Tricks To Bypass Device Control Protection Solutions
Posted by iNoticiero
on viernes, 28 de agosto de 2020
0
Preface
As I wrote in a previous blog post, I had an engagement last year where my task was to exfiltrate data from a workstation on some sort of storage media. The twist in that task was Lumension Sanctuary Device Control, and the version was 4.3.2, but I am not sure how newer version work and this seems to be a more general problem with device control solution, for example with Symantec products.
But what is a device control solution? In short, they audit I/O device use and block the attempts to use unauthorized devices. This includes hardware such as USB, PS/2, FireWire, CD/DVD so basically every I/O port of a computer. In my opinion, these are pretty good things and they offer a better looking solution than de-soldering the I/O ports from the motherboards or hot-gluing them, but on the other hand, they can be bypassed.
Bypass
OK, so what is the problem? Well the way these device control solutions work is that they load a few kernel drivers to monitor the physical ports of the machine. However... when you boot up the protected computer in safe mode, depending on the device control solution software, some of these drivers are not loaded (or if you are lucky, none of those modules will be loaded...) and this opens up the possibility to exfiltrate data.
In theory, if you have admin (SYSTEM maybe?) privileges, you might as well try to unload the kernel drivers. Just do not forget, that these device control solutions also have a watchdog process, that checks the driver and automatically loads it back if it is unloaded, so look for that process and stop or suspend it first.
In theory, if you have admin (SYSTEM maybe?) privileges, you might as well try to unload the kernel drivers. Just do not forget, that these device control solutions also have a watchdog process, that checks the driver and automatically loads it back if it is unloaded, so look for that process and stop or suspend it first.
In my case with the Lumension Sanctuary Device Control, I have found that when I boot the Workstation protected by the device control software in Safe Mode where, software's key logger protection module is not running... so I was still unable to use a USB stick, or a storage media, but I could plug in a keyboard for example...hmmm :)
As some of you probably already figured it out, now it is possible to use a pre-programmed USB HID, for example a Teensy! : ) I know about three different project, that uses this trick like these two mentioned in a Hackaday post, or this one. Unfortunately, the site ob-security.info no longer seems to be available (well, at least it is no longer related to infosec :D ), but you can still find the blog post and the files with the Wayback Machine.
For the hardware part, the wiring of the Teensy and the SD card adaptor is the same as I showed in the post on Making a USB flash drive HW Trojan or in the Binary deployment with VBScript, PowerShell or .Net csc.exe compiler post, so I will not copy it here again.
I have to note here that there are other ways to bypass these device control solutions, like the method what Dr. Phil Polstra did with the USB Impersonator, which is basically looks for an authorized device VID/PID and then impersonates that devices with the VID/PID.
Mitigation
Most probably, you will not need safe mode for the users, so you can just disable it... I mean, it is not that easy, but luckily there is a great blog post on how to do that. BTW, the first page of the post is for Windows XP, but you are not using XP anymore, aren't you? ;)
Alternatively, as I mentioned at the beginning, you might as well use some physical countermeasure (de-soldering/hot-gluing ports). That shit is ugly, but it kinda works.
Conclusion
Next time you will face a device control solution, try out these tricks, maybe they will work, and if they do, well, that's a lot of fun. :)
But don't get me wrong, these device control solutions and similar countermeasures are a good thing and you should use something like this! I know that they make doing business a bit harder as you are not able to plugin whatever USB stick you want, but if you buy a pile of hardware encrypted flash drives, and only allow those to be plugged in, you are doing it right ;)
Related news
- Growth Hacker Tools
- Pentest Tools Nmap
- Hacking Tools
- Hackers Toolbox
- What Are Hacking Tools
- Pentest Tools Find Subdomains
- Hacking Tools Online
- Github Hacking Tools
- Best Hacking Tools 2019
- World No 1 Hacker Software
- Hacker Tools Software
- Hack And Tools
- Pentest Tools List
- Hacking Tools For Games
- Pentest Tools Tcp Port Scanner
- Blackhat Hacker Tools
- What Is Hacking Tools
- Hacks And Tools
- Hacker Tools
- Pentest Tools Online
- Pentest Automation Tools
- Hacking App
- Github Hacking Tools
- Pentest Tools Website Vulnerability
- Hack Tools For Mac
- Hacker Hardware Tools
- Hacker Techniques Tools And Incident Handling
- Hacker Tools Apk Download
- Pentest Tools Tcp Port Scanner
- Pentest Recon Tools
- Hack Tools For Pc
- Hacking Tools Github
- Hackers Toolbox
- Hack Tools Download
- What Is Hacking Tools
- Pentest Tools Online
- Install Pentest Tools Ubuntu
- Pentest Tools Framework
- Nsa Hack Tools
- Hacking Tools
- Pentest Tools Linux
- Hacker Tools For Ios
- Pentest Tools List
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Windows
- Wifi Hacker Tools For Windows
- Hacker Tools Online
- Hacking Apps
- Hack Tools For Pc
- Top Pentest Tools
- Pentest Tools Linux
- Hacker Tools Github
- Pentest Tools Linux
- Hacker Tools Apk Download
- Usb Pentest Tools
- Pentest Tools List
- Bluetooth Hacking Tools Kali
- Android Hack Tools Github
- Hack Tools Github
- Hack Tools For Ubuntu
- Hacking Tools Hardware
- Hacker Tools Hardware
- Hack Tool Apk
- Wifi Hacker Tools For Windows
- Hacker Security Tools
- Pentest Tools Nmap
- Hack Tools
- Hacker
- Hacker Techniques Tools And Incident Handling
- Hacker Tools
- Hacker Tools Free
- Hackrf Tools
- Pentest Tools Github
- Hacker Tools Online
- Hack Tools Download
- Hacking Tools For Windows Free Download
- Hacker Security Tools
- Hacker Tools List
- Pentest Tools For Ubuntu
- Hack Tools For Ubuntu
- Hacking Tools For Mac
- Hacker Tools Linux
- Pentest Tools For Windows
- Pentest Tools Tcp Port Scanner
- Hacker Tools List
- Hacking Tools 2019
- Hacks And Tools
- Hack Tools For Windows
- Pentest Box Tools Download
- Hacker Tools Free Download
- Blackhat Hacker Tools
- Blackhat Hacker Tools
- Hacking Tools For Windows 7
- Android Hack Tools Github
- Ethical Hacker Tools
- What Are Hacking Tools
- Hacker Security Tools
- Hacker Tools Free Download
- Hack Website Online Tool
- Hacking Tools Github
- Hack Tools For Games
- Hack Tools
- Hack Apps
- Pentest Tools Windows
- Hack Website Online Tool
- Nsa Hacker Tools
- Hacking Tools Mac
- Hacker
- Hack Website Online Tool
- Termux Hacking Tools 2019
- Pentest Tools Tcp Port Scanner
- Hacker Tools List
- Hacking Tools Name
- Pentest Tools Alternative
- Hackers Toolbox
- Hacking Tools And Software
- Hacking Tools For Windows 7
- Hack Tools Mac
- Hacking Tools For Windows
- Hacking Tools Hardware
- Hacking Tools 2020
- Nsa Hack Tools
- Pentest Tools For Android
- Pentest Tools Nmap
- Hacker Tools Github
- Pentest Tools Port Scanner
- How To Install Pentest Tools In Ubuntu
- Hacking Tools For Windows 7
- Hacking Tools For Windows Free Download
- Pentest Tools For Ubuntu
- Hacker Techniques Tools And Incident Handling
- Nsa Hack Tools
- Pentest Tools Open Source
- Hacking Tools Kit
- Hacking Tools For Windows
- Android Hack Tools Github
- Hacker Hardware Tools
- Hacking Tools Name
- How To Hack
- Hacker Tools Linux
- Pentest Automation Tools
- Game Hacking
- Pentest Tools Url Fuzzer
- Pentest Recon Tools
- Hack Tools For Pc
- Hack App
- Tools Used For Hacking
- Hack Rom Tools
- Hacker Tools Hardware
- Pentest Tools Review
- Tools For Hacker
- Pentest Tools Tcp Port Scanner
- Hacking Tools Hardware
- Android Hack Tools Github
- Pentest Tools Subdomain
- Pentest Tools For Ubuntu
- Pentest Tools Website Vulnerability
- Hacker Tools Free Download
- Best Pentesting Tools 2018
- Hacking Tools And Software
- Hacker Tools Mac
- Pentest Tools Open Source
- Hacking Tools For Kali Linux
- Kik Hack Tools
- Hacker Security Tools
- Pentest Tools Framework
- Hacker Tools List
- Pentest Tools Apk
- Hacking Tools For Pc
- Hackers Toolbox
- Hacking Tools Mac
- Hacking Tools For Windows
- Hacking Tools Online
- Pentest Reporting Tools
- Pentest Tools Apk
- Hacker Tool Kit
Tagged as:
About the Author
Write admin description here..
Get Updates
Subscribe to our e-mail newsletter to receive updates.
Share This Post
Related posts
0 comentarios:
Publicar un comentario