Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ Skyhook - A Round-Trip Obfuscated HTTP File Transfer Setup Built To Bypass IDS Detections

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Skyhook - A Round-Trip Obfuscated HTTP File Transfer Setup Built To Bypass IDS Detections


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: kitploit.com


Skyhook is a REST-driven utility used to smuggle files into and out of networks defended by IDS implementations. It comes with a pre-packaged web client that uses a blend of React, vanilla JS, and web assembly to manage file transfers.


Key Links

Features

  • Round trip file content obfuscation
  • User-configurable obfuscation chaining
  • Self-signed and Lets Encrypt certificate procurement methods
  • Embedded web applications for both configuration and file transfers.
  • Server fingerprinting resiliency techniques:
    • Encrypted loaders capable of dynamically encrypting interface files as the file transfer interface is rendered
    • API and web resource path randomization

Brief Description

Note: See the user documentation for more thorough discussion of Skyhook and how it functions.

Skyhook's file transfer server seamlessly obfuscates file content with a user-configured series of obfuscation algorithms prior to writing the content to response bodies. Clients, which are configred with the same obfuscation algorithms, deobfuscate the file content prior to saving the file to disk. A file streaming technique is used to manage the HTTP transactions in a chunked manner, thus facilitating large file transfers.

flowchart

subgraph sg-cloudfront[Cloudfront CDN]
cf-listener(443/tls)
end

subgraph sg-vps[VPS]
subgraph sg-skyhook[Skyhook Servers]
admin-listener(Admin Server<br>45000/tls)
transfer-listener(Transfer Server<br>45001/tls)
end

config-file(Config File<br>/var/skyroot/config.yml)

admin-listener -..->|Reads &<br>Manages| config-file

webroot(Webroot<br>/var/skyhook/webroot)
transfer-listener -..->|Serves From &<br>Writes Cleartext<br>Files To| webroot
end


op-browser(Operator<br>Web Browser) -->|Administration<br>Traffic| admin-listener
op-browser <-->|Obfuscated<br>Data| transfer-listener

subgraph sg-corp[Corporate Environment]
subgraph sg-compromised[Beachhead Host]
comp-browser(Web Browser) -->|Reads &<b r>Writes| cleartext-file(Cleartext Files)
end
end

comp-browser <-->|Obfuscated<br>Data| cf-listener <-->|Obfuscated<br>Data| transfer-listener

A Brief Example

For example, here is a working obfuscation configuration:

And here is the file transfer interface. Clicking "Download" results in the file being retrieved in chunks that are encrypted with the chain of obfuscation methods configured above.

JavaScript deobfuscates the file before prompting the user to save it to disk.

Below is a request stemming from a download being inspected with Burp. Key elements of the transaction are encrypted to evade detection.



...



๐Ÿ“Œ Evasive File Smuggling with Skyhookย 


๐Ÿ“ˆ 39.55 Punkte

๐Ÿ“Œ WhatsApp Bug- To Allows iPhone Users to Bypass Face IDs Or Touch IDs


๐Ÿ“ˆ 35.78 Punkte

๐Ÿ“Œ Researcher Bypasses IDS Using IDS Signatures


๐Ÿ“ˆ 29.49 Punkte

๐Ÿ“Œ What is an Intrusion Detection System (IDS)? + Best IDS Tools | UpGuard


๐Ÿ“ˆ 29.49 Punkte

๐Ÿ“Œ Snort IDS for Hackers, Part 2: Basic Configuration of your Snort IDS


๐Ÿ“ˆ 29.49 Punkte

๐Ÿ“Œ Pure Malware Tools Pose As Legitimate Software to Bypass AV Detections


๐Ÿ“ˆ 28.33 Punkte

๐Ÿ“Œ CoralRaider Hacker Evade Antivirus Detections Using Malicious LNK File


๐Ÿ“ˆ 26.19 Punkte

๐Ÿ“Œ Build beautifully for Android Wearโ€™s Round Screen using API 23โ€™s -round identifier


๐Ÿ“ˆ 24.4 Punkte

๐Ÿ“Œ Space Photos of the Week: A Pulsar Spins Right Round, Baby, Right Round


๐Ÿ“ˆ 24.4 Punkte

๐Ÿ“Œ Build beautifully for Android Wearโ€™s Round Screen using API 23โ€™s -round identifier


๐Ÿ“ˆ 24.4 Punkte

๐Ÿ“Œ Space Photos of the Week: A Pulsar Spins Right Round, Baby, Right Round


๐Ÿ“ˆ 24.4 Punkte

๐Ÿ“Œ Pandas round() Method โ€“ How To Round a Float in Pandas


๐Ÿ“ˆ 24.4 Punkte

๐Ÿ“Œ Dynamically analyzing a heavily obfuscated Excel 4 macro malicious file, (Thu, Jan 14th)


๐Ÿ“ˆ 23.35 Punkte

๐Ÿ“Œ Octopus Backdoor is Back with a New Embedded Obfuscated Bat File, (Mon, May 9th)


๐Ÿ“ˆ 23.35 Punkte

๐Ÿ“Œ iot malware detections soar 273% since 2017. kaspersky lab warns home users of growing threat


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Ransomware Sees Triple-Digit Spike in Corporate Detections


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Microsoft: Malware, ransomware, and cryptominer detections are down in 2019


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Antivirus &#x26; Multiple Detections, (Sun, May 17th)


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Elastic Security Opens Public Detections Rules Repo - James Spiteri - PSW #667


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ McAfee Labs Threats Report Reveals 605% Increase In COVID-19-Themed Attack Detections


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Rediscovering Limitations of Stateful Firewalls: "NAT Slipstreaming" &#x3f; Implications, Detections and Mitigations , (Fri, Nov 6th)


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Different types of injection methods/detections explained - [ CreateRemoteThread, Process Hollowing, APC Injection, Thread Hijacking]


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Malware detections surge by 48% in 2019


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Shlayer Trojan Accounted for 30 Percent of Detections for macOS in 2019


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Want to see list of malware detections by Microsoft Defender? Here's how.


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ How Behavioral Detections Actually Discovered the SolarWinds Orion SUNBURST Attack


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ COVID-19-themed cyberattack detections continue to surge


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Report highlights top 10 threat detections seen across Microsoft Azure AD and Office 365


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Top 10 threat detections seen across Microsoft Azure AD and Office 365


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Swift-Attack - Unit Tests For Blue Teams To Aid With Building Detections For Some Common macOS Post Exploitation Methods


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Uptycs Introduces Detections that Correlate Threat Activity from the Kubernetes Control Plane and Container Runtime


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Leveraging the Apple ESF for Behavioral Detections


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Cyber-Threat Detections Surge 55% in 2022


๐Ÿ“ˆ 22.05 Punkte











matomo