Re: Metasploit Decloak Project v2

2008-12-15 Thread Praedor Atrebates
It works against me running linux, tor, and using firefox IF I elect to open 
the document directly via Openoffice.  

praedor

On Sunday 14 December 2008 21:08:45 Freemor wrote:
 On Sun, 14 Dec 2008 18:57:18 -0600

 Roc Admin onionrou...@gmail.com wrote:
  I just noticed that HDMoore re-released his decloak engine.
 
  http://metasploit.com/data/decloak
 
  He's improved some of the attacks from before like java, flash, and
  DNS in pretty interesting ways.  There's also a test for Microsoft
  Office documents which I thought was interesting.  From the page:
 
  When Microsoft Office is installed and configured to automatically
  open
 
   documents, a file can be returned which automatically downloads an
   image from the internet. This can bypass proxy settings and expose
   the real DNS servers of the user.
 
  It doesn't seem like there are any new attack vectors but I wanted to
  pass it along to see if anyone had comments.
 
  -ROC Tor Admin

 Well I must be doing something right...
 the only IP it showed for me was:

 External Address  204.13.236.244

 all the rest showed as unknown. and the above is definitely not my IP

 Still good to have something to test my config against tho.

-- 
Moral indignation is jealousy with a halo.
--H.G. Wells


signature.asc
Description: This is a digitally signed message part.


Re: Metasploit Decloak Project v2

2008-12-15 Thread Harry Hoffman
Interesting, it works with Open Office on Linux revealing the true ip
addr.

There's a option in OO to use a proxy, it was set to system at the time
and I tried just using foxyproxy.

But yeah, like someone else mentioned, using iptables to redirect all
attempts so that you don't have to worry about a app mis-behaving is a
good idea.

Cheers,
Harry


On Sun, 2008-12-14 at 19:26 -0600, H D Moore wrote:
 On Sunday 14 December 2008, Roc Admin wrote:
  It doesn't seem like there are any new attack vectors but I wanted to
  pass it along to see if anyone had comments.
 
 I am looking for feedback as well -- right now, the reporting side is 
 pretty weak, but that should improve this evening. Roger pointed me at the 
 torbutton design notes, so I will continue adding coverage/techniques 
 there. This test should work on all browsers regardless of security 
 settings or scripting. No test requires javascript, which should give an 
 accurate view for folks who run noscript/torbutton. My own testing with 
 torbutton shows it to be really solid (only tor exit and tor exit's DNS 
 servers show up).
 
 -HD



Metasploit Decloak Project v2

2008-12-14 Thread Roc Admin
I just noticed that HDMoore re-released his decloak engine.

http://metasploit.com/data/decloak

He's improved some of the attacks from before like java, flash, and DNS in
pretty interesting ways.  There's also a test for Microsoft Office documents
which I thought was interesting.  From the page:

When Microsoft Office is installed and configured to automatically open
 documents, a file can be returned which automatically downloads an image
 from the internet. This can bypass proxy settings and expose the real DNS
 servers of the user.


It doesn't seem like there are any new attack vectors but I wanted to pass
it along to see if anyone had comments.

-ROC Tor Admin


Re: Metasploit Decloak Project v2

2008-12-14 Thread H D Moore
On Sunday 14 December 2008, Roc Admin wrote:
 It doesn't seem like there are any new attack vectors but I wanted to
 pass it along to see if anyone had comments.

I am looking for feedback as well -- right now, the reporting side is 
pretty weak, but that should improve this evening. Roger pointed me at the 
torbutton design notes, so I will continue adding coverage/techniques 
there. This test should work on all browsers regardless of security 
settings or scripting. No test requires javascript, which should give an 
accurate view for folks who run noscript/torbutton. My own testing with 
torbutton shows it to be really solid (only tor exit and tor exit's DNS 
servers show up).

-HD


Re: Metasploit Decloak Project v2

2008-12-14 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Roc Admin wrote:
 I just noticed that HDMoore re-released his decloak engine.

 http://metasploit.com/data/decloak

 He's improved some of the attacks from before like java, flash, and
 DNS in pretty interesting ways.  There's also a test for Microsoft
 Office documents which I thought was interesting.  From the page:

 When Microsoft Office is installed and configured to
 automatically open documents, a file can be returned which
 automatically downloads an image from the internet. This can
 bypass proxy settings and expose the real DNS servers of the user.


 It doesn't seem like there are any new attack vectors but I wanted
 to pass it along to see if anyone had comments.

 -ROC Tor Admin
Seems the way to guard against this is to reconfigure the DNS lookup
to execute via tor at a system level.  Easily done with the network
configuration tools of Windows and Linux flavors.

Jon-
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAklFucoACgkQk8jp5ZVximL+fACgnTijon0ymXpas8d5EpGZ68/K
XbIAn21naTJaCf7fQ8vWTxhq1/ES7+oL
=qCXm
-END PGP SIGNATURE-



Re: Metasploit Decloak Project v2

2008-12-14 Thread Freemor
On Sun, 14 Dec 2008 18:57:18 -0600
Roc Admin onionrou...@gmail.com wrote:

 I just noticed that HDMoore re-released his decloak engine.
 
 http://metasploit.com/data/decloak
 
 He's improved some of the attacks from before like java, flash, and
 DNS in pretty interesting ways.  There's also a test for Microsoft
 Office documents which I thought was interesting.  From the page:
 
 When Microsoft Office is installed and configured to automatically
 open
  documents, a file can be returned which automatically downloads an
  image from the internet. This can bypass proxy settings and expose
  the real DNS servers of the user.
 
 
 It doesn't seem like there are any new attack vectors but I wanted to
 pass it along to see if anyone had comments.
 
 -ROC Tor Admin

Well I must be doing something right... 
the only IP it showed for me was:

External Address204.13.236.244

all the rest showed as unknown. and the above is definitely not my IP

Still good to have something to test my config against tho.
 
-- 
free...@gmail.com
free...@yahoo.ca

This e-mail has been digitally signed with GnuPG - ( http://gnupg.org/ )


signature.asc
Description: PGP signature


Re: Metasploit Decloak Project v2

2008-12-14 Thread H D Moore
On Sunday 14 December 2008, Roc Admin wrote:
 It doesn't seem like there are any new attack vectors but I wanted to
 pass it along to see if anyone had comments.

Added iTunes (itms://) and made the Office test much more useful. tor-
button asks the user to confirm itms:// URLs before launching at least.

-HD


Re: Metasploit Decloak Project v2

2008-12-14 Thread phobos
On Sun, Dec 14, 2008 at 07:26:43PM -0600, tors...@metasploit.com wrote 0.7K 
bytes in 14 lines about:
: accurate view for folks who run noscript/torbutton. My own testing with 
: torbutton shows it to be really solid (only tor exit and tor exit's DNS 
: servers show up).

My default browser config only shows the same; tor exit and tor dns
servers show up.

-- 
Andrew