Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

6 minutes
Video Transcription
Hello and welcome to another episode of breaking stuff with Robert today. We're going over http. Tunnel and http tunnel is a proxy, http proxy application or ah, tool that allows you to use get and post requests in order to
essentially bypassing a c l bypass. A fire will rule something of that nature. Go from a restricted system to maybe
ah less restricted system or gain access to assistant. You otherwise wouldn't be able to get to based on the current rule sets.
So this is really for this demonstration Purely command line. But it does have a gooey component that you can use, like on windows and things of that nature.
Now, this is going to be targeted at exploitation. Analysts looking to recreate attacks, you know, bypassed valuable rules. Do things of that nature to study that traffic. And look at that activity. Cyber defense analysts looking to create signatures for system behaviors related to bypassing controls
and of course, penetration testers that are looking to bypass
system controls
Now, while none of the knowledge is required is laid out here, it is recommended that you understand access control lists and their functions at a basic level knowledge of help. Tunneling works in what tunneling is the SS H protocol on what it is and does, since we will be using that in this demo
and a fundamental knowledge of Cali command line utilization.
So with those things in mind, let's jump into our demo.
Here we are, ladies and gentlemen, in the handy dandy demo environment. Now, you might notice that we have two systems up here. This is our second machine that we normally use. It has got an I P. Table rule listed here that will block port 22 traffic. Sshh. Traffic, too.
This box from
my test system. So you can see here if we do it if config that that i p matches the rule in the I P table. So when I try to do at this age
to the distant end
or the other callin machine, we get this nice connection refused message. Now,
when we give a look at the ports that are currently running, as you can see, only Port 22 is listening on this box and we were not able to make a connection. So let's say that I want to get around that I'm, ah, Penetration tester. Or maybe I want to generate some traffic that I can monitor, maybe create signatures
for the sport with respect to exploitation review.
So I'm gonna go ahead and for each
TTP tunnel, which is what we're revealing here today
as you can see its abbreviated to HTC. So if you want to see the different, you know, switches within that you can do on HTC help
that just gives you all the different switches. So we're primarily going to use the Ford ing to four report on this, and then we're going to show you how we can use that to then make a connection to a system that's blocking us. So
let's go ahead and jump right into that. So on this end, and I want to make sure that I am running the server side of this,
which is just the local host here,
I'm gonna do some 14 over 2139. So when we go back and look at that sat here,
we now see that 2139 is listening. Using that HTS service is so when we come back in,
we'll try to make that connection again, we'll still get refused. So
from that standpoint, I want to now afford this traffic this SS h traffic over that other port that's currently listening
and make my connection. So now I'm going to use the client side here I am fording, um over Port 80 90 is just a port. I can do anything here I could do 1234 and I want to. And then I'm affording to the distant end, which is 1 to 5138
And I want to hit port 2139 which is the port that's listening here.
So it starts doing that.
You can see here we are now in business. So when I go to make that S S h connection again,
I'm gonna use, um
I'm targeting my local host. And the reason for that is is that with this connection is going to go out over the port that I have created here. 1234 Okay. And it is going to hit. So when I do that of report
1234 the the idea years is that it is going to use my local machine okay. Over port 1234
using this particular rule to go to 2139 which is over here on the distant, endless name which will give me an S S H connection. So let's go ahead and hit. Enter.
And then now you can see that we can make that connection. And so if I wanted to, I could enter my password, and I now have access. Now let's go back just to validate.
I'm gonna do that the right way, don't we?
Now, you'll see here that we've got it waiting on that connection and that we still have 1234 listening. So if I go ahead and kill the process for that,
we see that it's no longer listening.
If I tried to make that S S h connection again, it refuses.
And if I try to make the connection
it refuses again. So, as you can see, this is just a brief demo of how you can use this http tunnel, um, to go over on http connection using, like, post and get requests to then bypass a rule and make like an SS H or other type of connection.
So with that in mind. Let's go ahead and jump back into our slides.
Well, I hope you enjoyed that demo of http tunnel. It was definitely interesting getting to work through that with you and show you how you can take a basic kind of foul rule or a C l and bypassed that using this pure http proxy that uses getting post request. So
with that in mind, I want to thank you for your time today,
and I look forward to seeing you again soon.