# 264/tcp - Pentesting Check Point Firewall

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

CheckPoint Firewall-1 firewalls์™€ ์ƒํ˜ธ์ž‘์šฉํ•˜์—ฌ firewall ์ด๋ฆ„ ๋ฐ Management Station ์ด๋ฆ„๊ณผ ๊ฐ™์€ ์œ ์šฉํ•œ ์ •๋ณด๋ฅผ ์•Œ์•„๋‚ผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Š” ํฌํŠธ 264/TCP๋กœ ์ฟผ๋ฆฌ๋ฅผ ์ „์†กํ•˜์—ฌ ์ˆ˜ํ–‰ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Firewall ๋ฐ Management Station ์ด๋ฆ„ ์–ป๊ธฐ

์‚ฌ์ „ ์ธ์ฆ ์š”์ฒญ(pre-authentication request)์„ ์‚ฌ์šฉํ•˜๋ฉด CheckPoint Firewall-1์„ ๋Œ€์ƒ์œผ๋กœ ํ•˜๋Š” ๋ชจ๋“ˆ์„ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ์ž‘์—…์— ํ•„์š”ํ•œ ๋ช…๋ น์€ ์•„๋ž˜์— ๋‚˜์™€ ์žˆ์Šต๋‹ˆ๋‹ค:

use auxiliary/gather/checkpoint_hostname
set RHOST 10.10.10.10

์‹คํ–‰ ์‹œ, ๋ชจ๋“ˆ์€ firewall์˜ SecuRemote Topology service์— ์ ‘์†์„ ์‹œ๋„ํ•ฉ๋‹ˆ๋‹ค. ์„ฑ๊ณตํ•˜๋ฉด CheckPoint Firewall์˜ ์กด์žฌ๋ฅผ ํ™•์ธํ•˜๊ณ  firewall๊ณผ SmartCenter ๊ด€๋ฆฌ ํ˜ธ์ŠคํŠธ์˜ ์ด๋ฆ„์„ ๊ฐ€์ ธ์˜ต๋‹ˆ๋‹ค. ์ถœ๋ ฅ ์˜ˆ์‹œ๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์Šต๋‹ˆ๋‹ค:

[*] Attempting to contact Checkpoint FW1 SecuRemote Topology service...
[+] Appears to be a CheckPoint Firewall...
[+] Firewall Host: FIREFIGHTER-SEC
[+] SmartCenter Host: FIREFIGHTER-MGMT.example.com
[*] Auxiliary module execution completed

Hostname ๋ฐ ICA Name ๊ฒ€์ƒ‰์„ ์œ„ํ•œ ๋Œ€์ฒด ๋ฐฉ๋ฒ•

๋˜ ๋‹ค๋ฅธ ๊ธฐ๋ฒ•์œผ๋กœ๋Š” firewall์— ํŠน์ • ์ฟผ๋ฆฌ๋ฅผ ์ง์ ‘ ์ „์†กํ•˜๊ณ  ์‘๋‹ต์„ ํŒŒ์‹ฑํ•˜์—ฌ firewall์˜ hostname๊ณผ ICA name์„ ์ถ”์ถœํ•˜๋Š” ๋ช…๋ น์„ ์‚ฌ์šฉํ•˜๋Š” ๋ฐฉ๋ฒ•์ด ์žˆ๋‹ค. ๋ช…๋ น๊ณผ ๊ทธ ๊ตฌ์กฐ๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™๋‹ค:

printf '\x51\x00\x00\x00\x00\x00\x00\x21\x00\x00\x00\x0bsecuremote\x00' | nc -q 1 10.10.10.10 264 | grep -a CN | cut -c 2-

์ด ๋ช…๋ น์˜ ์ถœ๋ ฅ์€ ์•„๋ž˜์— ์˜ˆ์‹œ๋œ ๊ฒƒ์ฒ˜๋Ÿผ ๋ฐฉํ™”๋ฒฝ์˜ ์ธ์ฆ์„œ ์ด๋ฆ„(CN) ๋ฐ ์กฐ์ง(O)์— ๊ด€ํ•œ ์ƒ์„ธ ์ •๋ณด๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค:

CN=Panama,O=MGMTT.srv.rxfrmi

HTTP Security Server Format String Bug (CAN-2004-0039)

Affected builds: NG FCS, NG FP1, NG FP2, NG FP3 HF2, and NG with Application Intelligence R54/R55.
Requirement: HTTP Security Server ๋˜๋Š” AI HTTP proxy๊ฐ€ ํ™œ์„ฑํ™”๋˜์–ด ๋Œ€์ƒ ํฌํŠธ๋ฅผ ํˆฌ๋ช…ํ•˜๊ฒŒ ๊ฒ€์‚ฌํ•˜๊ณ  ์žˆ์–ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. HTTP inspection์ด ๋น„ํ™œ์„ฑํ™”๋˜์–ด ์žˆ์œผ๋ฉด ์ทจ์•ฝํ•œ ์ฝ”๋“œ ๊ฒฝ๋กœ์— ์ „ํ˜€ ๋„๋‹ฌํ•˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค.

Triggering the error handler

ํ”„๋ก์‹œ๋Š” ์ž˜๋ชป๋œ ํ˜•ํƒœ์˜ HTTP ๋ฉ”์‹œ์ง€๋ฅผ ๊ฑฐ๋ถ€ํ•˜๊ณ  sprintf(errbuf, attacker_string);๋กœ ์ž์ฒด ์—๋Ÿฌ ํŽ˜์ด์ง€๋ฅผ ์ƒ์„ฑํ•˜์—ฌ ๊ณต๊ฒฉ์ž๊ฐ€ ์ œ์–ดํ•˜๋Š” ๋ฐ”์ดํŠธ๊ฐ€ ํฌ๋งท ๋ฌธ์ž์—ด๋กœ ๋™์ž‘ํ•˜๋„๋ก ํ•ฉ๋‹ˆ๋‹ค. ๋ฐฉํ™”๋ฒฝ์„ ํ†ตํ•ด ์ž˜๋ชป๋œ ์š”์ฒญ์„ ๋ณด๋‚ด๊ณ  ํŽ˜์ด๋กœ๋“œ๊ฐ€ ๋ฐ˜์˜๋œ ํ”„๋ก์‹œ ์ƒ์„ฑ ์—๋Ÿฌ๋ฅผ ์ฐพ์•„๋ณด์„ธ์š”:

printf 'BOGUS%%08x%%08x%%08x%%n HTTP/1.0\r\nHost: internal.local\r\n\r\n' | nc -nv [FIREWALL_IP] 80

If HTTP inspection์ด activeํ•˜๋ฉด, firewall(backend server๊ฐ€ ์•„๋‹ˆ๋ผ)๊ฐ€ ์ฆ‰์‹œ ์‘๋‹ตํ•˜์—ฌ middlebox๊ฐ€ request line์„ ํŒŒ์‹ฑํ•˜๊ณ  replayedํ–ˆ์Œ์„ ์ฆ๋ช…ํ•œ๋‹ค.

Exploitation

Format string primitive

  • parser๋ฅผ error routine์œผ๋กœ ๊ฐ•์ œ ์ง„์ž…์‹œํ‚จ๋‹ค (invalid method, URI, or headers).
  • ๊ณต๊ฒฉ์ž๊ฐ€ ์ œ์–ดํ•˜๋Š” dwords๋ฅผ ์•ž๋ถ€๋ถ„์— ๋ฐฐ์น˜ํ•˜์—ฌ %x, %s, %n ์ง€์‹œ์ž๊ฐ€ ์ด๋ฅผ stack arguments๋กœ ์ทจ๊ธ‰ํ•˜๊ฒŒ ํ•œ๋‹ค.
  • %x/%s๋ฅผ ์‚ฌ์šฉํ•ด pointers๋ฅผ leakํ•œ ๋‹ค์Œ, %n/%hn์œผ๋กœ ํฌ๋งคํŒ…๋œ ๋ฐ”์ดํŠธ ์ˆ˜๋ฅผ ์„ ํƒํ•œ ์ฃผ์†Œ์— ๊ธฐ๋กํ•ด return pointers, vtables, ๋˜๋Š” heap metadata๋ฅผ ๋ฎ์–ด์“ด ๋’ค injected shellcode๋‚˜ ROP๋กœ ์‹คํ–‰์„ ํƒˆ์ทจํ•œ๋‹ค.

Heap overflow primitive

๊ฐ™์€ unsafe sprintf()๊ฐ€ fixed-size heap buffer์— ์“ฐ๊ธฐ๋ฅผ ์ˆ˜ํ–‰ํ•œ๋‹ค. ๊ธด request body์™€ oversized directives(์˜ˆ: %99999x)๋ฅผ ์„ž์–ด ํฌ๋งคํŒ…๋œ ์ถœ๋ ฅ์ด ํ• ๋‹น์„ ๋„˜์น˜๊ฒŒ ํ•˜๋ฉด ์ธ์ ‘ํ•œ heap ๊ตฌ์กฐ๋“ค์ด ์†์ƒ๋˜์–ด ์ดํ›„ ์ฐธ์กฐ๋˜๋Š” freelist pointers๋‚˜ function tables๋ฅผ ์œ„์กฐํ•  ์ˆ˜ ์žˆ๋‹ค.

Impact

proxy๊ฐ€ ์†์ƒ๋˜๋ฉด firewall process ๋‚ด์—์„œ ์ฝ”๋“œ ์‹คํ–‰ ๊ถŒํ•œ์„ ํš๋“ํ•˜๊ฒŒ ๋œ๋‹ค (SYSTEM on Windows appliances, root on UNIX). ์ด๋ฅผ ํ†ตํ•ด rule manipulation, traffic interception, ๋ฐ management network๋กœ์˜ pivoting์ด ๊ฐ€๋Šฅํ•ด์ง„๋‹ค.

References

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ