deep dive into packet spoofing
Go to file
2024-02-27 10:48:06 -05:00
data Initial commit 2023-10-09 19:30:05 -04:00
README.md Added references 2024-02-27 10:48:06 -05:00

Despoofed

A deep dive into packet spoofing

ROUGH DRAFT

Introduction

Packet spoofing is a deceptive technique in computer networks where the source address of a data packet is manipulated to appear as if it's coming from a trusted source, rather than its true origin. This alteration can be used to hide the actual source of the traffic, often for malicious purposes. By impersonating a trusted source, attackers can bypass network security measures, launch powerful reflection attacks like DDoS, gain unauthorized system access, or trick users into trusting and interacting with the manipulated data.

The current state of packet spoofing

Packet spoofing, while once more straightforward, has become increasingly challenging to execute today due to the widespread adoption of network security best practices and filtering mechanisms. One of the primary defenses against spoofing is "ingress filtering" or "source address validation." Based on a best practice recommended by documents such as BCP 38, ingress filtering involves checking the source address of incoming packets at the edge of a network. If the source address isn't valid or doesn't belong to the range of IP addresses managed by that network, the packet is discarded.

Internet Service Providers and large network operators have been encouraged to implement these filters to ensure that traffic leaving their networks has a legitimate source address that belongs to their IP address space. By doing so, even if an attacker within their network tries to spoof an IP address, the malicious packets would be dropped before they reach the intended target.

In summary, the combination of industry best practices like ingress filtering, advancements in networking technology, and the proactive measures taken by ISPs and network operators have made it significantly more challenging for attackers to successfully execute spoofing attacks in the modern internet landscape.

Mothers Against Spoofed Packets

Mutually Agreed Norms for Routing Security (MANRS) is a global initiative designed to bolster the security and resilience of the internet's routing infrastructure. By fostering collaboration among network operators and internet exchange points, MANRS aims to counter common routing threats.

One of its primary focuses is on filtering and anti-spoofing, ensuring that traffic is from legitimate sources and thus directly combating IP spoofing. With the broad adoption of MANRS recommendations, many of the world's filters preventing spoofing have been implemented. Additionally, MANRS emphasizes efficient coordination among operators and global validation of routing information to further enhance network security.

Participants
Statical Coverage Report
  • Total ASNs: 1,403
  • Total IPv4 Ranges: 65,723
  • Total IPv4 Addresses: 774,313,984

This accounts for roughly 25% of the routeable address space.

CAIDA

The CAIDA Spoofer Project is an initiative undertaken by the Center for Applied Internet Data Analysis (CAIDA) to measure and analyze the susceptibility of the internet to source address validation (SAV) failures, which are often exploited in various cyberattacks, such as Distributed Denial of Service (DDoS) attacks using IP address spoofing. The project provides free software to the public, enabling individuals and organizations to test their networks for vulnerabilities related to IP spoofing. The gathered data is then used by researchers to create a global view of the current state of SAV enforcement and to devise strategies to improve internet security.

The significance of the Spoofer Project lies in its potential to highlight areas of the internet that are vulnerable to spoofing attacks, thereby encouraging network operators to adopt best practices in network filtering. By offering a clear picture of the state of IP spoofing vulnerabilities worldwide, the project aims to drive change and reduce the potential for malicious actors to misuse the internet's infrastructure. The collaborative nature of the project, with participants from around the world, underscores the importance of collective efforts in ensuring a safer online environment.

Reports

You can lookup a specific ASN to get a report on it, for example here is the report for OVH.

References

Todo

  • Compile list of blocked ASN's world-wide to discover ASN's that can allow spoofing
  • Shit on people like this
  • Show CAIDA spoofer software result samples
  • Include code to automate finding ASN's that will allow spoofing
  • CAIDA API documentation

Mirrors for this repository: acid.vegasSuperNETsGitHubGitLabCodeberg