the patsy proxy

27
The Patsy Proxy Getting Others To Do Your Dirty Work

Upload: baronzor

Post on 13-May-2015

1.293 views

Category:

Technology


1 download

DESCRIPTION

How to use systems not designed for use as proxies to pass traffic for you.

TRANSCRIPT

Page 1: The Patsy Proxy

The Patsy ProxyGetting Others To Do Your Dirty Work

Page 2: The Patsy Proxy

Who we are

Jen Savage◦Software Developer ◦@savagejen

Dan Crowley◦Managing Consultant at Trustwave

SpiderLabs◦@dan_crowley

Page 3: The Patsy Proxy

What is a patsy proxy?

Patsy (noun): A person who is easily taken advantage of

Proxy (noun): A person authorized to act on the behalf of another

A patsy proxy is anything that can be used to unwittingly perform an attack on the behalf of another.

Page 4: The Patsy Proxy

Advantages of a patsy proxyProxy owner is unaware of proxyTarget is unaware that victim acts

as proxy◦Not publicly listed as a proxy◦No traditional proxy service on victim

Logging unlikelyIP may be privileged

Page 5: The Patsy Proxy

Disadvantages of a patsy proxyAttack capabilities may be

limited◦May be blind◦May change the traffic◦May have a time delay◦May pass only certain types of traffic

What is inside the black box?◦May be logged

Page 6: The Patsy Proxy

On patsy limitationsPatsy only allows GET params

◦Many applications accept POST params in GET

Patsy only makes HEAD requests◦Many applications process HEAD/GET

the same No data will be returned DoS capability severely limited

Patsy is blind◦Many attacks can be launched blind

Page 7: The Patsy Proxy

Malicious uses of a patsy proxy

Page 8: The Patsy Proxy

Frame SomeonePost threats, harass people, etcAccess illegal materialsLaunch attacks

Page 9: The Patsy Proxy

Anonymize an attackAttack will trace back to the

patsy◦Is the patsy logging?

Traditional attacks◦SQLi◦RFI◦DoS

Page 10: The Patsy Proxy

Bypass IP address filteringEvade IP blacklist

◦IP ban◦Sites which disallow proxies

Exploit IP trust relationships◦Business partnerships◦Proxies usually disallow internal

access Not the case with unintentional proxying

Page 11: The Patsy Proxy

Methods to achieve a patsy proxy

Page 12: The Patsy Proxy

Automated ServicesURL shorteners & un-shortenersWeb SpidersTwitter bots“Upload from URL” functionalityWebpage translation utilitiesLink preview functionality

Page 13: The Patsy Proxy

GOOGLE TRANSLATE“Translate” a web page

Page 14: The Patsy Proxy

FACEBOOKStatus update preview

Page 15: The Patsy Proxy

Automated ServicesMalware Scanning UtilitiesMail Gateway Scanners

◦Thanks to Jcran for his Project Tuna data: tuna.pentestify.com/emails

Other

Good job Google on the Google Safe Browsing Database!

Page 16: The Patsy Proxy

CLAMAVIn certain configurations, URLs in emails are checked for malware

Page 17: The Patsy Proxy

GEOCITIES-IZERHack like it’s 1996

Page 18: The Patsy Proxy

UNKNOWN MAIL GATEWAY AVWith ROT13 power

Page 19: The Patsy Proxy

Traditional VulnsXSS / HTML InjectionXML injection (XXE)SQLiRFI

Page 20: The Patsy Proxy

Social EngineeringWorth mentioningNot worth in-depth explanation

Page 21: The Patsy Proxy

Could it be a vulnerability?

Page 22: The Patsy Proxy

Recursive DoSPoint the patsy back at itselfTraffic amplification factor:

◦MAX_URI / patsy URI length * 2Tack a large resource onto the

last iteration20 requests resulted in 30

minutes downtime◦Over the LAN!

Page 23: The Patsy Proxy

RECURSIVE DOS“If it’s stupid but it works, it isn’t stupid.”patsy.php contained fopen($_GET['site'], 'r');

Page 24: The Patsy Proxy

WAF bypassRecurse onceDouble encode attack

Web Server

WAFMal

Page 25: The Patsy Proxy

DDoS through patsiesI have 2MB upI have 30 patsies, each 15MB upI have Python

By your powers combined……I AM CAPTAIN DOWNTIME

Page 26: The Patsy Proxy

Access to Internal NetworksModern proxies enforce

boundaries between internal / external

Unintentional proxies may allow boundary violation◦http://patsy.com/?site=http://

10.0.0.1/admin.htm

Page 27: The Patsy Proxy

ConclusionAttribution is Hard(er)

◦An IP address is not a personIP address filtering is ineffectiveThink before generating traffic

for usersUser education is valuable for

users, too◦Don’t Take Candy from Internet

Strangers