Brute force backdoor checking

  • Thread starter Thread starter jjoensuu
  • Start date Start date
J

jjoensuu

Hi all,

I have been looking for software / hardware that can accomplish
following tasks:

A. software/hardware that can be used for running brute force /
dictionary attack against network ports running on a system.
B. hardware that can be used for running low level tests against
network ports.

Both of these would be used for checking a system for possible
backdoors.

Alternative A should be able to test a network port pretty much the
same way as a brute force pen testing tool would do with a software
application. It should be able to send character snippets of varying
lengths to selected network port or ports and be able to react to a
response.

Alternative B should be able to test a network port for reactions to
low level signals and voltage differences.

Does anyone know if this type of hardware/software exists
commercially?

Also pointers to any information such as books dealing with this type
of testing would be appreciated.

thanks

JJ
 
Hi all,

I have been looking for software / hardware that can accomplish
following tasks:

A. software/hardware that can be used for running brute force /
dictionary attack against network ports running on a system.
B. hardware that can be used for running low level tests against
network ports.

Both of these would be used for checking a system for possible
backdoors.

No they wouldn't, there is no need to try to brute force a
dictionary attack against an openly receiving port/software.
Merely finding one is enough without getting through it.

There is no need for low level hardware tests either, if a
port is open it has to work through the OS and that is not a
"low level" hardware factor.
 
On 15 Apr 2007 20:54:11 -0700, "jjoensuu"


No they wouldn't, there is no need to try to brute force a
dictionary attack against an openly receiving port/software.
Merely finding one is enough without getting through it.

There is no need for low level hardware tests either, if a
port is open it has to work through the OS and that is not a
"low level" hardware factor.

Right, if a software is listening on a port, it can of course be
communicated with. But my question pertains to two other factors:

Alternative A is related to the fact that a software listening on a
specific port could have a mechanism that opens a reverse shell if a
packet X with a value Y is fed to the port. What I am looking for is a
tool that can vary the values sent to the port and check for a
reaction.

Alternative B is related to the fact that the firmware on a NIC (or
its drivers, O/S network stack, a combination of these) could react to
small changes in the electric signal on the network. What I am looking
for here is a tool that can vary the electric signal and also monitor
the signal from the card (eg if a reverse shell is opened, the card
starts sending data and at this point there is fluctuation in the
voltage level).
 
Back
Top