Book 5: Covering Tracks on the Network Flashcards
What is the most common way for an attacker to hide information as it is transmitted across a network?
tunneling
pg 81 book 5
What is tunneling?
one protocol carried inside another protocol.
pg 81 book 5.
If use tunneling, what protocol will the network see?
Network sees only second protocol.
Example: “shell traffic inside ICMP packets” network would only see the ICMP packet.
pg 81 book 5.
If the host protocol being used to tunnel/transport the info is allowed to run, then the protocol inside like shell traffic will be able to traverse the network?
true
pg 81 book 5
Tunnel sender side contains?
Tunnel receiver side contains?
server side: information to put into the tunnel
reciever side: envelope opened and info is removed from the tunnel.
pg 81 book 5
How can attackers evade detection?
Tunneling information. a more complex method to evaluate and identify.
pg 81 book 5
What ways can an attacker tunnel data to evade detection and cover their tracks?
Tunneling via
- Reverse HTTP/HTTPS Shells
- ICMP Tunnels : Ptunnel tool
- DNS Tunnels: DNScat2 tool
- By blending in
Would an attacker want to establish a backdoor using protocols that are common for the network? if so, give example.
Yes.
example: HTTP.
More:
1. Establish a backdoor using protocols that are common for network
2. Exploit a system, start some sort of command and control mechanism
3. Attacker once compromises a system will need to figure out what protocol to use for c2
4. can compromise the internal machine to make internal HTTP requiests out to my attacker server(CC mechanism)
Reverse HTTP is done over both ___ and ___ HTTP channels.
insecure and secure
pg 82 book 5
How would reverse HTTP/HTTPs shells work?
at predetermined intervals the HTTP program on the internal system will surds the internet asking for commands from the attackers external machine.
Attacker types commands at the external machine on the internet and sends the commands back to the victim machine as HTTP responses.
Are you safe from Reverse HTTP/HTTPS tunneling if you require HTTP authentication with static passwords?
no. you are not safe if you require HTTP authentication with static passwords to get out of your firewall.
Reverse HTTP shells allow for the attacker to program the system with a user ID and passsword that will be given to the outgoing web proxy firewall for authentication.
True.
Name the tool that carries data inside the payloads of ICMP packets?
Ptunnel
What is Ptunnel?
ICMP tunneling tool that carries TCP connections inside ICMP Echo and ICMP Echo Reply packets.
Do alot of networks allow outbound ICMP Echo packets and their associated responses?
Yes.
what is Loki?
Tool that carries shell between its Linux client adn Linux server software using ICMP echo and reply packets.
What is ICMPShell?
Linux Shell Tool