Open In App

What is NTP Enumeration?

NTP Enumeration is a process by which an attacker can discover NTP servers on the network. This information can then be used to find vulnerable NTP servers, or simply to further enumerate the network. Servers that are allowed access from the internet usually have a much higher chance of being exploitable. An attacker will often use both DNS and brute force methods to find these servers, as well as using Shodan.io or Censys to find unprotected devices.

Exploit Vulnerability:

While NTP servers are typically given special access to the network, they do not always have to be on the same network. For example, an attacker may compromise a server with an open port and use NTP to take a list of hosts that are connected to him/her. The attacker can then send that list to scanners that scan for vulnerable hosts. The difference between this and other types of vulnerability is the amount of research involved and harder exploitation options. This can be used against wireless networks because many manufacturers will disable wireless access from their default factory settings. There are also less obvious ways to use it as well, such as traffic mirroring.

 

Properties:

NTP Security Model:

Important Points:

Conclusion:

NTP is an old protocol that reveals less information about the network, more than other protocols. There are some types of vulnerabilities in NTP servers, and even if it’s not a serious issue, it’s always better to at least make sure the server is patched before connecting to it. Security expert Bruce Schneier says this about NTP: “NTP has been used for years as a legitimate way to share clock timing between devices so that they know what time it is and can be synchronized. However, serious vulnerabilities have always been there and remain today. Since they’re easy to exploit, NTP should be kept off the corporate network.”

Article Tags :