerprinting using icmp : i have implemented
some of the techniques as proposed by Ofir Arkin . The methods are available
at http://www.sys-security.com.
|
|
|
|
|
|
|
IP
Masquerading InSecurity |
|
|
- A ping program which forges the source ip to
that of a masqueraded pc on the local lan , and sniffs the replies to
the ping queries . This shows how a masqueraded pc can be attacked from
the inside .
|
|
|
|
|
|
|
Packet
Modifiers |
|
|
- Mangler : This program reads packets from the
network and modifies them as specified , computes the checksum and then
places it back on the wire .
- Replay : Reads a tcpdump dump file and sends
the packets
back onto the network . It replays the saved packets taking into consideration
their relative timing .
|
|
|
|
|
|
|
Firewall
Presence |
|
|
- A scanner which determines the presence/absence
of firewalls by using the fact that if the layer 4 tcp checksum is wrong
then a firewall might still send back a reset as it does not verify
the L4 checksum . A host's network stack on the other hand will drop
the packet . This scanner is based on the method given in phrack 60
at http://www.phrack.org.
|
|
|
|
|
|
|
Multicasting |
|
|
- Multicasting in a WAN & related Network
Security Issues :
Made a software for sending and receiving multicast
messages . The data consisted of both real time text & voice . Encryption
of data using a symmetric key was implemented .
- Audio Conferencing software on the linux platform
.
Download presentation
.pdf
|
|
|
|
|
|
|
Protocols |
|
|
Implementation
of ARP , TCP , IP & UDP protocols using raw sockets . This enabled me
to understand the in depth working of the protocols . I custom made all
the headers of the protocols .
|
|
|
|
|
|
|
Network Utilities |
|
|
- Network Vulnerability Scanner ( checks for RPC & Samba vulnerability
) .
- A Ping Program : a barebones ping utility using raw sockets .
- Traceroute : route tracer using TTL & RTT fields .
- ICMP daemon : A barebone version of an ICMP daemon
- TCP client/server & FTP client / server side software ,
Telent Client .
|
|
|
|
|
|
|
Device Drivers |
|
|
- Printer
driver ( generic ) .
- Parallel & serial port drivers for various
hardware circuits .
- Hardware driver for a pc based infra-red remote
control .
|
|
|
|
|
|
|
Image
Processing |
|
|
- Tiff to Jpeg conversion using matlab .
- Canny Edge Detection in matlab .
- Steaganography using LSB algo.
|
|
Data
Compression |
|
|
Data
Compression software based on the following algorithms :-
- Huffmann
Algo.
- Arithmetic
Coding .
|
|
|
|
|
|
|
|
Software
Radio |
|
|
- Using Matlab implemented the following modulation
/ demodulation schemes viz AM , FM , SSBSC , DSBSC , FSK , BPSK , QPSK
, 8-PSK .
- Using C once again implemented the above .
|
|
|
|
|
|
|
Misc |
|
|
- Text Editor in C
- Hex Editor in C
- TSR's in C & Assembly e.g Doskey
- Address book using linked lists in C
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
home
|
resume
| hardware
projects |
contact
me |