20

Peeling Back the Layers of Tor With EgotisticalGiraffe

  • Upload
    aclufan

  • View
    220

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Peeling Back the Layers of Tor With EgotisticalGiraffe
Page 2: Peeling Back the Layers of Tor With EgotisticalGiraffe

Overall Classification

Page 3: Peeling Back the Layers of Tor With EgotisticalGiraffe

(U) Overview

Page 4: Peeling Back the Layers of Tor With EgotisticalGiraffe

(U) What is TOR?

• (U) "The Onion Router"

• (U) Enables anonymous internet activity

General privacy

N on-attribution

Circumvention of nation state internet policies

• (U) Hundreds of thousands of users

Dissidents (Iran, China, etc)

(5//51//REL)

(5//51//REL) Other targets too!

Page 5: Peeling Back the Layers of Tor With EgotisticalGiraffe

(U) What is TOR?

ent Krr\\AFC:: In

The Web w/ TOR client

Installed

Page 6: Peeling Back the Layers of Tor With EgotisticalGiraffe

(U) What is TOR?

Client Browsing The Web TOR client Installed

Page 7: Peeling Back the Layers of Tor With EgotisticalGiraffe

(U) What is TOR?

• (U) TOR Browser Bundle

Portable Firefox 10 ESR (tbb-firefox.exe)

Vidalia

Polipo

TarButton

TOR

"Idiot-proof"

Page 8: Peeling Back the Layers of Tor With EgotisticalGiraffe

(5//51//REL) The TOR Problem

Page 9: Peeling Back the Layers of Tor With EgotisticalGiraffe

(TS//51//REL) Fingerprinting TOR

Page 10: Peeling Back the Layers of Tor With EgotisticalGiraffe

(TS//51//REL) Fingerprinting TOR

Page 11: Peeling Back the Layers of Tor With EgotisticalGiraffe

(TS//51//REL) Fingerprinting TOR

• (TS//51//REL) TarButton cares about TOR users being indistinguishable from TOR users

• (TS//51//REL) We only care about TOR users versus non-TOR users

• (TS//51//REL) Thanks to TarButton, it's easy!

Page 12: Peeling Back the Layers of Tor With EgotisticalGiraffe

(5//51//REL) The TOR Problem

Page 13: Peeling Back the Layers of Tor With EgotisticalGiraffe

. (TS//51//REL) Exploiting TOR

• (TS//51//REL) tbb-firefox is bare bones Flash is a no-no

NoScript addon pre-installed ...

... but not enabled by default!

TOR explicitly advises against using any addons or extensions other than TarButton and No Script

• (TS//51//REL) Need a native Firefox exploit

Page 14: Peeling Back the Layers of Tor With EgotisticalGiraffe

. (TS//51//REL) Exploiting TOR

• (TS//51//REL) ERRONEOUSINGENUITY Commonly known as ERIN

First native Firefox exploit in a long time

Only works against 1-3.0-1.6.o.2

• (TS//51//REL) EGOTI5TICALGOAT

Commonly known as EGGO

Configured for 1.1..0-1.6.0. 2 ...

... but the vulnerability also exists in 1.o.o!

Page 15: Peeling Back the Layers of Tor With EgotisticalGiraffe

. (U) EGOTISTICALGOAT

• (T5//51//REL) Type confusion vulnerability in

E4X

• (T5/ /51//REL) Enables arbitrary read/write access to the process memory

• (T5//51//REL) Remote code execution via the CTypes module

Page 16: Peeling Back the Layers of Tor With EgotisticalGiraffe

. (TS//51//REL) Exploiting TOR

• (TS//51//REL) Can•t distinguish OS until on box

That's okay

• (TS//51//REL) Can•t distinguish Firefox version until on box

That's also okay

• (TS//51//REL) Can•t distinguish 64-bit from 32-bit unti I on box

I think you see where this is going

Page 17: Peeling Back the Layers of Tor With EgotisticalGiraffe

(5//51//REL) The TOR Problem

Page 18: Peeling Back the Layers of Tor With EgotisticalGiraffe

(TS//51//REL) Callbacks from TOR

• (T5//51//REL) Tests on Firefox 10 E5R worked

• (T5//51//REL) Tests on tbb-firefox did not

Gained execution

Didn•t receive FINKDIFFERENT

• (T5//51//REL) Defeated by Prefilter Hash!

Requests EGGI: Hash(tor_exit_ip II session_id)

Requests FIDI: Hash(target_ip II session_id)

Page 19: Peeling Back the Layers of Tor With EgotisticalGiraffe

(TS//51//REL) Callbacks from TOR

• (T5//51//REL) Easy fix Turn off prefilter hashing

FUNNELOUT

• (T5//51//REL) OP5EC Concerns Pre-play attacks

PSPs

Adversarial Actors

Targets worth it?

Page 20: Peeling Back the Layers of Tor With EgotisticalGiraffe

(5//51//REL) The TOR Problem