TUNELIRANJE PROTOKOLIMA KOJIMA TO NIJE OSNOVNA NAMENA

  • Dimitrije Šalić
Ključne reči: Reverzni proksi, Server, Konfiguracija

Apstrakt

Rad obuhvata opis principa procesa tuneliranja i osnovne tipove metoda tuneliranja. Pored toga, sadrži prikaz protokola tuneliranja koji se najčešće koriste u ovu svrhu, sa opisom njihovog načina funkcio­nisanja, a isto tako i prikaz protokola koji se takođe mogu koristiti u ovu svrhu, iako im to nije osnovna namena. Upravo s tim u vezi, opisani su mogući maliciozni napadi korišćenjem istih, ali i alati pomoću kojih je moguća nji­hova detekcija i prevencija. Na kraju, detaljno je analizi­ran primer implementacije tuneliranja korišćenjem upra­vo jednog od protokola kojem to nije osnovna namena – ICMP protokolom. Prilikom implementacije, korišćen je alat Icmpsh, a spomenuti su i alternativni alati. Odabran je iz razloga što ne zahteva administrativne privilegije da bi se pokrenuo na „žrtvinoj“ mašini i lako je prenosiv.

Reference

[1] Cloudfare, What is tunneling? | Tunneling in networking (https://www.cloudflare.com/learning/network-layer/what-is-tunneling/)
[2] What is ICMP tunneling and how to protect against it (https://www.extrahop.com/company/blog/2021/detect-and-stop-icmp-tunneling/)
[3] DNS Tunneling – how DNS can be (ab)used by malicious actors (https://unit42.paloaltonetworks.com/dns-tunneling-how-dns-can-be-abused-by-malicious-actors/)
[4] Cloudfare, What is DNS | How DNS works (https://www.cloudflare.com/learning/dns/what-is-dns/)
[5] Working of DNS Server (https://www.geeksforgeeks.org/working-of-domain-name-system-dns-server/)
[6] What is DNS tunneling and how to protect against it (https://www.extrahop.com/company/blog/2020/dns-tunneling-definition-and-protection/)
[7] DNS tunneling: How it works, Detection and Prevention (https://www.neuralegion.com/blog/dns-tunneling/)
[8] 'Setting up a VPN' SkillSoft Press 2002.
[9] What is GRE tunneling? | How GRE tunneling works (https://www.cloudflare.com/learning/network-layer/what-is-gre-tunneling/)
[10] OpenVPN (https://openvpn.net/)
[11] What is L2TP and how does it work (https://www.techtarget.com/searchnetworking/definition/Layer-Two-Tunneling-Protocol-L2TP)
[12] GRE configuration with IPSec (https://systemzone.net/mikrotik-site-to-site-gre-tunnel-configuration-with-ipsec/)
[13] SSTP (https://help.mikrotik.com/docs/display/ROS/SSTP)
[14] Yamaha, L2TP/IPSec (https://www.yamaha.com/products/en/network/techdocs/vpn/l2tp_ipsec/)
[15] DNS tunneling (https://www.cynet.com/attack-techniques-hands-on/how-hackers-use-dns-tunneling-to-own-your-network/)
Objavljeno
2022-09-05
Sekcija
Elektrotehničko i računarsko inženjerstvo