setiri: advances in trojan technology - def con con 10/def con 10 presentations/de… · trojan...

25
Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002

Upload: others

Post on 18-Oct-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Setiri:

Advances in Trojan Technology

Roelof Temmingh & Haroon Meer

Defcon 10

Las Vegas

2002

Page 2: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Schedule

IntroductionWhy Trojans?

Brief History of Trojans & Covert Channels

The Hybrid modelSetiri: Advances in Trojan Technology

Demonstration

Taking it furtherPossible fixes

Page 3: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Introduction

SensePostThe speakers

Objective of the presentation

Page 4: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Why Trojans?

Profile of Trojan users

Real criminals……don’t write buffer overflows

The weirdness of the industry

Examples

Page 5: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Brief History of Trojans & Covert

Tunnels

TrojansFrom Quick Thinking Greeks …

to Quick Thinking Geeks

TunnelsCovert Channels

Page 6: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Trojans (Valid IP – No Filters)

‚get real..‛

Page 7: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Trojans (Valid IP – Stateless Filter)

Dial Home Trojans

Random Ports / Open Ports / High Ports [cDc]

ACK Tunneling[Arne Vidstrom]

Page 8: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Trojans (Stateful Filters)

Orifice - http://bo2k.sourceforge.netGbotRattler

Page 9: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Brief History of Trojans & Covert

Tunnels

TrojansFrom Quick Thinking Greeks …

to Quick Thinking Geeks

TunnelsCovert Channels

Page 10: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Tunnels & Covert Channels

1985 – TSC Definition‛Covert Channels‛

1996 – Phrack Magazine – LOKI

1998 – RWWWShell – THC

1999 - HTTPTUNNEL – GNU

2000 - FireThru - Firethru

Page 11: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Conventional Trojans & how they fail

Stateful firewall & IDSDirect model

Direct model with network tricksICMP tunnelingACK tunneling

Properly configured stateful firewallIRC agents +

Authentication proxyHTTP tunnel ++

Personal firewall & Advanced ProxyHTTP tunnel with Authentication +++

Page 12: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Hybrid model: “GatSlag”

Combination between covert Tunnel and Trojan

Defenses mechanisms today:

Packet filters (stateful) / NATAuthentication Proxies

Intrusion detection systemsPersonal firewalls

Content/protocol checkingBiometrics/Token Pads/One time passwords

Encryption

Page 13: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

A typical network

Page 14: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

How GatSlag worked

Reverse connectionHTTP covert tunnel

Microsoft Internet Explorer as transport

Controls IE via OLEEncapsulate in IE, not HTTP

Receive commands in title of web pageReceive encoded data as plain text in body of web page

Send data with POST requestSend alive signals with GET request

Page 15: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Why GatSlag worked

Integration of client with MS ProxyNTLM authentication

SSL capableRegistry changes

Personal firewallsJust another browser

Platform independentIE on every desktop

Specify ControllerVia public web page – the MASTER site

Page 16: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Problems with Gatslag

The Controller’s IP can be obtained !Handling of multiple instances

GUI supportController needed to be online

Batch commandsCommand historyMultiple controllers

Upload facility not efficientPlatform support

Stability

Session level tunneling

Page 17: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Setiri:

Advances in Trojan Technology

Design notes:

Web site contains instructionsCGIs to create new instruction

Controller’s interface:–EXEC (DOS commands, various)

–TX (File upload)–RX (File download)

Directory structure – each instanceTrojan ‚surfs‛ to web site – just a normal user would

Page 18: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Setiri:

Advances in Trojan Technology II

AnonymityProblems with normal proxies

Already using a proxyProxy logs

‚Cleaners‛ provide anonymity‚In browser proxy‛ – Anonymizer

Trojan -> Cleaner: SSLCleaner -> Controller: SSL

Challenges:Browser historyTemporary files

Page 19: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology
Page 20: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology
Page 21: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology
Page 22: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Why defenses failFirewalls (stateful/NAT)

Configured to allow user or proxy out

Content level & IDSLooks like valid HTTP requests & repliesFiles downloaded as text in web pages

No data or ports to lock on toSSL provides encryption

Personal firewallsIE valid application

Configured to allow browsing

Authentication proxiesUser surf the web

Page 23: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Demonstration

Page 24: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Solving the dilemma

Delivery

White listing

User education

AV, personal firewalls

Should you allow everyone to surf the ‘net?

Page 25: Setiri: Advances in Trojan Technology - DEF CON CON 10/DEF CON 10 presentations/DE… · Trojan ‚surfs‛ to web site –just a normal user would. Setiri: Advances in Trojan Technology

Conclusion

Awareness

Our motivation