Firewall Exploits

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • enCode
    Member
    • Mar 2004
    • 101

    #1

    Firewall Exploits

    So I've been thinking about firewalls and how secure they are. My question is this "how easy is it to exploit a firewall vulnerability (if there is one?)" especially such a common one as ZoneAlarm. More importantly how is it done and is there any precautionary measures I can take to stop people from doing it???
    The only stupid question is the one that you dont ask.
    Or the one that ends up in dev/null.
  • astcell
    Human Rights Issuer
    • Oct 2001
    • 7512

    #2
    Very easy. A cisco buddy tells me he can hack firewalls to the point where they need to go back to factory default to be of any value.

    Comment

    • enCode
      Member
      • Mar 2004
      • 101

      #3
      REALLY!? how. what does he do?
      The only stupid question is the one that you dont ask.
      Or the one that ends up in dev/null.

      Comment

      • astcell
        Human Rights Issuer
        • Oct 2001
        • 7512

        #4
        He's cisco, so you know he knows stuff. Maybe he will loan me a PIX to take to Defcon. :>

        Comment

        • JoeSchmuck
          Mawashimono
          • Mar 2004
          • 93

          #5
          Hacking any router is easy.

          If you know the IP of the router, from a PC, do this:
          1. Click on Start>Run
          2. Type "command" without the quotes and click on OK
          3. Type this command: ping -l 65537 127.0.0.1
          4. Hit <Enter>
          5. If your computer crashed, you did it wrong, try again.
          6. If you got an error, type this command: ping -t 127.0.0.1
          7. Keep watching the results very carefully because eventually you will overflow the buffer of the router and it will show the router password.

          BEWARE! FOLLOWING THESE INSTRUCTIONS COULD DAMAGE YOUR PC OR YOUR ROUTER.

          If you have physical access to the router, it is easily hacked by this method:
          1. Take a cat 5 cable with a regular tip on one end, and the other end stripped so the wires are bare.
          2. Plug the tipped end into your ethernet port
          3. Put the ends of the stripped cable into the top eight holes in the AUI port in this order: stripe-orange, orange, stripe-green, blue, stripe-blue, green, stripe brown, brown
          4. Turn on the router and the computer (this only works with a pc)
          5. Click on Start, Run
          6. Type Calc, click OK (I know, it sounds corny, but it works)
          7. Click on View>Scientific
          8. Select Bin (Binary)
          9. Enter this number: 10011001101111111000000000001
          10. Select Hex (Hexidecimal)
          11. Successfully hacked.
          Ya got no legs, don't come crawlin' to me.

          Comment

          • astcell
            Human Rights Issuer
            • Oct 2001
            • 7512

            #6
            Physical access to a router should make it REAL easy. That's child's play. I had a Supermicro server die. Then I found out how to load the BIOS via the floppy drive, completely avoiding any bios password. That was fun and scary. Ironically I had a bad floppy drive!

            Comment

            • kree
              wasup
              • Aug 2003
              • 373

              #7
              Originally posted by JoeSchmuck
              Hacking any router is easy.

              If you know the IP of the router, from a PC, do this:
              1. Click on Start>Run
              2. Type "command" without the quotes and click on OK
              3. Type this command: ping -l 65537 127.0.0.1
              4. Hit <Enter>
              5. If your computer crashed, you did it wrong, try again.
              6. If you got an error, type this command: ping -t 127.0.0.1
              7. Keep watching the results very carefully because eventually you will overflow the buffer of the router and it will show the router password.

              BEWARE! FOLLOWING THESE INSTRUCTIONS COULD DAMAGE YOUR PC OR YOUR ROUTER.

              If you have physical access to the router, it is easily hacked by this method:
              1. Take a cat 5 cable with a regular tip on one end, and the other end stripped so the wires are bare.
              2. Plug the tipped end into your ethernet port
              3. Put the ends of the stripped cable into the top eight holes in the AUI port in this order: stripe-orange, orange, stripe-green, blue, stripe-blue, green, stripe brown, brown
              4. Turn on the router and the computer (this only works with a pc)
              5. Click on Start, Run
              6. Type Calc, click OK (I know, it sounds corny, but it works)
              7. Click on View>Scientific
              8. Select Bin (Binary)
              9. Enter this number: 10011001101111111000000000001
              10. Select Hex (Hexidecimal)
              11. Successfully hacked.
              Ok, McGyver. Put the crack pipe down!
              If there is a Church of WiFi, then this is it's !

              Comment

              • enCode
                Member
                • Mar 2004
                • 101

                #8
                Thats really cool but why does it work?
                It's a buffer overflow right?
                The only stupid question is the one that you dont ask.
                Or the one that ends up in dev/null.

                Comment

                • Chris
                  Great Satan of the East
                  • Oct 2001
                  • 2866

                  #9
                  Originally posted by enCode
                  Thats really cool but why does it work?
                  It's a buffer overflow right?

                  Please tell me you are joking and forgot to turn on the <sarcasm> tag.
                  perl -e 'print pack(c5, (41*2), sqrt(7056), (unpack(c,H)-2), oct(115), 10)'

                  Comment

                  • spahkle
                    Absurd Fetishist
                    • Jul 2003
                    • 418

                    #10
                    Originally posted by enCode
                    Thats really cool but why does it work?
                    It's a buffer overflow right?
                    yeah.. brain buffer
                    “Bigamy is having one wife too many. Monogamy is the same.”

                    Comment

                    • enCode
                      Member
                      • Mar 2004
                      • 101

                      #11
                      Originally posted by Chris
                      Please tell me you are joking and forgot to turn on the <sarcasm> tag.
                      <sarcasm>(oops)
                      The only stupid question is the one that you dont ask.
                      Or the one that ends up in dev/null.

                      Comment

                      • skroo
                        Volatile Compound
                        • Dec 2001
                        • 2348

                        #12
                        I'm going to try to answer this somewhat seriously.

                        Originally posted by enCode
                        So I've been thinking about firewalls and how secure they are. My question is this "how easy is it to exploit a firewall vulnerability (if there is one?)" especially such a common one as ZoneAlarm.


                        One important thing here is to define what you mean by 'exploit'. Do you want to obtain, say, administrative logons onto the device? Or crash it, or otherwise perform a successful DoS? Or make it pass traffic it shouldn't, or drop traffic it should allow?

                        ZoneAlarm runs on top of Windows, and is technically more of an Intrusion Prevention System (IPS) than firewall. It's fairly safe to say that any Windows exploits it doesn't know how to protect against will undermine its effectiveness - though the same is going to be true of any similar product that runs on top of a host OS. Again, though, you need to define what you mean by 'exploit' in this context - and there may well be additional internal flaws within ZoneAlarm that could conceivably lead to some form of successful remote exploit.

                        Not to avoid giving you an answer, but they need to be found before they can be exploited. As an off-the-cuff answer, there are a conceivably lot of places this might be possible within the internal architecture of ZoneAlarm. However, there's no way of giving you a solid answer until something is found and demostrated - it'd all be in the theoretical at this point.

                        More importantly how is it done and is there any precautionary measures I can take to stop people from doing it???
                        As for the 'how is it done' part, see above. As for precautionary measures, keep Windows, ZoneAlarm, and your antivirus software patched and up-to-date. Also, don't overlook good administrative practices such as limiting user privilege to the lowest level possible, enforcing storage quotas, defining and enforcing group policy, etc.

                        Comment

                        • enCode
                          Member
                          • Mar 2004
                          • 101

                          #13
                          O.K. i guess what i mean by 'exploit' is gaining control from a remote terminal.
                          i'm not too worried about DoS
                          So how would some one render the firewall useless (circumvent)?
                          although that may be too broad

                          P.S. thanx for being cool about answering my question though
                          The only stupid question is the one that you dont ask.
                          Or the one that ends up in dev/null.

                          Comment

                          • bascule
                            omgpwnies!
                            • Jul 2003
                            • 1946

                            #14
                            Originally posted by kree
                            Ok, McGyver. Put the crack pipe down!
                            Anyone who saw Half Baked knows that MacGyver smokes weed, not crack!
                            45 5F E1 04 22 CA 29 C4 93 3F 95 05 2B 79 2A B0
                            45 5F E1 04 22 CA 29 C4 93 3F 95 05 2B 79 2A B1
                            [ redacted ]

                            Comment

                            • kree
                              wasup
                              • Aug 2003
                              • 373

                              #15
                              Originally posted by bascule
                              Anyone who saw Half Baked knows that MacGyver smokes weed, not crack!
                              True, but as but as they say weed is a transitional drug therefore he is a crackhead!
                              If there is a Church of WiFi, then this is it's !

                              Comment

                              Working...