<++BOF>
-=[ Introduction
Many works have been done regarding evasion techniques against Intrusion Detection System (IDS) and Intru
- Packet fragmentation [1]
- Stream segmentation [1]
- Byte and traffic insertion [1]
- Polymorphic shellcode [2]
- Denial-of-Service [1]
- URL obfuscation (+ SSL encryption) [3]
- RPC fragmentation [4]
- HTML obfuscation [5] and JavaScript obfuscation [6]
- Etc...
Permutation Oriented Programming (formerly known as Exploit Next Generation) introduces a different and p
-=[ Approach
To circumvent or avoid a pattern-matching detection approach, there are two options:
1. Easier (or Harder): know how the vulnerability is detected (access to signature/vaccine [7]).
2. Harder (or Easier): know deeply how to trigger the vulnerability and how to exploit it (access to vul
-=[ Technique
Permutation Oriented Programming (also known as POP) is neither a new technique to obfuscate code nor a n
- Pattern-matching signatures
- Stateful Packet Inspection
- Deep Packet Inspection
POP (pronounced /pŏp/) technique works by deep analysis of a vulnerability and using all the acquired kno
For POP technique to be effective, it requires exploit developers, as well as IDS and IPS developers, to
For POP technique to be effectively stopped, it requires that IDS and IPS developers understand the trait
-=[ Last words
I have decided to change the name of this technique, because hackers and researchers have repulsion of th
The files, including PH-Neutral 0x7db [8] slide-deck and examples, are available at:
-
http://code.google.com/p/permutation-oriented-programming/
-=[ References & Credits
[1] "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection" by Thomas H. Ptacek
http://insecure.org/stf/secnet_ids/secnet_ids.html
[2] "DefCon 9: ADMmutate Polymorphic Shellcode API" by K2
http://www.youtube.com/watch?v=Oc-MyOXbYH0
[3] "A look at whisker's anti-IDS tactics" by Rain Forest Puppy
http://www.ussrback.com/docs/papers/IDS/whiskerids.html
[4] "Black Hat USA: IPS Shortcomings" by Renaud Bidou
http://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Bidou.pdf
[5] "HTML obfuscation tool" by isnoop.net
http://isnoop.net/tools/obfuscate.php
[6] "Online JavaScript Obfuscator" by Daft Logic
http://www.daftlogic.com/projects-online-javascript-obfuscator.htm
[7] "Black Hat USA: A Simpler Way of Finding 0day" by Robert Graham and David Maynor
https://www.blackhat.com/presentations/bh-usa-07/Maynor_and_Graham/Whitepaper/bh-usa-07-maynor_and_graham
[8] PH-Neutral 0x7db by Phenoelit
http://ph-neutral.org/
http://www.youtube.com/watch?v=IZYQILfxHiw
<--EOF>
No comments:
Post a Comment