Evader Userguide
Evader Userguide
A STONESOFT INNOVATION
Users Guide
Stonesoft Evader allows you to test the effectiveness of security devices in your network
environment against advanced evasion techniques.
The following sections are included:
Getting Started With Stonesoft Evader (page 2)
Installing the Evader Test Environment (page 3)
Evader Command Syntax (page 5)
Mongbat Command Syntax (page 10)
Supported Evasions (page 13)
Installation Environment
The installation environment consists of an attacker computer that runs the Stonesoft Evader
software and one or more victim computers. The examples in this document are based on the
following example installation. Your installation may vary according to your environment.
Illustration 1.1 Example Installation
Security Device(s)
1. Attacker computer
IPv4 Address: 172.16.120.1
Netmask: 255.255.255.128 (25)
Attacker source IPv4 address range: 172.16.120.30 - 172.16.120.126
2. Linux victim computer
IPv4 Address: 172.16.120.21
Netmask: 255.255.255.128 (25)
The following credentials are used to log in to the Linux operating system on both computers:
User: root
Password: password
System Requirements
The OVF Template can be deployed on the virtualization platform of your choice. You may need to
enable Promiscuous mode on the virtual switches to get your security device(s) to work
correctly.
If you want use a Windows XP victim computer as the target for testing evasions with the
conficker attack, you must install the operating system and configure the vulnerable services
according to the requirements below:
Windows XP (en-US) SP2 without patches
MSRPC Server Service configured to allow unauthenticated MSRPC binds (CVE-2008-4250)
Example IP Addresses for Windows Victim Computer:
IPv4 Address: 172.16.120.20
Netmask: 255.255.255.128 (25)
9. Click Finish to deploy the virtual machine. When the deployment is finished, click Close to
close the status dialog.
Whats Next?
Repeat these steps to deploy the other virtual machine, then continue by Configuring
the Attacker Computer (page 4).
The options for the evader command are explained in the tables below.
Table 1.1 Options for Network Configuration
Option
Description
--if=<name>
--src_ip=<IP address>
--src_port=<port number>
The source port number for the attacks. By default, a random port
number is used.
--src_mask=<netmask>
--gw=<IP address>
--dst_ip=<IP address>
--dst_port=<port number>
Option
Description
--attacks | -a
--info=<attack name>
--attack=<attack name>
--clean
--obfuscate
--extra=<option=value>
(,<option=value>)*
Option
Description
--evasions | -e
-evasion=
[<start stage>,<end stage>]
<evasion_name>,
<evasion_option=value>
(,<evasion_option=value>)*
Each evasion has its own set of options that are specific to that evasion. Use the following
options to show detailed information about the options for a specific evasion:
--info=<evasion_name>
Each evasion-specific option accepts one of the following three types of values (the evasion
description indicates what type of value each option accepts):
Integer: An integer value. The evasion description indicates the range of valid integers and
how to use them with the evasion.
Probability: Indicates how often the evasion is applied to the traffic. Probability values can be
entered in three ways:
As a percentage. For example, 75%. The evasion is applied with a probability of 75% to
each packet, so on average at the end of the attack, 75% of packets will have received
the evasion.
As a number. For example, 3. The evasion is applied to exactly every third packet.
As a list of iterations each preceded by '#'. For example, #3#6#13. The evasion is
applied exactly at the third, sixth and thirteenth iterations.
Multiple Choice: A specific named option. The evasion description specifies whether single
or multiple options can be used with the evasion. The syntax for the option depends on
whether single options or multiple options can be used:
Single Valid: A single named option. Quotes are optional.
Multiple Valid: A single named option or a list of named options separated with a pipe
(|). The entire list of options must be enclosed in quotes to prevent the pipe from being
interpreted as part of the Linux shell command.
Table 1.4 Other Options
Option
Description
--version | -v
--cfg_file=<file name>
--autoclose
--shell_tcp
--summary | -s
--iterations=<number>
--verifydelay=<length
of delay>
--randseed=<string>
Sets the seed to use for random number generation. The random
number generator generates random data for the payload of certain
attacks.
--record=<file name>
6
4. Select the attack Module for testing the evasions.
Note If you want to test evasions against a Windows XP victim computer with the
Conficker module, you must install the operating system and configure the vulnerable
services. See the System Requirements (page 3) for more information.
5. Define the module-specific options according to your environment.
6. Define the network options for the Evader command as instructed below:
Setting
Description
Interface
Enter the name of the interface on the attacker computer from which the attacks
originate.
Source IP
Enter the source IP address for the attacks. This address must be a unique IP
address from the same subnet as the IP address of the attacker computer.
Note! The Evader tool implements its own TCP/IP stack. Do not use the attacker
computers IP address as the source IP address.
Destination IP
Gateway IP
The options for the mongbat command are explained in the table below.
Table 1.10 Mongbat Options
Option
Description
--mode=(solo|dual|random)
--attack=<attack name>
--iface=<interface>
--attacker=<src ip>
The starting source IP address for the attacks. This address must be a
unique IP address from the same subnet as the IP address of the
attacker computer. The first worker uses this address, and any additional
workers use the next sequential IP addresses. There must be a sufficient
range of free IP addresses to provide a unique IP address for each
worker.
Note! The Evader tool implements its own TCP/IP stack. Do not use the
attacker computers IP address as the source IP address.
--victim=<dst ip>
--mask=<netmask>
--gw=<IP address>
The gateway address if the victim is not in the local network. Default:
empty.
--time=<time in seconds>
The duration of the attack in seconds when random mode is used. The
default is 60 seconds.
--workers=<worker count>
The number of workers to use for the attacks. Each worker is a separate
instance of the Evader program. There must be a sufficient range of free
IP addresses to provide a unique IP address for each worker.
The default is 1 worker.
--use_evasions=<evasion>
(,evasion)*
10
Option
Description
--disable_evasions=
<evasion> (,evasion)*
--check_victim=(true|false)
Check that the victim allows legal traffic without evasions before
attacking. Default: true.
--record=<directory name>
--min_evasions=<number>
--max_evasions=<number>
--index=<begin(-end)?>
The start index and optional stop index for solo and dual mode.
--stop_on_success
--passthrough
11
12
Total
156
156
1
Clean
156
21
135
Exploit
134
134
1
Supported Evasions
The evasions available depend on the selected attack. For example, HTTP evasions can only be
used with HTTP attacks. Use the following command to list the supported evasion techniques
for a specific attack:
./evader --attack=<attack name> --evasions
Table 1.13 Supported Evasions
Evasion
Description
Attack(s)
ipv4_frag
IPv4 fragmentation
conficker, http_phpbb_highlight
ipv4_opt
IPv4 options
conficker, http_phpbb_highlight
msrpc_bigendian
conficker
msrpc_groupsends
conficker
msrpc_ndrflag
conficker
msrpc_seg
conficker
netbios_chaff
NetBIOS chaff
conficker
netbios_init_chaff
conficker
smb_chaff
SMB chaff
conficker
smb_decoytrees
conficker
smb_fnameobf
conficker
smb_seg
conficker
smb_writeandxpad
conficker
tcp_chaff
TCP Chaff
conficker, http_phpbb_highlight
tcp_initialseq
conficker, http_phpbb_highlight
tcp_inittsopt
conficker, http_phpbb_highlight
tcp_nocwnd
conficker, http_phpbb_highlight
tcp_nofastretrans
conficker, http_phpbb_highlight
tcp_order
conficker, http_phpbb_highlight
tcp_overlap
conficker, http_phpbb_highlight
tcp_paws
conficker, http_phpbb_highlight
tcp_recv_window
conficker, http_phpbb_highlight
tcp_seg
TCP segmentation
conficker, http_phpbb_highlight
tcp_timewait
conficker, http_phpbb_highlight
Supported Evasions
13
Evasion
Description
Attack(s)
tcp_tsoptreply
conficker, http_phpbb_highlight
tcp_urgent
conficker, http_phpbb_highlight
http_header_lws
http_phpbb_highlight
http_known_user_agent
http_phpbb_highlight
http_request_line_separator
http_phpbb_highlight
http_request_method
http_phpbb_highlight
http_request_pipelined
http_phpbb_highlight
http_url_absolute
http_phpbb_highlight
http_url_dummypath
http_phpbb_highlight
http_url_encoding
http_phpbb_highlight
http_version
http_phpbb_highlight
14
Stonesoft Guides
Administrators Guides - step-by-step instructions for configuring and managing the system.
Installation Guides - step-by-step instructions for installing and upgrading the system.
Reference Guides - system and feature descriptions with overviews to configuration tasks.
User's Guides - step-by-step instructions for end-users.
Stonesoft Corporation
Itlahdenkatu 22 A
FI-00210 Helsinki
Finland
Tel. +358 9 476 711
Fax +358 9 4767 1349
Stonesoft Inc.
1050 Crown Pointe Parkway
Suite 900
Atlanta, GA 30338
USA
Tel. +1 770 668 1125
Fax +1 770 668 1131
Copyright 2012 Stonesoft Corporation. All rights reserved. All specifications are subject to change.