<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NSS Labs Report - Mitigation for claimed vulnerabilities? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37346#M27384</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried attack which is shown in previously mentioned video (&lt;A class="jive-link-external-small" href="https://www.youtube.com/watch?v=VTl3gkMOGWA&amp;amp;hd=1" rel="nofollow"&gt;Palo Alto Netowrks IPS evasion DEMO - NSS Labs - YouTube&lt;/A&gt;) and it was not successful over PA. It looks like PA (6.0.5, app&amp;amp;threat 459-2387) is blocking all segmented SMB traffic.&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="16086" alt="smb_seg.png" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/16086_smb_seg.png" style="height: 30px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="16091" alt="smb_seb_vuln.png" class="jive-image image-2" src="https://live.paloaltonetworks.com/legacyfs/online/16091_smb_seb_vuln.png" style="height: auto;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 06 Oct 2014 13:51:27 GMT</pubDate>
    <dc:creator>lios</dc:creator>
    <dc:date>2014-10-06T13:51:27Z</dc:date>
    <item>
      <title>NSS Labs Report - Mitigation for claimed vulnerabilities?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37342#M27380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://www.nsslabs.com/blog/seriously" title="https://www.nsslabs.com/blog/seriously"&gt;Seriously? | NSS Labs&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could someone elaborate on the section which says:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #323232; font-family: 'Open Sans', 'Helvetica Neue', Helvetica, Arial, sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #323232; font-family: 'Open Sans', 'Helvetica Neue', Helvetica, Arial, sans-serif;"&gt;&lt;EM&gt;All PAN-OS devices require a configuration change to detect even the most basic TCP stream segmentation evasions. The “&lt;/EM&gt;&lt;/SPAN&gt;&lt;EM&gt;Mismatched overlapping TCP segment&lt;SPAN style="color: #323232; font-family: 'Open Sans', 'Helvetica Neue', Helvetica, Arial, sans-serif;"&gt;” protection in the &lt;/SPAN&gt;Zone Protection&lt;SPAN style="color: #323232; font-family: 'Open Sans', 'Helvetica Neue', Helvetica, Arial, sans-serif;"&gt; profile is not enabled by default, which allows attackers to bypass the device completely using TCP stream segmentation with overlapping data evasion techniques. NSS strongly recommends that this protection is always enabled – any PAN customer that has not checked this box is at &lt;/SPAN&gt;&lt;STRONG style="color: #323232; font-family: 'Open Sans', 'Helvetica Neue', Helvetica, Arial, sans-serif;"&gt;extreme&lt;/STRONG&gt;&lt;SPAN style="color: #323232; font-family: 'Open Sans', 'Helvetica Neue', Helvetica, Arial, sans-serif;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: #323232; font-family: 'Open Sans', 'Helvetica Neue', Helvetica, Arial, sans-serif;"&gt;risk&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN style="color: #323232; font-family: 'Open Sans', 'Helvetica Neue', Helvetica, Arial, sans-serif;"&gt;&lt;EM&gt;.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #323232; font-family: 'Open Sans', 'Helvetica Neue', Helvetica, Arial, sans-serif;"&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #323232; font-family: 'Open Sans', 'Helvetica Neue', Helvetica, Arial, sans-serif;"&gt;I've not come across this and would like to know if it's suggested to enable it?&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Oct 2014 17:23:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37342#M27380</guid>
      <dc:creator>networkadmin</dc:creator>
      <dc:date>2014-10-02T17:23:45Z</dc:date>
    </item>
    <item>
      <title>Re: NSS Labs Report - Mitigation for claimed vulnerabilities?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37343#M27381</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi NetworkAdmin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can find following document to answer some of your question:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://researchcenter.paloaltonetworks.com/2014/09/response-recently-released-2014-nss-next-generation-firewall-comparative-analysis/" title="http://researchcenter.paloaltonetworks.com/2014/09/response-recently-released-2014-nss-next-generation-firewall-comparative-analysis/"&gt;Response to Recently Released 2014 NSS Next-Generation Firewall Comparative Analysis - Palo Alto Networks BlogPalo Alto …&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Oct 2014 17:32:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37343#M27381</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-10-02T17:32:28Z</dc:date>
    </item>
    <item>
      <title>Re: NSS Labs Report - Mitigation for claimed vulnerabilities?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37344#M27382</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had thought about posting that same report in hopes of seeing / hearing other thoughts. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This video was also ... interesting to say the least.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note:&amp;nbsp; I understand this appears to be a CheckPoint smear channel, it's still interesting to see the vulnerability.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=VTl3gkMOGWA&amp;amp;hd=1" style="color: #1155cc; font-family: verdana, sans-serif;" target="_blank" title="https://www.youtube.com/watch?v=VTl3gkMOGWA&amp;amp;hd=1"&gt;Palo Alto Netowrks IPS evasion DEMO - NSS Labs - YouTube&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Oct 2014 12:56:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37344#M27382</guid>
      <dc:creator>mrsoldner</dc:creator>
      <dc:date>2014-10-03T12:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: NSS Labs Report - Mitigation for claimed vulnerabilities?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37345#M27383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nothing new (2010):&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=D1lSpYoaf3o" title="https://www.youtube.com/watch?v=D1lSpYoaf3o"&gt;Advanced evasion techniques - Laboratory demonstration - YouTube&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Oct 2014 13:15:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37345#M27383</guid>
      <dc:creator>lios</dc:creator>
      <dc:date>2014-10-03T13:15:11Z</dc:date>
    </item>
    <item>
      <title>Re: NSS Labs Report - Mitigation for claimed vulnerabilities?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37346#M27384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried attack which is shown in previously mentioned video (&lt;A class="jive-link-external-small" href="https://www.youtube.com/watch?v=VTl3gkMOGWA&amp;amp;hd=1" rel="nofollow"&gt;Palo Alto Netowrks IPS evasion DEMO - NSS Labs - YouTube&lt;/A&gt;) and it was not successful over PA. It looks like PA (6.0.5, app&amp;amp;threat 459-2387) is blocking all segmented SMB traffic.&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="16086" alt="smb_seg.png" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/16086_smb_seg.png" style="height: 30px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="16091" alt="smb_seb_vuln.png" class="jive-image image-2" src="https://live.paloaltonetworks.com/legacyfs/online/16091_smb_seb_vuln.png" style="height: auto;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Oct 2014 13:51:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37346#M27384</guid>
      <dc:creator>lios</dc:creator>
      <dc:date>2014-10-06T13:51:27Z</dc:date>
    </item>
    <item>
      <title>Re: NSS Labs Report - Mitigation for claimed vulnerabilities?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37347#M27385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ask PA &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Oct 2014 14:06:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37347#M27385</guid>
      <dc:creator>lios</dc:creator>
      <dc:date>2014-10-06T14:06:34Z</dc:date>
    </item>
    <item>
      <title>Re: NSS Labs Report - Mitigation for claimed vulnerabilities?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37348#M27386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have to add that all I tried was conficker attack using single "smb_seg" evasion as shown in video which was stopped using signature not normalization. I haven't ran Evader in Automatic Evasions mode for 12 hours as shown in video..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Strangely some messages from &lt;SPAN class="j-post-author"&gt;&lt;STRONG&gt;&lt;A _jive_internal="true" class="jiveTT-hover-user jive-username-link" data-avatarid="2060" data-externalid="" data-presence="null" data-userid="19490" data-username="hshah" href="https://live.paloaltonetworks.com/people/hshah"&gt;hshah&lt;/A&gt;&lt;/STRONG&gt;&lt;/SPAN&gt; and one from me disappeared in this thread.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;Hi Lios,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for inputs. As I said PANW first gathers all fragemetns, IF any fragment is&lt;/P&gt;
&lt;P&gt;missing or overlapping than it simply drops all fragments.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Hardik Shah&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I wrote that it looks like PA is blocking ANY fragmented SMB traffic not just with missing or overlapping fragments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;Hi Lion,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That might be true.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Hardik Shah&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;Interesting, why would it block genuine fragments ?&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My response (ask PA) is still here..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Oct 2014 13:54:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37348#M27386</guid>
      <dc:creator>lios</dc:creator>
      <dc:date>2014-10-07T13:54:49Z</dc:date>
    </item>
    <item>
      <title>Re: NSS Labs Report - Mitigation for claimed vulnerabilities?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37349#M27387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By the way, new video:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=tB-NPf0AVI8" title="https://www.youtube.com/watch?v=tB-NPf0AVI8"&gt;PAN Evasion Bypass take 2 - With PAN Best Practices implemented - YouTube&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Oct 2014 13:55:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37349#M27387</guid>
      <dc:creator>lios</dc:creator>
      <dc:date>2014-10-07T13:55:52Z</dc:date>
    </item>
    <item>
      <title>Re: NSS Labs Report - Mitigation for claimed vulnerabilities?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37350#M27388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-8085"&gt;Customer advisory - Palo Alto Networks provides coverage for 2 security evasions&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Oct 2014 13:31:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37350#M27388</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-10-09T13:31:48Z</dc:date>
    </item>
    <item>
      <title>Re: NSS Labs Report - Mitigation for claimed vulnerabilities?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37351#M27389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=CTuzvztv0NM" title="https://www.youtube.com/watch?v=CTuzvztv0NM"&gt;Palo Alto Networks IPS Evasion Bypass After NSS Labs Patch 6.0.5h3 - YouTube&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Oct 2014 17:36:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37351#M27389</guid>
      <dc:creator>lios</dc:creator>
      <dc:date>2014-10-29T17:36:46Z</dc:date>
    </item>
    <item>
      <title>Re: NSS Labs Report - Mitigation for claimed vulnerabilities?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37352#M27390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So;&amp;nbsp; the fixes are not enough ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Oct 2014 17:46:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nss-labs-report-mitigation-for-claimed-vulnerabilities/m-p/37352#M27390</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-10-29T17:46:19Z</dc:date>
    </item>
  </channel>
</rss>

