pdp (architect) wrote: > Thor, with no disrespect but you are wrong. Security in depth does not > work and I am not planning to support my argument in any way. This is > just my personal humble opinion. I've seen only failure of the > principles you mentioned. Security in depth works only in a perfect > world. The truth is that you cannot implement true security mainly > because you will hit on the accessibility side. It is all about > achieving the balance between security and accessibility. Moreover, > you cannot implement security in depth mainly because you cannot > predict the future. Therefore, you don't know what kinds of attack > will surface next. > > Security is not a destination, it is a process. Security in depth > sounds like a destination to me. > > >> However, for the record, this is not an "attack." You might as well >> just email the target and ask for their password. Or if you can get >> them to open files, just send off a rootkit. But let's ignore that for >> now- let's pretend that somehow this is a magic attack-- This is where >> security-in-depth comes in, and where the overall context of your post >> is incorrect: >> > > It is not the same. We educate users not to open .exe files but RDP > and ICA are just pure business tools. Users are familiar with them and > their purpose. Therefore, they are more trusted. And what happens when > the tools that you trust turn against you? > > And how come it is OK for a simple text file be able to ride your > session and execute commands on behalf of you? I think that this is a > problem. CSRF is a well known, widely acknowledged problem. The client > should at least warn you that you are about to start an alternative > shell. That's not the case though. > > BTW, I am not sure if you stumbled across the other post I released on > FD and BUGTRAQ which is closely related to this one. Well, here is the > situation: if you visit a remote page that happens to be malicious, > attackers can inject any commands they wish into your remote desktop > without any visible notice. No interaction is required. And the attack > is super generic btw, and probably 100% wormable. > > So, I believe it is an attack. Yes, it is not stack, heap overflow, or > some null pointer dereference issue, but it is an attack that we > cannot simply ignore it, mainly because it is a problem with a feature > rather then a bug. Features cannot be easily eliminated. Bugs will be > fixed! > > One thing that I am always trying to do with the GNUCITIZEN sessions > is to educate developers as well system administrators that attacks > succeed when they are unexpected. At the end of the day, the trick is > simple. > > On 10/10/07, Thor (Hammer of God) <[EMAIL PROTECTED]> wrote: > >> Security in depth is alive and well, thank you. In fact, it is security >> in depth that allows administrators to prevent this type of "attack" (if >> we can actually make the stretch to call it that). >> >> However, for the record, this is not an "attack." You might as well >> just email the target and ask for their password. Or if you can get >> them to open files, just send off a rootkit. But let's ignore that for >> now- let's pretend that somehow this is a magic attack-- This is where >> security-in-depth comes in, and where the overall context of your post >> is incorrect: >> >> First off, you block .rdp files at the SMTP gateway (that by itself is >> security in depth). Secondly, normal domain users don't RDP to external >> hosts, so there would never be an allow rule for outbound RDP. Even if >> there was some need for off-lan RDP traffic from users, it would be on a >> host-by-host basis and managed by the firewalls. That, again, is >> security in depth. >> >> If your users are running XP, then the admin would prevent them from >> updating to the 6.0 client anyway. All you have to do in this case is >> configure your RDP hosts to require TLS encryption based on a >> certificate, and the client will not be able to connect at all if the >> certificate is not in the trusted root certificates store. Done. If >> you've got advanced users or have allowed 6.0 clients, then you ensure >> that the client is set not to connect if authentication fails against >> TLS secured hosts - of course, these people would be educated against >> lame attacks anyway, so, done. If you are running Win2k8, then you use >> group policy to disable clients opening un-signed RDP files in the first >> place, and again, be done. Or just use TSGateway and require >> certificates to log on - heck, they'd never make it past the gateway if >> you didn't allow them. Done part IV. If you've got Vista clients, then >> you'd also be using egress firewall rules in the "public" network >> context blocking the outbound traffic, all configured with a single GPO. >> I could go on, and on. >> >> The point is that just because you have (amazingly enough) qualified >> this attack as "highly successful" and "vicious" does not, in any way, >> degrade the value of security in depth. In fact, it is a perfect >> example *for* security in depth in that regard: if this "attack" >> succeeds against anyone, it is not because security in depth does not >> exist, it is because security in depth was not practiced. >> >> t >> >> >> >> >> >> -----Original Message----- >> From: pdp (architect) [mailto:[EMAIL PROTECTED] >> Sent: Wednesday, October 10, 2007 4:15 AM >> To: full-disclosure@lists.grok.org.uk; [EMAIL PROTECTED] >> Subject: Remote Desktop Command Fixation Attacks >> >> http://www.gnucitizen.org/blog/remote-desktop-command-fixation-attacks >> >> Security in depth does not exist! No matter what you do, dedicated >> attackers will always be able to penetrate your network. Seriously! >> Information security is mostly about risk assessment and crisis >> management. >> >> When it comes to exploitative penetration testing, I relay on tactics >> rather then exploits. I've already talked about how insecure Remote >> Desktop service could be. In this post I will show you how easy it is >> to compromise a well protected Windows Terminal or CITRIX server with >> a simple social engineering attack and some knowledge about the >> platform we are about to exploit. >> >> The attack is rather simple. All the bad guys have to do is to compose >> a malicious RDP (for Windows Terminal Services) or ICA (for CITRIX) >> file and send it to the victim. The victim is persuaded to open the >> file by double clicking on it. When the connection is established, the >> user will enter their credentials to login and as such let the hackers >> in. Vicious! >> >> I have a more detailed explanation about the tactics behind this >> attack. Because I don't want to spam people with tones of text, I just >> included a link which you can follow. Hope that this is useful and at >> the same time eye opening, not that it is something completely >> amazing. But it does work and it works well. >> >> cheers. >> >> -- >> pdp (architect) | petko d. petkov >> http://www.gnucitizen.org >> >> > > >
and I am not planning to support my argument in any way ha. nice. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/