SlideShare une entreprise Scribd logo
1  sur  10
Http
Tunneling
Exploit
By : Daniel Adenew (MSC)
What is Http Tunneling ?

•

HTTP Tunneling is a technique WHICH
communications using various network protocols are
encapsulated using the HTTP protocol,Since HTTP
protocol is not Monitored or can’t be blocked by
Firewall.[:(]

•

The HTTP protocol therefore acts as a wrapper for a
channel that the network protocol being tunneled
uses to communicate.[wikipedia]
What is its Use ?
used most often as a means for communication from
network locations with restricted connectivity – most
often behind NATs, firewalls, or proxy servers, and most
often with applications that lack native support for
communication in such conditions of restricted
connectivity. For blocking traffic initiated from outside the
network, or blocking of all network protocols except a
few is a commonly used method to lock down a network
to secure it against internal and external threats.
How do ? Implementation Issues
The application/ host opens an HTTP connection to a mediator server,
which acts as a relay of communications to and from the remote host.
if connection is Ok then application then communicates with the mediator
server using HTTP requests BUT encapsulating the actual
communications within those requests.
Mediator server during communication will unwraps the actual data before
forwarding it to the remote host in question.
The Attack Explained !!! (HTTP TUNNEL
EXPLOIT)

The httptunnel exploit consists of two
components, the client and the
server portion.
htc, resides on the attacker’s and hts,
resides on the victim’s server
The Attack Explained !!! (HTTP TUNNEL
EXPLOIT)

Httptunnel exploits the fact that most
firewalls have a proxy for http by creating a
data tunnel. To utilize the data tunnel,
another service is used to send and
receive data across the established
connection, such as telnet.
The Attack Explained !!! (HTTP TUNNEL
EXPLOIT)

use of HTTP PUT and HTTP GET
commands.
All data sent to the victim
machine is done through the PUT command
and data is returned through
the GET command.
Exploiting
Once installed on the target system, the
server component,
hts -F localhost:23 8888
htc -F 2323 -P PROXY:8000 VICTIM:8888
Once a successful connection has been established, the attacker can issue
commands to the VICTIM on the telnet port through the HTTP proxy data
tunnel by issuing the following:

telnet localhost 2323 [this was blocked by Firewall]
Finding the exploit
Because the exploit uses a legitimate service to transmit information
across the network and Internet, the protocol used does not provide an
indication of an exploit occurring.

The issue to watch for is whether the pattern of the protocol, in this case
HTTP PUT, requests being issued from a source to a destination.

The request packets may be of a smaller and less frequent nature than
normal http proxy traffic to a web site. (seem not easy to find and
trace!)
Recommendations
1. Ensure all servers are at the most current patch level to avoid root
compromise.
2. Disable all unnecessary services on servers; use only secure login
services, such as SSH.
3. Disable trust relationships with servers that can be accessed from
firewalls, such as those in a Demilitarized Zone (DMZ).
4. Conduct regular scans of servers on the full port range (1 through
65535).
5. Review firewall logs for unusual web access patterns from systems
that do not normally operate as a web client.
6. Monitor for HTTP GET requests issued from systems that do not
provide web services.

Contenu connexe

Tendances

I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commerce
mc aa
 
Cellular network
Cellular networkCellular network
Cellular network
shreb
 
FEMTOCELL TECHNOLOGY Presentation
FEMTOCELL TECHNOLOGY PresentationFEMTOCELL TECHNOLOGY Presentation
FEMTOCELL TECHNOLOGY Presentation
hareesh p
 

Tendances (20)

I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commerce
 
Fhss project
Fhss projectFhss project
Fhss project
 
mobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdfmobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdf
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
Ecommerce and online publishing
Ecommerce and online publishingEcommerce and online publishing
Ecommerce and online publishing
 
Digital marketing unit 2
Digital marketing unit 2Digital marketing unit 2
Digital marketing unit 2
 
Amps
AmpsAmps
Amps
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
consumer oriented applications
consumer oriented applicationsconsumer oriented applications
consumer oriented applications
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Mobile telephone systems
Mobile telephone systemsMobile telephone systems
Mobile telephone systems
 
Voice oriented data communication
Voice oriented data communicationVoice oriented data communication
Voice oriented data communication
 
Adaptation of tcp window
Adaptation of tcp windowAdaptation of tcp window
Adaptation of tcp window
 
Cellular network
Cellular networkCellular network
Cellular network
 
Telecom Roaming Overview
Telecom Roaming OverviewTelecom Roaming Overview
Telecom Roaming Overview
 
Atm intro
Atm introAtm intro
Atm intro
 
Unit 3
Unit 3Unit 3
Unit 3
 
FEMTOCELL TECHNOLOGY Presentation
FEMTOCELL TECHNOLOGY PresentationFEMTOCELL TECHNOLOGY Presentation
FEMTOCELL TECHNOLOGY Presentation
 
Risks of E-commerce
Risks of E-commerceRisks of E-commerce
Risks of E-commerce
 
Data management issues
Data management issuesData management issues
Data management issues
 

En vedette

підготовка випускників 2016 року до зно
підготовка випускників 2016 року до знопідготовка випускників 2016 року до зно
підготовка випускників 2016 року до зно
koblevoschool1
 
Ch 14 lecture_outline
Ch 14 lecture_outlineCh 14 lecture_outline
Ch 14 lecture_outline
TheSlaps
 
Storytelling reflection
Storytelling reflectionStorytelling reflection
Storytelling reflection
grade4biss
 
Microbiology Ch 08 lecture_presentation
Microbiology Ch 08 lecture_presentationMicrobiology Ch 08 lecture_presentation
Microbiology Ch 08 lecture_presentation
TheSlaps
 
Acunetix technical presentation v7 setembro2011
Acunetix technical presentation v7 setembro2011Acunetix technical presentation v7 setembro2011
Acunetix technical presentation v7 setembro2011
Wlad1m1r
 

En vedette (19)

null Pune meet - Evading Firewalls: Tunneling
null Pune meet - Evading Firewalls: Tunnelingnull Pune meet - Evading Firewalls: Tunneling
null Pune meet - Evading Firewalls: Tunneling
 
null Pune meet - Wireless Security
null Pune meet - Wireless Securitynull Pune meet - Wireless Security
null Pune meet - Wireless Security
 
Debate sobre o Piso_ALESE
Debate sobre o Piso_ALESEDebate sobre o Piso_ALESE
Debate sobre o Piso_ALESE
 
Identifying and Removing Malwares
Identifying and Removing MalwaresIdentifying and Removing Malwares
Identifying and Removing Malwares
 
Security News Bytes - null Dharmashala
Security News Bytes  - null DharmashalaSecurity News Bytes  - null Dharmashala
Security News Bytes - null Dharmashala
 
підготовка випускників 2016 року до зно
підготовка випускників 2016 року до знопідготовка випускників 2016 року до зно
підготовка випускників 2016 року до зно
 
ICE Snow Leopard
ICE Snow LeopardICE Snow Leopard
ICE Snow Leopard
 
خلل في الالتزام
خلل في الالتزامخلل في الالتزام
خلل في الالتزام
 
Cosmetic Treatment in Kochi | Dermatologist in Cochin
Cosmetic Treatment in Kochi | Dermatologist in CochinCosmetic Treatment in Kochi | Dermatologist in Cochin
Cosmetic Treatment in Kochi | Dermatologist in Cochin
 
Ch 14 lecture_outline
Ch 14 lecture_outlineCh 14 lecture_outline
Ch 14 lecture_outline
 
Infographic: Current Govt Programmes To Boost MSME Sector
Infographic: Current Govt Programmes To Boost MSME SectorInfographic: Current Govt Programmes To Boost MSME Sector
Infographic: Current Govt Programmes To Boost MSME Sector
 
Storytelling reflection
Storytelling reflectionStorytelling reflection
Storytelling reflection
 
Fun & profit with bug bounties
Fun & profit with bug bountiesFun & profit with bug bounties
Fun & profit with bug bounties
 
Chapter 4 Part 2
Chapter 4 Part 2Chapter 4 Part 2
Chapter 4 Part 2
 
Continuous Delivery on a Modern Web Stack
Continuous Delivery on a Modern Web StackContinuous Delivery on a Modern Web Stack
Continuous Delivery on a Modern Web Stack
 
Android Anatomy
Android  AnatomyAndroid  Anatomy
Android Anatomy
 
null Pune meet - Understanding TCP/IP and Network Intrusion
null Pune meet - Understanding TCP/IP and Network Intrusionnull Pune meet - Understanding TCP/IP and Network Intrusion
null Pune meet - Understanding TCP/IP and Network Intrusion
 
Microbiology Ch 08 lecture_presentation
Microbiology Ch 08 lecture_presentationMicrobiology Ch 08 lecture_presentation
Microbiology Ch 08 lecture_presentation
 
Acunetix technical presentation v7 setembro2011
Acunetix technical presentation v7 setembro2011Acunetix technical presentation v7 setembro2011
Acunetix technical presentation v7 setembro2011
 

Similaire à Http tunneling exploit daniel adenew web

Published on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxPublished on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
amrit47
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
patinijava
 

Similaire à Http tunneling exploit daniel adenew web (20)

Fit project
Fit projectFit project
Fit project
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxPublished on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
what_is_internet.pptx
what_is_internet.pptxwhat_is_internet.pptx
what_is_internet.pptx
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
 
Telnet
TelnetTelnet
Telnet
 
Telnet
TelnetTelnet
Telnet
 
Telnet
TelnetTelnet
Telnet
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall
FirewallFirewall
Firewall
 
Netdefender
NetdefenderNetdefender
Netdefender
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptx
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guide
 
Tcp and udp ports
Tcp and udp portsTcp and udp ports
Tcp and udp ports
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 

Plus de Daniel Adenew

Spring mvc my Faviourite Slide
Spring mvc my Faviourite SlideSpring mvc my Faviourite Slide
Spring mvc my Faviourite Slide
Daniel Adenew
 

Plus de Daniel Adenew (13)

Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com
 
Edge develop com_innovative
Edge develop com_innovativeEdge develop com_innovative
Edge develop com_innovative
 
Osdethiopia org
Osdethiopia orgOsdethiopia org
Osdethiopia org
 
Www mercycareethiopia org
Www mercycareethiopia orgWww mercycareethiopia org
Www mercycareethiopia org
 
Www orchidplc com_index_php_option_com_content_view_article (1)
Www orchidplc com_index_php_option_com_content_view_article (1)Www orchidplc com_index_php_option_com_content_view_article (1)
Www orchidplc com_index_php_option_com_content_view_article (1)
 
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_galWww mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
 
Edge develop com_previous_clients_html
Edge develop com_previous_clients_htmlEdge develop com_previous_clients_html
Edge develop com_previous_clients_html
 
Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com
 
Edge develop com
Edge develop comEdge develop com
Edge develop com
 
Spring mvc my Faviourite Slide
Spring mvc my Faviourite SlideSpring mvc my Faviourite Slide
Spring mvc my Faviourite Slide
 
Natural language processing with python and amharic syntax parse tree by dani...
Natural language processing with python and amharic syntax parse tree by dani...Natural language processing with python and amharic syntax parse tree by dani...
Natural language processing with python and amharic syntax parse tree by dani...
 
Delivery System Developed By Daniel Adenew
Delivery System Developed By Daniel AdenewDelivery System Developed By Daniel Adenew
Delivery System Developed By Daniel Adenew
 
The rise of android malware and efficiency of Anti-Virus
The rise of android malware and efficiency of Anti-VirusThe rise of android malware and efficiency of Anti-Virus
The rise of android malware and efficiency of Anti-Virus
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Http tunneling exploit daniel adenew web

  • 2. What is Http Tunneling ? • HTTP Tunneling is a technique WHICH communications using various network protocols are encapsulated using the HTTP protocol,Since HTTP protocol is not Monitored or can’t be blocked by Firewall.[:(] • The HTTP protocol therefore acts as a wrapper for a channel that the network protocol being tunneled uses to communicate.[wikipedia]
  • 3. What is its Use ? used most often as a means for communication from network locations with restricted connectivity – most often behind NATs, firewalls, or proxy servers, and most often with applications that lack native support for communication in such conditions of restricted connectivity. For blocking traffic initiated from outside the network, or blocking of all network protocols except a few is a commonly used method to lock down a network to secure it against internal and external threats.
  • 4. How do ? Implementation Issues The application/ host opens an HTTP connection to a mediator server, which acts as a relay of communications to and from the remote host. if connection is Ok then application then communicates with the mediator server using HTTP requests BUT encapsulating the actual communications within those requests. Mediator server during communication will unwraps the actual data before forwarding it to the remote host in question.
  • 5. The Attack Explained !!! (HTTP TUNNEL EXPLOIT) The httptunnel exploit consists of two components, the client and the server portion. htc, resides on the attacker’s and hts, resides on the victim’s server
  • 6. The Attack Explained !!! (HTTP TUNNEL EXPLOIT) Httptunnel exploits the fact that most firewalls have a proxy for http by creating a data tunnel. To utilize the data tunnel, another service is used to send and receive data across the established connection, such as telnet.
  • 7. The Attack Explained !!! (HTTP TUNNEL EXPLOIT) use of HTTP PUT and HTTP GET commands. All data sent to the victim machine is done through the PUT command and data is returned through the GET command.
  • 8. Exploiting Once installed on the target system, the server component, hts -F localhost:23 8888 htc -F 2323 -P PROXY:8000 VICTIM:8888 Once a successful connection has been established, the attacker can issue commands to the VICTIM on the telnet port through the HTTP proxy data tunnel by issuing the following: telnet localhost 2323 [this was blocked by Firewall]
  • 9. Finding the exploit Because the exploit uses a legitimate service to transmit information across the network and Internet, the protocol used does not provide an indication of an exploit occurring. The issue to watch for is whether the pattern of the protocol, in this case HTTP PUT, requests being issued from a source to a destination. The request packets may be of a smaller and less frequent nature than normal http proxy traffic to a web site. (seem not easy to find and trace!)
  • 10. Recommendations 1. Ensure all servers are at the most current patch level to avoid root compromise. 2. Disable all unnecessary services on servers; use only secure login services, such as SSH. 3. Disable trust relationships with servers that can be accessed from firewalls, such as those in a Demilitarized Zone (DMZ). 4. Conduct regular scans of servers on the full port range (1 through 65535). 5. Review firewall logs for unusual web access patterns from systems that do not normally operate as a web client. 6. Monitor for HTTP GET requests issued from systems that do not provide web services.