that's 4 vulnerabilities in 2 different #k12 products.
yes, 2. 1 in #goguardian and one in #contentkeeper #cloud interesting isin't it?
I did not mean to find that goguaridnan one, but guess what? I did!
shows you how easy it is to get around this, isn't it? the problem is we normally want the easy #filtering #bypass part, when we can use more advanced methods to get around #content #filtering .
I, in particular, look for the vulnerabilities in these k12 software noone tells you about. the vulnerabilities not found on YouTube, on odysee, or these other ones.
and I guess I found 4 of those lol
welp, #k12 #sysadmins , I found a new #vulnerability of #contentkeeper #cloud AKA CK-Express TP extension client side.
the new vulnerability still evolves around DNS, but still works either way.
I have moved to enterprise cloud flare gateway and modified a DNS configuration.
the problem with blocking is it still goes someware.
so let me tell you an even better solution for this: DNS remapping!
specifically, remapping all requests to contentkeeper.net and it's related subdomains to 0.0.0.0 which means CK doesn't even know what it doesn't connect to.
again, fokes, this is why you don't use client side agents for web filtering!
this is not a good idea!
again, you're trusting contentkeeper will be able to connect without a single problem.
the problem with the last flaw was that it attempted to display a block page. but this? this is even better because it can't do anything at all, even during the first initialization process ,it will simply think the device is completely offline with no network connection.
and like the last one that simply blocked rather than remapped, it gives a device not supported error.
it still needs to be on first reinitialization, but this will work.
here's how it works.
first, a user makes a DNS request not to block, but to remap, DNS entries from contentkeeper.net to 0.0.0.0 . ideally, also connections to contentkeeper.com, goguardian.com, and some other services to the same IP (this is completely possible to do on cloud flares end in 1 policy) but that's out of the scope of this.
next, they point to their DNS string which cloud flare has assigned them, or, if it has a static DNS IP, point to that.
of course, again, it needs to point on startup, either through the signin screen or before opening chrome. even better, turn off the wifi for a bit, go to the settings of the saved networks, then from there change the nameservers, bam!
and once done, if CK-ETP attempts to start, it will not work.
yes, I have found a nother #security vulnerability which is even better than reblock.
#cybersecurity #security #webfiltering #cipa #contentkeeper
Cloudflare One

Cloudflare One replaces legacy security perimeters with our global edge, making the Internet faster and safer for teams around the world.

welp, the school is fucked once again.
a few months ago, if you remember, I reported a #vulnerability in CK-Express TP that allows for, during installation, a bypass by making CKETP think it is not compatible with your device. well now it just got a lot easier. in fact, before then I thought you had to turn your wifi off and on every second or2. but what if you could just do the easiest thing in the world? leave it alone!
that's right.
turn off the wifi during the installation process, wait for at least 5minutes totle, bam. you didn't even have to do much and you just bypassed the #web #filtering system.
now to be fare, the Chromebook has to be completely knew, with no already configured CKETP instance on the client. or, it has to be completely factory reset. here's how it works. a user logs into the device, presumably, for the first time, or for the first time prior to reset.
they go to Google.com while the ck-express TP extension is installed.
CK will start initialization.
during this time, you turn off the wifi, and leave it off for 5minutes.
turn it back on, and you should get a compatibility error message.
you just bypassed CK-express and now have unfettered access to the internet.
I don't have any midigations for schools, as there are wa lot of ways to power wash a device, especially a chromeOS device like a Chromebook.
#cybersecurity #sysadmin #k12 #cipa #contentkeeper