Abstract
Having reviewed some of the issues in NTP security, the next step is to take a closer look at some of the vulnerabilities. The goal of this chapter is not to cover specific vulnerabilities, but instead look at how vulnerabilities in NTP can be exploited and the potential damage those exploits can cause to an organization.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Both code samples retrieved from the NTP Project Bug Page at http://bugs.ntp.org/attachment.cgi?id=1159&action=diff , accessed August 14, 2016.
- 2.
Metasploit code retrieved from the Metasploit GitHub page at https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/ntp/ntp_overflow.rb , accessed August 14, 2016.
- 3.
Code sample retrieved from the NTP Project Bug Page at: http://bugs.ntp.org/show_bug.cgi?id=2667 , accessed August 16, 2016
- 4.
Schwartz, Mathew. "DDoS Attack Hits 400 Gbit/s, Breaks Record." Dark Reading, UBM, Nov. 2, 2014. Accessed Aug. 31, 2016.
- 5.
Ntpdos code retrieved from GitHub at: https://github.com/vpnguy/ntpdos , accessed August 31, 2016.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Allan Liska
About this chapter
Cite this chapter
Liska, A. (2016). Vulnerabilities in NTP. In: NTP Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2412-0_3
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2412-0_3
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2411-3
Online ISBN: 978-1-4842-2412-0
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books