Sunday, 30 August 2020

Tricks To Bypass Device Control Protection Solutions

Preface

As I wrote in a previous blog post, I had an engagement last year where my task was to exfiltrate data from a workstation on some sort of storage media. The twist in that task was Lumension Sanctuary Device Control, and the version was 4.3.2, but I am not sure how newer version work and this seems to be a more general problem with device control solution, for example with Symantec products.

But what is a device control solution? In short, they audit I/O device use and block the attempts to use unauthorized devices. This includes hardware such as USB, PS/2, FireWire, CD/DVD so basically every I/O port of a computer. In my opinion, these are pretty good things and they offer a better looking solution than de-soldering the I/O ports from the motherboards or hot-gluing them, but on the other hand, they can be bypassed.

Bypass

OK, so what is the problem? Well the way these device control solutions work is that they load a few kernel drivers to monitor the physical ports of the machine. However... when you boot up the protected computer in safe mode, depending on the device control solution software, some of these drivers are not loaded (or if you are lucky, none of those modules will be loaded...) and this opens up the possibility to exfiltrate data.

In theory, if you have admin (SYSTEM maybe?) privileges, you might as well try to unload the kernel drivers. Just do not forget, that these device control solutions also have a watchdog process, that checks the driver and automatically loads it back if it is unloaded, so look for that process and stop or suspend it first.

In my case with the Lumension Sanctuary Device Control, I have found that when I boot the Workstation protected by the device control software in Safe Mode where, software's key logger protection module is not running... so I was still unable to use a USB stick, or a storage media, but I could plug in a keyboard for example...hmmm :)

As some of you probably already figured it out, now it is possible to use a pre-programmed USB HID, for example a Teensy! : ) I know about three different project, that uses this trick like these two mentioned in a Hackaday post, or this one. Unfortunately, the site ob-security.info no longer seems to be available (well, at least it is no longer related to infosec :D ), but you can still find the blog post and the files with the Wayback Machine.

For the hardware part, the wiring of the Teensy and the SD card adaptor is the same as I showed in the post on Making a USB flash drive HW Trojan or in the Binary deployment with VBScript, PowerShell or .Net csc.exe compiler post, so I will not copy it here again.

I have to note here that there are other ways to bypass these device control solutions, like the method what Dr. Phil Polstra did with the USB Impersonator, which is basically looks for an authorized device VID/PID and then  impersonates that devices with the VID/PID.

Mitigation

Most probably, you will not need safe mode for the users, so you can just disable it... I mean, it is not that easy, but luckily there is a great blog post on how to do that. BTW, the first page of the post is for Windows XP, but you are not using XP anymore, aren't you? ;)

Alternatively, as I mentioned at the beginning, you might as well use some physical countermeasure (de-soldering/hot-gluing ports). That shit is ugly, but it kinda works.

Conclusion

Next time you will face a device control solution, try out these tricks, maybe they will work, and if they do, well, that's a lot of fun. :)

But don't get me wrong, these device control solutions and similar countermeasures are a good thing and you should use something like this! I know that they make doing business a bit harder as you are not able to plugin whatever USB stick you want, but if you buy a pile of hardware encrypted flash drives, and only allow  those to be plugged in, you are doing it right ;)

Read more


  1. Pentest Tools Free
  2. Hack Tools For Ubuntu
  3. Hack Tools Github
  4. Hacking Tools For Windows 7
  5. Hacker Security Tools
  6. Best Hacking Tools 2019
  7. Pentest Tools For Ubuntu
  8. Usb Pentest Tools
  9. Pentest Tools Website
  10. Hacking Tools For Pc
  11. Hack Website Online Tool
  12. What Are Hacking Tools
  13. Pentest Tools Find Subdomains
  14. Hacker Tools Apk
  15. Hacker Tools For Windows
  16. Hacking Tools Pc
  17. World No 1 Hacker Software
  18. New Hack Tools
  19. Pentest Tools List
  20. Hack Tools
  21. Hack Tools 2019
  22. Physical Pentest Tools
  23. Beginner Hacker Tools
  24. Hack Rom Tools
  25. Pentest Tools For Windows
  26. Growth Hacker Tools
  27. Hacking App
  28. Hacking Tools Windows 10
  29. Nsa Hack Tools Download
  30. Pentest Tools For Android
  31. Kik Hack Tools
  32. Hacking Tools For Mac
  33. Pentest Tools For Android
  34. Hacking Tools Pc
  35. Tools For Hacker
  36. Hack Tools Online
  37. Pentest Tools For Mac
  38. Hacking Tools For Kali Linux
  39. Computer Hacker
  40. Game Hacking
  41. World No 1 Hacker Software
  42. Hackrf Tools
  43. Hack Tools Download
  44. Pentest Tools Nmap
  45. Pentest Tools Online
  46. Hacker Tools
  47. Hacking Tools Download
  48. Hacker Tools Linux
  49. Hacking App
  50. Hacker Tools Free Download
  51. Pentest Tools Open Source
  52. Bluetooth Hacking Tools Kali
  53. How To Make Hacking Tools
  54. Nsa Hack Tools Download
  55. Pentest Tools Apk
  56. Black Hat Hacker Tools
  57. Pentest Reporting Tools
  58. Ethical Hacker Tools
  59. Wifi Hacker Tools For Windows
  60. Hacker Tools
  61. Hacker Tools Mac
  62. Hacking Tools Free Download
  63. Game Hacking
  64. Tools For Hacker
  65. Hack Tools 2019
  66. Best Hacking Tools 2020
  67. Hacking Tools Pc
  68. Pentest Tools Framework
  69. Hacker Tools For Ios
  70. Best Pentesting Tools 2018
  71. Tools For Hacker
  72. What Is Hacking Tools
  73. Hak5 Tools
  74. Hacker Techniques Tools And Incident Handling
  75. Hack Tools Mac
  76. Hacking Tools 2020
  77. Easy Hack Tools
  78. Game Hacking
  79. Pentest Tools Windows
  80. Hacking Tools For Beginners
  81. Hacking Tools Free Download
  82. Pentest Tools Kali Linux
  83. What Are Hacking Tools
  84. Hacking Tools
  85. Hack Tools Online
  86. Usb Pentest Tools
  87. Growth Hacker Tools
  88. Hacker Tools For Windows
  89. Pentest Reporting Tools
  90. Ethical Hacker Tools
  91. Growth Hacker Tools
  92. Beginner Hacker Tools
  93. Hack Tools Download
  94. Pentest Tools Android
  95. Physical Pentest Tools
  96. Hack Tools For Games
  97. Pentest Reporting Tools
  98. Hack Tools Mac
  99. Hack Tool Apk
  100. Best Hacking Tools 2020
  101. Wifi Hacker Tools For Windows
  102. Hacking Tools 2020
  103. Hacking Tools For Mac
  104. Hack Tool Apk No Root
  105. Pentest Tools Url Fuzzer
  106. Hacker Tools For Windows
  107. Hack App
  108. Hacker Tools Free Download
  109. Pentest Tools Open Source
  110. Pentest Tools For Ubuntu
  111. Pentest Tools Website
  112. Hacker Tools Windows
  113. Hack Tools Mac
  114. New Hack Tools
  115. Pentest Tools Nmap
  116. Hack And Tools
  117. Free Pentest Tools For Windows
  118. Hacking Tools For Windows
  119. Hack Rom Tools
  120. Hacker Tools For Ios
  121. Hacking Tools Windows
  122. Pentest Tools For Android
  123. Physical Pentest Tools
  124. Computer Hacker
  125. Hacking Tools For Windows

No comments:

Post a Comment