Tag Archives: CheckPoint
Firewall/Router Attack – BlackNurse
This BlackNurse attack will causing high CPU on target device
-Kali linux
# hping3 -1 -C 3 -K 3 –flood
This attack only from 1 source. Could be more damage if I am using more attack sources
-Zyxel Zywall USG50
How to disable SIP ALG
SOURCE:
http://www.voip-info.org/wiki/view/Routers+SIP+ALG
Many of today’s commercial routers implement SIP ALG (Application-level gateway), coming with this feature enabled by default. While ALG could help in solving NAT related problems, the fact is that many routers’ ALG implementations are wrong and break SIP.
CheckPoint
login to Smart Dashboard
click Smart Defence tab
expand Application Intelligence
expand VoIP
disable all features on H.323
Cisco
(config)# no ip nat service sip tcp port 5060
(config)# no ip nat service sip udp port 5060
ASA
(config)# policy-map global_policy
(config)# no inspect sip
Cyberoam
> cyberoam system_modules sip unload
D-Link
Open a browser and enter the router’s IP address in the address bar. Go to “Firewall Settings” under the “Advanced” item.
Uncheck the box to disable SPI – usually, directly below this item are options for “NAT Endpoint Filtering” that must be changed to “Endpoint Independent” for both TCP and UDP.
Next, find the “Application Level Gateway (ALG) Configuration” area and uncheck the box for SIP.
Save these settings and reboot the device if requested
FortiGate
disable SIP ALG
# config system settings
# set sip-helper disable
# set sip-nat-trace disable
# end
verify
# show full-configuration system settings
delete sip
# config system session-helper
(session-helper) # show
config system session-helper
edit 1
set name pptp
set protocol 6
set port 1723
next
edit 2
set name h323
set protocol 6
set port 1720
next
edit 3
set name ras
set protocol 17
set port 1719
next
edit 4
set name tns
set protocol 6
set port 1521
next
edit 5
set name tftp
set protocol 17
set port 69
next
edit 6
set name rtsp
set protocol 6
set port 554
next
edit 7
set name rtsp
set protocol 6
set port 7070
next
edit 8
set name rtsp
set protocol 6
set port 8554
next
edit 9
set name ftp
set protocol 6
set port 21
next
edit 10
set name mms
set protocol 6
set port 1863
next
edit 11
set name pmap
set protocol 6
set port 111
next
edit 12
set name pmap
set protocol 17
set port 111
next
edit 13
set name sip
set protocol 17
set port 5060
next
edit 14
set name dns-udp
set protocol 17
set port 53
next
edit 15
set name rsh
set protocol 6
set port 514
next
edit 16
set name rsh
set protocol 6
set port 512
next
edit 17
set name dcerpc
set protocol 6
set port 135
next
edit 18
set name dcerpc
set protocol 17
set port 135
next
edit 19
set name mgcp
set protocol 17
set port 2427
next
edit 20
set name mgcp
set protocol 17
set port 2727
next
end
(session-helper) # delete 13
(session-helper) # end
Juniper
https://kb.juniper.net/InfoCenter/index?page=content&id=KB7078&actp=search
# set security alg sip disable
# commit and quit
Mikrotik
> ip firewall service-port set sip disabled=yes
Netgear
From Wan Setup Menu, NAT Filtering, uncheck the box next to “Disable SIP ALG”
PaloAlto
https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Disable-SIP-ALG/ta-p/60637
# set shared alg-override application sip alg-disabled yes
Peplink
go to http://<router.LAN.IP>/cgi-bin/MANGA/support.cgi
Click the “Disable” button under “SIP ALG Support”
SonicWall
in GUI, go to VOIP>Settings>General Settings
tick Enable consistent NAT
untick Enable SIP Transformations
SpeedTouch
telnet router
> connection unbind application=SIP port=5060
> saveall
Zyxel
telnet router
Menu option “24. System Maintenance”.
Menu option “8. Command Interpreter Mode”.
ip nat service sip active 0
CheckPoint GAIA Installation on Unetlab

-open Chrome and go to https://10.0.10.61






Blocking Browsec Chrome Extension
Browsec is VPN extension similar to ZenMate
CheckPoint:
Cisco ASA:
Cyberoam:
Fortigate:
Mikrotik:
add action=drop chain=forward layer7-protocol=browsec src-address-list=LAN
PaloAlto:
SonicWall:
Blocking Opera Turbo
CheckPoint:
Cisco ASA:
FortiGate:
Juniper:
PaloAlto:
SonicWall:
Blocking Telegram

Cisco ASA:
end
Juniper:
PaloAlto:
SonicWall:
Blocking ZenMate

Cisco ASA:
(config)# access-list acl-inside extended deny ip any object-group zenmate
Cyberoam:
FortiGate:
Juniper:
add action=drop chain=forward disabled=yes layer7-protocol=zenmate src-address-list=LAN
PaloAlto:
SonicWall:
Blocking YouTube
CheckPoint:
Cisco:
FortiGate:
Juniper:
Mikrotik:
/ip firewall layer7-protocol
add name=youtube regexp=”^.+(c.youtube.com|googlevideo.com).*\$”
/ip firewall address-list
add address=12.12.12.0/24 list=LAN
/ip firewall filter
add action=drop chain=forward layer7-protocol=youtube src-address-list=LAN
PaloAlto:
SonicWall:
Bypass Firewall
Method 1: Opera Turbo
Test:
-open Opera and tick File/Opera Turbo menu
-test whether can access http://www.playboy.com
Result:
BlueCoat:
CheckPoint: PASS
Cisco ASA:
Cyberoam:
FortiGate: No filter for this app
Juniper SRX:
PaloAlto: FAILED
SonicWall:
Method 2: FireFox or Chrome Zenmate Extention
Test:
-open Chrome or FireFox and enable Zenmate extention
-test whether can access http://www.playboy.com
Result:
BlueCoat:
CheckPoint: PASS
Cisco ASA:
Cyberoam:
FortiGate:
Juniper SRX:
PaloAlto:
SonicWall:
Method 3: Block Torrent
Test:
a. utorrent
-download and install utorrent from http://www.utorrent.com
-download and open torrent magnet from kickass.to
-test whether utorrent can download
b. tor browser
-download and install tor browser from https://www.torproject.org/projects/torbrowser.html.en
-launch Tor browser and go to http://www.playboy.com
c. Tor Network
Test:
-launch Tor browser but leave it running
-open Chrome
-open Chrome Settings/Show advanced settings
-click Change proxy settings
-click LAN settings
-click Advanced
Socks: 127.0.0.1 Port 9150
-test whether can access http://www.playboy.com
Result:
BlueCoat:
CheckPoint: PASS
Cisco ASA:
Cyberoam:
FortiGate:
Juniper SRX:
PaloAlto:
SonicWall:
Method 4: Open Proxy
Test:
-search open proxy that using port 80 from http://proxylist.hidemyass.com/
-set Chrome using open proxy for example 107.167.21.243 port 80
-test whether can access http://www.playboy.com
Result:
BlueCoat:
CheckPoint:
Cisco ASA:
Cyberoam:
FortiGate: FAILED
Juniper SRX:
PaloAlto:
SonicWall:
Method 5: Psiphon
Test:
-download and install Psiphon from https://psiphon.ca
-run and choose SSH+
-test whether can access http://www.playboy.com
Result:
BlueCoat:
CheckPoint: PASS
Cisco ASA:
Cyberoam:
FortiGate:
Juniper SRX:
PaloAlto: PASS
https://live.paloaltonetworks.com/t5/Featured-Articles/DotW-Blocking-PSiphon-3/ta-p/69359
SonicWall:
Method 6: Soft-Ether
Test:
-download, install and run Soft-Ether from http://www.vpngate.net/en/
-connect to VPN Relay Server using UDP
-set dns to 4.2.2.2
-test whether can access http://www.playboy.com
Result:
BlueCoat:
CheckPoint: PASS
Cisco ASA:
Cyberoam: No filter for this app
FortiGate: SUCCESS with custom app signature
Juniper SRX:
PaloAlto:
SonicWall:
Method 7: Block Internet Download Manager
Test:
-download IDM from https://www.internetdownloadmanager.com/
Result:
BlueCoat:
CheckPoint: PASS
Cisco ASA:
Cyberoam:
FortiGate:
Juniper SRX:
PaloAlto:
SonicWall:
Method 8: Block Free Download Manager
Test:
-download and install FDM from http://www.freedownloadmanager.org
Result:
BlueCoat:
CheckPoint: PASS
Cisco ASA:
Cyberoam:
FortiGate:
Juniper SRX:
PaloAlto:
SonicWall:
Method 9: Block Internet Download Accelerator
Test:
-download and install IDA from https://westbyte.com/ida/index.phtml?page=download
Result:
BlueCoat:
CheckPoint:
Cisco ASA:
Cyberoam:
FortiGate:
Juniper SRX:
PaloAlto:
SonicWall:
If anyone success blocking above test, please email me your rule. Because either I don’t the device or I have the device but don’t have the license or my filter is wrong
SonicWall:
Method 10: DNS Over TLS
Test:
-download and install Technitium DNS Server
Result:
BlueCoat:
CheckPoint:
Cisco ASA:
Cyberoam:
FortiGate:
Juniper SRX:
PaloAlto:
SonicWall: