Module 14: Network Evasion and Tunneling
Network Segmentation
Network Segmentation Concepts and Benefits
Concepts. Google/Wikipedia it.
Segmentation Theory
Concepts. Google/Wikipedia it.
Egress Busting
Detecting Egress Busting
Snort alerts generated by the egress busting attack
offsec@snort02:~$ tail /var/log/snort/alert_fast.txt
01/28-21:15:49.133529 [**] [1:10000006:0] "Malicious outbound traffic detected" [**] [Priority: 0] {TCP} 172.16.50.11:50167 -> 192.168.48.4:491
01/28-21:15:49.149038 [**] [1:10000006:0] "Malicious outbound traffic detected" [**] [Priority: 0] {TCP} 172.16.50.11:50168 -> 192.168.48.4:492
01/28-21:15:49.164680 [**] [1:10000006:0] "Malicious outbound traffic detected" [**] [Priority: 0] {TCP} 172.16.50.11:50169 -> 192.168.48.4:493
01/28-21:15:49.180393 [**] [1:10000006:0] "Malicious outbound traffic detected" [**] [Priority: 0] {TCP} 172.16.50.11:50170 -> 192.168.48.4:494
01/28-21:15:49.195977 [**] [1:10000006:0] "Malicious outbound traffic detected" [**] [Priority: 0] {TCP} 172.16.50.11:50171 -> 192.168.48.4:495
01/28-21:15:49.211640 [**] [1:10000006:0] "Malicious outbound traffic detected" [**] [Priority: 0] {TCP} 172.16.50.11:50172 -> 192.168.48.4:496
01/28-21:15:49.227126 [**] [1:10000006:0] "Malicious outbound traffic detected" [**] [Priority: 0] {TCP} 172.16.50.11:50173 -> 192.168.48.4:497
01/28-21:15:49.242844 [**] [1:10000006:0] "Malicious outbound traffic detected" [**] [Priority: 0] {TCP} 172.16.50.11:50174 -> 192.168.48.4:498
01/28-21:15:49.258451 [**] [1:10000006:0] "Malicious outbound traffic detected" [**] [Priority: 0] {TCP} 172.16.50.11:50175 -> 192.168.48.4:499
01/28-21:15:49.274751 [**] [1:10000006:0] "Malicious outbound traffic detected" [**] [Priority: 0] {TCP} 172.16.50.11:50176 -> 192.168.48.4:500Port Forwarding and Tunneling
Port Forwarding and Tunneling Theory



Port Forwarding and Tunneling in Practice
Reading the Windows Firewall With Advanced Security/Firewall Event Log
Listing all the inbound firewall rules
Getting detailed information usin the rule name
Inspecting the configuration of the portproxy interface using netsh
Remote port forwarding using plink.exe
Confirming port forward is setup
Accessing the network shares usin smbclient
Listing the Sysmon event logs while filtering for the plink string in the Message
Getting detailed infromation from the Sysmon event logs
Last updated