The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[REVS] Placing Backdoors Through Firewalls


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 17 Apr 2005 17:13:31 +0200
Subject: [REVS] Placing Backdoors Through Firewalls
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20050417173451.1DAE257CA@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Placing Backdoors Through Firewalls
------------------------------------------------------------------------


SUMMARY

This article describes possible back-doors through different firewall 
architectures. However, the material can also be applied to other 
environments to describe how hackers  cover their access to a system.

DETAILS

Hackers often want to retain access to systems they have penetrated even 
in the face of obstacles such as new firewalls and patched 
vulnerabilities. To accomplish this the attackers must install a back-door 
which a) does it's job and b) is not easily detectable. The kind of 
back-door needed depends on the firewall architecture used.

Firewall Architectures:
There are two basic firewall architectures and each has an enhanced 
version:

Packet Filters:
This is a host or router which checks each packet against an allow/deny 
rule-table before routing it through the correct interface. There are very 
simple ones which can only filter from the origin host, destination host 
and destination port, as well as good ones which can also decide based on 
incoming interface, source port, day/time and some TCP or IP flags. This 
could be a simple router, f.e. any Cisco, or a Linux machine with 
firewalling activated (ipfwadm).

Stateful Filters:
This is the enhanced version of a packet filter. It still does the same 
checking against a rule table and only routes if permitted, but it also 
keeps track of the state information such as TCP sequence numbers. Some 
pay attention to application protocols which allows tricks such as only 
opening ports to the interior network for ftp-data channels which were 
specified in a permitted ftp session. These filters can (more or less) get 
UDP packets (f.e. for DNS and RPC) securely through the firewall. (Thats 
because UDP is a stateless protocol. And it's more difficult for RPC 
services.)
This could be a great OpenBSD machine with the ip-filter software, a Cisco 
Pix, Watchguard, or the (in)famous Checkpoint FW-1.

Proxies / Circuit Level Gateways:
A proxy as a firewall host is simply any server which has no routing 
activated and instead has proxy software installed. Examples of proxy 
servers which may be used are squid for WWW, a Sendmail relay 
configuration and/or just a socked.

Application Gateways:
This is the enhanced version of a proxy. Like a proxy, for every 
application which should get through the firewall a software must be 
installed and running to proxy it. However, the application gateway is 
smart and checks every request and answer, f.e. that an outgoing FTP only 
may download data but not upload any, and that the data has got no virus, 
no buffer overflows are generated in answers etc. One can argue that squid 
is an application gateway, because it does many sanity checks and let you 
filter stuff but it was not programmed for the installation in a secure 
environment and still has/had security bugs.

A good example for a freeware kit for this kind is the TIS firewall 
toolkit (fwtk).

Most firewalls that vendors sell on the market are hybrid firewalls, which 
means they've got more than just one type implemented; for example the IBM 
Firewall is a simple packet filter with socks and a few proxies. I won't 
discuss which firewall product is the best, because this is not a 
how-to-by-a-firewall paper, but I will say this: application gateways are 
by far the most secure firewalls, although money, speed, special 
protocols, open network policies, stupidity, marketing hype and bad 
management might rule them out.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:sanandres@gmail.com.> Sumy .
The original article can be found at:  
<http://www.exploitx.com/forum/azbb.php?1113350365>; 
http://www.exploitx.com/forum/azbb.php?1113350365




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру