SlideShare una empresa de Scribd logo
1 de 10
Http
Tunneling
Exploit
By : Daniel Adenew (MSC)
What is Http Tunneling ?

•

HTTP Tunneling is a technique WHICH
communications using various network protocols are
encapsulated using the HTTP protocol,Since HTTP
protocol is not Monitored or can’t be blocked by
Firewall.[:(]

•

The HTTP protocol therefore acts as a wrapper for a
channel that the network protocol being tunneled
uses to communicate.[wikipedia]
What is its Use ?
used most often as a means for communication from
network locations with restricted connectivity – most
often behind NATs, firewalls, or proxy servers, and most
often with applications that lack native support for
communication in such conditions of restricted
connectivity. For blocking traffic initiated from outside the
network, or blocking of all network protocols except a
few is a commonly used method to lock down a network
to secure it against internal and external threats.
How do ? Implementation Issues
The application/ host opens an HTTP connection to a mediator server,
which acts as a relay of communications to and from the remote host.
if connection is Ok then application then communicates with the mediator
server using HTTP requests BUT encapsulating the actual
communications within those requests.
Mediator server during communication will unwraps the actual data before
forwarding it to the remote host in question.
The Attack Explained !!! (HTTP TUNNEL
EXPLOIT)

The httptunnel exploit consists of two
components, the client and the
server portion.
htc, resides on the attacker’s and hts,
resides on the victim’s server
The Attack Explained !!! (HTTP TUNNEL
EXPLOIT)

Httptunnel exploits the fact that most
firewalls have a proxy for http by creating a
data tunnel. To utilize the data tunnel,
another service is used to send and
receive data across the established
connection, such as telnet.
The Attack Explained !!! (HTTP TUNNEL
EXPLOIT)

use of HTTP PUT and HTTP GET
commands.
All data sent to the victim
machine is done through the PUT command
and data is returned through
the GET command.
Exploiting
Once installed on the target system, the
server component,
hts -F localhost:23 8888
htc -F 2323 -P PROXY:8000 VICTIM:8888
Once a successful connection has been established, the attacker can issue
commands to the VICTIM on the telnet port through the HTTP proxy data
tunnel by issuing the following:

telnet localhost 2323 [this was blocked by Firewall]
Finding the exploit
Because the exploit uses a legitimate service to transmit information
across the network and Internet, the protocol used does not provide an
indication of an exploit occurring.

The issue to watch for is whether the pattern of the protocol, in this case
HTTP PUT, requests being issued from a source to a destination.

The request packets may be of a smaller and less frequent nature than
normal http proxy traffic to a web site. (seem not easy to find and
trace!)
Recommendations
1. Ensure all servers are at the most current patch level to avoid root
compromise.
2. Disable all unnecessary services on servers; use only secure login
services, such as SSH.
3. Disable trust relationships with servers that can be accessed from
firewalls, such as those in a Demilitarized Zone (DMZ).
4. Conduct regular scans of servers on the full port range (1 through
65535).
5. Review firewall logs for unusual web access patterns from systems
that do not normally operate as a web client.
6. Monitor for HTTP GET requests issued from systems that do not
provide web services.

Más contenido relacionado

La actualidad más candente

Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access MethodsPrateek Soni
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithmUmesh Gupta
 
Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocolasimnawaz54
 
Router & functionality
Router & functionalityRouter & functionality
Router & functionalityAmzadKhn
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolMohd Arif
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)shilpa patel
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer ScienceTransweb Global Inc
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram ProtocolPeter R. Egli
 
Data link layer
Data link layerData link layer
Data link layerst2112
 
Networking device Computer Application in Business
Networking device Computer Application in BusinessNetworking device Computer Application in Business
Networking device Computer Application in BusinessNethan P
 

La actualidad más candente (20)

Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access Methods
 
Ftp
FtpFtp
Ftp
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
CSMA/CA
CSMA/CACSMA/CA
CSMA/CA
 
Network (Hub,switches)
Network  (Hub,switches)Network  (Hub,switches)
Network (Hub,switches)
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithm
 
Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocol
 
Data link layer
Data link layerData link layer
Data link layer
 
Router & functionality
Router & functionalityRouter & functionality
Router & functionality
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer Science
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 
Data link layer
Data link layerData link layer
Data link layer
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Networking device Computer Application in Business
Networking device Computer Application in BusinessNetworking device Computer Application in Business
Networking device Computer Application in Business
 

Destacado

Debate sobre o Piso_ALESE
Debate sobre o Piso_ALESEDebate sobre o Piso_ALESE
Debate sobre o Piso_ALESEdiego_coliveira
 
підготовка випускників 2016 року до зно
підготовка випускників 2016 року до знопідготовка випускників 2016 року до зно
підготовка випускників 2016 року до зноkoblevoschool1
 
Cosmetic Treatment in Kochi | Dermatologist in Cochin
Cosmetic Treatment in Kochi | Dermatologist in CochinCosmetic Treatment in Kochi | Dermatologist in Cochin
Cosmetic Treatment in Kochi | Dermatologist in CochinBeauaesthetica Cochin
 
Ch 14 lecture_outline
Ch 14 lecture_outlineCh 14 lecture_outline
Ch 14 lecture_outlineTheSlaps
 
Infographic: Current Govt Programmes To Boost MSME Sector
Infographic: Current Govt Programmes To Boost MSME SectorInfographic: Current Govt Programmes To Boost MSME Sector
Infographic: Current Govt Programmes To Boost MSME SectorPower2SME
 
Storytelling reflection
Storytelling reflectionStorytelling reflection
Storytelling reflectiongrade4biss
 
Chapter 4 Part 2
Chapter 4 Part 2Chapter 4 Part 2
Chapter 4 Part 2hcsc2016
 
Continuous Delivery on a Modern Web Stack
Continuous Delivery on a Modern Web StackContinuous Delivery on a Modern Web Stack
Continuous Delivery on a Modern Web StackLuke Crouch
 
Microbiology Ch 08 lecture_presentation
Microbiology Ch 08 lecture_presentationMicrobiology Ch 08 lecture_presentation
Microbiology Ch 08 lecture_presentationTheSlaps
 
Acunetix technical presentation v7 setembro2011
Acunetix technical presentation v7 setembro2011Acunetix technical presentation v7 setembro2011
Acunetix technical presentation v7 setembro2011Wlad1m1r
 

Destacado (19)

null Pune meet - Evading Firewalls: Tunneling
null Pune meet - Evading Firewalls: Tunnelingnull Pune meet - Evading Firewalls: Tunneling
null Pune meet - Evading Firewalls: Tunneling
 
null Pune meet - Wireless Security
null Pune meet - Wireless Securitynull Pune meet - Wireless Security
null Pune meet - Wireless Security
 
Debate sobre o Piso_ALESE
Debate sobre o Piso_ALESEDebate sobre o Piso_ALESE
Debate sobre o Piso_ALESE
 
Identifying and Removing Malwares
Identifying and Removing MalwaresIdentifying and Removing Malwares
Identifying and Removing Malwares
 
Security News Bytes - null Dharmashala
Security News Bytes  - null DharmashalaSecurity News Bytes  - null Dharmashala
Security News Bytes - null Dharmashala
 
підготовка випускників 2016 року до зно
підготовка випускників 2016 року до знопідготовка випускників 2016 року до зно
підготовка випускників 2016 року до зно
 
ICE Snow Leopard
ICE Snow LeopardICE Snow Leopard
ICE Snow Leopard
 
خلل في الالتزام
خلل في الالتزامخلل في الالتزام
خلل في الالتزام
 
Cosmetic Treatment in Kochi | Dermatologist in Cochin
Cosmetic Treatment in Kochi | Dermatologist in CochinCosmetic Treatment in Kochi | Dermatologist in Cochin
Cosmetic Treatment in Kochi | Dermatologist in Cochin
 
Ch 14 lecture_outline
Ch 14 lecture_outlineCh 14 lecture_outline
Ch 14 lecture_outline
 
Infographic: Current Govt Programmes To Boost MSME Sector
Infographic: Current Govt Programmes To Boost MSME SectorInfographic: Current Govt Programmes To Boost MSME Sector
Infographic: Current Govt Programmes To Boost MSME Sector
 
Storytelling reflection
Storytelling reflectionStorytelling reflection
Storytelling reflection
 
Fun & profit with bug bounties
Fun & profit with bug bountiesFun & profit with bug bounties
Fun & profit with bug bounties
 
Chapter 4 Part 2
Chapter 4 Part 2Chapter 4 Part 2
Chapter 4 Part 2
 
Continuous Delivery on a Modern Web Stack
Continuous Delivery on a Modern Web StackContinuous Delivery on a Modern Web Stack
Continuous Delivery on a Modern Web Stack
 
Android Anatomy
Android  AnatomyAndroid  Anatomy
Android Anatomy
 
null Pune meet - Understanding TCP/IP and Network Intrusion
null Pune meet - Understanding TCP/IP and Network Intrusionnull Pune meet - Understanding TCP/IP and Network Intrusion
null Pune meet - Understanding TCP/IP and Network Intrusion
 
Microbiology Ch 08 lecture_presentation
Microbiology Ch 08 lecture_presentationMicrobiology Ch 08 lecture_presentation
Microbiology Ch 08 lecture_presentation
 
Acunetix technical presentation v7 setembro2011
Acunetix technical presentation v7 setembro2011Acunetix technical presentation v7 setembro2011
Acunetix technical presentation v7 setembro2011
 

Similar a Http tunneling exploit daniel adenew web

Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].pptBachaSirata
 
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxPublished on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxamrit47
 
Network protocols
Network protocolsNetwork protocols
Network protocolsAbiud Orina
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security conceptssonuagain
 
Internetbasics
InternetbasicsInternetbasics
Internetbasicspatinijava
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.pptRaj Kumar
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxbmit1
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guideSrihari
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniquesinbroker
 

Similar a Http tunneling exploit daniel adenew web (20)

Fit project
Fit projectFit project
Fit project
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxPublished on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
what_is_internet.pptx
what_is_internet.pptxwhat_is_internet.pptx
what_is_internet.pptx
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
 
Telnet
TelnetTelnet
Telnet
 
Telnet
TelnetTelnet
Telnet
 
Telnet
TelnetTelnet
Telnet
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall
FirewallFirewall
Firewall
 
Netdefender
NetdefenderNetdefender
Netdefender
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptx
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guide
 
Tcp and udp ports
Tcp and udp portsTcp and udp ports
Tcp and udp ports
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 

Más de Daniel Adenew

Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Daniel Adenew
 
Edge develop com_innovative
Edge develop com_innovativeEdge develop com_innovative
Edge develop com_innovativeDaniel Adenew
 
Www mercycareethiopia org
Www mercycareethiopia orgWww mercycareethiopia org
Www mercycareethiopia orgDaniel Adenew
 
Www orchidplc com_index_php_option_com_content_view_article (1)
Www orchidplc com_index_php_option_com_content_view_article (1)Www orchidplc com_index_php_option_com_content_view_article (1)
Www orchidplc com_index_php_option_com_content_view_article (1)Daniel Adenew
 
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_galWww mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_galDaniel Adenew
 
Edge develop com_previous_clients_html
Edge develop com_previous_clients_htmlEdge develop com_previous_clients_html
Edge develop com_previous_clients_htmlDaniel Adenew
 
Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Daniel Adenew
 
Spring mvc my Faviourite Slide
Spring mvc my Faviourite SlideSpring mvc my Faviourite Slide
Spring mvc my Faviourite SlideDaniel Adenew
 
Natural language processing with python and amharic syntax parse tree by dani...
Natural language processing with python and amharic syntax parse tree by dani...Natural language processing with python and amharic syntax parse tree by dani...
Natural language processing with python and amharic syntax parse tree by dani...Daniel Adenew
 
Delivery System Developed By Daniel Adenew
Delivery System Developed By Daniel AdenewDelivery System Developed By Daniel Adenew
Delivery System Developed By Daniel AdenewDaniel Adenew
 
The rise of android malware and efficiency of Anti-Virus
The rise of android malware and efficiency of Anti-VirusThe rise of android malware and efficiency of Anti-Virus
The rise of android malware and efficiency of Anti-VirusDaniel Adenew
 

Más de Daniel Adenew (13)

Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com
 
Edge develop com_innovative
Edge develop com_innovativeEdge develop com_innovative
Edge develop com_innovative
 
Osdethiopia org
Osdethiopia orgOsdethiopia org
Osdethiopia org
 
Www mercycareethiopia org
Www mercycareethiopia orgWww mercycareethiopia org
Www mercycareethiopia org
 
Www orchidplc com_index_php_option_com_content_view_article (1)
Www orchidplc com_index_php_option_com_content_view_article (1)Www orchidplc com_index_php_option_com_content_view_article (1)
Www orchidplc com_index_php_option_com_content_view_article (1)
 
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_galWww mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
 
Edge develop com_previous_clients_html
Edge develop com_previous_clients_htmlEdge develop com_previous_clients_html
Edge develop com_previous_clients_html
 
Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com
 
Edge develop com
Edge develop comEdge develop com
Edge develop com
 
Spring mvc my Faviourite Slide
Spring mvc my Faviourite SlideSpring mvc my Faviourite Slide
Spring mvc my Faviourite Slide
 
Natural language processing with python and amharic syntax parse tree by dani...
Natural language processing with python and amharic syntax parse tree by dani...Natural language processing with python and amharic syntax parse tree by dani...
Natural language processing with python and amharic syntax parse tree by dani...
 
Delivery System Developed By Daniel Adenew
Delivery System Developed By Daniel AdenewDelivery System Developed By Daniel Adenew
Delivery System Developed By Daniel Adenew
 
The rise of android malware and efficiency of Anti-Virus
The rise of android malware and efficiency of Anti-VirusThe rise of android malware and efficiency of Anti-Virus
The rise of android malware and efficiency of Anti-Virus
 

Último

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Último (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Http tunneling exploit daniel adenew web

  • 2. What is Http Tunneling ? • HTTP Tunneling is a technique WHICH communications using various network protocols are encapsulated using the HTTP protocol,Since HTTP protocol is not Monitored or can’t be blocked by Firewall.[:(] • The HTTP protocol therefore acts as a wrapper for a channel that the network protocol being tunneled uses to communicate.[wikipedia]
  • 3. What is its Use ? used most often as a means for communication from network locations with restricted connectivity – most often behind NATs, firewalls, or proxy servers, and most often with applications that lack native support for communication in such conditions of restricted connectivity. For blocking traffic initiated from outside the network, or blocking of all network protocols except a few is a commonly used method to lock down a network to secure it against internal and external threats.
  • 4. How do ? Implementation Issues The application/ host opens an HTTP connection to a mediator server, which acts as a relay of communications to and from the remote host. if connection is Ok then application then communicates with the mediator server using HTTP requests BUT encapsulating the actual communications within those requests. Mediator server during communication will unwraps the actual data before forwarding it to the remote host in question.
  • 5. The Attack Explained !!! (HTTP TUNNEL EXPLOIT) The httptunnel exploit consists of two components, the client and the server portion. htc, resides on the attacker’s and hts, resides on the victim’s server
  • 6. The Attack Explained !!! (HTTP TUNNEL EXPLOIT) Httptunnel exploits the fact that most firewalls have a proxy for http by creating a data tunnel. To utilize the data tunnel, another service is used to send and receive data across the established connection, such as telnet.
  • 7. The Attack Explained !!! (HTTP TUNNEL EXPLOIT) use of HTTP PUT and HTTP GET commands. All data sent to the victim machine is done through the PUT command and data is returned through the GET command.
  • 8. Exploiting Once installed on the target system, the server component, hts -F localhost:23 8888 htc -F 2323 -P PROXY:8000 VICTIM:8888 Once a successful connection has been established, the attacker can issue commands to the VICTIM on the telnet port through the HTTP proxy data tunnel by issuing the following: telnet localhost 2323 [this was blocked by Firewall]
  • 9. Finding the exploit Because the exploit uses a legitimate service to transmit information across the network and Internet, the protocol used does not provide an indication of an exploit occurring. The issue to watch for is whether the pattern of the protocol, in this case HTTP PUT, requests being issued from a source to a destination. The request packets may be of a smaller and less frequent nature than normal http proxy traffic to a web site. (seem not easy to find and trace!)
  • 10. Recommendations 1. Ensure all servers are at the most current patch level to avoid root compromise. 2. Disable all unnecessary services on servers; use only secure login services, such as SSH. 3. Disable trust relationships with servers that can be accessed from firewalls, such as those in a Demilitarized Zone (DMZ). 4. Conduct regular scans of servers on the full port range (1 through 65535). 5. Review firewall logs for unusual web access patterns from systems that do not normally operate as a web client. 6. Monitor for HTTP GET requests issued from systems that do not provide web services.