Wednesday, 3 August 2016

Bypassing Firewall

Firewall Piercing (Inside-Out Attacks)
Disclaimer
Wehereby disclaim all responsibility for the following hacks. If it backfires on you in any way whatsoever, that’s the breaks. Not our fault. If you don’t understand the risks inherent in doing this, don’t do it. If you use the hacks and it allow vicious vandals to break into your company’s computers and costs you your job and your company millions of dollars. Don’t come crying to us.
Firewall Piercing (Inside-Out Attacks)
Moral

A firewall cannot protect a network against its own internal users, and should not even try to.
Inside-Out attacks try to initiate network connections from the trusted (corporate) to the un-trusted (Internet) network.
Synonym …Inside-Out Network subversion …Inside-Out Attack …Covert Channel Attack
Firewall Piercing (Inside-Out Attacks)
A Covert Channel is a communication channel that allows a process to transfer information in a manner that violates the system’s security policy; without alerting any firewalls and IDS’son the network.
The technique derives its stealthy nature by virtue of the fact that it sends traffic through ports that most firewalls will permit through.
Firewall Piercing (Inside-Out Attacks)
Direct Tunnels (Simple) …ACK tunnel …TCP tunnel (pop, telnet, ssh) …UDP tunnel (syslog, snmp) …ICMP tunnel …IPSEC, PPTP
Firewall Piercing (Inside-Out Attacks)
ProxifiedTunnels (Advance) …Socks SSL tunnel …HTTP/S tunnel (payload of http = tunnel) …HTTP/S proxy CONNECT method tunnel …DNS tunnel …FTP tunnel …Mail tunnel; http://www.detached.net/mailtunnel/ …MSN tunnel; http://gray-world.net/pr_msnshell.shtml
Firewall Piercing (Inside-Out Attacks)
Ethernet Bridging over TCP/UDP (Advance and Bloody) …Layer 3 data (eg. IP, IPX, AppleTalk) can be encapsulated, encrypted and tunneled through Layer 4 protocol (TCP/UDP) …Can run arbitrary any kind of TCP/IP applications behind a restrictive firewall …Original IP address could be changed making it more stealthy …Open VPN; http://openvpn.net/ …Implementation: http://www.ZecureLab.com
Firewall Piercing (Inside-Out Attacks)
Netcat …http://netcat.sourceforge.net …very good for building reverse tunnel (i.e. Information flow through the other ways)
Example of Covert Channel Attacks
DNS Tunnel …domain name lookup is allowed by any internal client
Example of Covert Channel Attacks
SSH Tunnel (Simple) …TCP/IP Gender Changer …Requires SSH port allowed by firewall
Example of Covert Channel Attacks
SSH Tunnel (Advanced) …TCP/IP Gender Changer …SSH over SSL Connect …HTTPS Proxy Connect-Method …Requires HTTPS allowed for any destinations …http://gray-world.net/pr_firepass.shtml …http://bypass.cc Comment …content-Filter does not help (SSL)
Example of Covert Channel Attacks
HTTP/S Tunnel …Using POST requests …Implementing “own”service POST requests …POST data are in binary form Implementations …http://www.nocrew.org/software/httptunnel.html …http://entreelibre.com/cctt/index_en.html
Example of Covert Channel Attacks
ICMP Tunnel …Reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets. Implementations …http://www.cs.uit.no/~daniels/PingTunnel/ …http://www.securiteam.com/tools/5PP0M0K60O.html …http://www.bo2k.com/
Example of Covert Channel Attacks
Ethernet Bridging over TCP/UDP …Reliably tunnel any network protocol (e.g. IP, IPX, AppleTalk) connections to a remote gatewayusing any TCP/UDP packets. …This demonstration concentrates on IP only. …A new identity (IP address) will be assigned. …A new default gateway, DNS entry will be acquired. …Your corporate LANs and the remote LANs arenow unify. Example of Covert Channel Attacks
Ethernet Bridging over TCP/UDP (con’t) …Implications „More stealthy „Hard to trace „Location-tracking „Hide BT Traffic (seed) „Privacy and freedom online „Anonymous Surfing „Identity Protection Example of Covert Channel Attacks
Mitigation …Un-plug your network cables …Firewall: deny “any to any rules” …Content-Filter http traffic: deny unwanted content-type …Firewall: restrict http/s locations …Firewall: restrict ipseclocations …Content-filter: deny anonymizerwebsites
Firewall Piercing (Inside-Out Attacks)
White-listing vs. Black-listing …Listing of the allowed resources = white-listing …Listing of the denied resources = black-listing …White-listing is more secure …Black-listing is easier to handle (convenience)

No comments:

Post a Comment