penetrating firewalls

17
Sheetal joseph Penetrating Firewalls Presented by Sheetal Joseph

Upload: angel-mercado

Post on 06-Apr-2018

246 views

Category:

Documents


0 download

TRANSCRIPT

8/3/2019 Penetrating Firewalls

http://slidepdf.com/reader/full/penetrating-firewalls 1/17

Sheetal joseph

Penetrating Firewalls

Presented by 

Sheetal Joseph

8/3/2019 Penetrating Firewalls

http://slidepdf.com/reader/full/penetrating-firewalls 2/17

Sheetal joseph

Road Map

Public information leakage (passive recon).

Fingerprinting a firewall type (active recon)

Firewalk

Paratrace

Loki attack

Reverse www shell

8/3/2019 Penetrating Firewalls

http://slidepdf.com/reader/full/penetrating-firewalls 3/17

Sheetal joseph

Public Information Leakage

Company name: BankofMumbai

Location: xyz, Mumbai

 Job Category: Network Administrator

Skills: Working knowledge of Microsoft NT Server, WindowsXP, Microsoft ISA.proxy and HP Openview

Cisco PIX, Juniper SSL VPN, Juniper Netscreen, 802.11wireless devices

8/3/2019 Penetrating Firewalls

http://slidepdf.com/reader/full/penetrating-firewalls 4/17

Sheetal joseph

Public Information Leakage

8/3/2019 Penetrating Firewalls

http://slidepdf.com/reader/full/penetrating-firewalls 5/17

Sheetal joseph

Fingerprinting Using Default Ports

8/3/2019 Penetrating Firewalls

http://slidepdf.com/reader/full/penetrating-firewalls 6/17

Sheetal joseph

 Traceroute, tracert 

8/3/2019 Penetrating Firewalls

http://slidepdf.com/reader/full/penetrating-firewalls 7/17Sheetal joseph

Firewalk 

Finds the open ports on a Firewall.

Sends TCP or UDP packets with an IP TTL evaluated toexpire just one hop past the firewall.

If the firewall allows the traffic in, then it will send thepackets to target where the TTL will get zero and the target will elicit a TTL exceeded on transit back to attacker.

If the firewall does not allow the traffic in, then we will not see any packet back which means the port is closed.

8/3/2019 Penetrating Firewalls

http://slidepdf.com/reader/full/penetrating-firewalls 8/17Sheetal joseph

Paratrace

Paratrace can identify routing devices behind a statefulpacket firewall, even if they have been network addresstranslated.

Utilises the way routers work on the Internet and therefore isnot an actual coding error on the vendor’s behalf,but ageneral weakness in the design of IPv4.

The systems affected by this are any routing devices that comply with the IPv4 RFC’s.

The protocols utilised in the exploit are TCP and ICMP.

8/3/2019 Penetrating Firewalls

http://slidepdf.com/reader/full/penetrating-firewalls 9/17Sheetal joseph

DOD Standard –  Transmission Control Protocol

2.6. Reliable Communication

When the TCP transmits a segment, it puts a copy on aretransmission queue and starts a timer; when theacknowledgement for that data is received, the segment isdeleted from the queue. If the acknowledgement is not received before the timer runs out, the segment isretransmitted (DOD Standard TCP, Section 2.6)

8/3/2019 Penetrating Firewalls

http://slidepdf.com/reader/full/penetrating-firewalls 10/17Sheetal joseph

Summary of attack 

1. Attacker runs Paratrace program with the target of the webserver

2. Attacker then connects to web server

3. The Paratrace program creates duplicates of the TCP packetsand sends them onto the target network. These packets havelow TTL values.

4. Routing devices that see the TCP packets with TTL 1,decrement the value to 0, drop the packet and send an

ICMP “Time Exceeded” messageback to the originator of the TCP packets, the attacker.

5. Attacker receives the ICMP messages and creates a map of the internal network.

8/3/2019 Penetrating Firewalls

http://slidepdf.com/reader/full/penetrating-firewalls 11/17Sheetal joseph

Step 1 – Establish Connection with Web Server 

8/3/2019 Penetrating Firewalls

http://slidepdf.com/reader/full/penetrating-firewalls 12/17Sheetal joseph

Step 2 – Paratrace Goes Active

8/3/2019 Penetrating Firewalls

http://slidepdf.com/reader/full/penetrating-firewalls 13/17Sheetal joseph

 Tcpdump Trace

8/3/2019 Penetrating Firewalls

http://slidepdf.com/reader/full/penetrating-firewalls 14/17Sheetal joseph

Step 3 - Paratrace Collates ICMP Returns

8/3/2019 Penetrating Firewalls

http://slidepdf.com/reader/full/penetrating-firewalls 15/17Sheetal joseph

Loki

Loki exploits the covert channel that exists inside of ICMP_ECHO traffic.

 Arbitrary information tunneling in the data portion of 

ICMP_ECHO and ICMP_ECHOREPLY packets.We can encapsulate (tunnel) any information we want.

8/3/2019 Penetrating Firewalls

http://slidepdf.com/reader/full/penetrating-firewalls 16/17Sheetal joseph

Reverse www

 A program is run on the internal host, which spawns a childevery day at a special time.

Child executes a local shell and connects to the hacker via a

http request with a ready signalThe legitimate answer of the hacker is the commands thechild would execute on its machine in the local shell

8/3/2019 Penetrating Firewalls

http://slidepdf.com/reader/full/penetrating-firewalls 17/17Sheetal joseph

Summary  

 :   

- )