120 likes | 226 Vues
Dive into advanced network recon strategies including firewall evasion methods and NIDS tricks. Learn elegant solutions and tools to bypass network defenses effectively. Discover the headaches, implementation problems, and weaknesses in code. Enhance your understanding of firewall types and determine the best approach to breach them.
E N D
Compromising a Unix Host Part II An Introduction to Tools and Techniques. -Mike Sconzo
More Network Recon. • Firewall Evasion Techniques • How to get through them • How to get around them • How to figure out the type of Firewall • Network Intrusion Detection System Evasion Techniques • Elegant solutions • Headaches • More Tools • Firewall • Proxy, Determining if a firewall is in your way, Firewall type • NIDS • Evasion, and Headaches
Firewalls *Caution hot to the touch* • Determining if a Firewall is blocking you • Why go through the trouble of evading/disabling/breaking a non-existant Firewall? • TTL (it's not just for routers anymore) • Works great if Firewall is set to Reject Packets • Known host configuration • Compare 'inside' and 'outside' views • Just a simple port scan • If packets are dropped we can tell
What kind of beast is it? • Established the presence of a firewall, now what? • Figure out type of firewall • Stateful • Packet filter • ... • Maybe deduce software/hardware being used • Help narrow down capabilities of the firewall • Implementation problems • What kind of filtering • Source • Destination • Source and Destination?
Going through • Implementation • Weaknesses in code (IPChains) • Problem where packets that were fragmented in a specific way would get through • 'Bad' rules • Not thought-out • Blocking the 'wrong' things • Mis-ordering • Allow before Deny
Going around • Get lucky and find a multi-homed host • Could be easier to compromise • Might be owned by a secretary • Easy to social engr? • Other ways? • DC Phone Home!
NIDS Evasion • Fragment Packets • Was real popular, but companies/projects have caught up • Snort once fell victim to this (2002) • RFP and his wisker tool, made a lot of ground in this area • Other • Signature based only know what they know • Change your attack (slightly) • Polymorphic shell code • URL tricks • Encode URLs • Traversal “/bogusdirector/../vulnerable/script.cgi” • TCP games • Back Packet Data, Fake RST ...
Tools of the trade • Fragrouter (previously know as fragroute, of the dsniff suite) • Used to bypass • Firewalls • NIDS • Paketto (suite) • Interesting layer 2 tools • Fast state-less scanner • Traceroute through stateful firewalls • Nmap • Look for trust relationships • Easily detect packet filters
More tools • Snot • Generates alerts based on a Snort ruleset • Causes a lot of alarms, hard to find the 'real' attack • Snort does have countermeasures • Stick • Similar to Snot • Apparently not as full featured • Nessus • Has built in NIDS evasion techniques • Whisker • Pioneered some of the NIDS evasion • Hping • Custom packet creation
Useful Sites • http://www.doxpara.com/ • http://www.dcphonehome.com/ • Currently dead • http://www.securityfocus.com/tools/176 • http://www.wiretrip.net/rfp/ • http://www.remoteassessment.com/ • http://www.nessus.org/doc/nids.html • http://sooshie.tamu.edu/ • Shamless plug of site list