Abusing Transparent Proxies with Flashv2.00.ppt
《Abusing Transparent Proxies with Flashv2.00.ppt》由会员分享,可在线阅读,更多相关《Abusing Transparent Proxies with Flashv2.00.ppt(35页珍藏版)》请在麦多课文档分享上搜索。
1、Abusing Transparent Proxies with Flash v2.00,By Robert Auger PayPal Information Risk Management,November 2009,Overview,What are transparent and intercepting proxies? When are transparent proxies used? How do they operate? Brief intro to the SOP Flash and the socket policy The abuse case Solutions an
2、d mitigations Conclusions,2,What are transparent and intercepting proxies?,Explicit Proxy: A proxy explicitly configured by a client or user system. Also known as a classic web proxy. Transparent Proxy: Proxy which is NOT explicitly configured by the client machine. Intercepting Proxy: A more intrus
3、ive version of a transparent proxy. May modify traffic.,3,When are transparent proxies used?,4,How traffic gets to transparent proxies,Technologies such as WCCP/GRE/IPTables/IPFW are often used to force/redirect traffic to the transparent proxy The user is unaware this is going on Proxy is typically
4、 on a dedicated machine, sometimes deployed on the gateway/router itself Often involves rewriting the packets destination to the proxies IP address and port (NAT) Some implementations merely sniff the wire and may not terminate to a service If the proxy is listening on all addresses then rewriting s
5、houldnt be required, although it is unknown how common this approach is,5,Common transparent proxy architectures,6,Approach A: Use the destination IP from the client,Proxy server determines destination based on original destination-IP address of client request. In this configuration the transparent
6、proxy routes requests much like a standard router by basing its routing decisions off of the network layer (layer 3).Architecture is defined in RFC 1919 (Classical versus Transparent IP Proxies) which is marked Informational and is not a standard. Only can be used in certain network architectures.,7
7、,When Approach A cannot be implemented (NAT),8,Approach B: Inspect application layer data,Proxy server determines destination based on the HTTP Payload from the client request. In this configuration the transparent proxy is determining IP destinations based on the application protocol (layer 7) inst
8、ead of IP (layer 3). Architecture not defined in any standard including RFC 2616 (HTTP 1.1). Due to the socket capabilities of browser plug-ins (flash/etc) this second architecture can be exploited by an attacker to gain access to any destination accessible by the proxy.,9,Brief intro into the Same
9、Origin Policy (SOP),A policy which permits scripts running on pages originating from the same site to access each others methods and properties without restrictions Site A can access Site As other content Site A generally cant access Site Bs content due to being on a different site/origin The same o
10、rigin policy is designed to restrict a sites access to itself Without the SOP Site A would be able to make requests to Site B and see the full response and Cookie data Technologies such as Silverlight and Flash have their own variants of the SOP enforced outside of the browser Flash: Crossdomain.xml
11、 files and Socket policy files,10,Flash and Sockets,Starting in Flash 9 Flash implemented socket policy files (socket master policy files) even for requests back to the same site hosting the flash Usually hosted on a socket policy server and not served up via HTTP Flash checks TCP port number 843 by
12、 default for this policy Can specify a custom location with Flashs loadPolicyFile() call Same general format as crossdomain.xmlMore info at http:/ this stage weve reviewed Proxy types and how their destination logic Same Origin Policy basics Flash and its socket policy filesNow, onto the badness!,12
13、,The Abuse Case,HTTP Request,HTTP Response,Evil Flash,,1.1.1.1,HTTP Request,HTTP Response,Socket Policy,HTTP Request,1.1.1.1,Socket() Policy Request,HTTP Response, Welcome to S!,GET / HTTP/1.0 Host: or GET http:/:80/ HTTP/1.0,,2.2.2.2,1.1.1.1,13,Impact (Technical version),Attacker can send HTTP Requ
14、ests to any host, and obtain full HTTP responses The proxy is actually making the requests, flash is used to facilitate thisFull TCP connection support in some cases (due to CONNECT!) Some intercepting proxies support explicit proxy evasion as a feature to prevent people in an organization from usin
15、g an external proxy, effectively falsifying the explicit proxy connection and tricking the client. ISPs unlikely to implement proxy avoidance (china maybe?) Depends on port restrictions for CONNECT method on the proxyLimitations Cookies and HTTP auth will not be obtainable because the SOP context is
16、 under Auth can be negotiated manually (brute forcing) NTLM/Basic/HTTP Based,14,Impact (Marketing version),Turn browsers into temporary botnet members Only for the length of time the malicious flash is loaded Perform brute forcing DDOS Flooding HTTP based DOS TCP connection based DOS Hard to track
17、due to the lack of installed malware Limited lifetimeIntranet TCP port scanning#! When the transparent proxy is on the local network, or LocalHost Otherwise allowed to make arbitrary TCP connections to internet Allow an attacker inside access to your network evading any NAT/firewalling in place depe
18、nding on the location of the proxy. Launch other attacks against local machines from the proxy Depends on the ACLS implemented on the proxy,15,What about proxies that are chained?,Depending on the network architecture/proxy combination you can still be vulnerable, even if your transparent proxy is b
19、asing its destination IP on the client DST IP If there are two chained transparent proxies, and one bases the destination on the HTTP payload, then youre vulnerable Transparent proxies utilizing explicit proxies always vulnerable,16,Non vulnerable chained proxy configurations,17,Demo,18,Manual Repro
20、duction,To identify if your environment is vulnerable you can perform the following manual steps.1. Perform a DNS lookup against a test website name 2. Telnet to that websites IP on port 80 ( $ telnet 80 ) 3. Paste the following request as the payload GET / HTTP/1.0Host: and/orGET http:/:80/ HTTP/1.
21、04. Hit enter twiceIt is important to specify a different website name in the Host header/URI Line. If you receive content from the host specified in the host header then youre affected.,19,Which kinds of products can be abused by this?,Classic Caching/Transparent proxies Squid Bluecoat (default con
22、figuration) Netcache Qbik WingateSecurity Gateways and parental control software Smoothwall, SchoolGuardian, and NetworkGuardian DansGuardian (web filtering gateway) Bloxx (web filtering gateway) Mac OS X Parental Control Software (Pre Snow Leopard) Many More,20,Further complications and related obs
23、ervations,Flashs socket policy binds to an IP Virtual hosting always going to be an issue when multiple sites share the same IP. Amit Klein wrote about these sorts of issues in multiple papers 7. Cloud computing environments may share 1 IP allowing for inter cloud host abuseUnnamed vendors implement
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ABUSINGTRANSPARENTPROXIESWITHFLASHV200PPT
