The Patsy Proxy

27
The Patsy Proxy Getting Others To Do Your Dirty Work

description

How to use systems not designed for use as proxies to pass traffic for you.

Transcript of The Patsy Proxy

Page 1: The Patsy Proxy

The Patsy ProxyGetting Others To Do Your Dirty Work

Page 2: The Patsy Proxy

Who we are

Jen Savage◦Software Developer ◦@savagejen

Dan Crowley◦Managing Consultant at Trustwave

SpiderLabs◦@dan_crowley

Page 3: The Patsy Proxy

What is a patsy proxy?

Patsy (noun): A person who is easily taken advantage of

Proxy (noun): A person authorized to act on the behalf of another

A patsy proxy is anything that can be used to unwittingly perform an attack on the behalf of another.

Page 4: The Patsy Proxy

Advantages of a patsy proxyProxy owner is unaware of proxyTarget is unaware that victim acts

as proxy◦Not publicly listed as a proxy◦No traditional proxy service on victim

Logging unlikelyIP may be privileged

Page 5: The Patsy Proxy

Disadvantages of a patsy proxyAttack capabilities may be

limited◦May be blind◦May change the traffic◦May have a time delay◦May pass only certain types of traffic

What is inside the black box?◦May be logged

Page 6: The Patsy Proxy

On patsy limitationsPatsy only allows GET params

◦Many applications accept POST params in GET

Patsy only makes HEAD requests◦Many applications process HEAD/GET

the same No data will be returned DoS capability severely limited

Patsy is blind◦Many attacks can be launched blind

Page 7: The Patsy Proxy

Malicious uses of a patsy proxy

Page 8: The Patsy Proxy

Frame SomeonePost threats, harass people, etcAccess illegal materialsLaunch attacks

Page 9: The Patsy Proxy

Anonymize an attackAttack will trace back to the

patsy◦Is the patsy logging?

Traditional attacks◦SQLi◦RFI◦DoS

Page 10: The Patsy Proxy

Bypass IP address filteringEvade IP blacklist

◦IP ban◦Sites which disallow proxies

Exploit IP trust relationships◦Business partnerships◦Proxies usually disallow internal

access Not the case with unintentional proxying

Page 11: The Patsy Proxy

Methods to achieve a patsy proxy

Page 12: The Patsy Proxy

Automated ServicesURL shorteners & un-shortenersWeb SpidersTwitter bots“Upload from URL” functionalityWebpage translation utilitiesLink preview functionality

Page 13: The Patsy Proxy

GOOGLE TRANSLATE“Translate” a web page

Page 14: The Patsy Proxy

FACEBOOKStatus update preview

Page 15: The Patsy Proxy

Automated ServicesMalware Scanning UtilitiesMail Gateway Scanners

◦Thanks to Jcran for his Project Tuna data: tuna.pentestify.com/emails

Other

Good job Google on the Google Safe Browsing Database!

Page 16: The Patsy Proxy

CLAMAVIn certain configurations, URLs in emails are checked for malware

Page 17: The Patsy Proxy

GEOCITIES-IZERHack like it’s 1996

Page 18: The Patsy Proxy

UNKNOWN MAIL GATEWAY AVWith ROT13 power

Page 19: The Patsy Proxy

Traditional VulnsXSS / HTML InjectionXML injection (XXE)SQLiRFI

Page 20: The Patsy Proxy

Social EngineeringWorth mentioningNot worth in-depth explanation

Page 21: The Patsy Proxy

Could it be a vulnerability?

Page 22: The Patsy Proxy

Recursive DoSPoint the patsy back at itselfTraffic amplification factor:

◦MAX_URI / patsy URI length * 2Tack a large resource onto the

last iteration20 requests resulted in 30

minutes downtime◦Over the LAN!

Page 23: The Patsy Proxy

RECURSIVE DOS“If it’s stupid but it works, it isn’t stupid.”patsy.php contained fopen($_GET['site'], 'r');

Page 24: The Patsy Proxy

WAF bypassRecurse onceDouble encode attack

Web Server

WAFMal

Page 25: The Patsy Proxy

DDoS through patsiesI have 2MB upI have 30 patsies, each 15MB upI have Python

By your powers combined……I AM CAPTAIN DOWNTIME

Page 26: The Patsy Proxy

Access to Internal NetworksModern proxies enforce

boundaries between internal / external

Unintentional proxies may allow boundary violation◦http://patsy.com/?site=http://

10.0.0.1/admin.htm

Page 27: The Patsy Proxy

ConclusionAttribution is Hard(er)

◦An IP address is not a personIP address filtering is ineffectiveThink before generating traffic

for usersUser education is valuable for

users, too◦Don’t Take Candy from Internet

Strangers