Vadim Smirnov

Forum Replies Created

Viewing 15 posts - 916 through 930 (of 1,507 total)
  • Author
    Posts
  • in reply to: Packet Injection – Solved #6686
    Vadim Smirnov
    Keymaster

      Create blockpage packet with all current headers, add unicode string of html, change IP length, change seq and ack, recalculate checksums and send packet to adapter.

      Instead I would do the following:

      1) Wait for a response packet from WWW-server
      2) If HTTP response packet contains a censored word then modify HTTP packet to contain a redirect packet like:

      <html>
      <head>
      <META HTTP-EQUIV="Refresh" CONTENT="0;URL=http://www.censored.com/">
      </head>
      <body>
      </body>
      </html>
      

      This simple redirect packet in most cases will be smaller in size than HTTP server response and you can add padding string between to exactly match the size of the original packet. This way you won’t need to affect SEQ/ACK fields, just recalculate TCP checksum.

      in reply to: Local Proxy Server and NDIS+TDI #6685
      Vadim Smirnov
      Keymaster

        LSP sample is available in WIndows SDK. Personally I don’t like LSP, its implementation in Windows wishes better.

        in reply to: Local Proxy Server and NDIS+TDI #6683
        Vadim Smirnov
        Keymaster

          Transparent local proxy? If you can’t intercept application network activity on the TDI level then probably mentioned antiviruses use Layered Service Provider (LSP) to redirect the connection to the local proxy and thus it does reach TDI only from the name of local proxy, not in the context of the calling application. If this is really so you have to create your own LSP and layer it just above AV LSP to get connection first.

          in reply to: IP Header Options #6681
          Vadim Smirnov
          Keymaster

            The problem is some routers have been configure to block most protocols except TCP taffic.

            In this case you may want to tunnel packets inside the SSL stream over TCP. An example, this method is used in http://www.projectloki.com VPN solution.

            I do realize that using a common protocol like IPSEC may get me through the router, but it may confuse traffic as well. My encryption solution is disruptive and does not fall into the normal encryption schema.

            Why not to use GRE tunneling then? Routers usually pass GRE and even may NAT if you use extended GRE header.

            in reply to: IP Header Options #6679
            Vadim Smirnov
            Keymaster

              Why do you want to add/change IP options? If you want to add extra encryption related information to the packet there are other possibilities.

              in reply to: IP Header Options #6677
              Vadim Smirnov
              Keymaster

                First of all I would recommend to use one of the known protocols to tunnel encrypted packets. There are several options and all of them will be successfully processed by routers:

                1) IPSEC ESP protocol
                2) GRE
                3) IP-in-IP
                4) IP-in-UDP

                As an example you can look at the GRETunnel sample from WinpkFilter samples set. It does not actually encrypt the tunneled packet but it is fairly simple to add encryption. If you need to have an extra information attached to the packet you can also use extended GRE.

                in reply to: IP Header Compression #6675
                Vadim Smirnov
                Keymaster

                  WinpkFilter hooking driver does not work with IPv6 and IPsec?

                  WinpkFilter hooking driver intercepts only TCPIP.SYS (IPv4) and ignores other protocols (it can be changed if needed). As soon as IPv6 is available only since Wndows XP I don’t see a problem to use NDIS IM driver instead NDIS hooking one for Windows XP and higher.

                  As for IPSec, as I have already told that depends from implementation, if WinpkFilter is above IPSec you will capture unencrypted packets and you will capture encrypted ones otherwise.

                  in reply to: IP Header Compression #6673
                  Vadim Smirnov
                  Keymaster

                    WinpkFilter NDIS IM driver is suitable for filtering IPv6. As for IPSec, it is actually depends from the particular implementation (WinpkFilter driver can be installed below or above IPsec driver).

                    in reply to: IP Header Compression #6671
                    Vadim Smirnov
                    Keymaster

                      i mean “IP header compression”–> RFC 2507(ftp://ftp.isi.edu/in-notes/rfc2507.txt)

                      If here you mean to use Windows built-in IP header compression for dial-up links then I think it is implemented below the WinpkFilter (inside of NDISWAN.SYS), so it should not interfere with the changes you do to the packet and its IP header.

                      in reply to: IP Header Compression #6669
                      Vadim Smirnov
                      Keymaster

                        What do you actually mean under “IP header compression”? RFC 2507(ftp://ftp.isi.edu/in-notes/rfc2507.txt)? Or some sort of your custom protocol compression?

                        in reply to: DNS vs. TCP inspection #6667
                        Vadim Smirnov
                        Keymaster

                          For the majority of Internet users it is enough to use one the Stealth modes to be fully protected from external attacks. TCP stateful inspection is mostly important for server systems.

                          in reply to: custom PKT&TCP RESET,Block page for Winpkfilter wwwcenso #6665
                          Vadim Smirnov
                          Keymaster

                            It looks you know what you need to do. What help are you asking for?

                            in reply to: custom PKT&TCP RESET,Block page for Winpkfilter wwwcenso #6663
                            Vadim Smirnov
                            Keymaster

                              You can modify the packet directly without making a copy. However, don’t forget to recalculate checksums before reinjecting the modified packet. Also, if you change TCP data length you have to change TCP header SEQ value.

                              in reply to: WinpkFilter 3.0: Wireless Access Failure #6660
                              Vadim Smirnov
                              Keymaster

                                NDIS_PACKET_TYPE_DIRECTED limits packets received to only packets having the destination MAC address equal to local system MAC address. You have also to allow broadcast packets to let the system function normally:

                                NDIS_PACKET_TYPE.NDIS_PACKET_TYPE_DIRECTED | NDIS_PACKET_TYPE.NDIS_PACKET_TYPE_BROADCAST

                                in reply to: WinpkFilter 3.0: Wireless Access Failure #6658
                                Vadim Smirnov
                                Keymaster

                                  I have performed some experiments with wireless network adapter on Windows XP SP3 having Norton Internet Security installed. I can confirm that after installation of WinpkFilter NDIS IM driver wireless connectivity is lost. But it is restored after reboot. Sometimes network stack can’t be rebound dynamically and after installation of NDIS IM driver you may have to reboot. This probably the case your users have met with WinpkFilter (both reported cases had Symantec software installed).

                                Viewing 15 posts - 916 through 930 (of 1,507 total)