<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Bypassing application control on PAN-OS in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/bypassing-application-control-on-pan-os/m-p/49561#M36519</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We do not feel that using client-server collusion by starting the connection as a permitted application and switching to another is genuine or valid test. The scheme devised in the test assumes both the client and server are already under the control of the attacker. We don't know of any real-world clients or servers that can talk HTTP initially and then switch to SSH. Our app-ID has coverage for many evasive real-world tunneling applications and we continue to add coverage for more as we discover them. In this instance, we are working to enhance checks in our HTTP decoder to identify this scheme and set the session to be unknown-tcp. We are targeting to make the fix available in the next 1-2 content updates.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 30 Oct 2012 19:30:47 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2012-10-30T19:30:47Z</dc:date>
    <item>
      <title>Bypassing application control on PAN-OS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/bypassing-application-control-on-pan-os/m-p/49559#M36517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I stumbled upon a blog entry (&lt;A href="http://www.what2code.net/?p=100" title="http://www.what2code.net/?p=100"&gt;http://www.what2code.net/?p=100&lt;/A&gt;) describing how to, sadly, bypass application control on Palo Alto Networks boxes.&lt;/P&gt;&lt;P&gt;Author does not provide the source code, but I believe the method is not the work of his imagination.&lt;/P&gt;&lt;P&gt;Any comment on this by PAN Team? Any possible cure for the virus? &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Oct 2012 13:39:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/bypassing-application-control-on-pan-os/m-p/49559#M36517</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2012-10-19T13:39:51Z</dc:date>
    </item>
    <item>
      <title>Re: Bypassing application control on PAN-OS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/bypassing-application-control-on-pan-os/m-p/49560#M36518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;While we are waiting for someone from PA to show up on friday evening I have posted a reply in the other thread with similar question &lt;A __default_attr="5509" __jive_macro_name="thread" class="jive_macro jive_macro_thread" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Oct 2012 18:51:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/bypassing-application-control-on-pan-os/m-p/49560#M36518</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-10-19T18:51:05Z</dc:date>
    </item>
    <item>
      <title>Re: Bypassing application control on PAN-OS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/bypassing-application-control-on-pan-os/m-p/49561#M36519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We do not feel that using client-server collusion by starting the connection as a permitted application and switching to another is genuine or valid test. The scheme devised in the test assumes both the client and server are already under the control of the attacker. We don't know of any real-world clients or servers that can talk HTTP initially and then switch to SSH. Our app-ID has coverage for many evasive real-world tunneling applications and we continue to add coverage for more as we discover them. In this instance, we are working to enhance checks in our HTTP decoder to identify this scheme and set the session to be unknown-tcp. We are targeting to make the fix available in the next 1-2 content updates.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Oct 2012 19:30:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/bypassing-application-control-on-pan-os/m-p/49561#M36519</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2012-10-30T19:30:47Z</dc:date>
    </item>
    <item>
      <title>Re: Bypassing application control on PAN-OS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/bypassing-application-control-on-pan-os/m-p/49562#M36520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I belive this is valid because its these methods that malware will use to break out of the internal network in order to phone home various of stuff it can get its hand on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Compromised client: checked (usually its a matter of "when" not "if").&lt;/P&gt;&lt;P&gt;Compromised server: checked (just look at all botnets where most uses compromised servers to act as C&amp;amp;C).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and suddently we have a situation where both the client AND the server is compromised and can run whatever protocol they wish (specially when you take networks such as the internet into account).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Oct 2012 21:45:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/bypassing-application-control-on-pan-os/m-p/49562#M36520</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-10-30T21:45:46Z</dc:date>
    </item>
  </channel>
</rss>

