{"id":630,"date":"2021-08-30T15:44:14","date_gmt":"2021-08-30T14:44:14","guid":{"rendered":"https:\/\/www.labtinker.net\/?p=630"},"modified":"2021-08-30T15:44:14","modified_gmt":"2021-08-30T14:44:14","slug":"blessings-and-curses","status":"publish","type":"post","link":"http:\/\/18.135.13.153\/?p=630","title":{"rendered":"Mixed Blessings"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">I recently wanted to find a reliable way of testing the sandboxing facility on a particular security device in a safe and controlled fashion. To test anti-virus systems you can you use an eicar file but this won&#8217;t trigger a sandbox. Someone recommended the site <em>7blessings.co.uk<\/em>  which creates dummy malware with a unique hash which, the theory goes, your AV won&#8217;t recognise and bat along to your sandboxing facility which should then attempt to detonate said malware, allowing you to confirm its efficacy. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">I had no access to a non-prod environment for the sandboxing system I was trying to test and it doesn&#8217;t have an easily accessible virtual equivalent so I decided to see if 7blessings would trigger Palo Alto&#8217;s sandboxing offering, Wildfire. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The lab was the simple set up below with the Windows 2019 host browsing out through a Palo Alto (PAN OS 10.0.7)<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"535\" height=\"304\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/08\/image-7.png\" alt=\"\" class=\"wp-image-646\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/08\/image-7.png 535w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/08\/image-7-300x170.png 300w\" sizes=\"auto, (max-width: 535px) 100vw, 535px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The firewall rule allowing internet traffic out had the following profile set up. I only enabled the Anti-Virus part of the NG abilities of the firewall (though it is set up to SSL intercept &#8211; we&#8217;ve got to give it chance!)<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"544\" height=\"423\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/AV-Setup.png\" alt=\"\" class=\"wp-image-649\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/AV-Setup.png 544w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/AV-Setup-300x233.png 300w\" sizes=\"auto, (max-width: 544px) 100vw, 544px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">For the <em>Lab-AV<\/em>  Anti-Virus Profile I copied the default profile but turned off the associated Wildfire Machine Learning capability to avoid confusion (not altogether successfully!)<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"898\" height=\"308\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-8.png\" alt=\"\" class=\"wp-image-657\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-8.png 898w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-8-300x103.png 300w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-8-768x263.png 768w\" sizes=\"auto, (max-width: 898px) 100vw, 898px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">So I expected to block an Eicar file which triggers &#8216;traditional&#8217; hash-based anti-virus but not 7blessings&#8217; sandbox malware test file (<a href=\"http:\/\/7blessings.co.uk\/malware.php#pafish\">http:\/\/7blessings.co.uk\/malware.php#pafish<\/a>) which in the site&#8217;s own words is:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-1-1024x86.png\" alt=\"\" class=\"wp-image-650\" width=\"840\" height=\"70\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-1-1024x86.png 1024w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-1-300x25.png 300w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-1-768x64.png 768w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-1.png 1346w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">So trying with the EICAR files (<a href=\"https:\/\/www.eicar.org\/?page_id=3950\">https:\/\/www.eicar.org\/?page_id=3950<\/a>):<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"566\" height=\"111\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-2.png\" alt=\"\" class=\"wp-image-651\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-2.png 566w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-2-300x59.png 300w\" sizes=\"auto, (max-width: 566px) 100vw, 566px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">From the left the first, third and fourth links got blocked with standard warnings&#8230;.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"798\" height=\"339\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-3.png\" alt=\"\" class=\"wp-image-652\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-3.png 798w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-3-300x127.png 300w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-3-768x326.png 768w\" sizes=\"auto, (max-width: 798px) 100vw, 798px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The third one sailed through which I didn&#8217;t expect. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"614\" height=\"80\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-4.png\" alt=\"\" class=\"wp-image-653\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-4.png 614w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-4-300x39.png 300w\" sizes=\"auto, (max-width: 614px) 100vw, 614px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">I didn&#8217;t have all shields up in having a cut down security profile so I parked this and move on to trying to download the sandbox testing malware file (<a href=\"http:\/\/7blessings.co.uk\/pafish.php\">http:\/\/7blessings.co.uk\/pafish.php<\/a>). This got blocked by standard AV&#8230; <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"875\" height=\"333\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-5.png\" alt=\"\" class=\"wp-image-654\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-5.png 875w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-5-300x114.png 300w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-5-768x292.png 768w\" sizes=\"auto, (max-width: 875px) 100vw, 875px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">And I could see this in the Palo&#8217;s Threat log&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"615\" height=\"173\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-7.png\" alt=\"\" class=\"wp-image-656\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-7.png 615w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-7-300x84.png 300w\" sizes=\"auto, (max-width: 615px) 100vw, 615px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">We were possibly been defeated by a payload based signature. (<a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-a-payload-based-signature\">https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-a-payload-based-signature<\/a>) Kudos to Palo<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">I didn&#8217;t actually set out to test the Palo itself but just find a reliable generic sandbox testing website which I could use with another product. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This is actually moot for a Palo as they provide their own way of testing their sandbox: (<a href=\"https:\/\/docs.paloaltonetworks.com\/wildfire\/8-1\/wildfire-admin\/submit-files-for-wildfire-analysis\/verify-wildfire-submissions\/test-a-sample-malware-file\">https:\/\/docs.paloaltonetworks.com\/wildfire\/8-1\/wildfire-admin\/submit-files-for-wildfire-analysis\/verify-wildfire-submissions\/test-a-sample-malware-file<\/a>)<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Returning to the eicar sample that sailed through earlier, I decided to raise all the Palo&#8217;s shield and try again&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"794\" height=\"385\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-9.png\" alt=\"\" class=\"wp-image-658\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-9.png 794w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-9-300x145.png 300w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-9-768x372.png 768w\" sizes=\"auto, (max-width: 794px) 100vw, 794px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">&#8230;and this time it was blocked&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"848\" height=\"317\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-10.png\" alt=\"\" class=\"wp-image-659\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-10.png 848w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-10-300x112.png 300w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/09\/image-10-768x287.png 768w\" sizes=\"auto, (max-width: 848px) 100vw, 848px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">I then decided to go back to my first set up with just the <em>Lab-AV<\/em> anti-virus profile enabled in the security profile and found that now the file was still being successfully blocked. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The firewall&#8217;s AV signatures had not been updated and the cache had been cleared on the browser. Could the device itself be keeping a cache of elements it had previously blocked? (irrespective of which anti-malware component had done the blocking). I rebooted the firewall but the file remained resolutely blocked. There may have been human error involved somewhere but I cannot fathom it; in the initial test the eicar files were opened on adjacent tabs on the same machine: three were blocked, one wasn&#8217;t. I will perhaps try and repeat this exercise another day.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Often a lab can raise more questions than it answers&#8230; these feels like one of those!<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I recently wanted to find a reliable way of testing the sandboxing facility on a particular security device in a safe and controlled fashion. To test anti-virus systems you can you use an eicar file but this won&#8217;t trigger a sandbox. Someone recommended the site 7blessings.co.uk which creates dummy malware with a unique hash which, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-630","post","type-post","status-publish","format-standard","hentry","category-firewalls"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"http:\/\/18.135.13.153\/index.php?rest_route=\/wp\/v2\/posts\/630","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/18.135.13.153\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/18.135.13.153\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/18.135.13.153\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/18.135.13.153\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=630"}],"version-history":[{"count":0,"href":"http:\/\/18.135.13.153\/index.php?rest_route=\/wp\/v2\/posts\/630\/revisions"}],"wp:attachment":[{"href":"http:\/\/18.135.13.153\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/18.135.13.153\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=630"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/18.135.13.153\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}