Timing of Efficient and Undiscovered Portscans

Timing of Efficient and Undiscovered Portscans

Marc Ruef
Marc Ruef
Oliver Kunz
Oliver Kunz
time to read: 5 minutes

During a penetration test we were confronted with rather unique requirements:

The requests should be performed as efficiently as possible without triggering an alarm in the system.

Because the target’s infrastructure was not maintained by our client (also our target) but by one of their external partners, we were not to involve the third party in our security testing. At that point, we didn’t know about the ideal timing behaviour of our requests. But this would play a crucial role in our mission in order to perform automated requests during an early phase of the testing. So we found ourselves at crossroads.

Efficiency vs. Camouflage

Research

In order to best gauge our possibilities of access we gathered information relating to the detection of many requests (typically during a portscan or a flooding). We defined the threshold using two values:

  1. Number of accesses
  2. per time unit (in our case, seconds)

To find this data for commonly used products, we used the following sources:

Results

In the following table, the number of requests (Req) per second (Sec). in order to get a unified number that can be compared, we complied the value nr/1S, the number of requests (nR) per second (1S). The arithmetic average of this number is 85.928.

Product Req Sec nR/1S
Aolynk Broadband Router 5 1 5
Astaro Firewall 100 1 100
Avira Internet Security 50 5 10
Billion BiPAC 100 1 100
Bullguard Internet Security 6 0.6 10
Checkpoint Firewall-1 30 20 1.5
Checkpoint Safe@Office 30 20 1.5
Checkpoint UTM-1 30 20 1.5
Checkpoint VPN-1 30 20 1.5
Checkpoint ZoneAlarm 30 20 1.5
Cisco ASA/PIX 8 120 0.07
cPanel lfd 11 260 0.04
Deerfield VisNetic Firewall 3 10 0.3
Inmon Traffic Sentinel 5 600 0.01
Juniper JunOS 10 0.01 2000
Juniper IDP 20 120 0.17
Juniper ScreenOS 10 5 2
Logsurfer+ 100 300 0.33
McAfee Sidewinder 5 30 0.17
Microsoft ISA 10 60 0.17
Microsoft TMG 10 60 0.17
Outpost Firewall 8 1 8
Port Scan Attack Detector 5 5 1
scanlogd 7 3 2.33
Snort 5 60 0.08
SonicWALL 300 1 300
Sophos Endpoint Protection 3 0.3 10
Sophos UTM 3 0.3 10
Watchguard Edge 10 1 10
Zyxel Zywall 30 60 0.5

Some factors stood out. All of them didn’t make our work easier:

Timing of products when detecting portscans

Summary

A reliable guideline for the threshold of port scan detection is the standard value of Checkpoint products. Thirty requests over twenty seconds is a maximum average of 1.5 packets per second, which is the median of the values in this article.

If you are confronted with the same paradoxical requirements as we were then you should go for approximately 1.3 packets per second in order to remain undetected. The offset of 0.2 was chosen as a buffer in order to be absolutely safe and undetected. Using nmap we enabled the switch —max-rate 1.3 in order to maintain that rate.

However, this view is only capable of dealing with standard settings of any product. The further recommendations by vendors, clients and experts as well as the settings that end up being used have to be looked at on an individual basis.

About the Authors

Marc Ruef

Marc Ruef has been working in information security since the late 1990s. He is well-known for his many publications and books. The last one called The Art of Penetration Testing is discussing security testing in detail. He is a lecturer at several faculties, like ETH, HWZ, HSLU and IKF. (ORCID 0000-0002-1328-6357)

Oliver Kunz

Oliver Kunz has been in information security since 2010. Mainly, he deals with incident response, forensics and the security of mobile devices.

Links

You want to test the security of your firewall?

Our experts will get in contact with you!

×
Specific Criticism of CVSS4

Specific Criticism of CVSS4

Marc Ruef

scip Cybersecurity Forecast

scip Cybersecurity Forecast

Marc Ruef

Voice Authentication

Voice Authentication

Marc Ruef

Bug Bounty

Bug Bounty

Marc Ruef

You want more?

Further articles available here

You need support in such a project?

Our experts will get in contact with you!

You want more?

Further articles available here