Detecting Quantum Insert
Using Bro-IDS
5 August - BroCon 2015 Yun Zheng Hu Fox-IT Security Research Team
Detecting Quantum Insert Using Bro-IDS 5 August - BroCon 2015 Yun - - PowerPoint PPT Presentation
Detecting Quantum Insert Using Bro-IDS 5 August - BroCon 2015 Yun Zheng Hu Fox-IT Security Research Team $ whoami Yun Zheng Hu Principal Security Expert www.fox-it.com github.com/fox-it @YunZhengHu Fox-IT Delft, Netherlands DELFT Past
Using Bro-IDS
5 August - BroCon 2015 Yun Zheng Hu Fox-IT Security Research Team
@YunZhengHu github.com/fox-it
Principal Security Expert
www.fox-it.com
DELFT
Name Description QUANTUMDNS DNS Injection/Redirection of A records QUANTUMBOT Hijacking idle IRC bots and c&c communication from bots. QUANTUMSKY Deny access to webpage by injecting/spoofing RST packets QUANTUMBISCUIT Enhance QI behind large proxies
source: https://firstlook.org/theintercept/document/2014/03/12/one-way-quantum/
source: https://www.eff.org/files/2015/01/23/20150117[...]network_based_anomaly_.pdf
but it didn’t work
SYN seq=x SYN-ACK ack=x+1 seq=y ACK ack=y+1 seq=x+1
Client Server
[data]
Client Server Shooter Router
SYN
Client Server Shooter Router
SYN
seq=x
Client Server Shooter Router
SYN
seq=x
SYN+ACK
Client Server Shooter Router
SYN
seq=x
SYN+ACK
ack=x+1, seq=y
Client Server Shooter Router
SYN
seq=x
SYN+ACK
ack=x+1, seq=y
ACK
Client Server Shooter Router
SYN
seq=x
SYN+ACK
ack=x+1, seq=y
ACK
ack=y+1, seq=x+1
Client Server Shooter Router
SYN
seq=x
SYN+ACK
ack=x+1, seq=y
ACK
ack=y+1, seq=x+1
PSH+ACK HTTP GET
Client Server Shooter Router
SYN
seq=x
SYN+ACK
ack=x+1, seq=y
ACK
ack=y+1, seq=x+1
PSH+ACK HTTP GET QI TIP {src,dst} {ip,port} x, y, len
Client Server Shooter Router
SYN
seq=x
SYN+ACK
ack=x+1, seq=y
ACK
ack=y+1, seq=x+1
QI TIP {src,dst} {ip,port} x, y, len PSH+ACK HTTP GET
ack=y, seq=x
Client Server Shooter Router
SYN
seq=x
SYN+ACK
ack=x+1, seq=y
ACK
ack=y+1, seq=x+1
QI TIP {src,dst} {ip,port} x, y, len PSH+ACK HTTP GET
ack=y, seq=x
PSH+ACK 302 Redirect ACK
Client Server Shooter Router
SYN
seq=x
SYN+ACK
ack=x+1, seq=y
ACK
ack=y+1, seq=x+1
QI TIP {src,dst} {ip,port} x, y, len PSH+ACK HTTP GET
ack=y, seq=x
PSH+ACK 302 Redirect
ack=x+len, seq=y
ACK
Client Server Shooter Router
SYN
seq=x
SYN+ACK
ack=x+1, seq=y
ACK
ack=y+1, seq=x+1
QI TIP {src,dst} {ip,port} x, y, len PSH+ACK HTTP GET
ack=y, seq=x
PSH+ACK 302 Redirect
ack=x+len, seq=y
ACK
ack=x+len, seq=y
Client Server Shooter Router
SYN
seq=x
SYN+ACK
ack=x+1, seq=y
ACK
ack=y+1, seq=x+1
QI TIP {src,dst} {ip,port} x, y, len PSH+ACK HTTP GET
ack=y, seq=x
PSH+ACK 302 Redirect
ack=x+len, seq=y
ACK
ack=x+len, seq=y
PSH+ACK 200 OK
Client Server Shooter Router
SYN
seq=x
SYN+ACK
ack=x+1, seq=y
ACK
ack=y+1, seq=x+1
QI TIP {src,dst} {ip,port} x, y, len PSH+ACK HTTP GET
ack=y, seq=x
PSH+ACK 302 Redirect
ack=x+len, seq=y
ACK
ack=x+len, seq=y
PSH+ACK 200 OK
ack=x, seq=y
Client Server Shooter Router
QI TIP {src,dst} {ip,port} x, y, len PSH+ACK 302 Redirect SYN+ACK SYN ACK PSH+ACK HTTP GET ACK PSH+ACK 200 OK
seq=x ack=x+1, seq=y ack=y+1, seq=x+1 ack=y, seq=x ack=x+len, seq=y ack=x, seq=y ack=x+len, seq=y
HTTP/1.1 302 Found Location: http://fox-it.com/ Content-Length: 0
Packet #1 - Sequence 1 (Length 71)
HTTP/1.1 200 OK Server: nginx Date: Tue, 21 Apr 2015 19:17:30 GMT Content-Type: text/html Last-Modified: Tue, 21 Apr 2015 19:16:41 GMT Connection: close ETag: "5536a219-1caf5" Accept-Ranges: bytes Vary: Accept-Encoding, User-Agent Content-Encoding: gzip Transfer-Encoding: chunked 6dca …
HTTP/1.1 302 Found Location: http://fox-it.com/ Content-Length: 0
Packet #1 - Sequence 1 (Length 71) Packet #2 - Sequence 1 - (Length 1448)
Last-Modified: Tue, 21 Apr 2015 19:16:41 GMT Connection: close ETag: "5536a219-1caf5" Accept-Ranges: bytes Vary: Accept-Encoding, User-Agent Content-Encoding: gzip Transfer-Encoding: chunked 6dca …
HTTP/1.1 302 Found Location: http://fox-it.com/ Content-Length: 0
Reassembled Data
Server
are being injected
payload of a connection
using tcp_max_old_segments
trigger the rexmit_inconsistency event
router target shooter Internet
LAN WAN
quantum-insert/