Skip to content
This repository has been archived by the owner on Oct 2, 2023. It is now read-only.

A tutorial explaining why and when some insecure network protocols should be replaced

License

Notifications You must be signed in to change notification settings

josevnz/insecure_protocol_tutorial

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

When and why to replace insecure network protocols

The reason is that clear text protocols are trivially easy to capture and analyze; many of these services where written when Internet was on its infancy but now attacker have better tools at their disposal to capture sensitive information, it also means the bar is pretty low for this kind of attacks.

What we will learn here:

  • How to use podman to setup thrown away services to learn about insecure settings and protocols
  • How to use tshark to capture and decode network traffic in real time
  • How replacing obsolete services with more modern alternatives to eliminate this type of attack

This tutorial assumes you have:

  • Access to podman or docker
  • Privileged access, so you can run tshark and containers in special mode
  • Basic knowledge of network protocols like TCP/IP, HTTP, FTP (But don't worry too much if not)

Capturing credentials on Basic authentication against an unencrypted HTTPD Apache server

Apache sandbox preparation

We need to create a self-signed SSL certificate for our demo, for that we will create a container based on the Fedora 37 Linux distribution and the mkcert application:

[josevnz@dmaf5 self_signed_certificates]$ podman run --rm --interactive --tty --volume $HOME/Downloads:/certs mkcert_image mkcert -cert-file /certs/cert.pem -key-file /certs/cert.key dmaf5 localhost 192.168.1.30 ::1

Then we will use this new SSL certificates for our podman container running Apache:

asciicast

Next step is to build our special Apache container:

asciicast

Now we are good to go. Let's test the authentication next.

Testing authentication with CURL

curl --silent --user admin:notsosecurepassword http://dmaf5:88080/secret/
# We use --insecure because is a self-signed certificate
curl --insecure --silent --user admin:notsosecurepassword https://dmaf5:8443/secret/

asciicast

Time to see how much sensitive information we can get with tshark

Using tshark to sniff the traffic between CURL and the podman container

HTTP sends data without encryption; Let me demonstrate how to create a podman container that protects a directory with a user/ password combination:

[josevnz@dmaf5 httpd]$ curl --silent --user admin:notsosecurepassword http://dmaf5:8080/secret/
<!-- Simple webpage used in our demo site. -->
<html>
<head>
    <title>ASCII art with Python 3</title>
</head>
<body bgcolor="black">
<script id="asciicast-518884" src="https://asciinema.org/a/518884.js" async></script>
</body>
</html>

And attacker running tshark could easily get your password (tshark expression with -Y allow us to focus on the traffic we care about):

tshark -i eno1 -Y 'http.request.method == GET and http.host == dmaf5:8080' -T json

The captured output may look like this:

asciicast

tshark is nice enough to even decode the base64 password for you (echo YWRtaW46bm90c29zZWN1cmVwYXNzd29yZA==|base64 --decode)

The problem is much worse than just password leaking; Any data you transmit (sensitive documents, credit card information, etc.) can be captured and extracted later.

Now let's try using a secure connection; For our demo we will use a self-signed certificate but in production you will use a proper setup.

Because the traffic is encrypted, the following expression doesn't show any data as tshark cannot see the encrypted payload:

tshark -i eno1 -Y 'http.request.method == GET and http.host == dmaf5:8443' -T json

We have to go lower on the protocol stack:

tshark -i eno1 -Y 'tcp.port == 8443' -T json

And no password this time!

asciicast

The fix for HTTP: Switch to HTTPS

You can easily install either a self-signed certificate for your test servers using 'https://github.com/FiloSottile/mkcert/' or if you have internet facing services you can use Certbot like this (below is an ansible playbook fragment to secure a nginx proxy):

- name: Setup Certbot
  pip:
    requirements: /opt/requirements_certboot.txt
    virtualenv: /opt/certbot/
    virtualenv_site_packages: true
    virtualenv_command: /usr/bin/python3 -m venv
  tags: certbot_env

- name: Get SSL certificate
  command:
    argv:
      - /opt/certbot/bin/certbot
      - --nginx
      - --agree-tos
      - -m {{ ssl_maintainer_email }}
      - -d {{ inventory_hostname }}
      - --non-interactive
  notify:
    - Restart Nginx
  tags: certbot_install

- name: Creates a cron file under /etc/cron.d/certbot_renew
  ansible.builtin.cron:
    name: certboot renew
    weekday: "5"
    minute: "0"
    hour: "0"
    user: root
    job: "/opt/certbot/bin/certbot renew --quiet --pre-hook 'systemctl stop nginx' --post-hook 'systemctl start nginx'"
    cron_file: certbot_renew
  tags: certbot_renew

Enough of HTTP, let's examine another application

Using Telnet and FTP when you should be using SSH, SFTP

Yes, you will be surprised how many times I still get asked to setup a ftp or a telnet server (and the answer is still the same :-)).

Sniffing the password from an FTP server

Let's take a vsftpd container for a spin; And will write a tshark expression that looks for specific ftp fields:

podman run --detach --tty --network=host --privileged --name kodegeek_vsftpd --env FTP_USER=admin --env FTP_PASS=insecurepassword --env LOG_STDOUT=yes fauria/vsftpd
tshark -i eno1 -Y 'ftp.request.command == USER or ftp.request.command == PASS' -T json

And on a different terminal we establish a ftp session against our container:

josevnz@raspberrypi:~$ ftp -4 -n -v dmaf5 
Connected to dmaf5.home.
220 (vsFTPd 3.0.2)
ftp> user admin insecurepassword
331 Please specify the password.
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> 

Tshark will nicely spit out the user and password for us in clear text:

          "ftp.request": "1",
          "ftp.response": "0",
          "USER admin\\r\\n": {
            "ftp.request.command": "USER",
            "ftp.request.arg": "admin"
          }
...
        "ftp": {
          "ftp.request": "1",
          "ftp.response": "0",
          "PASS insecurepassword\\r\\n": {
            "ftp.request.command": "PASS",
            "ftp.request.arg": "insecurepassword"
          }
        },

See it in action:

asciicast

The fix for FTP: Switch to SFTP

There are lots of tutorials about SFTP out there, you can get started with this one: How to use SCP and SFTP to securely transfer files

Finally, time to see our last application

What do you see during a telnet session?

A telnet server is one of those services that no one should see on their networks. I won't even ask you to run a container, instead I will show you how a live capture looks like (if you are curious I used the Docker telnet server for this demo).

Of course tshark can decode Telnet traffic fields on real time, so let's take it for a spin.

The fix for Telnet: Switch to SSH

Again, there is no shortage of tutorials out there: How to access remote systems using SSH

[josevnz@dmaf5 InsecureContainer]$ tshark -i eno1 -Y 'telnet' -T fields -e telnet.data
Capturing on 'eno1'
Ubuntu 17.10\r\n
dmaf5 login: 
r
r
o
o
o
o
t
t
\r
\r\n
Password: 
m
a
l
w
a
r
e
\r
\r\n
Last login: Sun Oct  9 01:32:14 UTC 2022 from raspberrypi.home on pts/1\r\n

Which is more or less the same you see on the client side:

josevnz@raspberrypi:~$ telnet dmaf5
Trying fd22:4e39:e630:1:1937:89d4:5cbc:7a8d...
Connected to dmaf5.home.
Escape character is '^]'.
Ubuntu 17.10
dmaf5 login: root
Password: 
Last login: Sun Oct  9 01:32:14 UTC 2022 from raspberrypi.home on pts/1

One last time in action:

asciicast

What is next?

About

A tutorial explaining why and when some insecure network protocols should be replaced

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published