Book 5: Covering Tracks on the Network Flashcards

1
Q

What is the most common way for an attacker to hide information as it is transmitted across a network?

A

tunneling

pg 81 book 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is tunneling?

A

one protocol carried inside another protocol.

pg 81 book 5.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If use tunneling, what protocol will the network see?

A

Network sees only second protocol.
Example: “shell traffic inside ICMP packets” network would only see the ICMP packet.
pg 81 book 5.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If the host protocol being used to tunnel/transport the info is allowed to run, then the protocol inside like shell traffic will be able to traverse the network?

A

true

pg 81 book 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tunnel sender side contains?

Tunnel receiver side contains?

A

server side: information to put into the tunnel
reciever side: envelope opened and info is removed from the tunnel.
pg 81 book 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can attackers evade detection?

A

Tunneling information. a more complex method to evaluate and identify.
pg 81 book 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What ways can an attacker tunnel data to evade detection and cover their tracks?

A

Tunneling via

  1. Reverse HTTP/HTTPS Shells
  2. ICMP Tunnels : Ptunnel tool
  3. DNS Tunnels: DNScat2 tool
  4. By blending in
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Would an attacker want to establish a backdoor using protocols that are common for the network? if so, give example.

A

Yes.
example: HTTP.
More:
1. Establish a backdoor using protocols that are common for network
2. Exploit a system, start some sort of command and control mechanism
3. Attacker once compromises a system will need to figure out what protocol to use for c2
4. can compromise the internal machine to make internal HTTP requiests out to my attacker server(CC mechanism)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Reverse HTTP is done over both ___ and ___ HTTP channels.

A

insecure and secure

pg 82 book 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How would reverse HTTP/HTTPs shells work?

A

at predetermined intervals the HTTP program on the internal system will surds the internet asking for commands from the attackers external machine.

Attacker types commands at the external machine on the internet and sends the commands back to the victim machine as HTTP responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Are you safe from Reverse HTTP/HTTPS tunneling if you require HTTP authentication with static passwords?

A

no. you are not safe if you require HTTP authentication with static passwords to get out of your firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Reverse HTTP shells allow for the attacker to program the system with a user ID and passsword that will be given to the outgoing web proxy firewall for authentication.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name the tool that carries data inside the payloads of ICMP packets?

A

Ptunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Ptunnel?

A

ICMP tunneling tool that carries TCP connections inside ICMP Echo and ICMP Echo Reply packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Do alot of networks allow outbound ICMP Echo packets and their associated responses?

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is Loki?

A

Tool that carries shell between its Linux client adn Linux server software using ICMP echo and reply packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is ICMPShell?

A

Linux Shell Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ptunnel is best used on a network that blocks out __ and __ packets but allows you to ping arbitrary hosts on the internet.

A

TCP and UDP.

19
Q

Ptunnel consists of how many components?

A

two. Ptunnel client and Ptunnel proxy

20
Q

Ptunnel proxy can be configured to authenticate the Ptunnel client using what kind of authentication algorithm?

A

MD5 based challenge/response

21
Q

The Ptunnel client and the Ptunnel proxy are the two main components of ___ tunneling.

A

ICMP tunneling.

22
Q

What is the tool used for DNS tunneling?

A

DNSCat2

23
Q

DNS Tunneling/ DNSCat2 is similar to what?

A

Netcat

24
Q

How is DNS Tunneling/DNSCat2 similar to netcat but differs?

A

similar, but unlike netcat DNS tunneling does NOT directly talk to the attacker server; instead it uses the victim network infrastructure to relay the malicious content, bypassing many different filtering mechanisms

25
Q

Netcat will talk directly to the attacker server?

DNS tunneling will talk to the victim network to then relay the malicious content?

A

true.

26
Q

Netcat talks directly to the attacker server and DNS tunneling does not/

A

true.

27
Q

What would prevent an attacker to reach a C2 system directly on the network?

A

blocked egress ports, authentication-required HTTP proxies

28
Q

How does DNS tunneling work?

A

attacker does not directly talk to a DNS server on the internet; instead the attacker queries the internal DNS server, using crafted query data that the internal DNS server then sends to root-level DNS servers on the internet. The root level DNS servers then foward the queries to the attacker-controlled DNS server. which extracts the crafted query and performs an action on the attacker supplied data.

29
Q

Does DNS tunneling talk directly to a DNS server on the internet?

A

No. talks to the internal DNS server

30
Q

DNS tunneling Process victim –> ____ –> firewall –> root level DNS Server –> …. –> ____

A

Internal DNS server

Attacker Server

31
Q

What is DNS?

A

Translates domain names to IP addresses so browsers can load internet resources.

32
Q

Extra: detecting DNS?

A

look for unusual data being sent back and forth using statistical techniques. Looking at the number of DNS domain requests compared to the normal baseline

33
Q

What isDNSCat2?

A

A DNS tunnel that creates an encrypted C2 channel to let you upload/download files, run a shell, etc

34
Q

DNSCat2 is an implementation of __ tunneling consisting of an attacker process that partially implements the DNS server protocol and a ___ for Linux or windows victims.

A

DNS

client

35
Q

DNSCat3 implements DNS tunneling attack, providing __ like functionality over ___. While also providing __ and end-to-end transport encryption.

A

netcat
DNS.
authentication.

36
Q

What can attacker do when dnscat2 is successful?

A

upload and download files, execute local system commands, set up new local listening ports for remote networking…etc

37
Q

DNSCat2 is a a popular command & control (C2) mechanism, even though it is easy to spot?

A

true.

38
Q

Other mechanism used to exfil data or establish a c2?

A

email, messaging tools, social media sites, cloud services….etc

39
Q

How could we prepare for protecting our network?

A

endpoint security tools, app whitelisting, UEBA tools.
Limit egress network protocol access, use authenticated proxy access for internet resources access vs direct unauthenticated access.

40
Q

A strong defense against c2 frameworks?

A

using authenticated proxy access for internet resource access vs direct unauthenticated access.

41
Q

How could we identify attackers using tunneling?

A

understand what’s on our network and systems look like to perform threat hunting.
spend time identifying which processes are running on systems, kind of network activity that is “normal” use a baseline to compare.
React to unauthorized netwrok egress access attempts.

42
Q

Good technique to identifying tunneling- anomalous network activity

A

RITA - real intelligence threat analytics

43
Q

What is RITA?

A

a sophisticated network analysis tool

44
Q

Are IDS a useful technique to detect C2 and exfil techniques?

A

no. lack insight into encrypted streams, blended protocols.