OWASP Atlanta Chapter Meeting OWASP APR The OWASP Foundation Filter Evasion Techniques

Similar documents
Pass4sure q. Cisco Securing Cisco Networks with Sourcefire IPS

Hackveda Training - Ethical Hacking, Networking & Security

Activating Intrusion Prevention Service

Managing SonicWall Gateway Anti Virus Service

Base64 The Security Killer

Exam Questions v8

Hands-On Ethical Hacking and Network Defense

The following topics describe how to configure correlation policies and rules.

Performance Tuning Snort. Steve Sturges SANS Incident Detection Summit 9 December

Penetration Testing with Kali Linux

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng

NIDS: Snort. Group 8. Niccolò Bisagno, Francesco Fiorenza, Giulio Carlo Gialanella, Riccardo Isoli

Router and ACL ACL Filter traffic ACL: The Three Ps One ACL per protocol One ACL per direction One ACL per interface

CNIT 129S: Securing Web Applications. Ch 10: Attacking Back-End Components

CISNTWK-440. Chapter 5 Network Defenses

EasyCrypt passes an independent security audit

Pluggable Transports Roadmap

Internet Security: Firewall

Application Detection

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

Interested in learning more about security? Beating the IPS. Copyright SANS Institute Author Retains Full Rights

CIT 480: Securing Computer Systems

Corrigendum 3. Tender Number: 10/ dated

Lecture Overview. IN5290 Ethical Hacking. Lecture 4: Web hacking 1, Client side bypass, Tampering data, Brute-forcing

RBS NetGain Enterprise Manager Multiple Vulnerabilities of 11

W is a Firewall. Internet Security: Firewall. W a Firewall can Do. firewall = wall to protect against fire propagation

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

DDOS RESILIENCY SCORE (DRS) "An open standard for quantifying an Organization's resiliency to withstand DDoS attacks" Version July

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

CyberP3i Course Module Series

Network Intrusion Detection Systems. Beyond packet filtering

Configuring Virtual Servers, Maps, and Policies

Computer Network Vulnerabilities

CSE361 Web Security. Attacks against the server-side of web applications. Nick Nikiforakis

Managing Latency in IPS Networks

ASA Access Control. Section 3

Configuring attack detection and prevention 1

Computer Security and Privacy

CNIT 129S: Securing Web Applications. Ch 12: Attacking Users: Cross-Site Scripting (XSS) Part 2

SOLUTION BRIEF REMOTE ACCESS: WEBSHELLS SEE EVERYTHING, FEAR NOTHING

Getting Started with Access Control Policies

Curso: Ethical Hacking and Countermeasures

Evaluation Criteria for Web Application Firewalls

Ethical Hacking and Prevention

Configuring Virtual Servers, Maps, and Policies

Application Layer Attacks. Application Layer Attacks. Application Layer. Application Layer. Internet Protocols. Application Layer.

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr.

* Knowledge of Adaptive Security Appliance (ASA) firewall, Adaptive Security Device Manager (ASDM).

Detecting Specific Threats

Chapter 7. Network Intrusion Detection and Analysis. SeoulTech UCS Lab (Daming Wu)

Access Control Using Intrusion and File Policies

Penetration Test Report

Advanced API Security

CSE 565 Computer Security Fall 2018

Polymorphic Blending Attacks. Slides by Jelena Mirkovic

Connection Logging. Introduction to Connection Logging

Access Control Using Intrusion and File Policies

THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY

Zero Day Attack Prevention via Single Packet Authorization

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

Connection Logging. About Connection Logging

Table of Contents...2 Abstract...3 Protocol Flow Analyzer...3

New Features and Functionality

ch02 True/False Indicate whether the statement is true or false.

Host Identity Sources

DLP FAIL!!! Using Encoding, Steganography and Covert Channels to Evade DLP and other Critical Controls

Configuring attack detection and prevention 1

Chapter 6 Global CONFIG Commands

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

Application Protocol Breakdown

Intrusion Detection - Snort

Configuring RTP Header Compression

Chapter 2 Advanced TCP/IP

Michael Rash DEFCON 12 07/31/2004

Intrusion Detection - Snort

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking

CSC Network Security

Our sponsors Zequi V Autopsy of Vulnerabilities

Vulnerability Validation Tutorial

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

CSC 574 Computer and Network Security. TCP/IP Security

Common Websites Security Issues. Ziv Perry

Using Ethereal As A Tool For Network Security Mentor: Mr. Christopher Edwards Team Members: Jerome Mitchell, Anthony Anderson, and Napoleon Paxton

Protecting Information Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protecting Information Assets

Computer Security 3e. Dieter Gollmann. Chapter 18: 1

Engineering Your Software For Attack

Web Application Security Statistics Project 2007

Certified Secure Web Application Engineer

Chapter 9. Firewalls

Certified Snort Professional VS-1148

CS 161 Computer Security

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

Intrusion Prevention Performance Tuning

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE

Evasion of High-End IDPS Devices at the IPv6 Era

Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development

CSE/EE 461 Lecture 13 Connections and Fragmentation. TCP Connection Management

Transcription:

Atlanta Chapter Meeting Filter Evasion Techniques 04.25.09 APR 2009 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the License. The Foundation http://www.owasp.org

Roadmap Announcements & Acknowledgements (Tony UV) Filter Evasion Presentation (Rob Ragan) Hands On Workshop Meeting Wrap Up (Tony UV) Upcoming events 2

Announcements & Acknowledgements Atlanta Case Study Team International/ National Chapter News Projects Atlanta Logo Request Meeting Locations Membership Sponsor Acknowledgements 3

Workshop FILTER EVASION 4

Filter Evasion Why? Cybercriminals are using evasion techniques Targets are relying on IPS/WAF/Firewalls Filter shortcomings need to be identified What? Value comes from building evasion techniques into the testing process Developers & QA need to test the strength of their sanitizers and validators. 5

Filters are a road block 6

Filters are a road block Unfortunately sometimes they re poorly designed 7

Whisker's anti-ids tactics 1999 Method matching GET HEAD Url encoding HEX %xx notation Double slashes '/' '//' Reverse traversal /dir/blahblah/../ Self-reference directories /dir/./././././ == /dir/ Premature request ending Stop at the first HTTP/1.?\r\n Parameter hiding %3f? HTTP mis-formatting %20 %09 (TAB) Long Urls GET /<random>/../dir/a.cgi DOS/Win directory syntax '/' '\' NULL method processing GET\0 Case sensitivity 'abc' 'ABC' Details @ http://www.wiretrip.net/rfp/txt/whiskerids.html 8

Whisker s Session Splicing Network level attack Not the same as IP fragmentation Send parts of the request in different packets "GET / HTTP/1.0" may be split across multiple packets to be "GE", "T ", "/", " H", "T", "TP", "/1", ".0" 9

IP Fragmentation vs Session Splicing IP Fragmentations Packet is too large for the link layer a router can split it into multiple fragments Session Splicing Purposefully delivering the payload over multiple packets to evade detection. Smaller than it needs to be. Defense Fragment reassembly Session reassembly Send a reset [RST] 10

Session Splicing 1999 vs 2009 The current implementation in whisker will result in 1-3 characters in each packet, depending on your system and network speed 1999 2009 11

Evade Passive Filters Pragmatic Session Splicing + Timing Attack Use the filter s signatures to split the payload Vulnerable if the IDS stateful inspection timeout is less than session reassembly of the hosts it protects Similar to fragmentation attack but instead of at the IP level we move up to the TCP level 12

Time Splicer The attack is practical if we split the session on the matches found by the signature we're trying to evade Attack: GET /index.php?param=<script>alert(123)</script> HTTP/1.1 Host:www.target.com Signature: Matches on <script> </script> tags Know the stateful inspection timeout for the IDS Recursively find matches and split the attack string, then send each splice in a new packet with time delay between each packet 13

Snort Preprocessors HTTP Inspect + Stream4 Stateful inspection Default timeout is 30 seconds # stream4: stateful inspection/stream reassembly for Snort #------------------------------------------------------------ # Use in concert with the -z [all est] command line switch to defeat stick/snot against TCP rules. Also performs full TCP stream reassembly, stateful inspection of TCP streams, etc. Can statefully detect various portscan types, fingerprinting, ECN, etc. # stateful inspection directive # no arguments loads the defaults (timeout 30, memcap 8388608) 14

POST /rootlogin.asp HTTP/1.1 Host: zero.spidynamics.com Keep-Alive: 300 Content-Type: application/x-www-form-urlencoded Content-Length: 102 txtpassphrase=&txtname=%3cs WAIT 30s cript%3ealert%283%29%3c%2f WAIT 30s script%3e&txthidden=this+was+hidden+from+the+user 15

16

17

Timing Attacks Are Fun What else can we do? Fingerprint the Server and Application technology based on timeout Fingerprint an IPS 18

Generic Archive Evasion Bypass scanning engines with archive files Password protect Modify file format Effects AV gateway products E-mail WWW Get malware to the target Use a custom unpacker to execute Recent advisories by Thierry Zoller @ http://zoller.lu 19

Range Header Evasion Only examining magic numbers is weak FindMimeFromData Function in IE Determines MIMIE type from first 256 bytes Avoid fake content-types used as XSS images Use Range to request only a portion of a file containing an attack Range: bytes=257-2048 Flash used to allow the Range and Range- Request header XMLHttpRequest still does! Reference: http://events.ccc.de/congress/2007/fahrplan/attachments/1054_unusual_web_bugs.pdf 20

Questions about filters or evasions? 21

Hands-on Time LET. US. HACK. 22

Meeting Wrap-Up Up Coming Meetings/ Workshops Atlanta Board Social Events Drinks @ Vortex 878 Peachtree St NE # 4, Atlanta, GA (404) 875-1667 23