Mahindra-British Telecom Ltd. Exploiting Layer 2 By Balwant Rathore.

Slides:



Advertisements
Similar presentations
Mitigating Layer 2 Attacks
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Common Layer 2 Attacks and Countermeasures.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Inter- VLAN Routing LAN Switching and Wireless – Chapter 6.
Virtual LANs.
Switching Topic 4 Inter-VLAN routing. Agenda Routing process Routing VLANs – Traditional model – Router-on-a-stick – Multilayer switches EtherChannel.
Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
VLANs- Chapter 3 CCNA Exploration Semester 3 Modified by Profs. Ward
Layer 2: Redundancy and High Availability Part 1: General Overview on Assignment 1.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Layer 2 Security – No Longer Ignored Security Possibilities at Layer 2 Allan Alton, BSc CISA CISSP NetAnalyst UBC October 18, 2007.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Connecting LANs, Backbone Networks, and Virtual LANs
We will be covering VLANs this week. In addition we will do a practical involving setting up a router and how to create a VLAN.
Chapter 4: Managing LAN Traffic
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching.
TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network.
– Chapter 5 – Secure LAN Switching
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VLANs.
CN2668 Routers and Switches (V2) Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
VLAN V irtual L ocal A rea N etwork VLAN Network performance is a key factor in the productivity of an organization. One of the technologies used to.
Chapter 8: Virtual LAN (VLAN)
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 7 – Secure Network Architecture and Management.
Author: Bill Buchanan. 1. Broadcast: What is the MAC address of this network address? 2. Requested host: All the hosts read the broadcast and checks.
© 2002, Cisco Systems, Inc. All rights reserved..
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 8 Virtual LANs Cisco Networking Academy.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
Switching Topic 2 VLANs.
Finish up from Monday:. Today’s Agenda…  Day 1 Switching Technologies (Chapter 2 Sybex)Switching Technologies (Chapter 2 Sybex) VIRTUAL LAN’s [VLAN’S]
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Switching in an Enterprise Network Introducing Routing and Switching in the.
Configuring VLAN Chapter 14 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Understand basic concept of VLAN  Configure.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
W&L Page 1 CCNA CCNA Training 2.5 Describe how VLANs create logically separate networks and the need for routing between them Jose Luis.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
LAN Switching Virtual LANs. Virtual LAN Concepts A LAN includes all devices in the same broadcast domain. A broadcast domain includes the set of all LAN-connected.
Cisco Implementing Cisco IP Switched Networks (SWITCH )
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Chapter 8 – Virtual LANs Virtual LANs VLAN Concepts VLAN Configuration.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 VLANs.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 VLANs.
CCNA Practice Exam Questions
Exploiting Layer 2 By Balwant Rathore.
Layer 2 Attacks and Security
Switching and VLANs.
Switching and VLANs.
– Chapter 5 – Secure LAN Switching
Chapter 5: Inter-VLAN Routing
Chapter 2: Basic Switching Concepts and Configuration
VLAN Trunking Protocol
Virtual LANs.
Cisco Real Exam Dumps IT-Dumps
Routing and Switching Essentials v6.0
Switching and VLANs.
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
Virtual LAN VLAN Trunking Protocol and Inter-VLAN Routing
Presentation transcript:

Mahindra-British Telecom Ltd. Exploiting Layer 2 By Balwant Rathore

Mahindra-British Telecom Ltd. Exploiting Layer 2 Exploiting VLANs by VLAN Hopping Exploiting CAM Table Attack Exploiting Spanning Tree Attack

Mahindra-British Telecom Ltd. Exploiting VLANs by VLAN Hopping Refreshing VLANs VLAN Hopping Attack

Mahindra-British Telecom Ltd. Refreshing VLANs What is VLAN? A broadcast domain created by one or more switches.

Mahindra-British Telecom Ltd. Why VLAN? Used to separate LANs logically in one or more switches.

Mahindra-British Telecom Ltd. Benefits of VLANs? Broadcast control Effective Bandwidth Utilisation CPU Utilisation Good Administrative Control with L3 device Access Control List Accounting Easy Movement

Mahindra-British Telecom Ltd. MAC Address Table Dynamic Address: Added by normal bridge/switch processing Permanent Address: Added via configuration, no time out Restricted-Static Address: A MAC address would be configured only with specific port.

Mahindra-British Telecom Ltd. Some facts about VLAN Max VLAN limit depends on switch model. VLAN1 is also called management VLAN CDP and VTP Adviserment are sent on VLAN1 Creation, Addition, or Deletion of VLANs is only possible in VTP server mode A layer 3 device is required for Inter VLAN communication

Mahindra-British Telecom Ltd. Trunk Port

Mahindra-British Telecom Ltd. Trunk Port... Trunk Ports has access to all VLAN by default Used to route traffic for multiple VLANs across switches It can use 802.1Q or ISL encapsulation

Mahindra-British Telecom Ltd. VLAN Hopping Attack Sample Frame Capture Insert 802.1q tag 802.1q Frames into non-trunk ports

Mahindra-British Telecom Ltd. VLAN Hopping Attack A host can spoof as a switch with ISL or 802.1Q tag

Mahindra-British Telecom Ltd. Step1: Sample Frame Capture Connect two PCs in the same VLAN of one switch. Send ICMP echo message from PC1 to PC2 Capture this with Sniffer Pro on PC 2 View packets in raw hex Start Packet generation component of sniffer pro Enter above captured packet in step 3 Send entered packet from PC1 to PC 2

Mahindra-British Telecom Ltd. Step2: Insert 802.1q tag Shift PC2 on trunk port (port 24) of switch and start Sniffer software Ping non-existent IP address from PC1 Capture ARP lookup on PC2 Shift PC1 on VLAN 2 port and repeat it VLAN1 and VLAN2 will have and tag respectively

Mahindra-British Telecom Ltd. Step3: 802.1q Frames into non- trunk ports Put PC1 on VLAN 1 switch one Put PC2 on VLAN1 of second switch Connect trunk cable between them Crafted packet from VLAN1, VLAN2 and VLAN3 was delivered to their destination VLAN

Mahindra-British Telecom Ltd. Step4: VLAN Hopping Connect PCs in different VLANs and in different switches Change VLAN IDs and send it to as many combinations as possible

Mahindra-British Telecom Ltd. In Different Switches Src VLAN | Dst VLAN | Tag ID Success? 122Yes 133Yes 211No 323No 311No

Mahindra-British Telecom Ltd. In Same Switch Src VLAN | Dst VLAN | Tag ID Success? 122No 133No 211No 323No 311No

Mahindra-British Telecom Ltd. Till today no proof of concept Tool Available Attack is not easy, require followings: Access to native VLAN Target machine is in different switch Attacker knows MAC address of the target machine Some layer 3 device for traffic from targets VLAN to back.

Mahindra-British Telecom Ltd. Safeguard Never, Never use VLAN 1 Always use a dedicated VLAN ID for all trunk ports Disable unused ports and put them in an unused VLAN Shutdown DTP on all user ports

Mahindra-British Telecom Ltd. Exploiting CAM Table

Mahindra-British Telecom Ltd. CAM Table Review Content Addressable Memory Contain MAC Address, Port and associated VLAN Have limited size Normally broadcast is limited to device port itself if the device entry is present in CAM table.

Mahindra-British Telecom Ltd. macof Use macof from Dsniff suit to overflow CAM Table Syntax Macof [-I interface] [-s src] [-d dst] [-e tha] [-x sport] [-y dport] [-n times] -n option is very important to perform exploit in control environment # sh cam count dynamic # total matching CAM entries = As CAM table is full, traffic floods to other switch on same VLAN

Mahindra-British Telecom Ltd. macof...

Mahindra-British Telecom Ltd. macof... As you know dsniff is developed for BSD not for linux It’s Installation is a pain, refer following document for Dsniff Installation over Linux e/242

Mahindra-British Telecom Ltd. Safeguard Implement Port Security Port Security Limits MAC addresses to a port. port secure max-mac-count 3 On detection of invalid MAC switch can be configured to block only invalid MAC Switch can be configured to shutdown the port

Mahindra-British Telecom Ltd. Port Security Restrict option may fail under macof load and disable the port, shutdown option is more appropriate. Consider management puzzle and performance hit Visit this for more detail on Port Security… lan/cat6000/sw_7_3/confg_gd/sec_port.htm - 34k

Mahindra-British Telecom Ltd. Exploiting Address Resolution Protocol (ARP)

Mahindra-British Telecom Ltd. Gratuitous ARP Is used by host to announce their IP address It's a broadcast packet like an ARP request

Mahindra-British Telecom Ltd. Gratuitous ARP

Mahindra-British Telecom Ltd. Safeguard Private VLANs provides protection against ARP attacks. ARPWatch is a freely available tool Consider static ARP for critical static routers and hosts Cisco is under development of an ARP firewall

Mahindra-British Telecom Ltd. Exploiting Spanning Tree

Mahindra-British Telecom Ltd. Exploiting Spanning Tree Send BPDUs using brconfig and make yourself new Root Bridge.

Mahindra-British Telecom Ltd. Exploiting Spanning Tree

Mahindra-British Telecom Ltd. Exploiting Spanning Tree

Mahindra-British Telecom Ltd. Exploiting Spanning Tree

Mahindra-British Telecom Ltd. References.

Mahindra-British Telecom Ltd. Thank You