Bypass a VPN, ACL, and VLAN ECE 4112 Alaric Craig and Pritesh Patel.

Slides:



Advertisements
Similar presentations
Mitigating Layer 2 Attacks
Advertisements

LAN Segmentation Virtual LAN (VLAN).
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Inter- VLAN Routing LAN Switching and Wireless – Chapter 6.
Virtual LANs.
VLAN KRISHNAKUMAR RAJENDRAN NIKITA PATEL TEJENDRA PATEL Guided by Prof, Edmund Gean.
Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They.
VLANs Virtual LANs CIS 278.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
Bellevue University CIS 341A Final Review. The test Monday, August 4, Question multiple choice, True/False, and fill in the blanks. You have the.
VLANs (Virtual LANs) CS 158B Elaine Lim Allison Nham.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Layer 2: Redundancy and High Availability Part 1: General Overview on Assignment 1.
© Wiley Inc All Rights Reserved. CCNA: Cisco Certified Network Associate Study Guide CHAPTER 8: Virtual LANs (VLANs)
Routing ROUTING. Router A router is a device that determines the next network point to which a packet should be forwarded toward its destination Allow.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
We will be covering VLANs this week. In addition we will do a practical involving setting up a router and how to create a VLAN.
Sybex CCNA Chapter 9: VLAN’s Instructor & Todd Lammle.
CCENT Study Guide Chapter 11 VLANs and Inter-VLAN Routing.
Ethernet Errors and Problems
1 Lecture #6 Switch – VLAN Asst.Prof. Dr.Anan Phonphoem Department of Computer Engineering, Faculty of Engineering, Kasetsart University, Bangkok, Thailand.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 8 – PIX Security Appliance Contexts, Failover, and Management.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel.
Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
Semester 3, v Chapter 3: Virtual LANs
Instructor & Todd Lammle
Sybex CCNA Chapter 11: VLAN’s Instructor & Todd Lammle.
– Chapter 5 – Secure LAN Switching
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
Router and Routing Basics
VLAN V irtual L ocal A rea N etwork VLAN Network performance is a key factor in the productivity of an organization. One of the technologies used to.
Chapter 8: Virtual LAN (VLAN)
Routing ROUTING Presented by Aditya Kumar Gupta Lecturer, Department of Computer Application SMS Varanasi.
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
© 2002, Cisco Systems, Inc. All rights reserved..
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching 3.0.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 8 Virtual LANs Cisco Networking Academy.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
W&L Page 1 CCNA CCNA Training 2.7 Configure and verify trunking on Cisco switches Jose Luis Flores / Amel Walkinshaw Aug, 2015.
Switching Topic 2 VLANs.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Protecting Against VLAN Attacks.
Virtual Local Area Networks (VLANs) Part II
Configuring VLAN Chapter 14 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Understand basic concept of VLAN  Configure.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
W&L Page 1 CCNA CCNA Training 2.5 Describe how VLANs create logically separate networks and the need for routing between them Jose Luis.
OSI Model Topology Patch cable Flow control Common layer 2 device Best path Purpose of Layer 2 devices.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
+ Lecture#8: VLAN Asma AlOsaimi Topics VLAN Segmentation VLAN Implementation VLAN Security and Design 3.0.
Chapter 11 VLANs and Inter-VLAN Routing
Instructor & Todd Lammle
Chapter 5: Inter-VLAN Routing
Virtual LANs.
Routing and Switching Essentials v6.0
Chapter 3: Implementing VLAN Security
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
CCNA 3 v3 JEOPARDY Module 9 CCNA3 v3 Module 9 K. Martin.
Virtual LAN VLAN Trunking Protocol and Inter-VLAN Routing
Presentation transcript:

Bypass a VPN, ACL, and VLAN ECE 4112 Alaric Craig and Pritesh Patel

Goal  Bypass three layers of security VPN VPN Router ACLs Router ACLs VLAN VLAN  Effectively, an outsider could bring an internal network down with a DOS.

Method  Exploit authenticated remote machine  Use the established VPN tunnel  Send traffic that bypasses Router ACLs and cross VLANs.

How  Use Sub7 to create a backdoor to the remote machine.  From remote machine, use existing vpn tunnel to communicate inside the network.  Now have access, perform VLAN Hopping attack.

Sub 7  Trojan Horse use to gain root level access  Many fun modules Keylogging Keylogging Enable telnet and ftp Enable telnet and ftp Tic tac toe Tic tac toe Realistic Matrix Realistic Matrix

In our case

VPN Bypassed  Once into the remote machine, telnet to VLAN 1 machine. A send vlan hopping traffic  VPN’s used: Cisco VPN concentrator and OpenVpn. Once connection setup, the prompt can be used to send traffic to the internal machine.

VLANs  Virtual Local Area Networks  A logical grouping of devices or users  Users can be grouped by function, department, application, regardless of physical segment location  VLAN configuration is done at the switch (Layer 2)

VLAN Membership  Static VLAN Assignment - Port based membership: Membership is determined by the port on the switch on determined by the port on the switch on not by the host. not by the host.  Dynamic VLAN Assignment - Membership is determined by the host’s MAC address. Administrator has to MAC address. Administrator has to create a database with MAC addresses and create a database with MAC addresses and VLAN mappings VLAN mappings

VLAN Communication VLANS cannot communicate with each other VLANS cannot communicate with each other even when they exist on the same switch For VLANS to communicate they must pass through a router For VLANS to communicate they must pass through a router Each VLAN is required to have at least one gateway to route packets in and out of the network Each VLAN is required to have at least one gateway to route packets in and out of the network

VLAN Trunking  Trunking allows us to cascade multiple switches using the trunk ports to interconnect them  Trunk ports act as a dedicated path for each VLAN between switches  The trunk port is a member of all configured VLANs

VLAN Tagging  Two dominant tagging technologies: - Inter Switch Link (ISL) (Cisco Proprietary - Inter Switch Link (ISL) (Cisco Proprietary Technology) Technology) - IEEE 802.1q (Industry Adopted - IEEE 802.1q (Industry Adopted Standard) Standard)

VLAN Network Setup

Access Control List Router ACLs: Standard IP access list ADMIN 10 permit , wildcard bits permit , wildcard bits permit , wildcard bits permit , wildcard bits deny any log 30 deny any log Extended IP access list ACCT 10 permit icmp any any echo-reply 10 permit icmp any any echo-reply 20 deny ip deny ip permit ip permit ip deny ip any any log 40 deny ip any any log Extended IP access list IT 10 permit icmp any any echo-reply (24 matches) 10 permit icmp any any echo-reply (24 matches) 90 deny ip deny ip deny ip deny ip deny ip any any log 110 deny ip any any log

ACL Demonstration

Switch Default Configuration  Dynamic Trunking Protocol (DTP) automates ISL/802.1q trunk configurations  DTP States: On: "I want to be a trunk and I don't care what you think!" State used when the other switch does not understand DTP. On: "I want to be a trunk and I don't care what you think!" State used when the other switch does not understand DTP. Off: "I don't want to be a trunk and I don't care what you think!" State used when the configured port is not intended to be a trunk port. Off: "I don't want to be a trunk and I don't care what you think!" State used when the configured port is not intended to be a trunk port. Desirable: "I'm willing to become a VLAN trunk; are you interested?" State used when the switch is interested in being a trunk. Desirable: "I'm willing to become a VLAN trunk; are you interested?" State used when the switch is interested in being a trunk. Auto: "I'm willing to go with whatever you want!" This is the default on many switches. Auto: "I'm willing to go with whatever you want!" This is the default on many switches. Non-Negotiate: "I want to trunk, and this is what kind of trunk I will be!“ Non-Negotiate: "I want to trunk, and this is what kind of trunk I will be!“  Native VLAN set to VLAN 1

VLAN Hopping Attacks  These attacks are designed to allow the attacker to bypass the Layer 3 device  The attack takes advantage of incorrectly configured trunk ports on network switches

VLAN Hopping Attacks  Basic VLAN Hopping Attack 1. Attacker fools switch into thinking that he is a switch that needs trunking he is a switch that needs trunking 2. The attack needs a trunking favorable setting such as Auto to succeed 3. The attacker is now a member of all 3. The attacker is now a member of all trunked VLANs on the switch and he send and receive data on those VLANs send and receive data on those VLANs

VLAN Hopping Attacks  Double Encapsulated VLAN Hopping Attack 1. Switches perform only one level of IEEE 802.1q decapsulation 802.1q decapsulation 2. This allows the attacker to specify a.1q 2. This allows the attacker to specify a.1q tag inside the frame, allowing the frame tag inside the frame, allowing the frame to go to a VLAN that the outer tag did to go to a VLAN that the outer tag did specify. specify. 3. This attack works even if Trunk ports are 3. This attack works even if Trunk ports are set to OFF set to OFF

Identification of VLAN Tags Using Ethereal VLAN Tag n nn

VLAN Hopping Attack Using Tcpreplay