Interesting... I have been reading and following up on this discussion. I seemed to have received this below email. I did not open it, as it was from a person with a hotmail.com address. In addition, the link provided I did not open - as it seems to be a link created using the geocities domain. Is this a hoax? -----Original Message----- From: Mike Shaw [mailto:mshawat_private] Sent: Monday, February 25, 2002 6:31 PM To: Rich Puhek; David Carmean Cc: incidentsat_private Subject: Re: Virus/trojan tunnel out from behind firewall? Sounds like "shell shoveling". With the source code to Netcat, a decent coder could make a shell shovelling program easily. Then 'glue' it to the elf-bowling du-jour and fakemail to your favorite target. This will bypass many if not the majority of FW configs. If you wanted to get real jiggy, you could make it connect to an IRC server and wait for commands to 'shovel' on cue. OR, periodically check an HTTP discussion group waiting for the key-phrase. Call it ''manchurian 1.0"....*sigh* if I only had the time. -Mike At 10:22 PM 2/24/2002 -0600, Rich Puhek wrote: >David Carmean wrote: > > > > Greetings. New to the list; have looked through a few months of > > the archives and hadn't seen this come up: > > > > Have there been any cases of a trojan/virus/etc tunnelling out from > > behind a firewall and thus providing an attacker a way into the > > "chewy center"? > >Do you mean a trojan/virus that actively establishes a tunnel through >SSH, etc to an outside machine as a method of bypassing a stateful >firewall? > >Or do you just mean that a trojan/virus/etc has provided an opening >despite the firewall? > >I'd also consider the gray areas in between, like worms/trojans that >transfer into (passwds, etc) back through SMTP, HTTP, or IRC. > >--Rich > > >_________________________________________________________ > >Rich Puhek >ETN Systems Inc. >_________________________________________________________ > >--------------------------------------------------------------------------- - >This list is provided by the SecurityFocus ARIS analyzer service. >For more information on this free incident handling, management >and tracking system please see: http://aris.securityfocus.com ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
attached mail follows:
This archive was generated by hypermail 2b30 : Tue Feb 26 2002 - 13:59:55 PST