Bypassing Firewall. @ PISA AGM Theme Seminar 2005. Presented by Ricky Lou Zecure Lab Limited



Similar documents
Inside-Out Attacks. Covert Channel Attacks Inside-out Attacks Seite 1 GLÄRNISCHSTRASSE 7 POSTFACH 1671 CH-8640 RAPPERSWIL

Inside-Out Attacks. Security Event April 28, 2004 Page 1. Responses to the following questions

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Internet Privacy Options

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

Multi-Homing Dual WAN Firewall Router

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Network Security Fundamentals

7.1. Remote Access Connection

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Solution of Exercise Sheet 5

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Chapter 11 Phase 5: Covering Tracks and Hiding

Cisco Configuring Commonly Used IP ACLs

Virtual Private Networks

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Computer Networks. Secure Systems

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Firewall Firewall August, 2003

DMZ Network Visibility with Wireshark June 15, 2010

CSCE 465 Computer & Network Security

EXPLORER. TFT Filter CONFIGURATION

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Internet Protocol: IP packet headers. vendredi 18 octobre 13

PIX/ASA 7.x with Syslog Configuration Example

Chapter 6 Virtual Private Networking Using SSL Connections

CSCI Firewalls and Packet Filtering

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Chapter 4 Firewall Protection and Content Filtering

Chapter 12 Supporting Network Address Translation (NAT)

Firewalls. Chapter 3

Basic Network Configuration

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Enterprise Edge Communications Manager. Data Capabilities

Network Configuration Settings

NETASQ MIGRATING FROM V8 TO V9

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Networking Basics and Network Security

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Networking for Caribbean Development

Network Security Firewall Manual Building Networks for People

Exam Questions SY0-401

Copyright 2006 Comcast Communications, Inc. All Rights Reserved.

Firewalls, Tunnels, and Network Intrusion Detection

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

General Network Security

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Fig : Packet Filtering

Firewalls (IPTABLES)

Cyber Essentials. Test Specification

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Security perimeter. Internet. - Access control, monitoring and management. Differentiate between insiders and outsiders - Different types of outsiders

Firewall Defaults and Some Basic Rules

Security Technology: Firewalls and VPNs

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

Post-Class Quiz: Telecommunication & Network Security Domain

Firewalls and Virtual Private Networks

Network Address Translation (NAT) Virtual Private Networks (VPN)

Cisco Secure PIX Firewall with Two Routers Configuration Example

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Chapter 32 Internet Security

Network Security CS 192

Network Security Firewall Manual Building Networks for People

Introduction to Computer Security Benoit Donnet Academic Year

Chapter 9 Firewalls and Intrusion Prevention Systems

Security threats and network. Software firewall. Hardware firewall. Firewalls

Security. TestOut Modules

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls. Network Security. Firewalls Defined. Firewalls

Proxies. Chapter 4. Network & Security Gildas Avoine

Load Balance Router R258V

Cornerstones of Security

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces

Using a VPN with Niagara Systems. v0.3 6, July 2013

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

21.4 Network Address Translation (NAT) NAT concept

Figure 41-1 IP Filter Rules

Firewalls P+S Linux Router & Firewall 2013

Technical Support Information Belkin internal use only

Network Defense Tools

F-SECURE MESSAGING SECURITY GATEWAY

Accessing Remote Devices via the LAN-Cell 2

Transcription:

Bypassing Firewall @ PISA AGM Theme Seminar 2005 Presented by Ricky Lou Zecure Lab Limited

Firewall Piercing (Inside-Out Attacks) Disclaimer We hereby disclaim all responsibility for the following hacks. If it backfires on you in any way whatsoever, that s the breaks. Not our fault. If you don t understand the risks inherent in doing this, don t do it. If you use the hacks and it allow vicious vandals to break into your company s computers and costs you your job and your company millions of dollars. Don t come crying to us.

Firewall Piercing (Inside-Out Attacks) Moral A firewall cannot protect a network against its own internal users, and should not even try to.

Firewall Piercing (Inside-Out Attacks) Inside-Out attacks try to initiate network connections from the trusted (corporate) to the un-trusted (Internet) network. Synonym Inside-Out Network subversion Inside-Out Attack Covert Channel Attack

Firewall Piercing (Inside-Out Attacks) A Covert Channel is a communication channel that allows a process to transfer information in a manner that violates the system s security policy; without alerting any firewalls and IDS s on the network. The technique derives its stealthy nature by virtue of the fact that it sends traffic through ports that most firewalls will permit through.

Firewall Piercing (Inside-Out Attacks) Direct Tunnels (Simple) ACK tunnel TCP tunnel (pop, telnet, ssh) UDP tunnel (syslog, snmp) ICMP tunnel IPSEC, PPTP

Firewall Piercing (Inside-Out Attacks) Proxified Tunnels (Advance) Socks SSL tunnel HTTP/S tunnel (payload of http = tunnel) HTTP/S proxy CONNECT method tunnel DNS tunnel FTP tunnel Mail tunnel; http://www.detached.net/mailtunnel/ MSN tunnel; http://gray-world.net/pr_msnshell.shtml

Firewall Piercing (Inside-Out Attacks) Ethernet Bridging over TCP/UDP (Advance and Bloody) Layer 3 data (eg. IP, IPX, AppleTalk) can be encapsulated, encrypted and tunneled through Layer 4 protocol (TCP/UDP) Can run arbitrary any kind of TCP/IP applications behind a restrictive firewall Original IP address could be changed making it more stealthy Open VPN; http://openvpn.net/ Implementation: http://www.zecurelab.com

Example of Covert Channel Attacks Netcat http://netcat.sourceforge.net very good for building reverse tunnel (i.e. Information flow through the other ways)

Example of Covert Channel Attacks DNS Tunnel domain name lookup is allowed by any internal client

Example of Covert Channel Attacks SSH Tunnel (Simple) TCP/IP Gender Changer Requires SSH port allowed by firewall

Example of Covert Channel Attacks SSH Tunnel (Advanced) TCP/IP Gender Changer SSH over SSL Connect HTTPS Proxy Connect-Method Requires HTTPS allowed for any destinations http://gray-world.net/pr_firepass.shtml http://bypass.cc Comment content-filter does not help (SSL)

Example of Covert Channel Attacks HTTP/S Tunnel Using POST requests Implementing own service POST requests POST data are in binary form Implementations http://www.nocrew.org/software/httptunnel.html http://entreelibre.com/cctt/index_en.html

Example of Covert Channel Attacks ICMP Tunnel Reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets. Implementations http://www.cs.uit.no/~daniels/pingtunnel/ http://www.securiteam.com/tools/5pp0m0k60o.html http://www.bo2k.com/

Example of Covert Channel Attacks Ethernet Bridging over TCP/UDP Reliably tunnel any network protocol (e.g. IP, IPX, AppleTalk) connections to a remote gateway using any TCP/UDP packets. This demonstration concentrates on IP only. A new identity (IP address) will be assigned. A new default gateway, DNS entry will be acquired. Your corporate LANs and the remote LANs are now unify.

Example of Covert Channel Attacks Ethernet Bridging over TCP/UDP (con t) Implications More stealthy Hard to trace Location-tracking Hide BT Traffic (seed) Privacy and freedom online Anonymous Surfing Identity Protection

Firewall Piercing (Inside-Out Attacks) Mitigation Un-plug your network cables Firewall: deny any to any rules Content-Filter http traffic: deny unwanted content-type Firewall: restrict http/s locations Firewall: restrict ipsec locations Content-filter: deny anonymizer websites

Firewall Piercing (Inside-Out Attacks) White-listing vs. Black-listing Listing of the allowed resources = white-listing Listing of the denied resources = black-listing White-listing is more secure Black-listing is easier to handle (convenience)

Contact E-mail RickyLou@ZecureLab.com MSN RickyLou@RickyLou.com