Router and Switch Presentation

20
Router and Switch Security By: Kulin Shah Krunal Shah

description

 

Transcript of Router and Switch Presentation

Page 1: Router and Switch Presentation

Router and Switch Security

By:Kulin Shah

Krunal Shah

Page 2: Router and Switch Presentation

LAB GOAL

• This lab will introduce students to the concept of security of network devices

• Few attacks on routers as well as switches and their countermeasures

Page 3: Router and Switch Presentation

PHYSICAL ACCESS COMPROMISE

• We will use the virtual XP machine and one Cisco router and switch on the playstation to carry out the attack.

• we assume that the attacker has physical access to the router • Connect a console cable from routers console port to the serial port

of the computer • Configure the settings are as shown below• Set "Bits per second" to 9600 • Set "Data Bits" to 8• Set "Stop Bits" to 1 • Set "Flow control" to none

Page 4: Router and Switch Presentation

Router break-in

• Send a break signal to the router within 60 seconds of the power up

• will put the router into the ROM monitor (ROMMON) mode. The break sequence would depend on your terminal emulation program. The break signal for the HyperTerminal is (CTRL-BREAK)

• So basically aim is to make it boot from the ROM than the NVRAM

Page 5: Router and Switch Presentation

*** System received an abort due to Break Key ***

signal= 0x3, code= 0x500, context= 0x813ac158PC = 0x802d0b60, Vector rommon 1 > confreg 0x2142 

 rommon 2 > reset 

System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)Copyright (c) 1999 by cisco Systems, Inc.TAC:Home:SW:IOS:Specials for infoC2600 platform with 32768 Kbytes of main memory  program load complete, entry point: 0x80008000, size: 0x6fdb4c Self decompressing the image : ######################################################################################################################################################################################################################################################## [OK]

Page 6: Router and Switch Presentation

• Copy the NVRAM config file into RAM with copy start run

• Whoa!!• Counter measure : block the break signal dropping an attacker into

ROMMON on a Cisco router using

no service password-recovery command

Page 7: Router and Switch Presentation

PVLAN on CISCO SWITCHES

• Primarily to achieve isolation without going through the pain of creating VLANS

• Multiple IPs not required

Page 8: Router and Switch Presentation

Lab set up for PVLAN

Page 9: Router and Switch Presentation

EXECUTION

Page 10: Router and Switch Presentation

HTTP AUTHENTICATION VULNERABILITY

• When the HTTP server is enabled and local authorization is used on Cisco device.

• It is possible, to bypass the authentication and execute any command on the device.

• All commands will be executed with the highest privilege (level 15).

• All releases of Cisco IOS software, starting with release 11.3 and later, are vulnerable.

Page 11: Router and Switch Presentation

ATTACK EXECUTION

• By sending a particular URL to a Cisco IOS device with the HTTP server enabled, a remote attacker may be able to execute commands with the administrator privileges. The malicious URL is of the following form:

• http://<address>/level/XX/exec/...

• XX is a number between 16 & 99.

• This vulnerability is documented as Cisco Bug ID CSCdt93862

Page 12: Router and Switch Presentation

VULNERABLE PRODUCTS

Cisco devices that may be running with affected Cisco IOS software releases include but are not limited to:

• Cisco routers in the AGS/MGS/CGS/AGS+, IGS, RSM, 800, ubr900, 1000, 1400, 1500, 1600, 1700, 2500, 2600, 3000, 3600, 3800, 4000, 4500, 4700, AS5200, AS5300, AS5800, 6400, 7000, 7100, 7200, ubr7200, 7500, and 12000 series.

• Most recent versions of the LS1010 ATM switch.

• The Catalyst 6000 and 5000 if they are running Cisco IOS software.

• The Catalyst 2900XL and 3500XL LAN switch only if it is running Cisco IOS software.

• The Catalyst 2900 and 3000 series LAN switches are affected.

Page 13: Router and Switch Presentation

COUNTERMEASURES

• Upgrading IOS to 12.0 or later

• Disabling HTTP

• Terminal Access Controller Access Control System (TACACS+) or Remote Authentication Dial in Service (Radius) for authentication.

Page 14: Router and Switch Presentation

MACOF ATTACK

• When a Layer 2 switch receives a frame, the switch looks in the CAM table for the destination MAC address.

• If an entry exists for the MAC address in the CAM table, the switch forwards the frame to the port designated in the CAM table for that MAC address.

• If no entry exists for the MAC address the frame, the switch looks at the source of the frame and adds it to CAM table entry.

• And the frame is essentially broadcasted on each and every port. This is the mechanism switches used to build their CAM table.

Page 15: Router and Switch Presentation

ATTACK EXECUTION

• CAM overflow

Page 16: Router and Switch Presentation

ATTACK SUCCESSFUL

Page 17: Router and Switch Presentation

COUNTERMEASURES

• If no protection against MAC address spoofing is setting up, this attack could succeed.

• By protecting the interface with “switchport port-security maximum 3”

• The port shut down after having seen the third different MAC address.

• Thus this attack has been defeated.

Page 18: Router and Switch Presentation

CONCLUSION

• We have exploited some of the vulnerabilities.

• Due to the ignorance and lack of knowledge of the system administrator it is easy to exploit many such vulnerabilities prevalent in the network devices.

• This lab aims to educate students about the threats and vulnerabilities existing in the network devices.

Page 19: Router and Switch Presentation

REFERENCES• www.askapache.com• www.tech-faq.com• www.antionline.com• www.cisco.com• www.securityfocus.com/infocus/1734• “Virtual LAN Security: weaknesses and countermeasures GIAC Security Essentials

Practical Assignment” - Steve A. Rouiller•  “Hacking Exposed Cisco Security Secrets and Solutions”- Andrew A. Vladimirov,

Konstantin V. Gavrilenko, Janis N. Vizulis and Andrei A. Mikhailovsky• www.arin.net• http://www.cisco.com/warp/public/474/index.shtml• http://www.modemsite.com/56k/x2-hyperterm.asp• http://www.cisco.com/en/US/tech/tk389/tk390/tk181/tsd_technology_support_sub-

protocol_home.html• http://www.cisco.com/warp/public/473/63.html• http://www.brandonhutchinson.com/installing_dsniff_2_3.html

Page 20: Router and Switch Presentation

QUESTIONS??