Locking Down Linux: Using Ubuntu as Your Primary OS, Part 2 (Network Attack Defense)

Jul 3, 2018 09:22 PM
Dec 3, 2020 09:05 PM
636662244517274845.jpg

After installing Ubuntu as your primary OS, you should have protected against USB Rubber Ducky payloads, defended against hard drive forensics, and reduced the overall attack surface against physical strikes. When defending against network-based attacks, you'll want to minimize hardware disclosures, prevent packet sniffers, harden firewall rules, and much more.

To be more specific, in this part of the mini-series for strengthening your primary Ubuntu installation, you'll learn to spoof your MAC address to trick passive attackers, disable unused networking services such as CUPS and Avahi, create specific firewall rules to block data exfil on certain ports, and prevent hackers from sniffing passwords and cookies in your packets with a VPN.

If you missed the previous article, you should check out part one to learn more about my motivations for starting this four-part guide — even if you already have Ubuntu installed and just want to lock it down.

Step 1: Defend Against Hardware Enumeration

When connecting to new Wi-Fi networks and routers, spoof the Wi-Fi adapter's MAC address. This won't prevent a motivated attacker from learning which operating system you're using, but it may confuse and prevent them from discovering hardware information.

For example, a hacker on a coffee shop Wi-Fi network might focus their attacks on non-Apple devices. If you appear on the network with an Apple MAC address, the attacker may completely ignore your device. Or, they might try some macOS-specific attack against your device, which won't work, because you're not actually using a MacBook — you only appear on the network as using Apple hardware. This coupled with a spoofed browser user-agent may really confuse a passive adversary.

To spoof your MAC address in Ubuntu, open up Network Manager and "Edit" your Wi-Fi connection. In the Identity tab, enter the MAC address you want to use into the Cloned Address box.

636657390432130375.jpg

Step 2: Defend Against Listening Service Abuse

A background process (or service) in a "LISTEN" state could mean other services and applications on the device and network can interact with it. These listening services are always waiting for data to trigger some dynamic response. Any service with a local address of 0.0.0.0 and in a listen state is likely accessible to anyone on the local network and possibly anyone on the internet.

A new Ubuntu installation will only have a few running services installed — so no scary listening ports to worry about by default. But be mindful of applications that you install in the future. They may open listening ports without informing you.

To keep track of which background processes are in a listening state, we'll use netstat, a tool used to print network connections, open ports, and running services. Because the minimal Ubuntu installation was used, the net-tools suite of applications (which includes netstat) will need to be installed manually. This can be done using the sudo apt install net-tools command.

~$ sudo apt install net-tools

Reading package lists... Done
Building dependency tree
Reading state information... Done
The following NEW packages will be installed:
  net-tools
0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
Need to get 194 kB of archives.
After this operation, 803 kB of additional disk space will be used.
Selecting previously unselected package net-tools.
(Reading database ... 149085 files and directories currently installed.)
Preparing to unpack .../net-tools_1.60+git20161116.90da8a0-1ubuntu1_amd64.deb ...
Unpacking net-tools (1.60+git20161116.90da8a0-1ubuntu1) ...
Processing triggers for man-db (2.8.3-2) ...
Setting up net-tools (1.60+git20161116.90da8a0-1ubuntu1) ...

Use the below netstat command to view services in a "LISTEN" state.

~$ sudo netstat -ntpul

Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address           Foreign Address         State       PID/Program name
tcp        0      0 127.0.0.53:53           0.0.0.0:*               LISTEN      651/systemd-resolve
tcp        0      0 127.0.0.1:631           0.0.0.0:*               LISTEN      806/cupsd
tcp6       0      0 ::1:631                 :::*                    LISTEN      806/cupsd
udp    47616      0 127.0.0.53:53           0.0.0.0:*                           651/systemd-resolve
udp        0      0 0.0.0.0:631             0.0.0.0:*                           812/cups-browsed
udp     2304      0 0.0.0.0:5353            0.0.0.0:*                           750/avahi-daemon: r
udp        0      0 0.0.0.0:38284           0.0.0.0:*                           750/avahi-daemon: r
udp6       0      0 :::37278                :::*                                750/avahi-daemon: r
udp6   25344      0 :::5353                 :::*                                750/avahi-daemon: r

Systemd-resolve is used to resolve domain names and probably shouldn't be modified or removed. I'll explain "cupsd" and "avahi-daemon" in the next sections.

Disable or Remove CUPS

Cupsd is a scheduler for CUPS, a service used by applications to interface with printers. There are several Nmap NSE scripts designed to pull information from CUPS services and pose a very minor security risk. However, if you very rarely need to interact with printers, CUPS can be disabled using the below systemctl disable cups-browsed command. The changes will take effect after a reboot.

~$ systemctl disable cups-browsed

Synchronizing state of cups-browsed.service with SysV service script with /lib/systemd/systemd-sysv-install.
Executing: /lib/systemd/systemd-sysv-install disable cups-browsed

If you're never going to use a printer, CUPS can be removed entirely with sudo apt autoremove cups-daemon.

~$ sudo apt autoremove cups-daemon

Reading package lists... Done
Building dependency tree
Reading state information... Done
The following packages will be REMOVED:
   bluez-cups (5.48-0ubuntu3)
   cups (2.2.7-1ubuntu2)
   cups-browsed (1.20.2-0ubuntu3)
   cups-core-drivers (2.2.7-1ubuntu2)
   cups-daemon (2.2.7-1ubuntu2)
   hplip (3.17.10+repack0-5)
   printer-driver-gutenprint (5.2.13-2)
   printer-driver-hpcups (3.17.10+repack0-5)
   printer-driver-postscript-hp (3.17.10+repack0-5)
   printer-driver-splix (2.0.0+svn315-6fakesync1)
0 upgraded, 0 newly installed, 10 to remove and 0 not upgraded.
After this operation, 8,383 kB disk space will be freed.
Do you want to continue? [Y/n] ^C
root@nullbyte:/home/tokyoneon# apt-get purge -V cups-daemon
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following packages will be REMOVED:
   bluez-cups* (5.48-0ubuntu3)
   cups* (2.2.7-1ubuntu2)
   cups-browsed* (1.20.2-0ubuntu3)
   cups-core-drivers* (2.2.7-1ubuntu2)
   cups-daemon* (2.2.7-1ubuntu2)
   hplip* (3.17.10+repack0-5)
   printer-driver-gutenprint* (5.2.13-2)
   printer-driver-hpcups* (3.17.10+repack0-5)
   printer-driver-postscript-hp* (3.17.10+repack0-5)
   printer-driver-splix* (2.0.0+svn315-6fakesync1)
0 upgraded, 0 newly installed, 10 to remove and 0 not upgraded.
After this operation, 8,383 kB disk space will be freed.
Do you want to continue? [Y/n] y

Disable or Remove Avahi

The Avahi daemon implements Apple's Zeroconf architecture (also known as "Rendezvous" or "Bonjour"). The daemon registers local IP addresses and static services using mDNS/DNS-SD.

In 2011, a denial of service vulnerability was discovered in the avahi-daemon. While this CVE is quite old and low in severity, it illustrates how attackers on a local network find vulnerabilities in networking protocols and manipulate running services on a target's device.

If you don't plan on interacting with Apple products or services on other devices, avahi-daemon can be disabled using the following sudo systemctl disable avahi-daemon command.

~$ sudo systemctl disable avahi-daemon

Synchronizing state of avahi-daemon.service with SysV service script with /lib/systemd/systemd-sysv-install.
Executing: /lib/systemd/systemd-sysv-install disable avahi-daemon
Removed /etc/systemd/system/dbus-org.freedesktop.Avahi.service.
Removed /etc/systemd/system/sockets.target.wants/avahi-daemon.socket.

Avahi can also be completely removed with sudo apt purge avahi-daemon.

~$ sudo apt purge avahi-daemon

Reading package lists... Done
Building dependency tree
Reading state information... Done
The following packages will be REMOVED:
   avahi-daemon* (0.7-3.1ubuntu1)
   avahi-utils* (0.7-3.1ubuntu1)
   libnss-mdns* (0.10-8ubuntu1)
0 upgraded, 0 newly installed, 3 to remove and 0 not upgraded.
After this operation, 541 kB disk space will be freed.
Do you want to continue? [Y/n] y

Step 3: Defend Against Port Abuse

An amateur hacker might try to exfiltrate data on port 1337 or create a reverse shell on port 4444 (literally listed on Wikipedia as Metasploit's default port). A firewall that only allows outgoing transmissions on a handful of ports will stop leet h4x0rz dead in their tracks.

To manage port allowances, we'll use UFW, a program that aims to provide an easy to use interface while configuring firewalls. UFW literally stands for Uncomplicated FireWall. It acts as an Iptables (packet filtering) frontend and is not intended to provide complete firewall functionality, but instead an easy way to add or remove simple rules.

1. Deny All Incoming & Outgoing Connections

Use the sudo ufw enable command to enable UFW.

~$ sudo ufw enable

Firewall is active and enabled on system startup

Disallow all incoming connections with the following.

~$ sudo ufw default deny incoming

Next, disallow all forward connections:

~$ sudo ufw default deny forward

And then disallow all outgoing connections:

~$ sudo ufw default deny outgoing

At this point, you won't be able to access the internet using Firefox or any other application.

2. Find Your Wireless Interface

To allow outgoing connections, you'll first need to find your Wi-Fi adapter's name using the ifconfig -a command.

~$ ifconfig -a

enp0s8: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.1.44  netmask 255.255.255.0  broadcast 192.168.1.255
        ether e8:e1:e8:c2:bc:b9  txqueuelen 1000  (Ethernet)
        RX packets 631  bytes 478024 (478.0 KB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 594  bytes 60517 (60.5 KB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
        device interrupt 16  base 0xd040

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 259  bytes 17210 (17.2 KB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 259  bytes 17210 (17.2 KB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

I'm using Ubuntu in VirtualBox for this demo, so my interface name is "enp0s8." Using the ifconfig command, your wireless interface may appear as "wlp3s0," "wlp42s0," or something similar.

3. Create Firewall Exceptions & Configure a Secure DNS Resolver

Allow DNS, HTTP, and HTTPS traffic out on the wireless interface using the following three commands.

~$ sudo ufw allow out on <interface> to 1.1.1.1 proto udp port 53 comment 'allow DNS on <interface>'
~$ sudo ufw allow out on <interface> to any proto tcp port 80 comment 'allow HTTP on <interface>'
~$ sudo ufw allow out on <interface> to any proto tcp port 443 comment 'allow HTTPS on <interface>'

The "1.1.1.1" address in the DNS command is CloudFlare's new privacy-focused DNS resolver. Many internet users don't realize that even if you're viewing a website using encrypted transmissions (little green lock in the URL bar), ISPs can still see every domain name you visit through DNS requests. Using CloudFlare's DNS resolver will help prevent Internet Service Providers (ISPs) from snooping on your traffic.

4. Update the Network Manger DNS Configuration

After setting the UFW rules, in the Network Manager, "Edit" your Wi-Fi connection and change the DNS field to 1.1.1.1. Disconnect and reconnect to the Wi-Fi network for the DNS changes to take effect.

636657394881036493.jpg

View the newly created rules using the sudo ufw status numbered command.

~$ sudo ufw status numbered

Status: active

     To                         Action      From
     --                         ------      ----
[ 1] 1.1.1.1 53/udp             ALLOW OUT   Anywhere on enp0s8         (out) # allow DNS on enp0s8
[ 2] 443/tcp                    ALLOW OUT   Anywhere on enp0s8         (out) # allow HTTPS on enp0s8
[ 3] 80/tcp                     ALLOW OUT   Anywhere on enp0s8         (out) # allow HTTP on enp0s8

Ubuntu will be able to make standard HTTP/HTTPS requests on ports 80 and 443 on the wireless interface you specified. If these rules are too strict for day-to-day activity, allow all outgoing packets using the below command.

~$ sudo ufw default allow outgoing

5. Monitor the Firewall

If you're trying to debug incoming or outgoing connections, use the tail command with the -f argument to follow UFW log messages and discrepancies in real time. The command would be tail -f /var/log/ufw.log.

~$ tail -f /var/log/ufw.log

kernel: [ 3900.250931] [UFW BLOCK] IN= OUT=enp0s8 SRC=192.168.1.44 DST=104.193.19.59 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=47090 DF PROTO=TCP SPT=35944 DPT=9999 WINDOW=29200 RES=0x00 SYN URGP=0
kernel: [ 3901.280089] [UFW BLOCK] IN= OUT=enp0s8 SRC=192.168.1.44 DST=104.193.19.59 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=47091 DF PROTO=TCP SPT=35944 DPT=9999 WINDOW=29200 RES=0x00 SYN URGP=0

In the above logs, UFW is blocking outgoing connections (OUT=) from my local IP address (192.168.1.44) to the Null Byte server (104.193.19.59), using TCP with a destination port (DPT) of 9999. This can be resolved using the below UFW command.

~$ sudo ufw allow out on <interface> from 192.168.1.44 to 104.193.19.59 proto tcp port 9999

For more on UFW, use the man ufw command to view the manual and available options.

~$ man ufw

Readers interested in firewalling on a granular level should check out Arch Linux's wiki on Iptables.

Step 4: Defend Against Packet Sniffers & Cookie Hijacking

Packet manipulation attacks on hostile networks can be prevented by using a virtual private network (VPN). VPNs offer a suite of technologies that:

  • Prevent hackers on Wi-Fi networks from manipulating and spying on your activity.
  • Prevent internet service providers (ISP) like Verizon and AT&T from spying on your activity and selling your data to third parties.
  • Allow for censorship evasion where ISPs or network firewalls prevent access to certain websites.

Most premium VPN services start at around $5 a month. Some noteworthy VPN providers include: ProtonVPN, Mullvad, VyprVPN, and Private internet Access.

Next Up: Application Hardening & Sandboxing

That's it for hardening your presence and activity on hostile networks. In the following article, we'll learn a bit about sandboxing applications and securing our system in the event a malicious program is executed on the device. After that, we'll dive into auditing, using antivirus software, and monitoring system logs.

Cover image (original) by Tinh t? Photo/Flickr; Screenshots by tokyoneon/Null Byte (unless otherwise noted)

Comments

No Comments Exist

Be the first, drop a comment!