Firewall Wizards mailing list archives

RE: Tunnel intruder


From: "R. DuFresne" <dufresne () sysinfo com>
Date: Wed, 9 Oct 2002 20:16:39 -0400 (EDT)


I recently has the opportunity to discuss this issue with a folks at
LURHQ, a small sec company in SC.  They had mentioned virus infections and
worm intrusions being a mojor issue with VPN tunnels found in their
offerings <along the MSSP line>.  I've also talked to a number of other
folks about this very issue as pertains to virus intrusions and trojans,
as well some discussions about a hacked box being the backdoor into the
soft chewy center of the corp network.  And being that SANS just recently
made mention at least one of the new slapper worm variants was used as the
mechanism for a DDOS of a gov site, I can see this as a possible intrusion
vector into the corp network from a linux system.

Thus my quests in farily recent posts about VPN software and appliances
that actually push a corporate policy to the remote end innitiating an
internal connection.  One would hope the software/devices used would check
that anti-virus application was installed and running with current virus
signatures, that no foreign/remote web/ftp/p2p/IM software was active or
could be activated once the VPN was tunneled in, and that a personal
firewall system was in place to protect a system also connected to the
outside internet, or disabled that route while the tunnel was in session.
It's a fairly all order considering a number of OS's the VPN technology
needs to be current and upto date on, as well as the number of offerings
in the anti-virus and personal firewall areana.  Not to mention knowledge
of the various web/ftp/IRC/IM/etc hannels and internet connectivity
issues they would need to trace and track.

Thanks,

Ron DuFresne


On Wed, 9 Oct 2002, Gibson, Brian wrote:

I can tell you of cases where users with tunnels to their office that were
running Webservers back in the CodeRed days were wreaking HAVOC on their
corporate networks.  My old company spent weeks trying to identify the
source of the problem.  

It really is a pretty trivial avenue to exploit.  If you are Joe Social
Engineer and you want to break into Widgets Inc.  that would probably be the
first avenue of attack you would look to do.  

Virtually no logging of intrusions.  Oblivious user.  Often full reign of
the corporate treasures.  In many corporate worlds VPN users are treated as
fully trusted hosts.  You could go MONTHS without detection.

The question isn't whether a Joe Cracker has broken in this way. The
question is why WOULDN'T they use this method? 


-----Original Message-----
From: Jim MacLeod [mailto:jmacleod () earthling net] 
Sent: Wednesday, October 09, 2002 6:21 PM
To: firewall-wizards () honor icsalabs com
Subject: [fw-wiz] Tunnel intruder

There's a lot of FUD being touted by firewall vendors about the possibility 
of a home computer being hacked, then the attacker using that computer's 
VPN connection to the office to break into the company network.

I can see this as a possibility and realize that we could easily get into 
an extended discussion of the probability/impossibility/inevitability of it 
occurring.  I personally want to avoid speculation.

Does anybody know of an actual incident where this attack was used, 
successfully or not?

Thanks,
-Jim

_______________________________________________
firewall-wizards mailing list
firewall-wizards () honor icsalabs com
http://honor.icsalabs.com/mailman/listinfo/firewall-wizards


*****************************************************************
Ryan Beck & Co.'s e-mail system is for business purposes only.
Messages are not confidential. All e-mail may be reviewed by
authorized supervisors, compliance or internal audit personnel.
E-mail may be archived and produced to others.
Ryan Beck will not accept trade order instructions via
e-mail. Please telephone your Financial Consultant to place trade
orders.

Ryan Beck & Co.
*****************************************************************

_______________________________________________
firewall-wizards mailing list
firewall-wizards () honor icsalabs com
http://honor.icsalabs.com/mailman/listinfo/firewall-wizards


-- 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
        admin & senior security consultant:  sysinfo.com
                        http://sysinfo.com

"Cutting the space budget really restores my faith in humanity.  It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation."
                -- Johnny Hart

testing, only testing, and damn good at it too!


_______________________________________________
firewall-wizards mailing list
firewall-wizards () honor icsalabs com
http://honor.icsalabs.com/mailman/listinfo/firewall-wizards


Current thread: