Shell over what?! Naughty CDN manipulations. Roee Cnaan, Information Security Consultant



Similar documents
Basheer Al-Duwairi Jordan University of Science & Technology

Internet Content Distribution

Akamai to Incapsula Migration Guide

Metasploit ing the target machine is a fascinating subject to all security professionals. The rich list of exploit codes and other handy modules of

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic

Security of IPv6 and DNSSEC for penetration testers

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

IndusGuard Web Application Firewall Test Drive User Registration

On-Premises DDoS Mitigation for the Enterprise

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks

Getting Started with AWS. Static Website Hosting

Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski

TUNNA. A tool designed to bypass firewall restrictions on remote webservers. By: Rodrigo Marcos Nikos Vassakis

The importance of Drupal Cache. Luis F. Ribeiro Ci&T Inc. 2013

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014

Content. Global Delivery Network: Folders

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

No Cloud Allowed. Denying Service to DDOS Protection Services

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity

Web Application Worms & Browser Insecurity

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

What to Look for When Choosing a CDN for DDoS Protection Written by Bizety

Kick starting science...

IERG 4080 Building Scalable Internet-based Services

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

Description: Objective: Attending students will learn:

Creating "Origin Pull" on Akamai (1)

1. LAB SNIFFING LAB ID: 10

First Line of Defense to Protect Critical Infrastructure

I Hunt Penetration Testers!

Security Intelligenece: tracking obfuscated and unrecognized attacks Check Point Software Technologies Ltd.


Information Security. Training

Content Delivery Network. Version 0.95

STARTER KIT. Infoblox DNS Firewall for FireEye

Internet Content Distribution

Data Center Content Delivery Network

The Hillstone and Trend Micro Joint Solution

Getting Started with AWS. Hosting a Static Website

Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1

DYNAMIC DNS: DATA EXFILTRATION

Common Server Setups For Your Web Application - Part II

Bridging the gap between COTS tool alerting and raw data analysis

Powered by. Incapsula Cloud WAF

WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA

Analysing the impact of CDN based service delivery on traffic engineering

SSDP REFLECTION DDOS ATTACKS

Akamai CDN, IPv6 and DNS security. Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013

Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?

IAAS REFERENCE ARCHITECTURES: FOR AWS

Analyzing HTTP/HTTPS Traffic Logs

Operation Liberpy : Keyloggers and information theft in Latin America

We Know It Before You Do: Predicting Malicious Domains

Cisco Videoscape Distribution Suite Service Broker

Getting Started with AWS. Hosting a Static Website

Inside-Out Attacks. Security Event April 28, 2004 Page 1. Responses to the following questions

Arbor s Solution for ISP

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

PROFESSIONAL SECURITY SYSTEMS

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

Covert Operations: Kill Chain Actions using Security Analytics

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Real Life DoS/DDOS Threats and Benefits of Deep DDOS Inspection. Oğuz YILMAZ CTO Labris Networks

Web Application Hosting Cloud Architecture

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications

Security A to Z the most important terms

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

NERC CIP Version 5 and the PI System

How To Protect A Dns Authority Server From A Flood Attack

DNS Record Injection Vulnerabilities in Home Routers

First Line of Defense

How To Understand The Power Of A Content Delivery Network (Cdn)

Intro to Firewalls. Summary

2010 Carnegie Mellon University. Malware and Malicious Traffic

Global Service Loadbalancing & DNSSEC. Ralf Brünig Field Systems Engineer r.bruenig@f5.com DNSSEC

STATE OF DNS AVAILABILITY REPORT

Content Distribution Networks (CDN)

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

UNMASKCONTENT: THE CASE STUDY

TDC s perspective on DDoS threats

Penetration Testing with Kali Linux

EE 7376: Introduction to Computer Networks. Homework #3: Network Security, , Web, DNS, and Network Management. Maximum Points: 60

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

The Pentester s Guide to Akamai

BSIDES Las Vegas Secret Pentesting Techniques Shhh...

Transcription:

Shell over what?! Naughty CDN manipulations Roee Cnaan, Information Security Consultant

About me (mister) Penetration Tester DDoS fitness tester Python and Scapy programmer SCADA and ICS attacker

Tools and Projects

Tools and Projects DNS and HTTP Trojan Performs Download and Execute of encrypted PE over HTTP Controlled by an encrypted DNS channel Can be hibernated for a while Written in Python

Tools and Projects White-hat DDoS botnet Scalable to a few Tb/s Performs dozens of L3,L4 and L7 attacks Written in Python Actively used by anti-ddos appliance vendors and CDNs

CDN

CDN Content Distribution Network Or Content Delivery Network Akamai CloudFlare Incapsula Amazon Cloudfront

CDN CDN typical setup Caching the content of client s website Visitors served with cached content Unfulfilled requests are served from the CDN, never directly

CDN CDN advantages Better performance A very good DDoS protection Hiding the client s real IP address Users see communication only with the CDN

Tase.co.il

CDN To sum it A great practice Provides outstanding bundle of performance and security Widely used

HTTP Shell

HTTP Shell HTTP shell (Actually, Reverse HTTP shell) Well known malicious communication channel Less suspicious by nature HTTP traffic Easy to manipulate Payload, parameters headers, etc

HTTP Shell How Reverse HTTP shell works? Attacker listens with a web server Victim communicates with the server by GET and POST GET from server to victim POST From victim to server Raw or encrypted data is carried as the payload Many other ways to carry the traffic headers, parameters etc

HTTP Shell

Reverse HTTP Shell over CDN? damn

Demo

Shell over CDN How it works? Shell performs GET request to FQDN (www.example.com) DNS resolves query to a CDN IP CDN knows Origin Server real IP Shell talks with CDN CDN talks with Origin Sever (Kali) Game on!

Shell over CDN Using CDN features In our favor CDN hides origin server? We are the origin Multiple POP of CDN; Different geo-location resolves to different IP IP is white-listed by best practices! IPv6! IPv6!

Domain X1 CDN account X1 (Free) Server X1 (Kali EC2 is great) 1. Register your domain with the registrar 2. Change registrar s DNS to CDN DNS 3. Add an A record to CDN, pointing to your server 4. Setup the server. Metasploit is good enough 5. Setup the client. Metasploit is good enough 6. Replace IPs with FQDN of your domain at setup 7. PROFIT

Shell over CDN Great way to exploit CDN features Escape as while-listed Easy setup

Wait! There s more!

Coral CDN www.coralcdn.org

Coral CDN Free and open CDN Based on peer-to-peer Nodes are caching the traffic like a CDN POP Usage : add nyud.net to URL

Coral CDN

Guess what s next? Shell Over Coral CDN!

Demo

Shell over Coral CDN

Shell over Coral CDN

Shell over Coral CDN What happened? We got error 405 Method Not Allowed Coral CDN does NOT support POST method! Meterpreter Works with GET and POST

Shell over Coral CDN Python! Wrote quick HTTP shell using GET only

Demo

Shell Over Coral CDN

Shell Over Coral CDN Pros : Each request with a new IP Twisted reverse TOR Can be concatenated to other CDNs Cons : Not built for performance

Mitigation

Mitigation Challenging by nature Traffic is valid at L4 and L7 Deep Packet Inspection Anomaly detection

Questions

Thank you roee@cipher-security.com www.cipher-security.com