what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

lsacc.txt

lsacc.txt
Posted Feb 4, 2000
Authored by Errno Jones

Legitimate Sites as Covert Channels: An Extension to the Concept of Reverse HTTP Tunnels. Legitimate sites that allow anonymous posting can be used to covertly send commands to systems behind firewalls.

tags | paper, web, protocol
SHA-256 | f38870b0140c9dcaa3bf98fc8e5581801de0fde783deb6c1eeff0a5c2b2f451e

lsacc.txt

Change Mirror Download
Legitimate Sites as Covert Channels:
An Extension to the Concept of Reverse HTTP Tunnels
By Errno Jones (errno :dot: jones :at: pure secure :dot: net)

STATEMENTS, ASSUMPTIONS, REQUESTS

1. Due to the lack of time, this is a summary.
2. Perhaps a proof-of-concept will follow.
3. If proof-of-concept has been implemented, please share.
4. Familiarity with reverse HTTP tunnels is assumed.

THE CROWD

The crowd is a safe harbor. It is very easy to hide something when the
environment that is used for the covert maneuver contains many other
objects of similar design.

There exist countless number of sites that let anonymous users post
messages, write text in guest books etc. These sites are the crowds.

THE COVERT CHANNEL

Any site that allows visitors to anonymously post messages and
immediately, or without verification, includes it as content can be
used to hide data to and from a reverse HTTP tunnel. Rather than
connecting and tunneling data to a specified site directly, implement
a posting mechanism to hide the communications.

THE APPLICATIONS

Assume there exist two message boards, A and B, which allow anonymous
postings. Assume there exist two software programs, C (client) and
S (server), that can post and read data from board A and B, and B and A
respectively.

C contains unique identifiers X and Y, and runs on network E (external).
S contains unique identifiers X and Y, and runs on network I (internal).

C posts a message, containing an encoded shell command, on board A with
unique identifier X. Intermittently, C also checks board B for unique
identifier Y, and if found, reads the message, decodes the contents,
and display the output.

S intermittently checks board A for unique identifier X, and if found,
reads the message, decodes the contents, and runs the shell command.
Then, S posts a message, containing the encoded output, to board B
with unique identifier Y.

THE DATA

The data must be hidden. One possibility is to collect large
amounts of spam messages, for C, and use the case of the letters as
bit patterns, or introduce misspellings at known intervals to encode
the data. The subject of the message can contain a unique bit pattern
or misspelling that is X. For S, the large amount of text that is
needed can be obtained from man pages, strings of programs etc., and
modified as in C.

CONCLUSION

Comments and suggestions are welcome, clarifications available.
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close