Just found this group and hope to make a few new friends here, looks like civil discussion unlike others. Didn’t see an intro thread but my background is over 15 years in Nuclear IT/cyber security and the past 2 as a SysAdmin in a private K-12 school system running a hybrid Windows/Office356/Google shop.
Searched here for other posts on this topic and was hoping to re-spark some conversation, maybe get some feedback and help other frustrated K-12 SysAdmins.
Recently (again) the high school students discovered the proxy bypass extensions for chrome like UltraSurf, BetterNet, HotSpot Shield, etc… and I have been struggling to find a way to detect and block this traffic through the firewall. SonicWall / LightSpeed setup and I have a Snort IDS box monitoring everything in/out from a mirrored port.
Does anyone have a solution for detection? or know of any rules for Snort that will detect this traffic? I’ve exhaustively searched with no luck.
Here’s what I currently do which may help others in the same boat.
Normally get a report from a teacher of a student browsing something they shouldn’t be.
I’ll run a remote script to dump the folder list of the chrome extensions to a text file to a shared directory.
dir C:\Users\username\AppData\Local\Google\Chrome\User Data\Default\Extensions\ > V:\MappedDrive%COMPUTERNAME%_%USERNAME%.txt
After I get the list, open with Notepad++ , copy the column of numbers and paste the cryptic extension IDs (ex. heajfgnegopeedndeahkdjedjkjcmnpb) into a spreadsheet to lookup the name for the extension. The spreadsheet uses a lookup table of all the extensions and extension names I found on student computers, it’s a living document.
Anyone know of a master database of extensions anywhere?
Once the bypass extension is known I use active directory to “search” for that extension folder on all computers and write a new folder to a shared location with the extensionname_computername_username.
The shared folder permissions and Write for authenticated users, and Full access for domain admins.
The following should copy all the folder contents but it doesn’t so it works nice as a notification.
GPO Editor / Extensions Policy
Users Configuration > Preferences > Windows Settings > Files
Add new file
Action - Update
Source - C:\Users%username%\AppData\Local\Google\Chrome\User Data\Default\Extensions\heajfgnegopeedndeahkdjedjkjcmnpb*
Destination - \server\sharedfolder$\HotSpotShield_%COMPUTERNAME%_%username%\
After a few days of building this list I’ll dump the contents of found users to another spreadsheet that makes a big script to automate an extension directory dump to text to my mapped drive. I then look for the folder creation date of the extension ID for a report.
I put together a nice report containing StudentName, ComputerName, ExtensionName, and FolderCreationDate for the Vice Principal who then disciplines the students. Warnings, detentions, and fines.
Once this is done I add the extension ID to a Chrome Extension Blacklist GPO, block it in my Google admin console, and then delete the folder using active directory.
GPO BlackList Policy
Users Configuration > Preferences > Windows Settings > Folders
Add new folder
Action - Delete
Path - C:\Users%username%\AppData\Local\Google\Chrome\User Data\Default\Extensions\heajfgnegopeedndeahkdjedjkjcmnpb
This normally breaks the internet on the Windows 10 chrome browser and they usually show up in the IT office to have it fixed where I need to go into chrome settings and “disconnect the Google Account”.
Internet comes back and then I make sure they log back in with the school google account.
That’s my method of madness. It was a little work up front but goes pretty quick now.
I’m working on going to a whitelist approach for extensions but haven’t done so yet.
Questions? Comments? Suggestions? Clarifications? anything will help.