Top Banner
Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002
25

Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Jan 01, 2016

Download

Documents

Phyllis Byrd
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Setiri: Advances in Trojan Technology

Roelof Temmingh & Haroon MeerDefcon 10

Las Vegas 2002

Page 2: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Schedule

IntroductionWhy Trojans?

Brief History of Trojans & Covert Channels

The Hybrid modelSetiri: Advances in Trojan Technology

Demonstration

Taking it furtherPossible fixes

Page 3: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Introduction

SensePostThe speakers

Objective of the presentation

Page 4: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Why Trojans?

Profile of Trojan users

Real criminals……don’t write buffer overflows

The weirdness of the industry

Examples

Page 5: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Brief History of Trojans & Covert Tunnels

TrojansFrom Quick Thinking Greeks …

to Quick Thinking Geeks

TunnelsCovert Channels

Page 6: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Trojans (Valid IP – No Filters)

“get real..”

Page 7: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Trojans (Valid IP – Stateless Filter)

Dial Home Trojans

Random Ports / Open Ports / High Ports [cDc]

ACK Tunneling[Arne Vidstrom]

Page 8: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Trojans (Stateful Filters)

Orifice - http://bo2k.sourceforge.net

GbotRattler

Page 9: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Brief History of Trojans & Covert Tunnels

TrojansFrom Quick Thinking Greeks …

to Quick Thinking Geeks

TunnelsCovert Channels

Page 10: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Tunnels & Covert Channels

1985 – TSC Definition”Covert Channels”

1996 – Phrack Magazine – LOKI

1998 – RWWWShell – THC

1999 - HTTPTUNNEL – GNU

2000 - FireThru - Firethru

Page 11: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Conventional Trojans & how they fail

Stateful firewall & IDSDirect model

Direct model with network tricksICMP tunnelingACK tunneling

Properly configured stateful firewallIRC agents +

Authentication proxyHTTP tunnel ++

Personal firewall & Advanced ProxyHTTP tunnel with Authentication +++

Page 12: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Hybrid model: “GatSlag”

Combination between covert Tunnel and Trojan

Defenses mechanisms today:

Packet filters (stateful) / NATAuthentication Proxies

Intrusion detection systemsPersonal firewalls

Content/protocol checkingBiometrics/Token Pads/One time passwords

Encryption

Page 13: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

A typical network

Page 14: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

How GatSlag worked

Reverse connectionHTTP covert tunnel

Microsoft Internet Explorer as transport

Controls IE via OLEEncapsulate in IE, not HTTP

Receive commands in title of web pageReceive encoded data as plain text in body of web

pageSend data with POST request

Send alive signals with GET request

Page 15: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Why GatSlag worked

Integration of client with MS ProxyNTLM authentication

SSL capableRegistry changes

Personal firewallsJust another browser

Platform independentIE on every desktop

Specify ControllerVia public web page – the MASTER site

Page 16: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Problems with Gatslag

The Controller’s IP can be obtained !Handling of multiple instances

GUI supportController needed to be online

Batch commandsCommand history

Multiple controllersUpload facility not efficient

Platform supportStability

Session level tunneling

Page 17: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Setiri: Advances in Trojan Technology

Design notes:

Web site contains instructionsCGIs to create new instruction

Controller’s interface:–EXEC (DOS commands, various)

–TX (File upload)–RX (File download)

Directory structure – each instanceTrojan “surfs” to web site – just a normal user

would

Page 18: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Setiri: Advances in Trojan Technology II

AnonymityProblems with normal proxies

Already using a proxyProxy logs

“Cleaners” provide anonymity“In browser proxy” – Anonymizer

Trojan -> Cleaner: SSLCleaner -> Controller: SSL

Challenges:Browser historyTemporary files

Page 19: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.
Page 20: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.
Page 21: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.
Page 22: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Why defenses failFirewalls (stateful/NAT)

Configured to allow user or proxy out

Content level & IDSLooks like valid HTTP requests & repliesFiles downloaded as text in web pages

No data or ports to lock on toSSL provides encryption

Personal firewallsIE valid application

Configured to allow browsing

Authentication proxiesUser surf the web

Page 23: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Demonstration

Page 24: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Solving the dilemma

Delivery

White listing

User education

AV, personal firewalls

Should you allow everyone to surf the ‘net?

Page 25: Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002.

Conclusion

Awareness

Our motivation