> The point that (doy?) made is that session hijacking produces a flood
> of shit as you jam in packets in the hopes of getting the numbers
> right. (Since the other guy is transmitting at the same time as you,
> you often send a slew of packets, to get them into the stack first.)
> There are a number of papers on detecting this sort of thing, many
> published in the months after Tsutomo was hacked.
Actually, the attacker does the _least_ amount of work, in terms of the
packet storms that result from hi-jacking a session. The fundamental aspect
of hijacking revolves around de-syncing the state machine of the connection
between the two attacked hosts.
The "flood" you refer to is simply the result of the unsuspecting hosts
ACKing packets that are not in-line with the current sequence numbers that
THEY believe are correct. Since the attacker (assumably) inserts
_something_ into the connection, the resultant SEQ/ACK pair will always be
different between the two unsuspecting hosts. As the attacker continues to
insert data into the stream, the receiving host ACKs this data, but the
other end sees the ACK as out of bounds with its idea of the current state.
So, it just ACKs the ACK. This perpetuates as ACKs answering ACKs. Hence,
the eternal ACK storm.
What actually kills this ack storm is a lost packet. Once one ACK is
dropped, the storm disappears. This is a function of the network load and
reliablity of the the layer-1 medium.
So yes, you _can_ detect these ACK storms, but what you really want to see
in the packets you pick up is the idea of the desynchronized state machine.
Locating WHEN the desynch occured gives a little more information. Something
nobody really ever talks about in foiling/detecting all of these IP spoofing
attacks is to look at the layer-2 information of suspected forged attacks.
That and looking at packet IDs can give fairly certain proof that some clown
really is trying to do something evil. Of course, proxys and bridges CAN
complicate things tho... Granted that this analysis is in itself limited,
but all of the "hacking" tools out there TODAY just do simple Layer 3/4 forgings
-- and these are easy to detect.