NTP enumeration

An attacker can enumerate the following information by querying an NTP server.

  • List of hosts connected to the NTP server

  • Internal client IP addresses, hostnames and operating system used

Tools

Remediation

  • Restrict the usage of NTP and enable the use of NTPSec, where possible.

  • Filter the traffic with IPTables.

  • Enable logging for the messages and events.