diff options
| author | FreeArtMan <dos21h@gmail.com> | 2017-02-12 22:05:41 +0000 | 
|---|---|---|
| committer | FreeArtMan <dos21h@gmail.com> | 2017-02-12 22:05:41 +0000 | 
| commit | f9add1a23b1061ebc3206a32206af388f2ec97ed (patch) | |
| tree | 47015820c362ba8232a62f6ac937321d1d4977c0 /md/writeup | |
| parent | 45bf707694e8532503291af38775aaed0c668617 (diff) | |
| download | md-content-f9add1a23b1061ebc3206a32206af388f2ec97ed.tar.gz md-content-f9add1a23b1061ebc3206a32206af388f2ec97ed.zip  | |
Update iptables and chromebook notes
Diffstat (limited to 'md/writeup')
| -rw-r--r-- | md/writeup/devices/samsung_xe303c12.md | 5 | ||||
| -rw-r--r-- | md/writeup/using_iptables.md | 85 | 
2 files changed, 82 insertions, 8 deletions
diff --git a/md/writeup/devices/samsung_xe303c12.md b/md/writeup/devices/samsung_xe303c12.md index 0879518..12d260e 100644 --- a/md/writeup/devices/samsung_xe303c12.md +++ b/md/writeup/devices/samsung_xe303c12.md @@ -133,6 +133,11 @@ to disable update service.  ```  initctl stop update-engine  ``` + +### Recovery mode + +Press __ESC__ + __Refresh buttom__ and then press __Power button__ +  ## Links  1. https://archlinuxarm.org/platforms/armv7/samsung/samsung-chromebook diff --git a/md/writeup/using_iptables.md b/md/writeup/using_iptables.md index 4ef342d..3ba3337 100644 --- a/md/writeup/using_iptables.md +++ b/md/writeup/using_iptables.md @@ -6,12 +6,44 @@ keywords:linux,iptables,networking,icmp,ping  iptables is linux firewall that uses linux kernel netfilters to expose in kernel  stuff to userland. Here is notes how to fulfill various tasks block, forward  -or prank this silly network packets.  +or prank this silly network packets. This is not manual it just research notes +how to get most of your linux box. + +### netfiler modules +#### conntrack +Module that allows more specific connection tracking for TCP,UDP,ICMP or others. +The information that conntrack gathers is then used to tell conntrack in which  +state the stream is currently in. + +## Protocols +### TCP connection states +| state | timeout | +|---|---| +| NONE 	| 30 minutes | +| ESTABLISHED | 5 days | +| SYN_SENT    | 2 minutes | +| SYN_RECV    | 60 seconds | +| FIN_WAIT    | 2 minutes | +| TIME_WAIT   | 2 minutes | +| CLOSE       | 10 seconds | +| CLOSE_WAIT  | 12 hours | +| LAST_ACK    | 30 seconds | +| LISTEN      | 2 minutes | + +Not constant values could change from version to version. + +### TCP connection establishment +| handshake | desc | +|---|---| +| SYN     | The active open is performed by the client sending a SYN to the server. The client sets the segment's sequence number to a random value A. | +| SYN-ACK | In response, the server replies with a SYN-ACK. The acknowledgment number is set to one more than the received sequence number i.e. A+1, and the sequence number that the server chooses for the packet is another random number, B. | +| ACK     | Finally, the client sends an ACK back to the server. The sequence number is set to the received acknowledgement value i.e. A+1, and the acknowledgement number is set to one more than the received sequence number i.e. B+1. | + +Once it has seen one packet(the SYN), it considers the connection as NEW.  +Once it sees the return packet(SYN/ACK), it considers the connection as ESTABLISHED.  ## Examples -SIP - Server IP, your machine ip address -  __General cmd flag description__  | Flag | Desc | @@ -31,6 +63,7 @@ __General cmd flag description__  | -t | command matching table |  | -j | jump target |  | -i | interface name | +| -m | extra matching rulles |  __Command matching table names__ @@ -44,7 +77,7 @@ __Command matching table names__  __Adding rulle targets__ -| adding | desc | +| rulle table | desc |  | --- | --- |  | INPUT       | for packets destined to local sockets |  | OUTPUT      | for locally-generated packet | @@ -52,6 +85,30 @@ __Adding rulle targets__  | PREROUTING  | for altering incoming packets before routing |  | POSTROUTING | for altering packets as they are about to go out | +__Connection state__ + +There is possible to match specific states of connections here is a list of  +some of them. + +|state | desc | +|---|---| +| NEW         | The NEW state tells us that the packet is the first packet that we see.  | +| ESTABLISHED | The ESTABLISHED state has seen traffic in both directions and will then continuously match those packets. | +| RELATED     | The RELATED state is one of the more tricky states. A connection is considered RELATED when it is related to another already ESTABLISHED connection.  | +| INVALID     | The INVALID state means that the packet can't be identified or that it does not. | +| UNTRACKED   | This is the UNTRACKED state. | + +All connection tracking is handled in the __PREROUTING__ chain, except locally  +generated packets which are handled in the __OUTPUT__ chain. What this means is that +iptables will do all recalculation of states and so on within  +the __PREROUTING__ chain. If we send the initial packet in a stream,  +the state gets set to __NEW__ within the __OUTPUT__ chain, and when we receive  +a return packet, the state gets changed in the __PREROUTING__ chain to  +__ESTABLISHED__,  and so on. If the first packet is not originated by  +ourself, the __NEW__ state  is set within the __PREROUTING__ chain of course.  +So, all state changes and calculations are done within  +the __PREROUTING__ and __OUTPUT__ chains of the nat table.  +  ### List all rulles  ``` @@ -222,7 +279,7 @@ Lets block just incoming ip  iptables -A INPUT -s 8.8.8.8 -j DROP  ``` -#### By port +#### Blov by port  Block ip to access specific port @@ -230,7 +287,7 @@ Block ip to access specific port  iptables -A INPUT -s 8.8.8.8 -p tcp --destination-port 25 -j DROP  ``` -### Block UID +### Block by UID  There is possble to make iptables basing on user id @@ -238,7 +295,16 @@ There is possble to make iptables basing on user id  iptables -A OUTPUT -m owner --uid-owner {USERNAME} -j DROP  ``` -### Loging +### Block by state +You can block some ports, but if you whant that ESTABLISHED connections are still +there. Then there is possible to match specific connection state +``` +iptables -A INPUT -m state --state NEW -j DROP -s 86.159.18.180 +``` + +### Connection state + +### Logging  Log droppend packages @@ -271,4 +337,7 @@ the system admins could be not happy with this jokes ;].  11. http://ipset.netfilter.org/iptables.man.html  12. http://gr8idea.info/os/tutorials/security/iptables5.html  13. http://linuxpoison.blogspot.co.uk/2010/11/how-to-limit-network-access-by-user.html -14. http://www.cyberciti.biz/tips/block-outgoing-network-access-for-a-single-user-from-my-server-using-iptables.html
\ No newline at end of file +14. http://www.cyberciti.biz/tips/block-outgoing-network-access-for-a-single-user-from-my-server-using-iptables.html +15. http://www.iptables.info/en/connection-state.html +16. https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Protocol_operation +17. https://tools.ietf.org/html/rfc675
\ No newline at end of file  | 
