<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Example Signature for WPAD.DAT Exploitation (TA16-144A) in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/example-signature-for-wpad-dat-exploitation-ta16-144a/m-p/78973#M96</link>
    <description>&lt;P&gt;One attack avenue for an organization that the US-CERT is currently alerting on is the abuse of Web Proxy Auto-Discovery in order to hijack traffic by directing a web browser to a proxy they own.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The technical details are available at: &lt;A href="https://www.us-cert.gov/ncas/alerts/TA16-144A" target="_self"&gt;https://www.us-cert.gov/ncas/alerts/TA16-144A&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are three avenues of detection I am aware of:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1) Detecting a DNS query with "wpad." in the content. This does not appear possible with the current custom signature engine, as there is not a 7 byte static anchor to signature off of.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) Detecting an HTTP transaction in which the content of the "Host" header starts with "wpad."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3) Detecting an HTTP transaction in which the URI contains "wpad.dat"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've written a custom signature that covers points 2 and 3 to illustrate what is possible.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This signature was written as an example to illustrate what the custom signature engine can do. It has minimal testing in a production environment, and is meant as a pivot point for creating your own custom protections.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's also imperative to remember that this signature will be very noisy if it is applied to internal environments, and makes the most sense only applied to traffic destined for the untrust zone.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have fun, signature enthusiasts!&lt;/P&gt;</description>
    <pubDate>Wed, 01 Jun 2016 20:29:14 GMT</pubDate>
    <dc:creator>rcole</dc:creator>
    <dc:date>2016-06-01T20:29:14Z</dc:date>
    <item>
      <title>Example Signature for WPAD.DAT Exploitation (TA16-144A)</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/example-signature-for-wpad-dat-exploitation-ta16-144a/m-p/78973#M96</link>
      <description>&lt;P&gt;One attack avenue for an organization that the US-CERT is currently alerting on is the abuse of Web Proxy Auto-Discovery in order to hijack traffic by directing a web browser to a proxy they own.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The technical details are available at: &lt;A href="https://www.us-cert.gov/ncas/alerts/TA16-144A" target="_self"&gt;https://www.us-cert.gov/ncas/alerts/TA16-144A&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are three avenues of detection I am aware of:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1) Detecting a DNS query with "wpad." in the content. This does not appear possible with the current custom signature engine, as there is not a 7 byte static anchor to signature off of.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) Detecting an HTTP transaction in which the content of the "Host" header starts with "wpad."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3) Detecting an HTTP transaction in which the URI contains "wpad.dat"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've written a custom signature that covers points 2 and 3 to illustrate what is possible.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This signature was written as an example to illustrate what the custom signature engine can do. It has minimal testing in a production environment, and is meant as a pivot point for creating your own custom protections.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's also imperative to remember that this signature will be very noisy if it is applied to internal environments, and makes the most sense only applied to traffic destined for the untrust zone.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have fun, signature enthusiasts!&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2016 20:29:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/example-signature-for-wpad-dat-exploitation-ta16-144a/m-p/78973#M96</guid>
      <dc:creator>rcole</dc:creator>
      <dc:date>2016-06-01T20:29:14Z</dc:date>
    </item>
  </channel>
</rss>

