SlideShare a Scribd company logo
1 of 18
Download to read offline
Automatic Discovery of Evasion
Vulnerabilities Using Targeted
Protocol Fuzzing
antti.levomaki@forcepoint.com
opi@forcepoint.com
WHO?
ANTTI LEVOMÄKI
Research Scientist
OLLI-PEKKA NIEMI
Director of Research
WHAT?
NETWORK EVASIONS
+
FUZZING
=
Automated method for finding evasion vulnerabilities in
modern up-to-date IPS & NGFW System
Evasions discovered by Ptacek and Newsham still work against modern
IPS and NGFW system
Lack of modern tools to highlight the risks of evasion vulnerabilities
Configuring IPS systems to detect and prevent evasions can be really hard
Increase the awareness to persuade vendors to fix
evasion gaps
WHY?
Result of a different interpretation of traffic by a security device than by the
victim endpoint
Robustness principle: “Be conservative in what you do, be liberal in what you
accept from others”, Jon Postel
Ptacek & Newsham paper: “Insertion, Evasion, and Denial of Service:
Eluding Network Intrusion Detection”, 1998
NETWORK EVASIONS
2009
Research
published
2010
AET Threat
Identified
2012
Evader released
as freeware
2013
BlackHat
Talk
2017
Relaunch. AET
Threat still present
Applies evasion to attacks to bypass virtual patching and intrusion prevention.
INTRODUCTION TO EVADER
Implements a few well known and old exploits to test traffic inspection
Userspace TCP/IP stack with atomic evasions on all network layers
Atomic evasions produce mostly valid transformations to traffic
Combinations produce interesting traffic
=> at least 245 - 2186 possible combinations depending on protocols
=> far too many to handle as a special case in IPS/NGFW
EVADER
TEST METHODOLOGY
Attacker
Security Device
Target
Verify
Connectivity
Verify
Backdoor port
availability*
Send Exploit
Connect to
backdoor*
CVE-2008-4250, MSRPC Server
Service Vulnerability
CVE-2004-1315, HTTP phpBB
highlight
CVE-2014-0160 Heartbleed
*Heartbleed success is determined based on
data leaked. No backdoor / post compromise
Cannot test all dynamic combinations
=> generate random combinations and test them rapidly
Cannot ensure that all combinations produce valid traffic
=> use real exploit and victim host. If the exploit works, traffic is valid.
Cannot know what the IPS/NGFW is doing
=> configure to terminate everything it thinks is malicious.
IDEA
MONGBAT
Fuzz generator for Evader, runs parallel Evader instances with random evasion
combinations targeting specific parts of networking protocols.
Handles addressing and validates the test environment.
The evasions and their parameters
are selected from the set Evader lists as supported.
=> validation scripts to drop completely useless combinations
=> each run is different
MONGBAT
Successful attacks are recorded for repeatability
Evader command line including
Evasions and parameters
Random seed
Packet captures
DEMO
RESULTS
Success/attempts in 10 minutes of fuzz testing
Vendor HTTP HTTPS Conficker Heartbleed
Vendor I 72 / 12364 crasha 21 / 858 0 / 557
Vendor II 133 / 8481 97 / 4119 16 / 2368 25 / 899
Vendor III 126 / 8788 277 / 4059 15 / 1204 40 / 1092
Vendor IV 746 / 1833 N/Ab 2 / 1077 N/Ab
Vendor V 3366 / 8975 2550 / 5970 8 / 3561 50 / 891
Vendor VI 0 / 7366 0 / 6337 0 / 7778 0 / 994
RESULTS
Low level evasions can be payload independent
=> TCP layer evasion discovered with HTTP attack likely also
works with HTTPS & SMB/MSRPC
Vendor HTTP HTTPS Conficker Heartbleed
Vendor I H
Vendor II P, C T, H P T
Vendor III P, H P, C, T, H P P, C, T
Vendor IV P, C, H P, C, T, H C P, C, T
Vendor V P, C, T, H P, C, H T
Vendor VI
P = PAWS
C = TCP_CHAFF
H = HTTP
T = TLS record layer segmentation
CHALLENGES – VENDORS ARE BLOCKING THE TOOL
WHAT Block the tool FIX
DE:AD:BE:EF Prevent testing by blocking MAC Changed MAC
User-Agent “Railforge” Block attack based on User-Agent Change User-Agent
TCP Syn Windows Scale 0 Prevent testing by blocking SYN
packets
OS Spoof to mimic Windows, Linux
during 3-W HS
Identify Shellbanner Block post compromise and prevent
success validation
Different mechanism for success
validation or custom shell banner
High port blocking Block post compromise and prevent
success validation
Inline shell, visual effect or ack based
success indication
Blacklist Blacklist IP or subnet used for testing Legitimate clean test pre-exploit test
validation
KEY FINDINGS
1. Rapid discovery of working evasions
2. Very difficult to tune security policies to be evasion-proof
3. Low level (TCP) evasions can be payload independent
4. One (1) reliably working evasion is enough to bypass security completely.
antti.levomaki@forcepoint.com
opi@forcepoint.com
For questions and access to EVADER
contact Olli-Pekka Niemi
opi@forcepoint.com

More Related Content

Similar to Eu 17-levomaki-automatic-discovery-of-evasion-vulnerabilities-using-targeted-protocol-fuzzing

Cloud Reliability: Decreasing outage frequency using fault injection
Cloud Reliability: Decreasing outage frequency using fault injectionCloud Reliability: Decreasing outage frequency using fault injection
Cloud Reliability: Decreasing outage frequency using fault injectionJorge Cardoso
 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationOlehLevytskyi1
 
Detect Threats Faster
Detect Threats FasterDetect Threats Faster
Detect Threats FasterForce 3
 
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10Fuzzing101 uvm-reporting-and-mitigation-2011-02-10
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10Codenomicon
 
Monitoring What Matters: The Prometheus Approach to Whitebox Monitoring (Berl...
Monitoring What Matters: The Prometheus Approach to Whitebox Monitoring (Berl...Monitoring What Matters: The Prometheus Approach to Whitebox Monitoring (Berl...
Monitoring What Matters: The Prometheus Approach to Whitebox Monitoring (Berl...Brian Brazil
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesGENIANS, INC.
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayKaren Oliver
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection finalAkshay Bansal
 
Modern Web Security, Lazy but Mindful Like a Fox
Modern Web Security, Lazy but Mindful Like a FoxModern Web Security, Lazy but Mindful Like a Fox
Modern Web Security, Lazy but Mindful Like a FoxC4Media
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
 
A Study Of Open Ports As Security Vulnerabilities In Common User Computers
A Study Of Open Ports As Security Vulnerabilities In Common User ComputersA Study Of Open Ports As Security Vulnerabilities In Common User Computers
A Study Of Open Ports As Security Vulnerabilities In Common User ComputersJoshua Gorinson
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksAsep Sopyan
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanningleminhvuong
 
Ceh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceCeh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceAsep Sopyan
 
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdftheVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdfGabriel Mathenge
 
Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Barry Greene
 
Wi fi security dedicated architectures
Wi fi security dedicated architecturesWi fi security dedicated architectures
Wi fi security dedicated architecturesparipec
 

Similar to Eu 17-levomaki-automatic-discovery-of-evasion-vulnerabilities-using-targeted-protocol-fuzzing (20)

Cloud Reliability: Decreasing outage frequency using fault injection
Cloud Reliability: Decreasing outage frequency using fault injectionCloud Reliability: Decreasing outage frequency using fault injection
Cloud Reliability: Decreasing outage frequency using fault injection
 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentation
 
Detect Threats Faster
Detect Threats FasterDetect Threats Faster
Detect Threats Faster
 
Vulnerability
VulnerabilityVulnerability
Vulnerability
 
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10Fuzzing101 uvm-reporting-and-mitigation-2011-02-10
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10
 
Monitoring What Matters: The Prometheus Approach to Whitebox Monitoring (Berl...
Monitoring What Matters: The Prometheus Approach to Whitebox Monitoring (Berl...Monitoring What Matters: The Prometheus Approach to Whitebox Monitoring (Berl...
Monitoring What Matters: The Prometheus Approach to Whitebox Monitoring (Berl...
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilities
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain Essay
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection final
 
Modern Web Security, Lazy but Mindful Like a Fox
Modern Web Security, Lazy but Mindful Like a FoxModern Web Security, Lazy but Mindful Like a Fox
Modern Web Security, Lazy but Mindful Like a Fox
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
A Study Of Open Ports As Security Vulnerabilities In Common User Computers
A Study Of Open Ports As Security Vulnerabilities In Common User ComputersA Study Of Open Ports As Security Vulnerabilities In Common User Computers
A Study Of Open Ports As Security Vulnerabilities In Common User Computers
 
The Veil-Framework
The Veil-FrameworkThe Veil-Framework
The Veil-Framework
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 
nullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric Systemnullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric System
 
Ceh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceCeh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissance
 
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdftheVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
 
Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1
 
Wi fi security dedicated architectures
Wi fi security dedicated architecturesWi fi security dedicated architectures
Wi fi security dedicated architectures
 

Recently uploaded

VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 

Recently uploaded (20)

VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 

Eu 17-levomaki-automatic-discovery-of-evasion-vulnerabilities-using-targeted-protocol-fuzzing

  • 1. Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing antti.levomaki@forcepoint.com opi@forcepoint.com
  • 3. WHAT? NETWORK EVASIONS + FUZZING = Automated method for finding evasion vulnerabilities in modern up-to-date IPS & NGFW System
  • 4. Evasions discovered by Ptacek and Newsham still work against modern IPS and NGFW system Lack of modern tools to highlight the risks of evasion vulnerabilities Configuring IPS systems to detect and prevent evasions can be really hard Increase the awareness to persuade vendors to fix evasion gaps WHY?
  • 5.
  • 6. Result of a different interpretation of traffic by a security device than by the victim endpoint Robustness principle: “Be conservative in what you do, be liberal in what you accept from others”, Jon Postel Ptacek & Newsham paper: “Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection”, 1998 NETWORK EVASIONS
  • 7. 2009 Research published 2010 AET Threat Identified 2012 Evader released as freeware 2013 BlackHat Talk 2017 Relaunch. AET Threat still present Applies evasion to attacks to bypass virtual patching and intrusion prevention. INTRODUCTION TO EVADER
  • 8. Implements a few well known and old exploits to test traffic inspection Userspace TCP/IP stack with atomic evasions on all network layers Atomic evasions produce mostly valid transformations to traffic Combinations produce interesting traffic => at least 245 - 2186 possible combinations depending on protocols => far too many to handle as a special case in IPS/NGFW EVADER
  • 9. TEST METHODOLOGY Attacker Security Device Target Verify Connectivity Verify Backdoor port availability* Send Exploit Connect to backdoor* CVE-2008-4250, MSRPC Server Service Vulnerability CVE-2004-1315, HTTP phpBB highlight CVE-2014-0160 Heartbleed *Heartbleed success is determined based on data leaked. No backdoor / post compromise
  • 10. Cannot test all dynamic combinations => generate random combinations and test them rapidly Cannot ensure that all combinations produce valid traffic => use real exploit and victim host. If the exploit works, traffic is valid. Cannot know what the IPS/NGFW is doing => configure to terminate everything it thinks is malicious. IDEA
  • 11. MONGBAT Fuzz generator for Evader, runs parallel Evader instances with random evasion combinations targeting specific parts of networking protocols. Handles addressing and validates the test environment. The evasions and their parameters are selected from the set Evader lists as supported. => validation scripts to drop completely useless combinations => each run is different
  • 12. MONGBAT Successful attacks are recorded for repeatability Evader command line including Evasions and parameters Random seed Packet captures
  • 13. DEMO
  • 14. RESULTS Success/attempts in 10 minutes of fuzz testing Vendor HTTP HTTPS Conficker Heartbleed Vendor I 72 / 12364 crasha 21 / 858 0 / 557 Vendor II 133 / 8481 97 / 4119 16 / 2368 25 / 899 Vendor III 126 / 8788 277 / 4059 15 / 1204 40 / 1092 Vendor IV 746 / 1833 N/Ab 2 / 1077 N/Ab Vendor V 3366 / 8975 2550 / 5970 8 / 3561 50 / 891 Vendor VI 0 / 7366 0 / 6337 0 / 7778 0 / 994
  • 15. RESULTS Low level evasions can be payload independent => TCP layer evasion discovered with HTTP attack likely also works with HTTPS & SMB/MSRPC Vendor HTTP HTTPS Conficker Heartbleed Vendor I H Vendor II P, C T, H P T Vendor III P, H P, C, T, H P P, C, T Vendor IV P, C, H P, C, T, H C P, C, T Vendor V P, C, T, H P, C, H T Vendor VI P = PAWS C = TCP_CHAFF H = HTTP T = TLS record layer segmentation
  • 16. CHALLENGES – VENDORS ARE BLOCKING THE TOOL WHAT Block the tool FIX DE:AD:BE:EF Prevent testing by blocking MAC Changed MAC User-Agent “Railforge” Block attack based on User-Agent Change User-Agent TCP Syn Windows Scale 0 Prevent testing by blocking SYN packets OS Spoof to mimic Windows, Linux during 3-W HS Identify Shellbanner Block post compromise and prevent success validation Different mechanism for success validation or custom shell banner High port blocking Block post compromise and prevent success validation Inline shell, visual effect or ack based success indication Blacklist Blacklist IP or subnet used for testing Legitimate clean test pre-exploit test validation
  • 17. KEY FINDINGS 1. Rapid discovery of working evasions 2. Very difficult to tune security policies to be evasion-proof 3. Low level (TCP) evasions can be payload independent 4. One (1) reliably working evasion is enough to bypass security completely.
  • 18. antti.levomaki@forcepoint.com opi@forcepoint.com For questions and access to EVADER contact Olli-Pekka Niemi opi@forcepoint.com