
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 191
Sincewejusttalkedaboutthedefaultports,onethingwecan try istoexplore
vulnerabilitiesrelatedtoFW1’sports.AsearchonCERTreturnsonesuch
vulnerability.Thisvulnerabilityinvolvesport259 andisrelatedtoFW1’sRDP
protocol:
“ByaddingafakedRDPheadertotypicalUDPtraffic,anycontentcan bepassedto
port259onanyhostoneithersideofthedevice.”
61
So,howdowelaunchanattackbasedonthisinformation?Thebestthingtodoisto
lookatthe“Proofofconceptcode”availableat
http://www.insidesecurity.de/fw1_rdp_poc.html.ThesourcecodeisavailableinC
language.Bycompilingourownattackprogramusingthesecodes,suchattackcanbe
launched.Keepinmindthough,thatthisvulnerabilityisfoundonly onFW1version
4.1. Thereisnoevidencethatidenticalvulnerabilityexistsinversion4.0.
ForGIACadministratortoworkonthisissue,itissuggestedthatthefollowing
workaroundssuppliedbyinsideSECURITYbefollowed:
“
Commentline2646ofbase.def(accept_fw1_rdp;)
DeactivateimpliedrulesintheCheckPointpolicyeditor(andbuildyourownrules
formanagementconnections).
BlockUDPtraffictoport259onyourperimeterrouter.
”
62
Attacking–theTrojanroute:
Thisattackallowsustotakecontrolof FW1.
Wealreadyknowfromour“websitevisit”whatprotocolsareallowedinGIAC’s
securityarchitecture.RememberwetalkedaboutsecondaryDNSserverandzone
transfer?FW14.x’sdefaultpolicysettingdoesallowtrafficthatheadstowardsTCP
port53 topass.Sincemanyadministratorssimplyleavethisoptionasis,whatwecan
dothenistouseNSLOOKUP oranyothermeantoinitiateazonetransferagainstthe
61
http://www.kb.cert.org/vuls/id/310295
62
http://issrv1.insidesecurity.de/fw1_rdp.html
Comentários a estes Manuais