Files
hpr-knowledge-base/hpr_transcripts/hpr0747.txt
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

431 lines
38 KiB
Plaintext

Episode: 747
Title: HPR0747: Botnets and DNS Tunnelling
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0747/hpr0747.mp3
Transcribed: 2025-10-08 01:52:57
---
music
Hello, HPR audience, this is co-cruncher and Phoenix, we're kind of chatting today.
This is the first time we're actually talking. It's strange to talk to a stranger, but Phoenix,
why don't you start by also greeting the audience?
Hello, podcast listeners. It's been a while since we've been on HPR, but yeah, it's nice
to speak with you, co-cruncher, how are you?
I'm fine. You said you're in sunny Dundee. I'm in Rainy Vancouver, so that's quite a contrast,
I guess.
I suppose it stands to show how diverse the HPR community actually is.
Yes, that's true. So I have a question for you, because I'm only listening to HPR, starting
last October, so I haven't really heard many of your shows at HPR before you started
then doing your own show. I always thought that HPR is actually a good way to get started
with podcasting and then do your own show, just wondering how that is working out for you.
I mean, I have such a love-hate relationship with podcast and if truth be told, I've talked
about podcasting before, like it's software freedom day and all of that sort of stuff,
and I'm a big fan of podcasting and I've always said that HPR is an ideal way to get into
podcasting and I was once given some advice by the HPR god himself, Klaatu, that said,
you shouldn't really start your own podcast, you should always do it through syndicated
through HPR and that sort of stuff. And for some silly reason, I just didn't take the
advice and I've had two podcasts in the end that I've started up like through HPR,
track set that made about four episodes and Felix Tech weekly. But sometimes it's very
hard because of your outside commitments to be able to do it. But we're getting Felix
Tech weekly back on and it's a lot of fun. In the flip side, if I'm struggling getting
that out, it makes it hard sometimes for me to podcast the HPR and the HPR has always
been like my first podcasting love. I love the community, I love everything about it.
But yeah, if you want to get into podcasting, there is no better way than using HPR, definitely
than outdo. Yeah, that makes a lot of sense. I mean, I never thought I would ever do podcasting
before. The last time that Ken actually was desperate to get shows in and I recorded
my show on how I got into Linux. Yeah, I think Ken's putting some really nice features.
A lot of good works gone into HPR. I haven't really been much of an active member for a while
just without such stuff. But like they have that number that you can call in and record
podcasts where I think that's a fantastic addition. Yeah, they syndicate Thursdays. I think
that's a really good idea. I mean, the HPRs come on leaps and bounce this year and yeah,
definitely. I have to stick my hands up. I'm an HPR fan boy. There's no to you, there's
no to you, but yeah. So people at home, if you get bored, you should start recording
episodes. That could be just as easy as getting two geeks on Skype, I suppose. We probably
have to tell the audience the reason why we're doing this show now is because Ken kind of
saw the queue getting too empty and was putting out the call in the mailing list for shows.
So you said you have something to talk about and I said I have time to record and edit
it. So now we're doing it. It's awesome. And I mean, we did have a little pre-show, very
short chat through Facebook to kind of agree on one or two topics. Shall we start with
a botnet topic? Yeah, yeah. So maybe I give a little introduction how that actually came
up because I was listening to your last Finox Tech Weekly. There you mentioned that in Canada,
there was a 53% increase in command and control servers for botnets. But then in Finox Tech Weekly,
there was this pause of five seconds or something. And during that time, a lot of questions piled
up in my head and I decided to go online and do a little bit of research about why is it in
Canada and what happened. The information I got is not... there isn't that much information.
The reason... Sorry? No, there's not. I mean, it's an interesting question. Why kind of
nowhere else? So what did they come across? It seems to me that... How this number came out is
because this company... Let me see if I wrote it down some websites. There is this guy, Patrick
Ronald. And they started looking into this issue after they decided to invest the situation
that they were seeing an increase in targeted attacks against the Canadian government.
That's the reason why they looked into the numbers. And they saw an increase of 53% in the botnets.
I mean, in the command and controls and over 300% increase in spyware or no,
phishing networks or phishing attacks. So it's a huge increase coming from Canada. But I mean,
one of the first questions I have is like, how do you really identify and count command and
control servers? Because they are dormant most of the time, aren't they?
Yes, yes and no. It's an interesting question. I mean, we have to take whatever statistics come
out of this with a pinch of salt because it's one commercial entity's outlook on what they're seeing
through their data, which they collect in their ways of doing. So it's not been independently
verified, say the least. So websites are seeing what it considers to be a command and control,
which could very well be legitimate. But it is what website sees as a command and control.
Now, this is not to say that there isn't an increase in it. But command and control would be
if someone is to get infected, Confaker was a prime example of this sort of stuff that the botnets
needs to speak about Conf. So by code analysis, you can say, right, this piece of evil code
contacts this server. In some way, shape or form, it will be hard coded, either an IP address
or a domain name or something like that. And that's where they'll say there's a command and
control center in Canada, because they'll be doing an IP lookup so to speak of. Does that sort of
make sense? It does, but I mean, there are also these command and control centers that kind of
have an algorithm on a time-based algorithm for finding the connection. So it may actually not
necessarily be hard coded or easy to identify that certain calculation results in an IP number or
something. Yeah, I mean, at the end, but in the end, the point for delivering control has to be,
I mean, no matter how much you encrypt it, at the end, it's got to be decrypted, no matter what,
that there is an exit point and an entry point. And that software has to speak to an exit point
at some point and that has the nature of it. You can make it more difficult, so on and so forth.
It's not to say, though, that a vanlode of cyber criminals rolled into Canada. I mean,
this is the bit that I found very hard to get my head around, that trying to make this localisation
of the problem. And the internet isn't like that. It doesn't work that way. And I think
websites did a very strange job as well, because they picked on Canada, but they failed to say
that America is still the number one host of phishing data. Canada is number two.
Maybe there isn't such a surprise that if the biggest country in the world producing this stuff
is your next own neighbour, maybe there is going to be a novel spill. I don't think that it's,
yeah, I was very dubious about it on the show, I have to be to be honest with you.
I mean, they talk a little bit. I mean, there's like, they have different numbers in their statistic.
And I'm gonna post the link in the show notes. So Canada is number two now for phishing sites,
and it moved from 13 to 6 for the botnets, I think. Well, there are two reasons. One reason they
talk about why the US is leading, and that it's just because a lot of the servers are in the US,
I mean, it's like, really, you have a huge infrastructure there, so that also means
high numbers for everything. And then they talk about two botnets that were taken down in the US,
and that's why maybe the people moved to Canada, because the line for tonight is cracking down
botnets more in the US currently. It's just a transient issue. If you squeeze one end,
it's gonna pop up at any other end. I mean, at the end of the day, I suppose the relieving point is,
if they're saying that this is due to the rush stock and core flood botnets being taken down,
what they're ultimately trying to say with this sort of argument is that there actually
hasn't been an increase in any cybercrime whatsoever, it's just been moved. So there isn't
more cybercriminals, you know, just the problem is, and you know, you can only do crackdowns for
a certain amount of time as well. I don't think, I think, I wouldn't be surprised if we saw
this sort of number drop and move about. Maybe it's just a good, maybe what we're really going to
start seeing now is a transient cybercrime bubble just popping about and moving to different countries
and so on and so forth. I don't know if this is going to be like a permanent problem for Canada,
100% sure on that. Well, it's a problem that's not going to go away. I mean, you're not saying that
the number is going to drop overall. It's just the ranking maybe change again.
Yeah, there's no doubt that the issue needs to be looked at. I mean, at the end of the day,
if you've got cybercriminals using your infrastructure, at some point there is always going to be a
problem and it is up to governments to regulate that sort of issues. So yeah, and in the kind of
government are going to have to look at what they can do to make sure that they come out of that
situation and what appropriate actions of government can take at their level. Because yeah,
if it's easy to commit cybercrime in Canada, you'll not be surprised if you have cybercriminals move
in. I suppose that's almost like common sense. Yeah, that's something I read in like the comments by
different people. The articles that I looked at, that like the Canadian government really isn't
doing much or doesn't have good structures in place to actually deal with cybercriminals.
And that's not particularly unusual. I used to do it. It was involved in the Math Gohacking
degree and we, at the beginning, we did a lot of learning about how laws take a long time to
cut shop with what's happening, technologically related, a massive time. And you know, there was
times where cybercrime in the UK wasn't very well regulated and times in America. It's a very
interesting book by, I was recommended by a friend of mine called The Cuckoo's Egg by Clifford Strong.
It's an awesome book. It's a true story. And they had, they basically had hackers,
this is years and years ago, maybe it was in the 70s or something like this,
had hackers breaking into systems. But the American like into like Melnet,
none of this sort of stuff. I mean, they had some serious intrusion going on,
but they didn't have the laws to actually get the FBI involved. The FBI couldn't get involved
unless it was a million dollars in crime. And so the problem with laws, the thing is that they don't,
it's easy to write a patch, but it's not so easy to write a law and you have to get it through
courts and votes and so on and so forth. So yeah, it's an ever-changing step.
It's a tough problem. I wouldn't want to be a government trying to fix what's legal and not legal.
Yeah, it's certainly cyberspace. Yeah, cyberspace, because it's global and it's really hard to
deal with it on a country by country level. Or packets don't know borders, like that's the long
storage shop. They don't care if they were sent from Canada or they don't care if they were
received in America. But unfortunately, those states have to have some level of control.
Not much you can do about that, I suppose. Another question that came to my mind is like,
I mean, you have the command and control servers and then you have the zombie computers,
right, that they can contact. Yeah. How can you find out if your computer is a zombie?
Numerous of ways. But it's all, you all have to, it's kind of like a per-situation basis,
I suppose. I suppose we need to understand as if you've been compromised. Exactly what a
compromise is. It's probably easier to look at it that way. Changing performance,
instability already system, because obviously bad guys don't care if they break APIs in your
system or libraries or any of that sort of thing. They don't care. Also of strange network
activity, definitely a big giveaway of something's going on. So, yeah, I mean firewalls,
firewalls are good at picking this stuff up. If you're running semi-decent firewall stuff,
it's good. Linux, obviously, in a lot of ways is, in my opinion, a little bit ahead of the game
on that, but I also think that Windows are their own firewall that they, I mean, I don't use
Windows systems anymore and haven't done for years, but the last time I knew they had a firewall
and XP and that seems to have been pretty good from most of the research I did at the time.
So these things will help. At the end of the day, if your zombie can't communicate with its
command and control, then it's still a zombie. It's not an active player anymore. But yeah, there's
a big, they're interesting. I mean, it's something that we talk about. Obviously, when I speak to
people not involved in hacking or I'm the first hacker that they've met and the conversations
ultimately always start off with, you know, how can hacking be ethical, blah, blah, blah, blah, blah.
But eventually, what happens is people start saying, well, I've got nothing to hide, so no one's
going to hack me. You know, there's this, I'm only a small fish, there's plenty of other fish in
the sea, so I'm not, you know, I'm not a target. I've got nothing for them to target.
And it's this point that I always come back to. It's these zombie machines.
And you inadvertently be involved in cybercrime. Russian, the Russian mafia have been
reported to have used botnets to take down gambling websites during life matches. So they would say to
basically an extortion hacker. You will pay us 25,000 pounds during the Arsenal Chelsea soccer match,
or we will deduce your site during that match. And if you don't believe us, we'll take your site
off now, and they're not the site either. And then the gambling companies don't have two choices,
really. They either pay or they don't pay. And obviously, if your business is taking online
bets during sporting events, you being off during a major sporting event is a massive issue.
But yeah, I mean, that's an example of you being used purely as a resource. People don't
understand that. We just tend to think that as a target, as a target, a bad guy is interested
in your data. It's not always the case. Sometimes a bad guy is interested in your resources,
such as your bad ones, such as your machine, so on and so on. So gambling sites, that's an
interesting one, because I mean, there is a lot of money involved, so you can really also
probably get a lot of money. The only reason we know about it is we, one of the gambling sites,
refused to pay and got knocked off. We don't know how many actually paid prior to that. So it could
have been the first one, it could have just got caught, or, you know, all it could be one in many.
That's for sure. There is a, I certainly know of companies and organizations in the UK that have
paid money, extortion money for data, not to be. Yeah, I know of a university in London that paid three
times before they called in the police. Wow. So yeah, we don't really like these.
Yeah, it's only one that we know about. So it's either, either widespread or not. But yeah,
it's an example of, it's an example of using the situation and they don't just target on
gambling sites. I mean, at the end of the day, you could inadvertently be by being a part of
a botanet being involved in lots of different stuff. Anonymous, a prime example, interesting case
anonymous people, willingly, in fact, in themselves of the botanet, that certainly would take any of
your protection, certainly under any UK law, that's certainly you wouldn't have any protection under
law and that situation. And I would be surprised under many, many, well, many countries that you would
be protected under law. As far as I know, you don't have protection in the US either. I mean,
that's what I heard on other podcasts that I'm listening to.
The, I think the long story short is, most laws are based on intent anyway.
The intent to commit a crime is the criminal act itself. So, you know, you know, knowingly
using yourself as a tool to knock over PayPal or Amazon, you know, you knew what you were doing.
There's no, it doesn't matter if you were a small cog in a big machine at the end of the day,
your intent was to cause damage. So, you know, if you're lost in support of those arguments,
you know, as we would say in the UK, you're banged to right.
Yeah. There is also the other side of the story. I mean, it's an amazing kind of, you know,
invention to actually have computers, control other computers and have them do a lot of things.
I think the most extreme botnet that I remember was the Estonia attack where they actually took
down a whole country. There's a lot of cases about this. British NIDA is,
he's on a little bit of a rant about this stuff recently. And I have to agree with him.
The problem with cyber warfare in this kind of context is that
you should never really use the term, you should never really use the term more,
unless it does refer to, you know, bombs and bullets and death. Because it desensitizes people.
There is no, you know, nothing's happening now. So, nothing happened to Estonia that hasn't
happened before. There was nothing new in what happened here. You know, it just had a name,
that's all that happened. At the end of the day, if you talk about this in a warfare context,
right, the reality of what happened in Estonia was an invading army invaded the country
and filled up all the queues in the supermarket. That's the equivalent of what they did.
You know, they turned off some services. Yes, it was a pain in the bum, but no one, you know,
they occupied services that's all they did. And it's not really, you know,
what we should be starting to see, and we have been starting to see, is more cyber components
being deployed during warfare. But yeah, the term, the Estonia thing is, you know, it was done for
no other reason than to annoy Estonia. You know, let's be, let's be perfectly, it was
designed to be the ultimate nagua. But yet we see, I mean, you don't want to talk about like
cyber warfare, we see cyber weapons. That's what we're seeing. We see this with, you know,
I mean, alleged blah, blah, blah, blah, blah, blah. But let's be honest about this. This
software attacked not only a specific nuclear reactor, a specific nuclear refinement facility,
but a specific reactor within the facility, right? So that code was a very specifically written
for a target. No two ways about it had an auto kill switch, all of these sorts of stuff.
You know, so I'm going to make my opinion that that cyber, you know, that's the cyber weapon.
And what we need to start talking about in terms of war, because this is a problem when you say
things like cyber war, is that an act of war? You know, is that cyber attack an act of war?
You know, that was a cyber weapon that went off, you know, and unless we dropped the cyber
warfare, Malaki, and start talking about it in the context of what it is. And stop with this,
this media hype about it all, and start being a little bit more realistic about it. We're going
to get into crazy situations based on doses. I mean, we've seen, we've seen cyber components
being used in warfare for quite a while, believe the beginning of Cold War one. We hacked into
the Iraqis air defenses and shot them off, you know, cyber weapons and warfare.
They're allied forces. I believe I'm not sure if it's British or not, I'm not sure which ones
did it, but yeah, they switched the radar off and then bombed. It's not unusual. But we didn't
call that cyber warfare, we called that war. So yeah, that's my issue, and I don't mean to go
into a big rant about it. And I think, I mean, it is really too bad that the terminology kind of
distracts from what is actually going on and happening and, you know, blurring the actual
discussion about the technology and the potential. But I mean, these incidents are wake-up calls
and make us realize that there are vulnerabilities out there that are new because of our networked
world. That's kind of what I see. The prime example is this internet
culture. Well, I mean, it's an echo of Bruce Naiveau again on this one. But if you make a button
that could turn off your internet as a bad guy, that's pretty much the button I want to press.
And now I have a target. So, you know, it's making a nuclear bomb because
someone's got a nuclear bomb. You know, it blows my mind how it even gets discussed. I mean,
have a friend who would say that it's that wrong. It's not even wrong anymore. You know,
and that's almost the meaning that, you know, it couldn't be wrong if you tried. It's that far
away from even sensible. God knows how they would even think about doing gang impl... Well, I've
got ideas about how they could implement something like that. But what would you want to
is such a different question. And in fairness as well, I mean, say America shot up shot for 24 hours.
You know, what's the impact on the rest of the internet? Does the internet carry on? Does it stop?
Do we inadvertently lose all our services because of American press as a botanist worrying
times? No doubt about it. I kind of think that the internet is still going to survive even without
the US. But the question is, like, how many services actually come from that country
that we depend on and that don't, you know, have read because outside that would survive?
Yeah, the, the interest that we see, well, you know, if they make a kill switch,
they might soon find out. You think somebody will be tempted to find out.
Oh, God, it'd be the holy grail, wouldn't it? I mean, really. It's like the world's biggest target.
Yeah. You know, it's not going to get bigger target than I turned off America's internet.
Yeah. You know, it's the ultimate dose.
Yeah, I never really thought about it that way, but it's intriguing.
Okay, well, that was much much longer or much longer answers to my questions that I have regarding
this botanist thing in Canada. She just tell me to shut up when I ran below you.
No, I think it was very interesting because I mean, we're taking a risk here. We're having a
discussion without that actually knowing each other and it works quite well. But there was
another topic that you mentioned, which is something you talked about at meetings, which is
tunneling over, what was it, tunneling over DNS? DNS in quite. Yeah. I've recently been talking
a couple of it. It's not a, it's not a new thing, but I've been talking about how it's possible to
wrap up your communications into DNS inquiries and send them,
and transfer them over DNS inquiries. So basically wrapping your IP traffic in DNS inquiries.
And it wouldn't surprise people to know that there isn't many legitimate reasons why you'd
be doing this. But the reason for it is, is that it's a very effective means of bypassing captive
portals or some firewalls as well. It's very handy at doing that. And the reality of it is.
What can you just explain DNS inquiries? Like, what is actually the information that has been sent
in DNS queries? What happens in, yeah, what happens in DNS is, DNS is the system that we use
so that we have domain names that are memorable. Otherwise, we don't have to remember
number ranges and people notoriously about it remembering those. So DNS is the system that we use
to cover that transfer domain name service or system or something like that. And the idea is,
is that there is, I think, 16 or maybe 13 root DNS servers. And what they handle is the .coms,
the .orgs and so on and so on and so forth. And then the domain name part, which is like
phoenix.co.uk. My ISP would handle the resolution between getting the phoenix bit and translating that
to a number that refers to a system somewhere on the internet. So what happens in a DNS inquiry
is pretty much one end, you have a request that goes out and says, I'm looking for
.phoenix.co.uk. And the system goes, okay, that ends in a code.uk, that root domain
say over holds that, will hold the information for that. Hi, where as phoenix is okay, phoenix
is held by this domain name server, and this is his IP address. And that's pretty much how it
should work. I've got some notes on it somewhere on the site and stuff like that, but I'll send you
some stuff and you maybe stick with me on the HPR site, where there's a better job of explaining
DNS stuff. But basically DNS requests in the end are your computer's way of asking the domain
name server where a resource on the internet is. So and then you can use this for tunneling?
Yes, well, this is the interesting thing. I'm sure with all, I'm going to talk about a captive
portal, and it might be easier if I just mention it like a captive portal is, I'm sure we've seen
these wireless networks that you can sign up, you get on it's an open wireless network, but you need
to register to use the web. And what they tend to do, how they tend to work is they tend to
intercept HTTP requests. And until you pay for your servers, it will intercept all those HTTP
requests. However, it would seem and has done for a long, long time, they do allow unfettered DNS
requests. So what you, what I've been able to do, and I'm not the only one in the world that's
done it, and I'm only copying other people's work really, is I've been able to wrap my
club HTTP traffic, which would be intercepted on these captive portals. And I've been able to
wrap it up into DNS requests that aren't being intercepted by the captive portal. So I'm able to
get point-to-point communication working over, but basically without them being able to, they
can't see it, it's not being intercepted by them at all. So I think the trick is to not use the
HTTP protocol so that the other server cannot identify you as somebody who should pay.
Yeah, well, it doesn't, it doesn't see you. I mean, you're allowed to, you're working within
the rules of that particular system, you know, exploiting anything per se. But what happens is,
in this case, so I was able to establish a quite easily, was able to establish an SSH session
over a captive portal, and I was able to establish a nice SSH session out of the captive portal
to another machine and tunnel my traffic and everything like that as well. And what is interesting
here is another vector, when I've talked about this before, and I talk about vectors, and I'm
really talking about uses. I mean, I'm supposed to be a bad guy for the good guys, ultimately,
I'm supposed to be, so I'm supposed to think about how these things are attacked. And what's really
handy is, is that as a bad guy, it's a very, very handy tool. It's easy to say, oh, we get free
internet out of it. But the reality of it is, is that I can tunnel data out of your network
over your DNS servers. Now, you, if you're not watching for that, you may have a very tight up
data lockup kind of policy, but I can bit by bit still data out of your network over your DNS
inquiries. Or I can tunnel, the great thing with DNS, DNS is very good at nut traversing.
It's a reusable address. So we can use it to establish, unless it communications with a target.
So we tunnel our tap code over DNS, and that's second vents problems with nut and quite hard
for it to be picked up as well. So yeah, I mean, there is a lot of interesting uses for it.
But this came about in God. This is not unknown. A bunch of German hackers, I think, in 1998,
used it to call into Microsoft's update service, and then they would tunnel their traffic.
Because it was a toll-free number at the time, like just dial-ups sort of days, but you know,
they were able to call into Microsoft's update service, and then tunnel their IP traffic
over DNS inquiries and get an internet connection, basically, through a toll-free number,
which was Microsoft's update server. And that was the beginning part of that. And then,
very famous research called Dan Kaminsky, released some tools, which my talk was based on
slightly called Aussie Man DNS, which is a really set of pulse scripts that enable you to set
this sort of setup. It's quite easy, actually, to be honest, but you need a machine on the internet.
That's the long story short. I mean, you need something to tunnel too.
Well, I feel like I have to go through my networking book again to actually understand
how in which protocol you're really kind of exploiting here.
What you're ultimately doing is your wrapping, this is quite a bit to get your head around as well,
your wrapping TCP IP pockets up in UDP. Okay, so you move them down.
Yeah, oh, there's a whole, there's a whole lot of stuff that needs to be worked out. You're exploiting,
what you're really doing is you're exploiting how it works is you can encode traffic in DNS
requests. You get lots of different DNS sort of requests. So you can get a DNS request for a TXT
file, which holds resources in. So what we're able to do is encode traffic into base 64
and base 32, sorry, and then reencode it at the other end and then respond back with the
request. So what you're really happening, what you're really doing is sending structured DNS
requests, because you can get up to the length of a DNS request theoretically, you can get up
to 255 bytes. So in one DNS request, we can send an amount of bytes that dependable, but
no more than 255, but probably a little bit less. And then the fake domain name server in the
internet can respond back with a TXT file that has the appropriate response for our traffic.
And that way we're able to send data from point to point. So you're exploiting the implementation
of DNS more than anything else. Yeah, I mean, because also HTTP requests, they kind of
are in the end broken down into packets that get sent out and reassembled.
Yeah, I mean, the problem of UDP, the problem, the problem you have to overcome in reality is
using UDP for something that is completely incapable of doing.
The problem of UDP has no arrechecking. You drop a packet, you drop a packet. However,
in a TCP IP cell, that's not good for you, that's bad. So there is, as a protocol hacker,
but that's why I kind of really love that sort of stuff, because it's really insane to think
that you've basically put a score of pegging around home and make it work.
So two more questions. I mean, so if packets get dropped, do you just ignore them or can you
identify that they were dropped? Yeah, it's re-request them. Yeah, there's a couple of tools out there
that make this easy. Rosiemann DNS is one of them, without doubt, probably the better one of the
tools. And that is actually available on my site as well. I can't remember the location,
I think, but I'll send it to you. Yeah. And there is a few other tools, one called NSTX,
which this is what the German hacker's developed. And what this does is a Linux tool, I think,
I don't think you can get it for Windows, I could be wrong, though. And I don't think you can get
it for Mac, but I think it's a Linux tool, and you're able to set up like a virtual network device
on your machine, and you have like a fake domain name server on the internet, and you can set up
a virtual device on that machine as well. And you can set up a VPN, and it works that way.
And that one's quite good, there's quite a lot of protection built into it and stuff like that.
I've been talking about it for a while, so you know, I've got some slides and stuff like that,
they'll be coming out in the next couple of weeks, going over all this stuff. I spoke about it
at B size London, and I'll wait to speak about it again in London at the beginning of June.
So the other question you mentioned, TXT files, so that's text files, is there then, I mean,
how much data can you actually transport this way? 255 points. At once, yeah, but in total.
Anyone, yeah, no, no limit to it. If you talk about countermeasures to this sort of attack,
if you're, there's countermeasures to the countermeasures, and it's one of these strange games of
kind of mouse, but the reality of it is there's certain things that you can do. There isn't really
a huge amount of legitimate reason for browse and requests, and then sort of sort of, it really
mail users TXT quite a lot, you know, you shouldn't really need that. Captive portals,
wise, you need to change DNS servers when you're, you know, you shouldn't allow recursive DNS
lookups. This is how it ultimately works. So you're able to, what happens? There's a say we have
evilserver.finix.co.uk. We do a DNS request to that, and what happens is we use a file setup,
a DNS server setup that would say, or requests for this domain name, look at this domain name
server for it, and that's kind of like a recursive lookup, and that's in part where the hack works,
because of this recursive movement. It's very hard to explain over a podcast, I do try and explain
it in my slides, but the true hack in the implementation is two things really, is this recursive lookup
because your DNS server can't use the legitimate peer person, captive port or firewall or so on
and so on and so forth. You're only seeing the resource to evil.finix.co.uk, but what happens when
that lookup happens is when it gets that domain server, that's the bit where it points to a different
fake domain server, that's encoding and decoding, base64 and 34 encoded DNS requests.
But you can't say block, if you get a million requests for a domain block, you just can't do that,
because imagine if you are a university that has a captive port or requires your students
to sign into the wireless network via their credentials, a lot of universities have the
similar setup, and you'd be able to tunnel out of that. So, but the problem there is, is that you
can't say, oh well, if you get a million requests to Finix, block Finix, because how many million
requests do they get to Google? I mean, you know, the problem is that you can't do, there's only
certain things you can and can't do. I mean, you're only using functionality. That's the interesting
problem. You know, you're doing what the protocol in some ways was designed to do, you know, the TXT
records, you know, it's in 255 bytes a day, that's exactly what you're doing, that's exactly what
it was designed to do. There is problems, but yeah, if you start to see a huge bandwidth go up
on your port 53, yeah, might be time to start looking. Certainly, there's no two ways about it,
you shouldn't see that much bandwidth or that much traffic, you know, really a DNS request,
isn't a huge amount of data, it shouldn't be, you know, it's a lightweight protocol.
I can't remember what port 53 is standing for. Oh, that's DNS, sorry. That's DNS.
Okay, that's how the circle kind of closes. Yeah, this is really interesting because it's kind of
just exploiting the way things work and I mean, it's a typical hack because you're taking what's
there and making use of it. Yeah, absolutely. All of the best hacks are implementation hacks.
You know, if you look, if the protocol, the problem is when you write something, DNS systems
is an example of this, but this was written years and years ago. So we've had a lot of time to go
over it and find weaknesses and lots and lots and lots of years of doing that and this is always
the game that people play, you know, and you get that. I mean, there's this protocol hacking is
really interesting. Okay, well, I'm looking forward to actually see your slides because it is hard
to imagine the whole thing without the graphic explanation. I had to do this talk,
besides London in 30 minutes from beginning to end. Now, it was recorded, but I don't know when
it's going to be made available. But I have the slides and I'd like to say, I'm giving it again,
but yeah, after that, the slides will be up. I think the slides may be available on the B-Sides
London website, maybe Google and see. I'll find out. Yeah, if I can find them, we should put a link
in the show notes. Have you ever scared you with all the DNS tunneling talk?
No, you're kind of... I'm curious now. And, you know, these are the kind of podcasts that I really
like at HPR when I get information about something that I've never really thought about and then
can actually follow up. And, you know, maybe get more information, get to understand it better or
just... It's thought-provoking in a lot of ways. That's what I like. But I am a little overwhelmed
at this point I have to admit. So, you know, able to look at your slides will be good. Oh, you sent
me the link. That's great. Yeah, I just found the link. Okay, so we'll put that in.
If you have any more questions, if I have more questions, we have to do another show because I think
this one is already getting pretty long. I mean, much longer than I expected it would be.
And maybe we should also mention that in your Finox Tech Weekly, you actually talk about
B-Sides London. So, if people are interested in hearing more about it, they can probably just
try to find your podcast, right? Yeah, you can... We... We... Allegedly, we do a weekly podcast,
but it's not been like that for a while, but yeah, you can find us at dot, dot, dot, dot,
phoenix.co.uk. And, yeah, we've... We've passed a couple of episodes of Ben B-Sides sort of
related, which is a really... It's really been quite fun to be involved in all of that sort of
stuff, so it's been a bit of a lot of fun. It was very nice to speak with you. Yeah.
Like we could do it against someday. Yes, this was very nice. I'm like, glad that I was able to
pick your brain about the botnets, which helped a lot. Yeah, trust it. Thanks for jumping in.
Thanks for offering to record a show for HPR. No, thank you for wanting to do it.
I've really enjoyed it, actually. It's been... It's been fun. Okay, I think we have to say goodbye
to our audience, and thanks for listening. Yeah, thanks very much, and folks, don't forget,
you could be making shows as well, so do take the opportunity to get on calls and talk to people
and record things, and, you know, it's a community podcast, and Ken needs the shows, so, honestly,
folks, stand up and be kind and get yourself recording the show. And your co-grunt show,
you have a good day, okay? Thanks, see you too, Phoenix. Bye.
Thank you for listening to Half Republic Radio. HPR is sponsored by Carol.net,
so head on over to C-A-R-O dot N-E-C for all of her to need.