SlideShare une entreprise Scribd logo
1  sur  10
Http
Tunneling
Exploit
By : Daniel Adenew (MSC)
What is Http Tunneling ?

•

HTTP Tunneling is a technique WHICH
communications using various network protocols are
encapsulated using the HTTP protocol,Since HTTP
protocol is not Monitored or can’t be blocked by
Firewall.[:(]

•

The HTTP protocol therefore acts as a wrapper for a
channel that the network protocol being tunneled
uses to communicate.[wikipedia]
What is its Use ?
used most often as a means for communication from
network locations with restricted connectivity – most
often behind NATs, firewalls, or proxy servers, and most
often with applications that lack native support for
communication in such conditions of restricted
connectivity. For blocking traffic initiated from outside the
network, or blocking of all network protocols except a
few is a commonly used method to lock down a network
to secure it against internal and external threats.
How do ? Implementation Issues
The application/ host opens an HTTP connection to a mediator server,
which acts as a relay of communications to and from the remote host.
if connection is Ok then application then communicates with the mediator
server using HTTP requests BUT encapsulating the actual
communications within those requests.
Mediator server during communication will unwraps the actual data before
forwarding it to the remote host in question.
The Attack Explained !!! (HTTP TUNNEL
EXPLOIT)

The httptunnel exploit consists of two
components, the client and the
server portion.
htc, resides on the attacker’s and hts,
resides on the victim’s server
The Attack Explained !!! (HTTP TUNNEL
EXPLOIT)

Httptunnel exploits the fact that most
firewalls have a proxy for http by creating a
data tunnel. To utilize the data tunnel,
another service is used to send and
receive data across the established
connection, such as telnet.
The Attack Explained !!! (HTTP TUNNEL
EXPLOIT)

use of HTTP PUT and HTTP GET
commands.
All data sent to the victim
machine is done through the PUT command
and data is returned through
the GET command.
Exploiting
Once installed on the target system, the
server component,
hts -F localhost:23 8888
htc -F 2323 -P PROXY:8000 VICTIM:8888
Once a successful connection has been established, the attacker can issue
commands to the VICTIM on the telnet port through the HTTP proxy data
tunnel by issuing the following:

telnet localhost 2323 [this was blocked by Firewall]
Finding the exploit
Because the exploit uses a legitimate service to transmit information
across the network and Internet, the protocol used does not provide an
indication of an exploit occurring.

The issue to watch for is whether the pattern of the protocol, in this case
HTTP PUT, requests being issued from a source to a destination.

The request packets may be of a smaller and less frequent nature than
normal http proxy traffic to a web site. (seem not easy to find and
trace!)
Recommendations
1. Ensure all servers are at the most current patch level to avoid root
compromise.
2. Disable all unnecessary services on servers; use only secure login
services, such as SSH.
3. Disable trust relationships with servers that can be accessed from
firewalls, such as those in a Demilitarized Zone (DMZ).
4. Conduct regular scans of servers on the full port range (1 through
65535).
5. Review firewall logs for unusual web access patterns from systems
that do not normally operate as a web client.
6. Monitor for HTTP GET requests issued from systems that do not
provide web services.

Contenu connexe

Tendances

User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CS
Thanveen
 
Cellular network
Cellular networkCellular network
Cellular network
shreb
 

Tendances (20)

Wireless system
Wireless systemWireless system
Wireless system
 
Xmpp
XmppXmpp
Xmpp
 
csma ca
 csma ca csma ca
csma ca
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
 
Web and http computer network
Web and http computer networkWeb and http computer network
Web and http computer network
 
Lec 1 introduction to wireless communication(1)
Lec 1   introduction to wireless communication(1)Lec 1   introduction to wireless communication(1)
Lec 1 introduction to wireless communication(1)
 
WAP 2.0
WAP 2.0WAP 2.0
WAP 2.0
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Application Layer
Application Layer Application Layer
Application Layer
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling Technologies
 
Data Link Layer Numericals
Data Link Layer NumericalsData Link Layer Numericals
Data Link Layer Numericals
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 
WLAN
WLANWLAN
WLAN
 
Cdma2000
Cdma2000Cdma2000
Cdma2000
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CS
 
Cellular network
Cellular networkCellular network
Cellular network
 
04 transmission media
04 transmission media04 transmission media
04 transmission media
 

En vedette

підготовка випускників 2016 року до зно
підготовка випускників 2016 року до знопідготовка випускників 2016 року до зно
підготовка випускників 2016 року до зно
koblevoschool1
 
Ch 14 lecture_outline
Ch 14 lecture_outlineCh 14 lecture_outline
Ch 14 lecture_outline
TheSlaps
 
Storytelling reflection
Storytelling reflectionStorytelling reflection
Storytelling reflection
grade4biss
 
Microbiology Ch 08 lecture_presentation
Microbiology Ch 08 lecture_presentationMicrobiology Ch 08 lecture_presentation
Microbiology Ch 08 lecture_presentation
TheSlaps
 
Acunetix technical presentation v7 setembro2011
Acunetix technical presentation v7 setembro2011Acunetix technical presentation v7 setembro2011
Acunetix technical presentation v7 setembro2011
Wlad1m1r
 

En vedette (19)

null Pune meet - Evading Firewalls: Tunneling
null Pune meet - Evading Firewalls: Tunnelingnull Pune meet - Evading Firewalls: Tunneling
null Pune meet - Evading Firewalls: Tunneling
 
null Pune meet - Wireless Security
null Pune meet - Wireless Securitynull Pune meet - Wireless Security
null Pune meet - Wireless Security
 
Debate sobre o Piso_ALESE
Debate sobre o Piso_ALESEDebate sobre o Piso_ALESE
Debate sobre o Piso_ALESE
 
Identifying and Removing Malwares
Identifying and Removing MalwaresIdentifying and Removing Malwares
Identifying and Removing Malwares
 
Security News Bytes - null Dharmashala
Security News Bytes  - null DharmashalaSecurity News Bytes  - null Dharmashala
Security News Bytes - null Dharmashala
 
підготовка випускників 2016 року до зно
підготовка випускників 2016 року до знопідготовка випускників 2016 року до зно
підготовка випускників 2016 року до зно
 
ICE Snow Leopard
ICE Snow LeopardICE Snow Leopard
ICE Snow Leopard
 
خلل في الالتزام
خلل في الالتزامخلل في الالتزام
خلل في الالتزام
 
Cosmetic Treatment in Kochi | Dermatologist in Cochin
Cosmetic Treatment in Kochi | Dermatologist in CochinCosmetic Treatment in Kochi | Dermatologist in Cochin
Cosmetic Treatment in Kochi | Dermatologist in Cochin
 
Ch 14 lecture_outline
Ch 14 lecture_outlineCh 14 lecture_outline
Ch 14 lecture_outline
 
Infographic: Current Govt Programmes To Boost MSME Sector
Infographic: Current Govt Programmes To Boost MSME SectorInfographic: Current Govt Programmes To Boost MSME Sector
Infographic: Current Govt Programmes To Boost MSME Sector
 
Storytelling reflection
Storytelling reflectionStorytelling reflection
Storytelling reflection
 
Fun & profit with bug bounties
Fun & profit with bug bountiesFun & profit with bug bounties
Fun & profit with bug bounties
 
Chapter 4 Part 2
Chapter 4 Part 2Chapter 4 Part 2
Chapter 4 Part 2
 
Continuous Delivery on a Modern Web Stack
Continuous Delivery on a Modern Web StackContinuous Delivery on a Modern Web Stack
Continuous Delivery on a Modern Web Stack
 
Android Anatomy
Android  AnatomyAndroid  Anatomy
Android Anatomy
 
null Pune meet - Understanding TCP/IP and Network Intrusion
null Pune meet - Understanding TCP/IP and Network Intrusionnull Pune meet - Understanding TCP/IP and Network Intrusion
null Pune meet - Understanding TCP/IP and Network Intrusion
 
Microbiology Ch 08 lecture_presentation
Microbiology Ch 08 lecture_presentationMicrobiology Ch 08 lecture_presentation
Microbiology Ch 08 lecture_presentation
 
Acunetix technical presentation v7 setembro2011
Acunetix technical presentation v7 setembro2011Acunetix technical presentation v7 setembro2011
Acunetix technical presentation v7 setembro2011
 

Similaire à Http tunneling exploit daniel adenew web

Published on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxPublished on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
amrit47
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
patinijava
 

Similaire à Http tunneling exploit daniel adenew web (20)

Fit project
Fit projectFit project
Fit project
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxPublished on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
what_is_internet.pptx
what_is_internet.pptxwhat_is_internet.pptx
what_is_internet.pptx
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
 
Telnet
TelnetTelnet
Telnet
 
Telnet
TelnetTelnet
Telnet
 
Telnet
TelnetTelnet
Telnet
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall
FirewallFirewall
Firewall
 
Netdefender
NetdefenderNetdefender
Netdefender
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptx
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guide
 
Tcp and udp ports
Tcp and udp portsTcp and udp ports
Tcp and udp ports
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 

Plus de Daniel Adenew

Spring mvc my Faviourite Slide
Spring mvc my Faviourite SlideSpring mvc my Faviourite Slide
Spring mvc my Faviourite Slide
Daniel Adenew
 

Plus de Daniel Adenew (13)

Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com
 
Edge develop com_innovative
Edge develop com_innovativeEdge develop com_innovative
Edge develop com_innovative
 
Osdethiopia org
Osdethiopia orgOsdethiopia org
Osdethiopia org
 
Www mercycareethiopia org
Www mercycareethiopia orgWww mercycareethiopia org
Www mercycareethiopia org
 
Www orchidplc com_index_php_option_com_content_view_article (1)
Www orchidplc com_index_php_option_com_content_view_article (1)Www orchidplc com_index_php_option_com_content_view_article (1)
Www orchidplc com_index_php_option_com_content_view_article (1)
 
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_galWww mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
Www mercycareethiopia org_welcome_to_mercy_care_ethiopia_gal
 
Edge develop com_previous_clients_html
Edge develop com_previous_clients_htmlEdge develop com_previous_clients_html
Edge develop com_previous_clients_html
 
Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com Website Developemnt for edge-develop.com
Website Developemnt for edge-develop.com
 
Edge develop com
Edge develop comEdge develop com
Edge develop com
 
Spring mvc my Faviourite Slide
Spring mvc my Faviourite SlideSpring mvc my Faviourite Slide
Spring mvc my Faviourite Slide
 
Natural language processing with python and amharic syntax parse tree by dani...
Natural language processing with python and amharic syntax parse tree by dani...Natural language processing with python and amharic syntax parse tree by dani...
Natural language processing with python and amharic syntax parse tree by dani...
 
Delivery System Developed By Daniel Adenew
Delivery System Developed By Daniel AdenewDelivery System Developed By Daniel Adenew
Delivery System Developed By Daniel Adenew
 
The rise of android malware and efficiency of Anti-Virus
The rise of android malware and efficiency of Anti-VirusThe rise of android malware and efficiency of Anti-Virus
The rise of android malware and efficiency of Anti-Virus
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Http tunneling exploit daniel adenew web

  • 2. What is Http Tunneling ? • HTTP Tunneling is a technique WHICH communications using various network protocols are encapsulated using the HTTP protocol,Since HTTP protocol is not Monitored or can’t be blocked by Firewall.[:(] • The HTTP protocol therefore acts as a wrapper for a channel that the network protocol being tunneled uses to communicate.[wikipedia]
  • 3. What is its Use ? used most often as a means for communication from network locations with restricted connectivity – most often behind NATs, firewalls, or proxy servers, and most often with applications that lack native support for communication in such conditions of restricted connectivity. For blocking traffic initiated from outside the network, or blocking of all network protocols except a few is a commonly used method to lock down a network to secure it against internal and external threats.
  • 4. How do ? Implementation Issues The application/ host opens an HTTP connection to a mediator server, which acts as a relay of communications to and from the remote host. if connection is Ok then application then communicates with the mediator server using HTTP requests BUT encapsulating the actual communications within those requests. Mediator server during communication will unwraps the actual data before forwarding it to the remote host in question.
  • 5. The Attack Explained !!! (HTTP TUNNEL EXPLOIT) The httptunnel exploit consists of two components, the client and the server portion. htc, resides on the attacker’s and hts, resides on the victim’s server
  • 6. The Attack Explained !!! (HTTP TUNNEL EXPLOIT) Httptunnel exploits the fact that most firewalls have a proxy for http by creating a data tunnel. To utilize the data tunnel, another service is used to send and receive data across the established connection, such as telnet.
  • 7. The Attack Explained !!! (HTTP TUNNEL EXPLOIT) use of HTTP PUT and HTTP GET commands. All data sent to the victim machine is done through the PUT command and data is returned through the GET command.
  • 8. Exploiting Once installed on the target system, the server component, hts -F localhost:23 8888 htc -F 2323 -P PROXY:8000 VICTIM:8888 Once a successful connection has been established, the attacker can issue commands to the VICTIM on the telnet port through the HTTP proxy data tunnel by issuing the following: telnet localhost 2323 [this was blocked by Firewall]
  • 9. Finding the exploit Because the exploit uses a legitimate service to transmit information across the network and Internet, the protocol used does not provide an indication of an exploit occurring. The issue to watch for is whether the pattern of the protocol, in this case HTTP PUT, requests being issued from a source to a destination. The request packets may be of a smaller and less frequent nature than normal http proxy traffic to a web site. (seem not easy to find and trace!)
  • 10. Recommendations 1. Ensure all servers are at the most current patch level to avoid root compromise. 2. Disable all unnecessary services on servers; use only secure login services, such as SSH. 3. Disable trust relationships with servers that can be accessed from firewalls, such as those in a Demilitarized Zone (DMZ). 4. Conduct regular scans of servers on the full port range (1 through 65535). 5. Review firewall logs for unusual web access patterns from systems that do not normally operate as a web client. 6. Monitor for HTTP GET requests issued from systems that do not provide web services.