Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Backdoor into Home network through company laptop

    Scheduled Pinned Locked Moved Firewalling
    13 Posts 6 Posters 1.3k Views 5 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • 4 Offline
      4o4rh
      last edited by 4o4rh

      I just discovered my work laptop is being used as a backdoor into my home network.
      I had the device on the guest network, with it bypassing my VPN (as work has its own pulseVPN).

      Nevertheless, when the work PC is not connected to their VPN, I had a few ports open e.g. web browsing.

      It seems they have been probing my network from the inside (most likely when the PulseVPN has been down) as they contacted my managed about having the 3rd party vpn installed on my laptop (which it is not - the vpn is a client connection on my pfsense).

      Can someone advise how best to ensure they have no access to any other internal part of the network inc the firewall and only the PulseVPN will be passed through. It is of course no surprise the company is from a country that is renowned for do as I say, not as I do.

      JKnottJ NogBadTheBadN 2 Replies Last reply Reply Quote 0
      • JKnottJ Offline
        JKnott @4o4rh
        last edited by

        @gwaitsi

        I don't know where you are, but in many places that would be illegal.

        Regardless, if that computer is connected to your local network, there's not much pfsense can do, beyond blocking whatever they're connecting to.

        Perhaps you should only connect to your guest network and have your rules set up to not allow anything to the main network. That's what I do here. I have my work computer connected to my guest WiFi and my rules do not allow any access to my main network or even pfsense, other than ping the interface.

        Here are my guest WiFi rules:

        df08c412-1cae-41db-92c5-925e7c94b60e-image.png

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        4 1 Reply Last reply Reply Quote 0
        • 4 Offline
          4o4rh @JKnott
          last edited by

          @jknott it's unbelievable. It is a criminal offence with jail time in my country, but that has never stopped my employer's country from creating their own set of rules for themselves ;-)

          I have created a vlan with a single ip and blocked everything on the lan side excep 443 access to the vpn servers and dhcp/dns on the pfsense.

          I will give them conditional approval to do testing. Try to get some free penetration testing results

          why do you have the block ipv4+6 at the top? I have;

          • allow IP4 work_laptop port 443 to work_vpn * gw_wan
          • reject IP4/6 * * * *

          do i have the order wrong?

          M JKnottJ 3 Replies Last reply Reply Quote 0
          • M Offline
            mer @4o4rh
            last edited by

            @gwaitsi Order of the rules as shown in the GUI is "first match wins" so if a packet matches your IPV4 from work_laptop port 443 to work_vpn rule, the reject IPV4/6 is never evaluated.

            1 Reply Last reply Reply Quote 0
            • JKnottJ Offline
              JKnott @4o4rh
              last edited by

              @gwaitsi

              I use block IPv4 & IPv6 because I have both on my network and am just covering all bases.

              As for your connection, a guest LAN, such as mine, should be all you need and you could still have other guests on it. As I mentioned, my work computer is on my guest VLAN, so they could probe all they want and won't find anything. I have OpenVPN on my main network.

              BTW, I was just looking at some stuff from my work computer. I'm currently doing training for Avaya IP Office unified communications and so was using Packet Capture to see what it was doing. Likewise, you could use it to see what snooping is going on.

              PfSense running on Qotom mini PC
              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
              UniFi AC-Lite access point

              I haven't lost my mind. It's around here...somewhere...

              4 1 Reply Last reply Reply Quote 0
              • JKnottJ Offline
                JKnott @4o4rh
                last edited by

                @gwaitsi said in Backdoor into Home network through company laptop:

                why do you have the block ipv4+6 at the top? I have;

                allow IP4 work_laptop port 443 to work_vpn * gw_wan
                reject IP4/6 * * * *

                do i have the order wrong?

                As mentioned above, rules are run in order until first match. So, I first allowed ping to the interface. I then blocked the specific IPv4 and IPv6 addresses and finally allowed access out to the Internet.

                PfSense running on Qotom mini PC
                i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                UniFi AC-Lite access point

                I haven't lost my mind. It's around here...somewhere...

                4 1 Reply Last reply Reply Quote 0
                • 4 Offline
                  4o4rh @JKnott
                  last edited by

                  @jknott yeh, so my order is correct right.
                  only allow out the specific vpn for the specific device. block everything else to lan or wan.

                  1 Reply Last reply Reply Quote 0
                  • 4 Offline
                    4o4rh @JKnott
                    last edited by 4o4rh

                    @jknott said in Backdoor into Home network through company laptop:

                    my work computer is on my guest VLAN, so they could probe all they want and won't find anything.

                    Problem is, I had both my work laptop and my wife's laptop on the same guest network. So my work penetration testing, could have potentially hit my wife's work. Then the question comes, who is legally liable - punishable by 2yrs here. Now it will put them both on separate isolated vlans so no chance of this happening again

                    JKnottJ V 2 Replies Last reply Reply Quote 0
                    • JKnottJ Offline
                      JKnott @4o4rh
                      last edited by

                      @gwaitsi

                      Why is your wife's computer on the guest LAN? Don't you trust her? 😉

                      My guest WiFi is used for guests, work computer and TV. The only reason the TV is on it is because it can't handle the 63 character password I use on my main SSID.

                      PfSense running on Qotom mini PC
                      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                      UniFi AC-Lite access point

                      I haven't lost my mind. It's around here...somewhere...

                      4 1 Reply Last reply Reply Quote 0
                      • 4 Offline
                        4o4rh @JKnott
                        last edited by 4o4rh

                        @jknott said in Backdoor into Home network through company laptop:

                        Why is your wife's computer on the guest LAN? Don't you trust her?

                        of course i meant her work laptop. i didn't think anything of it, because they both require company vpns, but in hindsight, probably should have isolated them from day 1

                        1 Reply Last reply Reply Quote 0
                        • NogBadTheBadN Offline
                          NogBadTheBad @4o4rh
                          last edited by NogBadTheBad

                          @gwaitsi said in Backdoor into Home network through company laptop:

                          I had the device on the guest network, with it bypassing my VPN (as work has its own pulseVPN).

                          It might be an application on the laptop itself talking back to the office, I quite often see snort throw up a warning about the Zscaler application on my work laptop about http being run over port 443 regardless if I'm connected via pulse or not.

                          If you're that worried about it place the laptop in a protected port on your switch if you can, so the only l2 device it can talk to is the gateway.

                          Andy

                          1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                          1 Reply Last reply Reply Quote 0
                          • Cool_CoronaC Offline
                            Cool_Corona
                            last edited by

                            Give the DHCP lease a static IP and make rules for the mentioned IP.

                            Block everything for the IP except access to the internet.

                            First rule basis.... put it on top.

                            1 Reply Last reply Reply Quote 0
                            • V Offline
                              viragomann @4o4rh
                              last edited by

                              @gwaitsi said in Backdoor into Home network through company laptop:

                              Problem is, I had both my work laptop and my wife's laptop on the same guest network. So my work penetration testing, could have potentially hit my wife's work.

                              I assume, your guest network is a Wifi. Most wireless access points have the capability to block communication between stations connected to it within the same SSID.
                              It's a good advise to activate this option on a guest network as there should be no need to access any other device.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.