Saturday, August 29, 2020

Tricks To Bypass Device Control Protection Solutions

Preface

As I wrote in a previous blog post, I had an engagement last year where my task was to exfiltrate data from a workstation on some sort of storage media. The twist in that task was Lumension Sanctuary Device Control, and the version was 4.3.2, but I am not sure how newer version work and this seems to be a more general problem with device control solution, for example with Symantec products.

But what is a device control solution? In short, they audit I/O device use and block the attempts to use unauthorized devices. This includes hardware such as USB, PS/2, FireWire, CD/DVD so basically every I/O port of a computer. In my opinion, these are pretty good things and they offer a better looking solution than de-soldering the I/O ports from the motherboards or hot-gluing them, but on the other hand, they can be bypassed.

Bypass

OK, so what is the problem? Well the way these device control solutions work is that they load a few kernel drivers to monitor the physical ports of the machine. However... when you boot up the protected computer in safe mode, depending on the device control solution software, some of these drivers are not loaded (or if you are lucky, none of those modules will be loaded...) and this opens up the possibility to exfiltrate data.

In theory, if you have admin (SYSTEM maybe?) privileges, you might as well try to unload the kernel drivers. Just do not forget, that these device control solutions also have a watchdog process, that checks the driver and automatically loads it back if it is unloaded, so look for that process and stop or suspend it first.

In my case with the Lumension Sanctuary Device Control, I have found that when I boot the Workstation protected by the device control software in Safe Mode where, software's key logger protection module is not running... so I was still unable to use a USB stick, or a storage media, but I could plug in a keyboard for example...hmmm :)

As some of you probably already figured it out, now it is possible to use a pre-programmed USB HID, for example a Teensy! : ) I know about three different project, that uses this trick like these two mentioned in a Hackaday post, or this one. Unfortunately, the site ob-security.info no longer seems to be available (well, at least it is no longer related to infosec :D ), but you can still find the blog post and the files with the Wayback Machine.

For the hardware part, the wiring of the Teensy and the SD card adaptor is the same as I showed in the post on Making a USB flash drive HW Trojan or in the Binary deployment with VBScript, PowerShell or .Net csc.exe compiler post, so I will not copy it here again.

I have to note here that there are other ways to bypass these device control solutions, like the method what Dr. Phil Polstra did with the USB Impersonator, which is basically looks for an authorized device VID/PID and then  impersonates that devices with the VID/PID.

Mitigation

Most probably, you will not need safe mode for the users, so you can just disable it... I mean, it is not that easy, but luckily there is a great blog post on how to do that. BTW, the first page of the post is for Windows XP, but you are not using XP anymore, aren't you? ;)

Alternatively, as I mentioned at the beginning, you might as well use some physical countermeasure (de-soldering/hot-gluing ports). That shit is ugly, but it kinda works.

Conclusion

Next time you will face a device control solution, try out these tricks, maybe they will work, and if they do, well, that's a lot of fun. :)

But don't get me wrong, these device control solutions and similar countermeasures are a good thing and you should use something like this! I know that they make doing business a bit harder as you are not able to plugin whatever USB stick you want, but if you buy a pile of hardware encrypted flash drives, and only allow  those to be plugged in, you are doing it right ;)

Related news
  1. Hack Website Online Tool
  2. Hack Tools
  3. Computer Hacker
  4. What Is Hacking Tools
  5. Pentest Tools Url Fuzzer
  6. Pentest Tools For Mac
  7. How To Hack
  8. Hacker Security Tools
  9. Hacker
  10. Tools Used For Hacking
  11. How To Make Hacking Tools
  12. Hacking App
  13. Hacking App
  14. Hacker Tools 2019
  15. Pentest Tools Website
  16. Hacking Tools Kit
  17. Hacker
  18. Hacker Tools List
  19. Hacking Tools Kit
  20. Hacking Tools Free Download
  21. Pentest Tools For Android
  22. Pentest Tools Apk
  23. Pentest Tools
  24. Hacker Tools Apk Download
  25. How To Install Pentest Tools In Ubuntu
  26. Hacker Tools Linux
  27. Pentest Tools Github
  28. Best Hacking Tools 2019
  29. Hacker Tools For Ios
  30. Pentest Tools Windows
  31. Hacker Techniques Tools And Incident Handling
  32. New Hack Tools
  33. Hackers Toolbox
  34. Pentest Automation Tools
  35. Underground Hacker Sites
  36. Hacker Tools Free
  37. Top Pentest Tools
  38. Pentest Tools Alternative
  39. How To Install Pentest Tools In Ubuntu
  40. Pentest Tools For Mac
  41. Hack Tools Pc
  42. Hacking Tools For Windows 7
  43. Hacker Tools Mac
  44. Free Pentest Tools For Windows
  45. Pentest Tools Github
  46. Pentest Reporting Tools
  47. Pentest Tools List
  48. Game Hacking
  49. Pentest Tools Download
  50. Hacking Tools Windows
  51. Termux Hacking Tools 2019
  52. Wifi Hacker Tools For Windows
  53. Pentest Tools Port Scanner
  54. Pentest Tools Nmap
  55. Best Hacking Tools 2019
  56. Hacker Search Tools
  57. Computer Hacker
  58. Hacker Tools For Ios
  59. Hackrf Tools
  60. Hack Tools For Windows
  61. Game Hacking
  62. Pentest Automation Tools
  63. Pentest Tools Free
  64. Termux Hacking Tools 2019
  65. Free Pentest Tools For Windows
  66. Nsa Hack Tools Download
  67. Hack Apps
  68. Hackrf Tools
  69. Hacking Tools Kit
  70. Hacking Tools 2020
  71. Hack Rom Tools
  72. Pentest Tools Apk
  73. Hack Apps
  74. Pentest Tools For Ubuntu
  75. Hacking Tools For Windows Free Download
  76. Hack Website Online Tool
  77. Pentest Tools Github
  78. Hack Tools Mac
  79. Hack App
  80. Hacking Tools Name
  81. Hack Tools For Windows
  82. Computer Hacker
  83. Pentest Reporting Tools
  84. Top Pentest Tools
  85. Pentest Tools For Android
  86. New Hack Tools
  87. Computer Hacker
  88. Hacker Tools 2020
  89. Hacker Techniques Tools And Incident Handling
  90. Hacker Tools 2019
  91. Tools 4 Hack
  92. Hacking Tools For Games
  93. Hack And Tools
  94. Tools Used For Hacking
  95. Hack Tools
  96. Hacker Tools 2019
  97. Hacker Techniques Tools And Incident Handling
  98. Game Hacking
  99. Hack Tool Apk No Root
  100. Hacking Tools Hardware
  101. Best Hacking Tools 2019
  102. Hacking Tools Kit
  103. Hack Tools Online
  104. Hacks And Tools
  105. Tools 4 Hack
  106. Pentest Tools
  107. Game Hacking
  108. Pentest Tools For Ubuntu
  109. Hacking Tools For Games
  110. Install Pentest Tools Ubuntu
  111. Hack Tools Pc
  112. How To Make Hacking Tools
  113. Hacking Tools Download
  114. Pentest Tools Tcp Port Scanner
  115. Hackers Toolbox
  116. Hacking Tools Kit
  117. Hacking Tools Kit
  118. Hack Tools Download
  119. Pentest Tools
  120. Pentest Tools For Windows
  121. Hack Tools Github
  122. Ethical Hacker Tools
  123. How To Make Hacking Tools
  124. Hacking Tools For Windows 7
  125. Hacker Techniques Tools And Incident Handling
  126. Computer Hacker
  127. Hack Tool Apk No Root
  128. World No 1 Hacker Software
  129. Hacking Tools Usb
  130. Hack Tools Pc
  131. Pentest Tools Review
  132. Blackhat Hacker Tools
  133. Hacking Tools Software
  134. Top Pentest Tools
  135. Physical Pentest Tools
  136. Hacking Tools For Beginners
  137. Hack Tools For Windows
  138. Pentest Tools Kali Linux
  139. Install Pentest Tools Ubuntu
  140. Hacking Tools Windows 10
  141. Hack Tools For Pc
  142. Hackrf Tools
  143. Hacking Tools Name
  144. Pentest Tools Windows
  145. Hack Tools For Ubuntu
  146. Hacker Techniques Tools And Incident Handling
  147. Hacker Security Tools
  148. Hacking Tools
  149. Bluetooth Hacking Tools Kali
  150. Pentest Tools Online
  151. Nsa Hacker Tools
  152. Pentest Tools Apk
  153. Hack Tools Pc
  154. Hacking Tools Pc
  155. Hacker Tools 2020
  156. Hacker Tools Mac
  157. Hacker Security Tools
  158. Hacking Tools For Windows 7
  159. New Hack Tools
  160. Game Hacking
  161. Hacking Tools 2020
  162. Pentest Tools Github
  163. Pentest Tools Android
  164. Pentest Tools Windows
  165. Hacker Tools For Mac
  166. Hack Tools Download
  167. Hack Tools
  168. How To Make Hacking Tools
  169. Pentest Tools Download
  170. Hacker Tools Linux
  171. Pentest Tools Kali Linux
  172. Pentest Automation Tools
  173. Pentest Tools Nmap
  174. How To Make Hacking Tools
  175. Easy Hack Tools
  176. Tools 4 Hack

CEH: Gathering Network And Host Information, Types Of Scan


In Hacking the main focus is over gathering the information about victim or victim's machine. Which will help to find out which type of exploit will works according to the given circumstances. Gathering the network and host information means to find out by which network, the which victim's machine is connected and communicating over the network. Moreover, scanning is also performed for gathering information about open and closed ports. After that they'll able to find the vulnerabilities in the target system and try to get access to the system.

Types Of Scan

As a CEH you should know the scan types and uses:

SYN

SYN scan doesn't complete the TCP three way handshake that is why it is known as a half-open scan. An attacker send a SYN packet to the victim machine if SYN/ACK packet is received back to attacker, then it clarify that the port is listening due to the acknowledgment by the victim that it has completed the connection. While if the attacker is received the RST/ACK packet then it assumed that the port is closed or open.


XMAS

XMAS scan works only on target system that has the RFC 793 development of TCP/IP and it doesn't works against any version of windows.
XMAS scan send a packet with by setting up the FIN, URG and PSH flags of the TCP header. The function of this scan is if the port is active there will be no response but if the port is closed the target responds with a RST/ACK packet.


FIN

A FIN scan send a packet by setting up only the FIN flag of the TCP. This scan is similar to XMAS scan. FIN scan receives no response if the port is active while if the port is closed it receives the RST/ACK packet.


NULL 

NULL scan is also similar to the XMAS scan. But the only difference is that it sends a packet without setting up the any flag of TCP header. NULL scan receives no response if the port is open but if the port is closed it receives the RST/ACK packet.


IDLE

It is just like spoofing an IP address by sending a SYN packet to the victim's machine to find out which services are available over the system. This scan is completed with the help of another system called as "Zombie" (that is not receiving or transmitting any information).


Related articles

Friday, August 28, 2020

"I Am Lady" Linux.Lady Trojan Samples



Bitcoin mining malware for Linux servers - samples
Research: Dr. Web. Linux.Lady

Sample Credit:  Tim Strazzere

MD5 list:

0DE8BCA756744F7F2BDB732E3267C3F4
55952F4F41A184503C467141B6171BA7
86AC68E5B09D1C4B157193BB6CB34007
E2CACA9626ED93C3D137FDF494FDAE7C
E9423E072AD5A31A80A31FC1F525D614



Download. Email me if you need the password.
Related posts

OWASP API Security Project Media Coverage



A list of must read articles on OWASP API Security Project

Related word