Slide 1 - ECE Users Pages

advertisement
Router and Switch Security
By:
Kulin Shah
Krunal Shah
LAB GOAL
• This lab will introduce students to the concept of security of network
devices
• Few attacks on routers as well as switches and their countermeasures
PHYSICAL ACCESS COMPROMISE
• We will use the virtual XP machine and one Cisco router and switch
on the playstation to carry out the attack.
• we assume that the attacker has physical access to the router
• Connect a console cable from routers console port to the serial port
of the computer
• Configure the settings are as shown below
• Set "Bits per second" to 9600
• Set "Data Bits" to 8
• Set "Stop Bits" to 1
• Set "Flow control" to none
Router break-in
• Send a break signal to the router within 60 seconds of
the power up
• will put the router into the ROM monitor (ROMMON)
mode. The break sequence would depend on your
terminal emulation program. The break signal for the
HyperTerminal is (CTRL-BREAK)
• So basically aim is to make it boot from the ROM than
the NVRAM
*** System received an abort due to Break Key ***
signal= 0x3, code= 0x500, context= 0x813ac158PC = 0x802d0b60, Vector
rommon 1 > confreg 0x2142
rommon 2 > reset
System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE
(fc1)Copyright (c) 1999 by cisco Systems,
Inc.TAC:Home:SW:IOS:Specials for infoC2600 platform with 32768
Kbytes of main memory program load complete, entry point: 0x80008000,
size: 0x6fdb4c Self decompressing the image :
############################################################
############################################################
############################################################
############################################################
######## [OK]
• Copy the NVRAM config file into RAM with copy
start run
• Whoa!!
•
Counter measure : block the break signal dropping an attacker into
ROMMON on a Cisco router using
no service password-recovery command
PVLAN on CISCO SWITCHES
• Primarily to achieve isolation without going
through the pain of creating VLANS
• Multiple IPs not required
Lab set up for PVLAN
EXECUTION
HTTP AUTHENTICATION
VULNERABILITY
• When the HTTP server is enabled and
local authorization is used on Cisco
device.
• It is possible, to bypass the authentication
and execute any command on the device.
• All commands will be executed with the
highest privilege (level 15).
• All releases of Cisco IOS software, starting
with release 11.3 and later, are vulnerable.
ATTACK EXECUTION
• By sending a particular URL to a Cisco IOS
device with the HTTP server enabled, a
remote attacker may be able to execute
commands with the administrator privileges.
The malicious URL is of the following form:
• http://<address>/level/XX/exec/...
• XX is a number between 16 & 99.
• This vulnerability is documented as Cisco
Bug ID CSCdt93862
VULNERABLE PRODUCTS
Cisco devices that may be running with affected Cisco IOS software
releases include but are not limited to:
•
Cisco routers in the AGS/MGS/CGS/AGS+, IGS, RSM, 800, ubr900, 1000,
1400, 1500, 1600, 1700, 2500, 2600, 3000, 3600, 3800, 4000, 4500, 4700,
AS5200, AS5300, AS5800, 6400, 7000, 7100, 7200, ubr7200, 7500, and
12000 series.
•
Most recent versions of the LS1010 ATM switch.
•
The Catalyst 6000 and 5000 if they are running Cisco IOS software.
•
The Catalyst 2900XL and 3500XL LAN switch only if it is running Cisco IOS
software.
•
The Catalyst 2900 and 3000 series LAN switches are affected.
COUNTERMEASURES
• Upgrading IOS to 12.0 or later
• Disabling HTTP
• Terminal Access Controller Access
Control System (TACACS+) or Remote
Authentication Dial in Service (Radius) for
authentication.
MACOF ATTACK
• When a Layer 2 switch receives a frame, the switch
looks in the CAM table for the destination MAC
address.
• If an entry exists for the MAC address in the CAM
table, the switch forwards the frame to the port
designated in the CAM table for that MAC address.
• If no entry exists for the MAC address the frame, the
switch looks at the source of the frame and adds it to
CAM table entry.
• And the frame is essentially broadcasted on each and
every port. This is the mechanism switches used to
build their CAM table.
ATTACK EXECUTION
• CAM overflow
ATTACK SUCCESSFUL
COUNTERMEASURES
• If no protection against MAC address
spoofing is setting up, this attack could
succeed.
• By protecting the interface with
“switchport port-security maximum 3”
• The port shut down after having seen the
third different MAC address.
• Thus this attack has been defeated.
CONCLUSION
• We have exploited some of the
vulnerabilities.
• Due to the ignorance and lack of
knowledge of the system administrator it is
easy to exploit many such vulnerabilities
prevalent in the network devices.
• This lab aims to educate students about
the threats and vulnerabilities existing in
the network devices.
REFERENCES
•
•
•
•
•
•
•
•
•
•
•
•
•
www.askapache.com
www.tech-faq.com
www.antionline.com
www.cisco.com
www.securityfocus.com/infocus/1734
“Virtual LAN Security: weaknesses and countermeasures GIAC Security Essentials
Practical Assignment” - Steve A. Rouiller
“Hacking Exposed Cisco Security Secrets and Solutions”- Andrew A. Vladimirov,
Konstantin V. Gavrilenko, Janis N. Vizulis and Andrei A. Mikhailovsky
www.arin.net
http://www.cisco.com/warp/public/474/index.shtml
http://www.modemsite.com/56k/x2-hyperterm.asp
http://www.cisco.com/en/US/tech/tk389/tk390/tk181/tsd_technology_support_subprotocol_home.html
http://www.cisco.com/warp/public/473/63.html
http://www.brandonhutchinson.com/installing_dsniff_2_3.html
QUESTIONS??
Download