Module 12: Techniques in Evading Firewalls

Firewalls are critical for filtering network traffic based on predefined rules, but attackers use advanced methods to bypass them. Below is a structured breakdown of common firewall evasion techniques and countermeasures:

1. Protocol and Port Manipulation

  • Port Redirection:
    • Use ports commonly allowed by firewalls (e.g., HTTP/80, HTTPS/443) for non-standard traffic (e.g., SSH over port 443).
    • Tools: socatnetcat, or SSH tunneling.
  • Port Knocking:
    • Send a sequence of connection attempts to closed ports to “unlock” a hidden service.
  • Fragmented Packets:
    • Split malicious payloads into fragments to evade rule-based detection.
      Example: nmap -f (sends fragmented packets).

2. Application-Layer Evasion

  • HTTP/HTTPS Tunneling:
    • Encapsulate traffic within HTTP/HTTPS (e.g., DNS over HTTPS, SSH over HTTPS).
      Tools: Burp Suite, proxychains, or custom scripts.
  • DNS Tunneling:
    • Exfiltrate data via DNS queries (e.g., iodineDNScat2).
  • ICMP Tunneling:
    • Hide data in ICMP echo requests (ping packets) using tools like ptunnel.

3. Encryption and Obfuscation

  • SSL/TLS Encryption:
    • Encrypt traffic to bypass firewall inspection (e.g., HTTPS, VPNs).
  • Payload Encoding:
    • Use Base64, XOR, or custom encoding to disguise malicious payloads (e.g., PowerShell encoded commands).

4. Spoofing and Anonymization

  • IP/MAC Spoofing:
    • Mask source IP/MAC addresses to mimic trusted hosts.
  • Proxy Chains:
    • Route traffic through multiple proxies/Tor to hide origins.
      Tools: proxychains, Tor, VPNs.
  • Cloud-Based Evasion:
    • Use cloud services (e.g., AWS, Azure) as intermediaries to bypass IP blacklists.

5. Firewall Rule Exploitation

  • Stateful Firewall Bypass:
    • Exploit connection states (e.g., sending ACK packets without prior SYN handshake for port scanning).
      Example: nmap -sA (ACK scan).
  • Rule Gaps:
    • Abuse overly permissive rules (e.g., allowing outbound traffic from internal networks).
  • Time-Based Evasion:
    • Spread attacks over time to avoid triggering rate-limiting rules.

6. Advanced Techniques

  • IPv6 Exploitation:
    • Target misconfigured IPv6 firewall rules (many networks prioritize IPv4).
  • MAC Flooding:
    • Overwhelm firewall CAM tables to force fail-open states (layer 2 attacks).
  • Zero-Day Exploits:
    • Exploit unpatched vulnerabilities in firewall firmware/software.

Real-World Tools for Firewall Evasion

  1. Nmap:
    • -sS (Stealth SYN scan), -f (fragmentation), --script firewall-bypass.
  2. Hping3:
    • Craft custom packets to test firewall rules (e.g., hping3 -S -p 80 -c 1 [target]).
  3. Metasploit:
    • Use reverse_https payloads to bypass egress filtering.
  4. SSH Tunneling:
    • Create encrypted tunnels (e.g., ssh -D 8080 user@example.com for a SOCKS proxy).

Countermeasures

  1. Deep Packet Inspection (DPI): Analyze payloads even in encrypted traffic (e.g., SSL inspection).
  2. Behavioral Analysis: Detect anomalies (e.g., unusual port 443 traffic patterns).
  3. Zero-Trust Architecture: Enforce strict access controls and least privilege.
  4. Regular Rule Audits: Close unused ports and tighten firewall policies.
  5. Next-Gen Firewalls (NGFW): Use AI/ML to identify advanced evasion tactics.

Key Takeaways

  • Firewalls rely on rules and protocol awareness; attackers exploit gaps in both.
  • Modern evasion combines encryptionprotocol abuse, and social engineering.
  • Defense requires multi-layered security (e.g., NGFW, IDS/IPS, endpoint protection).

Understanding these techniques helps ethical hackers identify vulnerabilities and strengthen defenses against sophisticated attacks.

Scroll to Top