Room362.com

Blatherings of a security addict.

Workshop at ToorCamp With Dark0perator

| Comments

Dark0perator and I will be giving a workshop at ToorCamp coming up July 2nd-5th:

You can find us on the ToorCamp site: http://www.toorcamp.org/content/W13

Here is the description of our talk, save the bio(s):

The Art of Pivot and Persistence: Shell is only the beginning.

This workshop is based on the assumption that you have some level of access on a target system. From that it is demonstrated how to go from that level of access to taking over the whole company and how to keep that access, surviving reboots, AV scans, and even reimaging. The following levels of access is covered:

  1. Domain Administrator access on a domain controller
  2. Local Administrator access on a client machine
  3. Root on a Database server
  4. Root on a Web server
  5. User on a client machine
  6. User on a Database server
  7. User on a Web server

Offensive Security Live Courses for 2009

| Comments

I highly recommend both of these courses, and the chance to get in front of the instructors and ask questions live is worth it IMHO. So bang on those manager doors and work it out, because seats fill quickly and they are limited. 

Check out the Offensive Security – Instructor Lead Training page for updated information.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
We are excited to announce our next Offsec Live Classes.  
  
Since you asked to be notified of our next dates you will be happy to be among the first to have your teams invited to one of our next classes.  
  
Our last classes sold out about 2 months early and this class there are literally hundreds in the queue so please contact me as early as you can.  

------------------------------------------------------
Pentesting With BackTrack Live  
October 26-30, 2009  
Columbia, MD  
  
Costs:  
$3500 now till July 15th  
$3799 July 15th – September 1st  
$3999 September 1st till class  
  
Your class will include the following:  
·         5 days of intense training from Mati Aharoni and Chris Hadnagy  
·         30 days of labs in our special Pentesting with BackTrack Labs  
·         Your chance to take the highly regarded OSCP Certification  
·         We also cover your lunch during the week  
·         We host a special after hours session for those who want to join in  
  
This class is designed to take you from A to Z in real life pentesting skills.  We cover from Information Gathering to writing your own overflow.  
  
We ask each student to have a clear understanding of TCP/IP, basic linux skills and familiarity with the concepts of pentesting.  

------------------------------------------------------
Offensive Security Cracking the Perimeter Live  
November 9-13, 2009
Columbia, MD  
  
Costs:  
$5000 now till July 30th  
$5299 July 30th – October 1st  
$5499 October 1st till class  
  
Your class will include the following:  
·         5 days of intense training from Mati Aharoni and Chris Hadnagy  
·         30 days of labs in our special Cracking the Perimeter Labs  
·         Your chance to take the prestigious OSCE Certification  
·         We also cover your lunch during the week  
  
This class is designed for the seasoned security professional - A pentester or sec pro that has taken their skills to the edge and now need a little push over – to learn insane ways to crack the perimeter.  
  
This class relies heavily on the student knowing and using Olly Debugger, the Metasploit framework and understanding if not having written an full blown exploit before attempting this class.  If you have taken the “Pentesting With BT” class and mastered all aspects of this class you might be ready to take Cracking the Perimeter.  
  
All attendees are eligible for 40 CPE credits if you are CISSP.  
  
We are limiting these classes to a maximum of 20 for Pentesting with BackTrack and 15-17 for Cracking the Perimeter -  so if you are interested please contact us early and register completely to ensure your seat is saved.  
  
Thanks and I look forward to seeing you in class.  
  
Sincerely,  
  
Chris Hadnagy  
Operations Manager  
[www.offensive-security.com](http://www.offensive-security.com)  
[www.remote-exploit.org](http://www.remote-exploit.org)  
“back|track4 – So good it should be commercial”

Kindle 2 Review: Putting the Fire Out

| Comments

Now, before you get all huffy about the title, it’s not what you think. Keep reading:

It’s been 20 days since I received my Kindle 2 (word of warning, NEVER use USPS. Spend the money; it’s not worth the stress). But enough of lullygaging, let me get straight to it:

Advertised Features:

  • Email DOC, HTML/HTM, JPEG/JPG, GIF, PNG, BMP (Also, everything can be put in a ZIP for one time sending).

    • All of these worked well, I very surprised that DOCX worked so well, and they actually prefer it (since it’s based on XML it comes out cleaner after the conversion). However when you start getting into the images, it can get a bit harry when going to higher resolutions. My Kindle locked up on a 3 MB hi-res PNG of my boys (remember this is after Amazon converted it).
  • Email PDF

    • As they say, this is experimental. There are desktop software converters (not specifically designed for the Kindle) that do a much better job (and are free). But we’ll talk more about that in the ‘hacks’ portion (Amazon charges 10 cents per PDF)
  • Text to Speech

    • Granted I haven’t used much other T2S programs in my day other than Microsoft ?Steve?. This is a feature that I find phenomenal. I am one of those types who sometimes can’t quite concentrate on the reading of a book, and when I get to that point I switch on the T2S and can keep enjoying the book. The only annoying part, but understandable, is in picture quotes or code snippets, it reads through them the best it can, which is sometimes painful.
  • Fast Page Turns, Longer Battery Life, Improved Display, More Storage

    • I can’t really attest to them being better or worse than the Kindle 1, but:

      • It turns pages REALLY slow, and REALLY fast some times, kinda depends on it’s mood, time of the month, or position of the moon, not sure, but it isn’t due to the amount of content on the next page, amount of rapid fire page turns, or battery life. I can’t quite figure out the rhyme or reason.

      • The battery life is phenomenal, I charge it once a week, possibly more if I’m reading a ton. I believe this is due to me turning off the 3G. You don’t need it on if you aren’t sending a doc or shopping for a book.

      • The ‘electronic paper’ reacts to light just as real piece of paper would. Looks better in high light conditions, and only has a glare if you’re pointing a light directly at it.

      • This is where I got a bit miffed. The Kindle 1 had a SD card slot, the Kindle 2 had just 2 GB of flash storage. However, after putting umpteen PDFs, Docs, and even a couple audio books (Audible format and MP3). I still haven’t used up the space.

  • Large Selection, Low Book Prices

    • Their selection of technical books is quite lacking. And their prices are only a few dollars off something that you aren’t getting physically, something you can’t lend a friend or flip through. I agree with a bunch of the press that is going around hammering Amazon for their “9.99” advertising. But, there is a light at the end of the tunnel. Plenty of technical book publishers offer eBooks versions on their site (O’Reilly to name one) and their formats are Kindle friendly. You can find most of the books that you want, you just have to do a bit more digging than flipping through the Kindle Store
  • Kindle Store (Blogs, Newpapers, Magazines)

    • Alright, paying to read a blog is just plain bull. I don’t care if they deliver it in a pretty format. Newspapers I don’t feel much better about, but Magazines I can kind of understand. But I still run into the brick wall of why they are charging so much for something that you can’t share.
  • 3G Wireless

    • The power of the antenna on the Kindle is horrible. So much that I want to buy one of those “Seen On TV” cellular antenna boosting stickers. I understand the power struggle, battery life over connectivity, I get it. But let come on! Why do I go out of single if I set it down? But, back to an earlier point, I only have it on when I want to look for a book in the store or email one to my Kindle. It certainly isn’t a deal breaker for me.
  • Browser

    • No,.. just no. If this was 1995 and there was no dynamic content on pages this browser would have fit perfectly. If you must use this feature, look for the mobile sites, use those. Again, not a deal breaker, I have an iPhone that does browsing if needed, I don’t need my “book” to browse… yet.
  • Just plain gripes

    • USB Ultra Thin is almost as hard to come by as the iPod/iPhone interface, if not harder. Why not use mini USB like everyone else on the planet? I hate forgetting chargers on trips and having to go and buy one. 

    • No scroll wheel. I think this is something that is not only missing on the Kindle but the iPhone as well. Blackberry got famous on that wheel and they are screwing it up with that stupid ball.

    • Lastly, it’s not very right hand friendly. I’m a lefty but sometimes it’s just more convenient to hold it with my right hand, and there is no page back on the right. So to flip back a page it more muscles that I have to use, and I’m lazy ;–)

“Hacks”

  1. Converting PDFs the right and WRONG way: Do not waste your time with Stanza. Their iPhone eBook reader app is awesome, but the converter for PDFs is downright horrid. Use a program called MobiPocket Creator. Be sure to install the Publisher version when it asks during the install. It’s a convoluted process, but your end result is SO much better than both the Stanza way, and Amazon’s own converter. Follow the 6 steps: HERE. And you’ll be fine. Yes, it’s a Windows program. I haven’t researched Mac programs, and the Linux ones where just two complicated to be useful.

  2. If you MUST use the browser, turn on Advanced Mode and Javascript.  The Kindle has compartmentalized it’s Settings, so go into the Experimental –> Browser and then Menu-> Settings. 

  3. Use your pads. If you are used to typing, you use the tips of your fingers. Typing on the Kindle works SO much better if you use the pads of your fingers. 

  4. Want to save a bit of code for later? Highlight it. It will go into your “My Clippings” in and you’ll not only be able to access it and see the whole clipping, but you’ll be able to go directly to that line (Kindle doesn’t use pages) in the book, and be able to read back up if needed. Even if that book is way back in your history.

  5. Cheat Sheets. I created my own cheat sheets in Word, converted some of the ones Ed Skoudis made and a munch of others, now I have them on my Kindle and have access to them at a moments notice. Those familiar with ClickScripts will really enjoy this aspect of the Kindle. Wrap your head around that it’s not just for books, and you’ll start seeing a whole new world of things you can put on your Kindle.

What would put the Kindle on FIRE

  • Just one request, but it would hands down make the Kindle worth every cent of the 350 price tag. I want Amazon to take the contents of an email, if no other attachments exist, and send it to me as text or HTML on my Kindle. This helps me two fold. First, if I have a lengthy email that I want to read later, I can do so without straining on my iPhone to read it. Second, I can use Google Reader’s email article function to turn the Kindle into an off-site Google Reader.

Conclusion

Yes, I do think I made a great choice in my selection over a Netbook. With any technology, especially one that pushes the industry, there will be positives and negatives. But, I am reading more, and thoroughly enjoying a small sneak preview of F0rb1dd3n by my good friend Jayson Street. Bottom line, it’s a solid buy. I would highly suggest it for anyone on the go, people who never can find the time to read, and people who don’t like carrying a library with them everywhere.

Manager Training Camp - Bootcamp Style

| Comments

Last Friday (March 6th, 2009) I posed the question above. What I got in return was nothing short of amazing, and to tell you the truth, it amazed me how the tally rounded out. I categorized the answers and counted them up (MANAGERS, listen up!):

  1. (12 votes) – Security Fundamentals: This category involves the application of A/V, IDS/IPS, basic safe surfing techniques, least privilege use, and an understanding of phishing. It astounds me that this is at the top of the list. I grouped all of these answers together because they truly are the BASICS of Information Security. Why after all these years have managers of security professionals not gotten this drilled into them to the point of bleeding? What are we doing wrong?

  2. (8 votes) – Targeting: “We aren’t a target”, “There isn’t anything on saying we are getting attacked”. This is another that surprised me to be at the top of the list. How can managers not think that 1. that they are a target, and 2. think that because there aren’t any alarms going off, they aren’t getting attacked?

  3. (6 votes) – Passwords: Complexity, not using stickies, rotation, etc. I left this out of Security Fundamentals, because it’s not an easy beast to over come. It’s something that definitely needs to be addressed and a plan set down for the application, enforcement and technology behind it.

  4. (6 votes) – Compliance and Policy: Everyone in this category made it abundantly clear that compliance to a standard does NOT mean that you are secure, but not at least making the compliance bar is worse. Internal policies need to be created to provide a stricter regimen then the compliance checklist demonstrates.

  5. (5 votes) – Accountability: From basic user to CEO and Security Analyst. Accountability has many faces but it usually shows none of them in the security world. Users of the world learn quick when one of coworkers get restricted access because they clicked test phishing after they had just gone through phishing training.

  6. (5 votes) – Defense In Depth: This is an old concept as well, but in recent years have been twisted to include DiD at host and network infrastructure level. The phrase Defense In Dept will continue to grow as the depths at which we can put protections on info systems grows. You need to realize that you ARE a target and you NEED to move with this evolution, not ignore it. Doing so doesn’t make it “go away”

  7. (3 votes) – Users are stupid: I can’t believe that this even made it as an item. Managers, you seriously don’t understand that your weakest link on your network is the users?

  8. (2 votes) – Data Layer Protection: Encryption. Even if the client data is stored on a super “secure” data node, that doesn’t mean somewhere between point A and point B isnt’ compromised. If it’s sensitive or secret, it needs to be treated as such at EVERY juncture where that data is transferred or can be accessed from.

  9. (2 votes) – Risk Management: Managers, this is supposedly your specialty. Get back to it, they want you to be open to understand technically why this or that isn’t a threat.

  10. (1 vote) – Company buy-in: I am truly surprised this didn’t make the top of the list. I personally think that company buy-in to security should precede the rest of the categories.

This is simply a top 10 list of things we as Security Professionals want you to know. It would not be hard to create training in your organization around these 10 categories. If you are a manager or one of us, get it started, make the slides and start getting these topics nailed down.

I have included the raw tweets from the poll so that you as managers can understand what your people want you to learn:

lorddrachenblut

passwords dont go on post it notes

taiyed

The importance of protecting client data with encryption.

oneeyedcarmen

Compliance != Security

clamasters – http://www.curtis-lamasters.com/

definitely not my quote but “If you can’t measure it, you can’t improve it” Put that into security terms and make sure he understands

techsnax – http://techsnax.blogspot.com/

that security means more than just passwords!

strcpy – http://strcpy.net/

that IDS is completely a flawed concept. Either that or firewalls are not an end-all solution for security.

tcrweb – http://tcrweb.wordpress.com/

That users are the weakest link, convenience and security don’t always mesh well _natron_ – http://blog.invisibledenizen.org/ /s/boss/client, layered security

armorguy – http://www.linkedin.com/in/martinjfisher

I’d be ecstatic if my boss understood defense in depth. “If we have A/V why do we need other endpoint products?”…

andywillingham – http://andyitguy.blogspot.com/

Management has to quit exempting themselves from security policies or others won’t buy into them

iamnowonmai

Classifying data in containers.

multimode – http://www.chromedpork.net/

Risk Management – Identifing the $ risk and priorization of tasks based on that risk.

l3d

defense in depth… But i don’t have this issue, thank god.

ilovegarick

I’d have all my co-workers understand not to open email attachments from unknown senders and not to forward them on either.

multimode -http://www.chromedpork.net/

And accuracy in the presentation of those risks to peer and upper management.

mortman

but !compliant == !secure

ramblinpeck

Ill replace boss with clients, but actually understanding AND using a real least privilege model would be great step for everyone

DFrain – http://www.brinkmasterj.com/

@ Compliance as well!

sintixerr – http://sintixerr.wordpress.com/

That security is only tangentially related to technology

multimode – http://www.chromedpork.net/

Becuase an unsuccesful phishing email is often put way higher on the list then patching critical infrastructure.

tnicholson – http://nicholsonsecurity.com/

That people (good/bad) are the weakest link regardless of policies or security related technology. Educate users about security!

cyberhiker – http://howisthatassuranceevidence.blogspot.com/

The parts of infosec that make you secure are not the parts that are sexy or come from a vendor.

post_break – http://iamthekiller.net/

The notion that forced password changes tend to be more of a security risk rather than a security method. (unless someone got fired)

cloudchaos – http://www.cloudchaos.com/

the need for a good password/phrases that are changed regularly. |

Techdulla – http://techdulla.wordpress.com/

That threats (specifically web threats) do not discriminate based on the size of your organization.

michaeldickey

Hard question, and worthy of a blog post. I’d say “You will have a security incident. Plan for it and plan to find it.”

RonW123

“If you have responsibility for security, but have no authority, your role is to take the blame when something goes wrong” Spafford

tottenkoph

The importance of email and Internet use policies, they’re usually overlooked by password policies. :/

jaysonstreet – http://f0rb1dd3n.com/

Just because there is no perceptible change does not mean you are not being attacked. The better your security the less they notice.

ChrisJohnRiley – http://www.c22.cc/

Security testing is all well and good, but not following through to fix the issues makes the process a pointless exercise.

MarcoFigueroa – http://www.mafcorp.net/

I would make my boss understand that spending less than 1% of the total gross of the company income on Security is unacceptable.

MarcoFigueroa – http://www.mafcorp.net/

This seems to be the norm, the ratio of percentage spent on security is always a huge difference in most companies.

dgeorghiou

Security is only as good as the system’s weakest link.

MarcoFigueroa – http://www.mafcorp.net/

@tnicholson We have a security awareness program. It makes them aware but they still get compromised. There excuse is I didn’t know!

ddahlen – http://www.poorboys.tv/

That even non-windows machines are vulnerable and targets for attack.

timmedin

Getting rid of the “we will never be a target” mentality

slick0 – http://www.basenetradio.net/

The importance of having an antivirus/antispyware solution in the office. I wish I were joking.

bug_bear

Antivirus is not a valid primary defense

lorddrachenblut

@slick0 and firewalls per machine

richardebaker

that one computer hooked to 2 networks is in fact a gigantic hole in the air gap security on a control net.

lbhuston – http://stateofsecurity.com/

One concept: That threats can be identified by transactions with non-real services, accounts and things.

CrucialCarl – http://www.dontpanictech.com/

(cool topic) my concept: Ignorance is not a valid defense and will not make you any less accountable.

danphilpott – http://fismapedia.org/

One security concept: Never believe what a sales person says, always get independent analysis.

lorddrachenblut

passwords dont go on post it notes

BrianWGray

the importance of PUBLISHED policies.

hmjgriffon

stop wrting your password on a sticky note on your monitor, and stop making it 123456

jodyfranklin – http://www.elder-n00b.org/

if you’re still compiling the list how about long passwd != strong passwd

JosephDawson – http://bitstop.ca/

get your client to understand one security concept fully… You can’t add security after…

curtw

within the context of the organization, I’d say the importance of executive representation and project approve/deny power.

Replies sent to CORE Security

ben_p – http://www.thegeekzone.com/

@CoreSecurity I would love for him to understand that security needs a budget. We have a lot of good ideas but no dedicated resources

ben_p – http://www.thegeekzone.com/

@CoreSecurity Actually, they get that but it’s the people above them (with the checkbook) that need that realization.

sonofshirt

@CoreSecurity That Red Teaming and auditing are not synonymous.

jason_nixon – http://jasonnixon.net/

@CoreSecurity Patch management is proactive requirement.

spinzon – http://www.scottpinzon.com/

@CoreSecurity One security concept: that the threat is real. Too much security is done to a compliance checklist. Take it seriously, boss!

steveshead

@CoreSecurity – that it only takes one ‘mistake’ to bring it all down!

AnonymASS - Hiding Behind the Tubes

| Comments

First I wanted to say, sorry for this and the last installment of Room362 being non-technical. They are topics that I feel strongly about and so felt impelled to share.One of the biggest problems in the world, IMHO, are people who have unfounded hate. This is compounded by the anonymity of the Internet. Allowing that hate to have no reprocussion or identity. Let me also say I have a deep respect for Free Speech, the depths of which I fear, few truly know. What I don’t have a respect for is people who abuse that right. It’s ultimately a respect of your fellow man/woman/it, that transends any nationality, race, creed, or color.

Now that you know where I stand, let me step down to a slightly lower soap box. On my last post about ethics, I received a comment from an individual who posted under the guise of not only a false email and name, but also from a proxied address. They were on my side of the argument and were digusted with Dave’s. His/her/it’s post was pointed, rude, and had no constructive criticism or facts. It was deleted. It does not deserve a direct response. So I am issuing a response to all who tred here.

These types of posts are allowed to flow on other forums, blogs, and mediums of the Internet. They WILL NOT be allowed here. Period. 

You may think of me what you will, pompous, self righteous. I don’t care. I will keep my bit of the Internet clean how I see fit.

Lastly, I hope I demonstrated this fact already, but I want to reiterate it here. I will never delete comments on any side of any discussion I have here, even if I disagree with the comment. I enjoy debat and discussion. I am religous in my faith fight for free speech and it’s application on the internet.

You have something to say fine. You better do it with respect or you can take your posts to slashdot, digg, or some other place. They won’t see the light of day here.

The Ethics of Teaching Hacking

| Comments

My recent post “OzymanDNS – Tunneling SSH over DNS” caused a good friend, and someone I highly respect in the information security field, Dave Hull from Trusted Signal, to call me out on the ethics of the post.

Instead of lying to you, Dave, and to myself, I did not put any thought into the ethics of the post until Dave brought it up. Well, except for that auto subconscious RIGHT/WRONG check.

However, I have done a lot of thinking on it since Dave’s message to me, I came up with a number of reasons why the post is not unethical and a number of reasons why it was. So I am going to post my thoughts and would like to know what you think. I hardly think there is or ever will be a solid white line of ethics but lets see if we can discuss it a bit.

Ethical:

  1. Teaching people to do anything, is at it’s core, simply that. It doesn’t make them do it. The flip side of this coin will be in the unethical side so don’t get your Anti-NRA panties in a bunch yet.

  2. Offensive Security, SANS, C|EH (no they don’t teach ethics even though it’s in the name of the cert), and all the other “Penetration Testing” courses are teaching hacking. The phrase “Penetration Testing” was created so that we could pass it off to our bosses as a needed service without scaring them.

Unethical:

  1. Specifically in the post it is targeting Hotspots that charge money. Skirting this is illegal, and could land some jail time, or at least make you spend some time in airport holding, making you miss your flight. I did not put a disclaimer in the post, and I probably should have.

  2. Hak5 has a huge following of impressionable teens, who may or may not be mature enough to handle this information in the correct manor.

So, was the post unethical because it sounds like I put my stamp of approval on illegal activities? Would it have been more ethical with a disclaimer? Would have been more ethical without the targeting of hotspots? Should I take the post down?

My decision after considering everything? To leave it up, while adding a disclaimer. It is not my job to raise the worlds kids with a solid basis of ethics, but it is my responsibility not to endorse illegal activity to those who follow my activity online.

Thanks Dave, I look forward to your comments, and anyone else’s who would like to chime in on the issue.

OzymanDNS - Tunneling SSH Over DNS

| Comments

Hak5 Episode 504 Shownotes

(In the episode I say that it’s cross platform, use the release links for the Windows binaries to get it working on windows or use cygwin)

DISCLAIMER – I IN NO WAY ENDORSE ILLEGAL ACTIVITIES – USE THE FOLLOWING GUIDE IN A TEST ENVIRONMENT OR AT YOUR OWN LEGAL RISK.

UPDATE:Thanks to Chris Gates and Robin Wood for pointing me towards a fixed up version of OzymanDNS and a great tutorial: HERE

UPDATE 2: Since Ozyman is no longer hosted on Dan’s site, I have posted it here:

Download: ozymandns_src_0.1.tgz

(Until of course/if he asks me to take it down)

DNS Tunneling isn’t new. Dan Kaminsky’s post for OzymanDNS’ release was July 29th 2004 (There was DNS Tunneling linux packages dating back to the late 90s even). I will however comment that it’s still in it’s release version, but very functional. Also, DNS Tunnel isn’t “Big News” so it really hasn’t been ‘mitigated’ anywhere yet. Everywhere I have tested it, it has worked, even behind a certain switch that rhymes with ‘Panera’

What does OzymanDNS do? It has two parts, server, and client. The server is a set and forget. It sits there waiting for a connection (caveat: from anywhere) But we are getting ahead of ourselves, lets setup up DNS first.

(I’m going to assume that you have a SSH server somewhere that you have already setup)

Step 1 – DNS Setup:

Each “Domain Manager” or DNS Server has a different set up, So I’m not going to go into the details. The jist of the change you need to make is either make a domain or a subdomain that points it’s nameserver records towards the host that you are running your server on.

  • ihaztunnel.room362.com IN NS mubixpwnsyour.homedns.org

In this example we have setup a subdomain called “ihaztunnel” and set it’s Name Server Record pointing to a dynamic dns host that points at the location of my OzymanDNS server.

Step 2 – Server Setup:

You need Perl, the MIME::Base32, and Net::DNS modules. After that you just run nomde.pl from whatever directory that you extracted the OzymanDNS scripts with the following context:

  • ./nomed.pl -i 0.0.0.0 ihaztunnel.room362.com

This tells it to listen on any IP the host has (you can specifiy one if you wish), and tells it the DNS name that it’s supporting. Don’t forget to do port forwarding on your router or whatever may be in the way of port 53 UDP and TCP coming inbound. Also keep in mind that your ISP may be blocking, so field test the connection before you try to use it in the wild.

Step 3 – Client Connection:

For the client, the setup is the same, get perl, the modules and OzymanDNS. Then you run the following command:

  • ssh -D 8080 -C -o ProxyCommand="/home/mubix/ozymandns/droute.pl whatever.ihaztunnel.room362.com" room362.com

Breaking this command down:

  1. “-D 8080” starts SSH tunneling (Socks Proxy) on port 8080 once a connection is made.

  2. “-C” requests compression so that we can get the best speeds possible.

  3. “-o ProxyCommand” sets the SSH option to the location of the droute.pl script and…

  4. “whatever.ihaztunnel.room362.com” the ‘whatever’ portion of this is the important part. It can be whatever you want it to be but the “magic” happens by adding this subdomain of the one you already set up.

  5. “room362.com” the hostname or IP of the SSH server that you will be tunneling through.

If all worked out, you will get prompted to enter your password. That’s it folks. Now you can use FoxyProxy or just your standard proxy settings to use the tunnel. Or, you can use product that, IMHO, is well worth the 30 bucks for the PORTABLE EDITION: Proxifier. It hooks the OS and makes every connection go through the proxy (games, IM, Java, Flash).

Notes:

Before you go the DNS route, it might pay off to try the ?.jpg trick first. Check out the debuggable.com post for more details. – Thanks Xanfantasy for the memory jog.

http://www.dnstunnel.de/ – A site that has an in-depth walk-through of setting up OzymanDNS if I didn’t answer all of your questions. They even have a script that will make OzymanDNS a service on Linux boxes

http://thomer.com/howtos/nstx.html – A write up on NSTX which doesn’t require SSH but doesn’t look like it’s still in production. It is however in the Ubuntu and Gentoo repositories so feel free to mess with it there, and since Back|Track 4 is now Ubuntu based you may be able to get it set up on BT4 as well.

Iodine:
http://code.kryo.se/iodine/ – Another DNS Tunneling project that looks to be the most up to date. I haven’t tested it out to make sure it functions.

Dns2tcp:
http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en – Another DNS Tunneling Project

And if DNS isn’t your thing and you want to tunnel over HTTP, check out Corkscrew: http://www.agroman.net/corkscrew/

Metasploit <3s Microsoft

| Comments

Update to post: Metasploit Heart’s Microsoft

Ok, so many people had issues with the Vimeo video, that I posted it to youtube in hopes that you’ll be able to play it all the way through. I still have no idea what the issue is, it’s played perfectly on all the computers that I’ve tried it on.