Tricks To Bypass Device Control Protection Solutions

Preface

As I wrote in a previous blog post, I had an engagement last year where my task was to exfiltrate data from a workstation on some sort of storage media. The twist in that task was Lumension Sanctuary Device Control, and the version was 4.3.2, but I am not sure how newer version work and this seems to be a more general problem with device control solution, for example with Symantec products.

But what is a device control solution? In short, they audit I/O device use and block the attempts to use unauthorized devices. This includes hardware such as USB, PS/2, FireWire, CD/DVD so basically every I/O port of a computer. In my opinion, these are pretty good things and they offer a better looking solution than de-soldering the I/O ports from the motherboards or hot-gluing them, but on the other hand, they can be bypassed.

Bypass

OK, so what is the problem? Well the way these device control solutions work is that they load a few kernel drivers to monitor the physical ports of the machine. However... when you boot up the protected computer in safe mode, depending on the device control solution software, some of these drivers are not loaded (or if you are lucky, none of those modules will be loaded...) and this opens up the possibility to exfiltrate data.

In theory, if you have admin (SYSTEM maybe?) privileges, you might as well try to unload the kernel drivers. Just do not forget, that these device control solutions also have a watchdog process, that checks the driver and automatically loads it back if it is unloaded, so look for that process and stop or suspend it first.

In my case with the Lumension Sanctuary Device Control, I have found that when I boot the Workstation protected by the device control software in Safe Mode where, software's key logger protection module is not running... so I was still unable to use a USB stick, or a storage media, but I could plug in a keyboard for example...hmmm :)

As some of you probably already figured it out, now it is possible to use a pre-programmed USB HID, for example a Teensy! : ) I know about three different project, that uses this trick like these two mentioned in a Hackaday post, or this one. Unfortunately, the site ob-security.info no longer seems to be available (well, at least it is no longer related to infosec :D ), but you can still find the blog post and the files with the Wayback Machine.

For the hardware part, the wiring of the Teensy and the SD card adaptor is the same as I showed in the post on Making a USB flash drive HW Trojan or in the Binary deployment with VBScript, PowerShell or .Net csc.exe compiler post, so I will not copy it here again.

I have to note here that there are other ways to bypass these device control solutions, like the method what Dr. Phil Polstra did with the USB Impersonator, which is basically looks for an authorized device VID/PID and then  impersonates that devices with the VID/PID.

Mitigation

Most probably, you will not need safe mode for the users, so you can just disable it... I mean, it is not that easy, but luckily there is a great blog post on how to do that. BTW, the first page of the post is for Windows XP, but you are not using XP anymore, aren't you? ;)

Alternatively, as I mentioned at the beginning, you might as well use some physical countermeasure (de-soldering/hot-gluing ports). That shit is ugly, but it kinda works.

Conclusion

Next time you will face a device control solution, try out these tricks, maybe they will work, and if they do, well, that's a lot of fun. :)

But don't get me wrong, these device control solutions and similar countermeasures are a good thing and you should use something like this! I know that they make doing business a bit harder as you are not able to plugin whatever USB stick you want, but if you buy a pile of hardware encrypted flash drives, and only allow  those to be plugged in, you are doing it right ;)

Related news
  1. Hacker Tools Software
  2. Pentest Box Tools Download
  3. Hacking Tools Windows 10
  4. Hacker
  5. Hack And Tools
  6. Best Hacking Tools 2019
  7. Ethical Hacker Tools
  8. Hacker Security Tools
  9. Hacking Tools Download
  10. Pentest Tools Online
  11. Pentest Recon Tools
  12. Hack Tool Apk
  13. Wifi Hacker Tools For Windows
  14. Hacker Tools Windows
  15. Pentest Tools Url Fuzzer
  16. Hacking Tools Hardware
  17. Pentest Tools Framework
  18. How To Make Hacking Tools
  19. Hacking Tools Online
  20. Hacker Tools
  21. Hack App
  22. Pentest Tools For Ubuntu
  23. Hack Tool Apk
  24. Best Hacking Tools 2020
  25. Hacker Tools Linux
  26. Hacking Tools Windows 10
  27. How To Make Hacking Tools
  28. Hack Tool Apk No Root
  29. Hack Tool Apk
  30. Pentest Tools Windows
  31. Hacking Tools Github
  32. Hacking Tools
  33. Pentest Tools Apk
  34. Usb Pentest Tools
  35. Pentest Tools Linux
  36. Hack Tools 2019
  37. Pentest Tools Online
  38. Hack And Tools
  39. Hack Tool Apk No Root
  40. Pentest Tools Windows
  41. Blackhat Hacker Tools
  42. Ethical Hacker Tools
  43. Hacking Tools 2020
  44. Beginner Hacker Tools
  45. Hacking Tools Pc
  46. Hacking Tools Download
  47. Blackhat Hacker Tools
  48. Tools For Hacker
  49. Hack Tools Download
  50. Hacker Hardware Tools
  51. Hacking Tools 2020
  52. Hacking Tools For Kali Linux
  53. Pentest Tools Open Source
  54. Hack Tools
  55. Hack Tools
  56. Hacker Tools Free Download
  57. How To Make Hacking Tools
  58. Hack App
  59. Hacker Tools Apk Download
  60. Hacker Tools For Mac
  61. Hacker Tools Github
  62. Hack Tools Github
  63. Hack Tools
  64. Easy Hack Tools
  65. Pentest Tools
  66. Pentest Tools For Windows
  67. Hacker Tools Free
  68. Hacker Tool Kit
  69. Hacking Tools For Beginners
  70. Hacker Tools List
  71. Hack Tools 2019
  72. Hack Tools
  73. Hacking Tools 2019
  74. Best Hacking Tools 2019
  75. Physical Pentest Tools
  76. Pentest Tools For Android
  77. Hack Website Online Tool
  78. Hacker Tools Windows
  79. Hacker Tools Mac
  80. Hack Tools For Ubuntu
  81. Pentest Box Tools Download
  82. Hacker Tools For Mac
  83. Hacks And Tools
  84. Hacker Tools For Windows
  85. Pentest Tools Kali Linux
  86. Nsa Hacker Tools
  87. Hacking Tools Github
  88. Pentest Tools Free
  89. Hacker Tools For Ios
  90. Hacker Tools Linux
  91. Hacker Tools Linux
  92. Blackhat Hacker Tools
  93. Hacking Tools For Mac
  94. Hacker Search Tools
  95. Install Pentest Tools Ubuntu
  96. Hacking Tools For Windows 7
  97. Hack Tools For Games
  98. Hacking Tools Online
  99. Best Pentesting Tools 2018
  100. Hacker Tools For Mac
  101. Hacks And Tools
  102. Physical Pentest Tools
  103. Tools For Hacker
  104. Pentest Tools Windows
  105. Hackers Toolbox
  106. Hacker Tools Free Download
  107. Pentest Tools For Ubuntu
  108. Pentest Tools Open Source
  109. Hacker Hardware Tools
  110. Hacking Tools For Mac
  111. Hack Tools Mac
  112. Physical Pentest Tools
  113. Github Hacking Tools
  114. Hacking Tools For Pc
  115. Hacker Tools Hardware
  116. Free Pentest Tools For Windows
  117. Hacking Tools Pc
  118. Nsa Hack Tools Download
  119. Pentest Tools Windows
  120. Hacking Tools Software
  121. Hacker Tools Free
  122. Hacker
  123. Hacker Tools For Windows
  124. Hacking Tools And Software
  125. How To Hack
  126. How To Make Hacking Tools
  127. Hack Tool Apk
  128. Hacker
  129. Computer Hacker
  130. Hack And Tools
  131. Hacking Tools Name
  132. Nsa Hack Tools
  133. Android Hack Tools Github
  134. Pentest Tools Online
  135. Hacker Search Tools
  136. Pentest Tools List
  137. Hack Tools For Games
  138. Install Pentest Tools Ubuntu
  139. Hacker Tools For Ios
  140. Hack Tools Mac
  141. Pentest Tools Linux