120 likes | 219 Views
Compromising a Unix Host. Part II An Introduction to Tools and Techniques. -Mike Sconzo. “Stupid Flanders, You're a Genius!” --Homer Simpson. More Network Recon. Firewall Evasion Techniques How to get through them How to get around them How to figure out the type of Firewall
E N D
Compromising a Unix Host Part II An Introduction to Tools and Techniques. -Mike Sconzo
More Network Recon. • Firewall Evasion Techniques • How to get through them • How to get around them • How to figure out the type of Firewall • Network Intrusion Detection System Evasion Techniques • Elegant solutions • Headaches • More Tools • Firewall • Proxy, Determining if a firewall is in your way, Firewall type • NIDS • Evasion, and Headaches
Firewalls *Caution hot to the touch* • Determining if a Firewall is blocking you • Why go through the trouble of evading/disabling/breaking a non-existant Firewall? • TTL (it's not just for routers anymore) • Works great if Firewall is set to Reject Packets • Known host configuration • Compare 'inside' and 'outside' views • Just a simple port scan • If packets are dropped we can tell
What kind of beast is it? • Established the presence of a firewall, now what? • Figure out type of firewall • Stateful • Packet filter • ... • Maybe deduce software/hardware being used • Help narrow down capabilities of the firewall • Implementation problems • What kind of filtering • Source • Destination • Source and Destination?
Going through • Implementation • Weaknesses in code (IPChains) • Problem where packets that were fragmented in a specific way would get through • 'Bad' rules • Not thought-out • Blocking the 'wrong' things • Mis-ordering • Allow before Deny
Going around • Get lucky and find a multi-homed host • Could be easier to compromise • Might be owned by a secretary • Easy to social engr? • Other ways? • DC Phone Home!
NIDS Evasion • Fragment Packets • Was real popular, but companies/projects have caught up • Snort once fell victim to this (2002) • RFP and his wisker tool, made a lot of ground in this area • Other • Signature based only know what they know • Change your attack (slightly) • Polymorphic shell code • URL tricks • Encode URLs • Traversal “/bogusdirector/../vulnerable/script.cgi” • TCP games • Back Packet Data, Fake RST ...
Tools of the trade • Fragrouter (previously know as fragroute, of the dsniff suite) • Used to bypass • Firewalls • NIDS • Paketto (suite) • Interesting layer 2 tools • Fast state-less scanner • Traceroute through stateful firewalls • Nmap • Look for trust relationships • Easily detect packet filters
More tools • Snot • Generates alerts based on a Snort ruleset • Causes a lot of alarms, hard to find the 'real' attack • Snort does have countermeasures • Stick • Similar to Snot • Apparently not as full featured • Nessus • Has built in NIDS evasion techniques • Whisker • Pioneered some of the NIDS evasion • Hping • Custom packet creation
Useful Sites • http://www.doxpara.com/ • http://www.dcphonehome.com/ • Currently dead • http://www.securityfocus.com/tools/176 • http://www.wiretrip.net/rfp/ • http://www.remoteassessment.com/ • http://www.nessus.org/doc/nids.html • http://sooshie.tamu.edu/ • Shamless plug of site list