Network Evasion
Ways to accomplish evasion
Fragmenting packets - break down packets before they are sent to IDS can't recognize them and sees them as useless chatter
Spoofing an IP address - use a packet crafting tools to obscure the source IP address of packets. Data coming back to the fake address will not be seen by the attacker.
Tools: Hping, Scapy, Komodia
Source routing
Originally designed to allow applications to specify the route a packet takes to a destination, ignoring what the route tables between the two systems say
It was deprecated long ago
Attacker could use an IP address of another machine on the subnet and have all the return traffic sent back
Doesn't really work in modern networks because firewalls and routers detect and block source-routed packets
IP Address Decoy
Hide the real source of the scan by hiding it among a bunch of decoy source addresses (making it look like the decoys are also scanning)
Proxies
a system you set up to act as a middle man between you and your targets
used by network admins to control traffic and provide security for internal users
can be in a single location or spread across multiple proxies
Proxy Chain Tools
Proxy Switches
Proxy Workbench
ProxyChains
SoftCab's Proxy Chain Builder
CyberGhost
Proxifier
Onion Routing (TOR)
installs a small client on your machine
gets a list of other clients running Tor from a directory server
communication between Tor clients is encrypted
![[../../../Screenshots/TOR.png]]
Anonymizers
services on the Internet that make use of a web proxy to hide your identity
Tools
Guardster
Ultrasurf
Psiphon
Tails
HTTP tunneling
firewall evasion technique
wrapping traffic within an HTTP shell
Works because port 80 is almost never filtered
Devices Aligned Against the Attacker
Intrusion Detection Systems (IDSs)
hardware and/or software devices that examine streams of packets for unusual or malicious behavior
Types of IDSs
Signature based
IDS compares packets against a list of known traffic patterns that indicate an attack
Only as good as the signature list, if it is not kept up to date, new intrusions may go undetected.
Anomaly (behavior based)
decisions on alerts based on learned behavior and "normal" patterns
better at picking up the latest attacks
can generate a lot of false positives
Host-based IDS
usually a software program that lives on the host itself
usually signature based
IDS Evasion tools
ADMutate
Nessus
NIDSbench
Inundator
IDS Informer
Snort
An open source IDS that combines the benefits of signature, protocol and anomaly-based inspections
Things it can detect
Buffer overflows
Port Scans
OS fingerprinting
Runs in three modes
Sniffer mode - lets you watch packets in real time as they come across the network tap
Packet Logger - saves packets to disk for review
Network Intrusion Detection System - analyzes network traffic against rule sets
Snort rules are a single line composed of a header and options.
Each rule contains
Action
Alert
Log
Pass
Protocol
format direction
Source address/port
Message parameters
Firewall
An appliance within a network that is designed to protect internal resources from unauthorized access
There is always an implicit deny
Types of firewalls
Stateful inspection - tracks the entire status of a connection
Circuit-level gateway - works at the Session layer and allows or prevents data streams not concerned with each packet
Application-level - filters traffic much like a proxy, allowing specific services in and out of the network based on its rule set
Firewall Evasion
firewalking - peck away at the firewall in such a manner to identify which ports and protocols it is letting through and which ones it has blocked (filtered)
best method available is to have a compromised machine on the inside initiate all communication for you
Honeypots
A system set up as a decoy to entice attackers
Important points
Anything and everything on a honeypot system is not to be trusted
The location of the honeypot is super important
Types of Honeypots
High-interaction honeypot - simulates all services and applications and is designed to be completely compromised
Examples: Symantec, Decoy Server, Honeynets
Low-interaction honeypot - simulates a limited number of services and cannot be compromised completely (by design)
Examples: Specter, Honeyd, KFSensor
Last updated