Tuesday, August 25, 2020

Tricks To Bypass Device Control Protection Solutions

Preface

As I wrote in a previous blog post, I had an engagement last year where my task was to exfiltrate data from a workstation on some sort of storage media. The twist in that task was Lumension Sanctuary Device Control, and the version was 4.3.2, but I am not sure how newer version work and this seems to be a more general problem with device control solution, for example with Symantec products.

But what is a device control solution? In short, they audit I/O device use and block the attempts to use unauthorized devices. This includes hardware such as USB, PS/2, FireWire, CD/DVD so basically every I/O port of a computer. In my opinion, these are pretty good things and they offer a better looking solution than de-soldering the I/O ports from the motherboards or hot-gluing them, but on the other hand, they can be bypassed.

Bypass

OK, so what is the problem? Well the way these device control solutions work is that they load a few kernel drivers to monitor the physical ports of the machine. However... when you boot up the protected computer in safe mode, depending on the device control solution software, some of these drivers are not loaded (or if you are lucky, none of those modules will be loaded...) and this opens up the possibility to exfiltrate data.

In theory, if you have admin (SYSTEM maybe?) privileges, you might as well try to unload the kernel drivers. Just do not forget, that these device control solutions also have a watchdog process, that checks the driver and automatically loads it back if it is unloaded, so look for that process and stop or suspend it first.

In my case with the Lumension Sanctuary Device Control, I have found that when I boot the Workstation protected by the device control software in Safe Mode where, software's key logger protection module is not running... so I was still unable to use a USB stick, or a storage media, but I could plug in a keyboard for example...hmmm :)

As some of you probably already figured it out, now it is possible to use a pre-programmed USB HID, for example a Teensy! : ) I know about three different project, that uses this trick like these two mentioned in a Hackaday post, or this one. Unfortunately, the site ob-security.info no longer seems to be available (well, at least it is no longer related to infosec :D ), but you can still find the blog post and the files with the Wayback Machine.

For the hardware part, the wiring of the Teensy and the SD card adaptor is the same as I showed in the post on Making a USB flash drive HW Trojan or in the Binary deployment with VBScript, PowerShell or .Net csc.exe compiler post, so I will not copy it here again.

I have to note here that there are other ways to bypass these device control solutions, like the method what Dr. Phil Polstra did with the USB Impersonator, which is basically looks for an authorized device VID/PID and then  impersonates that devices with the VID/PID.

Mitigation

Most probably, you will not need safe mode for the users, so you can just disable it... I mean, it is not that easy, but luckily there is a great blog post on how to do that. BTW, the first page of the post is for Windows XP, but you are not using XP anymore, aren't you? ;)

Alternatively, as I mentioned at the beginning, you might as well use some physical countermeasure (de-soldering/hot-gluing ports). That shit is ugly, but it kinda works.

Conclusion

Next time you will face a device control solution, try out these tricks, maybe they will work, and if they do, well, that's a lot of fun. :)

But don't get me wrong, these device control solutions and similar countermeasures are a good thing and you should use something like this! I know that they make doing business a bit harder as you are not able to plugin whatever USB stick you want, but if you buy a pile of hardware encrypted flash drives, and only allow  those to be plugged in, you are doing it right ;)

More info


  1. Hack Tools For Games
  2. Hackers Toolbox
  3. Hacker
  4. Tools Used For Hacking
  5. Pentest Tools Free
  6. Pentest Tools Open Source
  7. Pentest Tools Github
  8. What Is Hacking Tools
  9. How To Install Pentest Tools In Ubuntu
  10. Hacking Tools For Windows
  11. Tools For Hacker
  12. Termux Hacking Tools 2019
  13. Hacking Tools Pc
  14. Pentest Tools Tcp Port Scanner
  15. What Are Hacking Tools
  16. Pentest Tools Online
  17. Hacker Tools Online
  18. Hacker Tools Software
  19. New Hack Tools
  20. Hacker Tools List
  21. Hackrf Tools
  22. Pentest Tools Bluekeep
  23. Hacker Tools For Ios
  24. Pentest Tools
  25. Hacker Tools For Ios
  26. Easy Hack Tools
  27. Easy Hack Tools
  28. Kik Hack Tools
  29. Black Hat Hacker Tools
  30. Pentest Tools Subdomain
  31. Hacking Tools For Beginners
  32. Pentest Tools Framework
  33. Hacker Tools
  34. Physical Pentest Tools
  35. Ethical Hacker Tools
  36. Hak5 Tools
  37. Hack Tools Online
  38. Hacker Tools
  39. Hacker Hardware Tools
  40. Hacker Tools Windows
  41. Hacker Tools Apk
  42. Underground Hacker Sites
  43. Hacker Tools
  44. Hacker Tools Linux
  45. Best Pentesting Tools 2018
  46. Pentest Tools Nmap
  47. Nsa Hacker Tools
  48. Hack Tools For Games
  49. Hacker Tools For Windows
  50. Best Pentesting Tools 2018
  51. Pentest Tools Github
  52. Pentest Tools Find Subdomains
  53. Underground Hacker Sites
  54. Hack Tools Download
  55. Bluetooth Hacking Tools Kali
  56. Hacking Tools For Pc
  57. Hacker Techniques Tools And Incident Handling
  58. Hacker Tool Kit
  59. Pentest Tools Website
  60. What Is Hacking Tools
  61. Hacking Tools For Windows Free Download
  62. World No 1 Hacker Software
  63. Hack Tool Apk No Root
  64. Hacker Tools Github
  65. Hacker Hardware Tools
  66. Physical Pentest Tools
  67. Blackhat Hacker Tools
  68. Hacking Tools Software
  69. Pentest Reporting Tools
  70. Hacking Tools For Beginners
  71. Pentest Tools Online
  72. Pentest Tools For Ubuntu
  73. Hack Rom Tools
  74. Hack Tools For Games
  75. Hack Tools Pc
  76. Hacking Tools For Mac
  77. Hacking Tools Mac
  78. Pentest Tools For Windows
  79. Hacking Tools Online
  80. Hack Tool Apk
  81. Best Pentesting Tools 2018
  82. How To Make Hacking Tools
  83. Hacker Tool Kit
  84. Hacking App
  85. Pentest Box Tools Download
  86. Pentest Tools Linux
  87. Pentest Tools Open Source
  88. Hacking Tools Online
  89. Hacking App
  90. Hacker Tools 2020
  91. Hacks And Tools
  92. Hack Tools Online
  93. Best Hacking Tools 2019
  94. Pentest Tools Download
  95. Hacking Tools For Games
  96. Hacker Tools Online
  97. Hacker Tools 2019
  98. Hack Tools For Mac
  99. Game Hacking
  100. Hack Tools Online
  101. Hacking Tools Pc
  102. Nsa Hacker Tools
  103. Tools For Hacker
  104. Hacking Tools Github
  105. Pentest Reporting Tools
  106. Pentest Tools Nmap
  107. Best Pentesting Tools 2018
  108. Hacker Techniques Tools And Incident Handling
  109. Hacker Tools For Ios
  110. Best Hacking Tools 2019
  111. Pentest Tools Review
  112. Hacking Tools 2020
  113. Pentest Tools Apk
  114. Hacker Tools Free
  115. Hacking Tools For Windows 7
  116. Hack Tools Download
  117. Hack Tools For Pc
  118. Pentest Recon Tools
  119. Hackers Toolbox
  120. Hack Tools Pc
  121. Pentest Tools Download
  122. Pentest Tools Framework
  123. Pentest Tools Port Scanner
  124. Hack Tools For Windows
  125. Hacker Tools Apk Download
  126. Best Hacking Tools 2020
  127. Tools Used For Hacking
  128. Hacker Tools For Pc
  129. Pentest Tools For Ubuntu
  130. Nsa Hack Tools Download
  131. Hak5 Tools
  132. Pentest Tools Framework
  133. Hacking Tools For Mac
  134. Computer Hacker
  135. Easy Hack Tools
  136. Wifi Hacker Tools For Windows
  137. Tools Used For Hacking
  138. Hack Tools
  139. Wifi Hacker Tools For Windows
  140. Hacker Tools Software
  141. Hack Tool Apk
  142. Hacker Techniques Tools And Incident Handling
  143. Usb Pentest Tools
  144. Hacker Tools Mac
  145. Pentest Tools Tcp Port Scanner
  146. Pentest Tools Nmap
  147. Hacking Apps
  148. Hacking Tools Windows 10
  149. Hack Tools 2019
  150. Hacker Tools Hardware
  151. Pentest Tools Tcp Port Scanner
  152. New Hacker Tools
  153. Pentest Tools Github
  154. Usb Pentest Tools
  155. Hacking Tools 2019
  156. Pentest Tools For Windows
  157. Pentest Tools Url Fuzzer
  158. Pentest Tools Apk
  159. Hak5 Tools
  160. Hacker Tools Apk
  161. Hacking Tools Github
  162. Hacking Tools Github
  163. Hacker Hardware Tools
  164. Pentest Tools Bluekeep
  165. Hacking Tools For Windows
  166. Hack Tools Online

No comments:

Post a Comment