Recon Montreal
|
|
|
- MargaretMargaret Patrick
- 10 years ago
- Views:
Transcription
1 How to develop a rootkit for Broadcom NetExtreme network cards Guillaume Delugré Sogeti / ESEC R&D guillaume(at)security-labs.org Recon Montreal
2 . Delugré How to develop a rootkit for Broadcom NetExtreme network cards 2/46 Plan 1 2
3 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 3/46 The targeted device
4 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 4/46 Previous work Targeted hardware Broadcom NetExtreme family of Ethernet cards Widely used on laptops, home computers, servers... MAC components MIPS CPU (executing firmware) Non-volatile EEPROM memory (firmware, config... ) Volatile SRAM memory (code, stack, packet buffers... ) Previous work Developed a set of tools to reverse engineer NetExtreme firmware Full access to ROM, EEPROM and SRAM in software Debugging of the firmware in real time from userland EEPROM write access, code execution at bootstrap
5 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 5/46 InVivo debugger interface (powered by Metasm)
6 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 6/46 Firmware development Firmware development Firmware developed in C, very few MIPS assembly required Replacing the proprietary Broadcom firmware? Also a nice place to hide a rootkit Remote access for an attacker Access to physical memory over PCI
7 . Delugré How to develop a rootkit for Broadcom NetExtreme network cards 7/46 Plan 1 2
8 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 8/46 So what now? Thinking of a plan Now we can load and execute firmware code in the NIC Where do we go from here? Common beliefs The firmware is responsible for processing network frames The firmware controls everything in the NIC
9 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 8/46 So what now? Thinking of a plan Now we can load and execute firmware code in the NIC Where do we go from here? Common beliefs The firmware is responsible for processing network frames The firmware controls everything in the NIC WRONG!
10 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 9/46 In real life Here is the real story The firmware initializes the NIC (low-level stuff) It would possibly handle special features (WoL, PXE... ) if requested Once the NIC is ready to be used by driver, the firmware stalls its execution The End. In a nutshell Firmware almost does nothing Much of the work is directly inlined in hardware
11 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 9/46 In real life Here is the real story The firmware initializes the NIC (low-level stuff) It would possibly handle special features (WoL, PXE... ) if requested Once the NIC is ready to be used by driver, the firmware stalls its execution The End. In a nutshell Firmware almost does nothing Much of the work is directly inlined in hardware
12 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 10/46 So what now? The challenge So we got code execution on something which does nothing How can we turn this something to really do something? That is the real topic of this presentation Requested features We want to communicate remotely with the firmware We want to do arbitrary DMAs to physical memory Need to gain control over the Ethernet link and the DMA engines from firmware
13 . Delugré How to develop a rootkit for Broadcom NetExtreme network cards 11/46 Plan 1 2
14 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 12/46 Two options 1 Let the firmware run and hook its execution flow afterwards 2 Rewrite the whole firmware initialization sequence
15 Hooking the firmware execution flow Hooking the firmware execution flow Much more easy and efficient It is possible without modifying the firmware code/data Original firmware can optionaly load other firmware Just burn the firmware and a special flag in the EEPROM The original firmware will automatically load yours after init Just a little thing to take care of You cannot directly rewrite the code which is loading the firmware (it will obviously crash) Load a trampoline code at a higher address Jump on it and rewrite the original firmware from there G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 13/46
16 Rewriting the whole firmware bootstrap routine Rewriting the firmware initialization sequence If you feel sport... Quick way: trace all the I/O accesses and replay them I started reversing the whole thing, but it uses a lot of undocumented registers Fun fact The EEPROM header is CRC32-checked by ROM code The ROM code for BCM5721 is bugged Firstly, CRC32 algorithm is wrongly implemented Performs CRC over the whole header, including the CRC field Compares with a static constant inlined in the assembly code Bruteforce the CRC32 field until it matches the constant... G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 14/46
17 . Delugré How to develop a rootkit for Broadcom NetExtreme network cards 15/46 Plan 1 2
18 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 16/46 Objective We want to establish a communication channel with a remote attacker But the default firmware cannot do that... ASF Alert Standard Format A special firmware from Broadcom is dedicated to remote management System can be halted/rebooted remotely SNMP heartbeats are regularly sent over the network How does it do that?!
19 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 17/46 ASF firmware Reversing the ASF firmware This Broadcom firmware is actually a complete hack Makes use of an integrated QoS feature to catch special packets (ASF) Makes use of a poorly documented register to forge network frames (SNMP heartbeats)
20 . Delugré How to develop a rootkit for Broadcom NetExtreme network cards 18/46 QoS in network card Quality of service A few models of cards supports integrated QoS Incoming packets are placed into different queues depending on their data Although most models supposedly don t support it, the registers are still here Mechanism 1 Up to 8 rules can be set up (logical conditions) 2 If a packet matches a rule, the RX flow is halted 3 An interrupt is sent to the MIPS CPU 4 Firmware can then inspect packet or even modify it 5 Packet can be dropped or passed to the OS
21 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 19/46 Hooking the RX flow
22 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 20/46 Forging packets How to send packets from the firmware? ASF firmware makes use of a poorly documented register Some undocumented structures are set up in NIC memory Those structures contain chunks of packet data A pointer to the structures list is put into the register The packet magically appears on the network! Reproducing the trick The thing was to understand those structures I found very similar ones defined in a very old driver C header They were never referenced in the code, no reason to be here Probably a wrong copy-paste from Broadcom developers...
23 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 21/46 Forging packets
24 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 22/46 Summary at this point Communication over the network So now I can catch any incoming packet and I can also forge new ones Consequently I can remotely communicate with the NIC Can we also intercept the TX flow? The answer is no, at least not easily No similar QoS thing exists for the outgoing packets The driver can request TCP segmentation off-loading by firmware But no driver actually does that... We will come back to this feature later however
25 Final step for network processing Networking setup Firmware only knows its own MAC address We need the gateway MAC, our own IP, maybe the DNS server IP... Detecting the network configuration Rootkit has its own IP/UDP stack Embeds a lightweight DHCP client If no DHCP server on LAN, catches DNS responses and extract MAC gateway, our own IP, DNS IP... A fake MAC address can also be used to simulate a ghost machine on the LAN G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 23/46
26 . Delugré How to develop a rootkit for Broadcom NetExtreme network cards 24/46 Plan 1 2
27 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 25/46 Getting DMAs to work Next step! We can communicate with the firmware remotely. Cool. But it would be quite pointless if we couldn t attack the OS For this, we need to be able to do arbitrary DMAs to physical memory DMA Packets are exchanged between the driver and the NIC through DMA over PCI Everything is automatized, firmware does not interfere To hack the DMA engines, we need to delve into the NIC internals
28 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 26/46 NIC internals Exchanging packets between NIC and the driver A buffer is described by a Buffer Descriptor structure (BD) Pointer to data in physical memory Length of data Some optional flags for the NIC Buffer descriptors are organized into Ring Buffers NIC and driver use a consumer/producer design pattern Example: Packet send (TX) Here, driver = producer and NIC = consumer Driver produces a BD, increments producer index NIC fetches the pending BD, then packet data NIC increments its consumer index, and so on
29 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 27/46 TX process
30 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 28/46 NIC internals Example: Packet reception (RX) RX process is a little more complicated, uses two rings One with BDs pointing to preallocated memory One with BDs pointing to packet data Driver produces BDs with preallocated memory NIC consumes those BDs when a packet is received NIC copies packet in preallocated memory and produces a new BD Driver consumes the BD and finds the packet data in memory Producer and consumer indexes for each ring must be consistent on the driver and NIC sides
31 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 29/46 RX process
32 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 30/46 Status block Status block The NIC keeps track of its indexes into a Status Block structure The NIC regularly DMAs this structure to the driver Driver checks if some packets are pending for reception if sent packets have been properly processed (then it can free their memory)
33 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 31/46 Subverting the NIC DMA Buffer descriptors point to physical memory To achieve arbitrary DMAs, we need to corrupt Buffer Descriptors just in time For write access, corruption of BDs in the RX ring For read access, corruption of BDs in the TX ring Strong constraints BDs have to be corrupted just in time NIC and driver must keep working normally We will begin with the DMA writes which are much simpler to achieve
34 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 32/46 DMA write Principle for DMA write Impact We can interrupt the RX flow with the QoS trick Firmware corrupts the current BD in NIC memory Makes it point to an arbitrary address in physical memory Firmware modifies the packet contents in NIC memory Firmware then resumes the RX flow Arbitrary data is then DMAed to arbitrary address Driver sees an invalid packet, but keeps on working We can write between 4 and 1500 (MTU) bytes to physical memory in one shot
35 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 33/46 DMA write
36 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 34/46 DMA read DMA read DMA read is much more difficult to achieve, but still feasible The problem is we cannot interrupt the TX flow as for RX So we will simulates a TX event from firmware makes it trigger an interruption to the MIPS CPU Everything will be done using only DMA writes TCP segmentation feature TX process can be interrupted if a special flag is set in the BD Firmware can then offload TCP segmentation from the host CPU Driver never sets this flag by default, so we ll do it ourselves
37 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 35/46 DMA read Principle for DMA read Impact Corrupt the current BD in TX ring with DMA write Modify the address/length of data Set the TCP segmentation bit Trigger a TX event Register is not accessible from the MIPS CPU Emits a DMA write to the NIC itself to bypass that We can do this because we have access to the PCI BAR0 Arbitrary memory is DMAed to the NIC TCP segmentation interrupts the MIPS CPU Firmware appends network headers to data, resumes TX flow Arbitrary data is sent over the wire
38 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 36/46 DMA read
39 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 37/46 DMA read We are not done yet After experimentation, a packet with physical memory does appear on network HURRAY! Then the driver miserably crashes... What happened? The NIC has consumed a BD the driver has never produced We have Index NIC == Index driver + 1 Driver does see this, enters some recovery routine which crashes the whole thing We must resynchronize the driver with the NIC
40 Resynchronization technique #1 Resynchronization technique #1 Driver won t crash if we prevent the Status Block from being DMAed The ring buffer is usually made of 512 BD entries We use the same technique to trigger 512 DMA reads in a row At this time we have gone around the full ring to our initial point We can resume Status Block updating, driver and NIC are now resynchronized Drawback Triggers 512 DMA reads, quite a waste if we just want a few bytes G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 38/46
41 Resynchronization technique #2 Edge case behaviour We actually have Index NIC == Index driver + 1 If we block the Status Block update, driver will still see Index NIC == Index driver So if a new packet is sent, driver will do Index driver + 1, which equals to Index NIC Nothing happens on the NIC side, but the driver is resynchronized We can try to force the driver to send a packet (which will never be processed) Idea Fake the reception of an ARP request packet to the driver ARP reply will be automatically sent G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 39/46
42 Resynchronization technique #2 Faking a packet reception We have to fake the arrival of the ARP request, but we cannot let the Status Block being updated (or the driver will crash) Methodology: Block the Status Block updating process Replace a packet data with a fake ARP request packet Inject a fake Status Block in physical memory (RX index incremented) Send an interrupt to the driver to fake the packet arrival ARP reply is sent, discarded, and driver is resynchronized Restore the Status Block updating process G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 40/46
43 Resynchronization technique #2 Faking a packet reception We have to fake the arrival of the ARP request, but we cannot let the Status Block being updated (or the driver will crash) Methodology: Block the Status Block updating process Replace a packet data with a fake ARP request packet Inject a fake Status Block in physical memory (RX index incremented) Send an interrupt to the driver to fake the packet arrival ARP reply is sent, discarded, and driver is resynchronized Restore the Status Block updating process G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 41/46
44 Resynchronization technique #2 Triggering an interrupt from firmware If standard interrupts are used, then assert the PCI #INTA line If MSI are used (e.g. over PCI-Express) then Emits a DMA write to the APIC at 0xffe0xxxx This will trigger a Message Signaled Interrupt (MSI) We know the exact address and vector to use since it has been assigned to us by the chipset This information can be found in the PCI configuration space APIC will then send the right IRQ to the driver (no spurious interrupt) Advantage After all this, we have triggered only one DMA read This technique is much more hardcore, but it spares us from triggering 512 DMA reads in a row G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 42/46
45 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 43/46 Conclusion on DMA Bypassing inherent limitations Firmware was initially not meant to control the DMA engines DMA writes are yet achievable in a very stable way At first glance DMA reads looked unfeasible... The presented techniques make it possible using only DMA writes at predictable addresses No configured IOMMU was supposed to be present Remote DMA Rootkit offers read/write primitives to physical memory to the remote attacker Small and independent from the underlying operating system Intelligence has to reside on the client side
46 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 44/46 Conclusion In a nutshell... Getting code execution on the NIC is NOT the end of the game A lot of trickery is needed to turn the firmware into a malicious payload Rootkit can communicate with the attacker over the network R/W access primitives to physical memory are provided Security considerations Rootkit is active even if the machine is shutdown Rootkit can corrupt physical memory during the system boot Need for a trusted boot sequence coupled with a properly configured IOMMU
47 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 45/46 References References My talks about reverse engineering the Broadcom firmware (Hack.lu 2010, HITB 2011) Can you still trust your network card, Y-A. Perez, L. Duflot (CSW 2010) Runtime firmware integrity verification, Y-A. Perez, L. Duflot (CSW 2011)
48 G. Delugré How to develop a rootkit for Broadcom NetExtreme network cards 46/46 Thank you for your attention! Questions?
Putting it on the NIC: A Case Study on application offloading to a Network Interface Card (NIC)
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCNC 2006 proceedings. Putting it on the NIC: A Case Study on application
Programming Interface. for. Bus Master IDE Controller. Revision 1.0
Programming Interface for Bus Master IDE Controller Revision 1.0 5/16/94 Until this specification is ratified, it is solely owned and maintained by: Brad Hosler, Intel Corporation [email protected] (please
Embedded devices as an attack vector
[email protected] Computer Laboratory University of Cambridge 21C3 1 Embedded devices Threat model Aims 2 Why use embedded devices? Why is using embedded devices hard? Reverse engineering techniques
TCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to
Introduction to TCP Offload Engines By implementing a TCP Offload Engine (TOE) in high-speed computing environments, administrators can help relieve network bottlenecks and improve application performance.
Guardian: Hypervisor as Security Foothold for Personal Computers
Guardian: Hypervisor as Security Foothold for Personal Computers Yueqiang Cheng, Xuhua Ding Singapore Management University (SMU) The International Conference on Trust & Trustworthy Computing (TRUST),
Using the CoreSight ITM for debug and testing in RTX applications
Using the CoreSight ITM for debug and testing in RTX applications Outline This document outlines a basic scheme for detecting runtime errors during development of an RTX application and an approach to
Hello and welcome to this presentation of the STM32L4 Firewall. It covers the main features of this system IP used to secure sensitive code and data.
Hello and welcome to this presentation of the STM32L4 Firewall. It covers the main features of this system IP used to secure sensitive code and data. 1 Here is an overview of the Firewall s implementation
OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R
OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
Exploring the Remote Access Configuration Utility
Exploring the Remote Access Configuration Utility in Ninth-Generation Dell PowerEdge Servers The Remote Access Configuration Utility supports local and remote server management in ninth-generation Dell
Hello, and welcome to this presentation of the STM32 SDMMC controller module. It covers the main features of the controller which is used to connect
Hello, and welcome to this presentation of the STM32 SDMMC controller module. It covers the main features of the controller which is used to connect the CPU to an SD card, MMC card, or an SDIO device.
Wireshark in a Multi-Core Environment Using Hardware Acceleration Presenter: Pete Sanders, Napatech Inc. Sharkfest 2009 Stanford University
Wireshark in a Multi-Core Environment Using Hardware Acceleration Presenter: Pete Sanders, Napatech Inc. Sharkfest 2009 Stanford University Napatech - Sharkfest 2009 1 Presentation Overview About Napatech
Security Overview of the Integrity Virtual Machines Architecture
Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling
Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308
Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308 Laura Knapp WW Business Consultant [email protected] Applied Expert Systems, Inc. 2011 1 Background
Introduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
Internetworking and IP Address
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology
3. The Lagopus SDN Software Switch Here we explain the capabilities of the new Lagopus software switch in detail, starting with the basics of SDN and OpenFlow. 3.1 SDN and OpenFlow Those engaged in network-related
FRONT FLYLEAF PAGE. This page has been intentionally left blank
FRONT FLYLEAF PAGE This page has been intentionally left blank Abstract The research performed under this publication will combine virtualization technology with current kernel debugging techniques to
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
Virtual Private Systems for FreeBSD
Virtual Private Systems for FreeBSD Klaus P. Ohrhallinger 06. June 2010 Abstract Virtual Private Systems for FreeBSD (VPS) is a novel virtualization implementation which is based on the operating system
Yukon FE+ 88E8040. PCI Express Fast Ethernet Controller with Embedded NV Memory for LOM Applications. Product Brief
Cover Yukon FE+ 88E8040 PCI Express Fast Ethernet Controller with Embedded NV Memory for LOM Applications Product Brief Doc. No. MV-S105427-00, Rev. B September 26, 2008 Marvell. Moving Forward Faster
Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
CSC 2405: Computer Systems II
CSC 2405: Computer Systems II Spring 2013 (TR 8:30-9:45 in G86) Mirela Damian http://www.csc.villanova.edu/~mdamian/csc2405/ Introductions Mirela Damian Room 167A in the Mendel Science Building [email protected]
Configuring Your Computer and Network Adapters for Best Performance
Configuring Your Computer and Network Adapters for Best Performance ebus Universal Pro and User Mode Data Receiver ebus SDK Application Note This application note covers the basic configuration of a network
Operating System Overview. Otto J. Anshus
Operating System Overview Otto J. Anshus A Typical Computer CPU... CPU Memory Chipset I/O bus ROM Keyboard Network A Typical Computer System CPU. CPU Memory Application(s) Operating System ROM OS Apps
Gigabit Ethernet Design
Gigabit Ethernet Design Laura Jeanne Knapp Network Consultant 1-919-254-8801 [email protected] www.lauraknapp.com Tom Hadley Network Consultant 1-919-301-3052 [email protected] HSEdes_ 010 ed and
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Red Hat Linux Internals
Red Hat Linux Internals Learn how the Linux kernel functions and start developing modules. Red Hat Linux internals teaches you all the fundamental requirements necessary to understand and start developing
ROM Monitor. Entering the ROM Monitor APPENDIX
APPENDIX B This appendix describes the Cisco router ROM monitor (also called the bootstrap program). The ROM monitor firmware runs when the router is powered up or reset. The firmware helps to initialize
CCNA 2 Chapter 5. Managing Cisco IOS Software
1 CCNA 2 Chapter 5 Managing Cisco IOS Software The default source for Cisco IOS Software depends on the hardware platform; most commonly, though, the router looks to the configuration commands that are
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
AT-2916SX AT-2931SX AT-2972SX AT-2972SX/2 AT-2972T/2
Advanced Control Suite Gigabit Ethernet Network Adapters AT-2916SX AT-2931SX AT-2972SX AT-2972SX/2 AT-2972T/2 User s Guide 613-000492 Rev. C Copyright 2007 Allied Telesis, Inc. All rights reserved. No
A very short history of networking
A New vision for network architecture David Clark M.I.T. Laboratory for Computer Science September, 2002 V3.0 Abstract This is a proposal for a long-term program in network research, consistent with the
vsphere Networking vsphere 6.0 ESXi 6.0 vcenter Server 6.0 EN-001391-01
vsphere 6.0 ESXi 6.0 vcenter Server 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more
Analysis of Open Source Drivers for IEEE 802.11 WLANs
Preprint of an article that appeared in IEEE conference proceeding of ICWCSC 2010 Analysis of Open Source Drivers for IEEE 802.11 WLANs Vipin M AU-KBC Research Centre MIT campus of Anna University Chennai,
IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances
HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances Introduction............................................................ 2 What is Virtualization?....................................................2
I/O Attacks in Intel-PC Architectures and Countermeasures
I/O Attacks in Intel-PC Architectures and Countermeasures Fernand Lone Sang, Vincent Nicomette and Yves Deswarte Laboratoire d Analyse et d Architecture des Systèmes LAAS-CNRS Toulouse, France July 6,
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
C-GEP 100 Monitoring application user manual
C-GEP 100 Monitoring application user manual 1 Introduction: C-GEP is a very versatile platform for network monitoring applications. The ever growing need for network bandwith like HD video streaming and
Operating Systems Design 16. Networking: Sockets
Operating Systems Design 16. Networking: Sockets Paul Krzyzanowski [email protected] 1 Sockets IP lets us send data between machines TCP & UDP are transport layer protocols Contain port number to identify
PIKA HMP 3.0 High Level API Programmer's Guide
Copyright (c) 2011. All rights reserved. Table of Contents 1 Copyright Information 1 2 Contacting PIKA Technologies 2 3 Introduction 3 3.1 Purpose and Scope 4 3.2 Assumed Knowledge 4 3.3 Related Documentation
Dell EqualLogic Red Hat Enterprise Linux 6.2 Boot from SAN
Dell EqualLogic Red Hat Enterprise Linux 6.2 Boot from SAN A Dell EqualLogic best practices technical white paper Storage Infrastructure and Solutions Engineering Dell Product Group November 2012 2012
How to Setup Bare Metal Adaxa Suite Demonstration Box
How to Setup Bare Metal Adaxa Suite Demonstration Box Level 1 616 St Kilda Road Melbourne Victoria 3004 T:1-300-990-120 Email: [email protected] Web: www.adaxa.com Table of Contents Pre-Requisites 1.1 Hardware
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
FIPS 140-2 Security Policy 3Com Embedded Firewall PCI Cards
FIPS 140-2 Security Policy 3Com Embedded Firewall PCI Cards 3Com Corporation 5403 Betsy Ross Drive Santa Clara, CA 95054 USA February 24, 2006 Revision Version 0.4 Page 1 of 15 1. Introduction The following
Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona [email protected] Copyright
Storm Worm & Botnet Analysis
Storm Worm & Botnet Analysis Jun Zhang Security Researcher, Websense Security Labs June 2008 Introduction This month, we caught a new Worm/Trojan sample on ours labs. This worm uses email and various phishing
Debugging A MotoHawk Application using the Application Monitor
CONTROL SYSTEM SOLUTIONS Debugging A MotoHawk Application using the Application Monitor Author(s): New Eagle Consulting 3588 Plymouth Road, #274 Ann Arbor, MI 48105-2603 Phone: +1 (734) 929-4557 Ben Hoffman
Operating Systems 4 th Class
Operating Systems 4 th Class Lecture 1 Operating Systems Operating systems are essential part of any computer system. Therefore, a course in operating systems is an essential part of any computer science
CGL Architecture Specification
CGL Architecture Specification Mika Karlstedt Helsinki 19th February 2003 Seminar paper for Seminar on High Availability and Timeliness in Linux University of Helsinki Department of Computer science i
Code Injection From the Hypervisor: Removing the need for in-guest agents. Matt Conover & Tzi-cker Chiueh Core Research Group, Symantec Research Labs
Code Injection From the Hypervisor: Removing the need for in-guest agents Matt Conover & Tzi-cker Chiueh Core Research Group, Symantec Research Labs SADE: SteAlthy Deployment and Execution Introduction
Bridging the Gap between Software and Hardware Techniques for I/O Virtualization
Bridging the Gap between Software and Hardware Techniques for I/O Virtualization Jose Renato Santos Yoshio Turner G.(John) Janakiraman Ian Pratt Hewlett Packard Laboratories, Palo Alto, CA University of
Introduction to Analyzer and the ARP protocol
Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining
Optimizing Network Virtualization in Xen
Optimizing Network Virtualization in Xen Aravind Menon EPFL, Lausanne [email protected] Alan L. Cox Rice University, Houston [email protected] Willy Zwaenepoel EPFL, Lausanne [email protected]
POACHER TURNED GATEKEEPER: LESSONS LEARNED FROM EIGHT YEARS OF BREAKING HYPERVISORS. Rafal Wojtczuk <[email protected]>
POACHER TURNED GATEKEEPER: LESSONS LEARNED FROM EIGHT YEARS OF BREAKING HYPERVISORS Rafal Wojtczuk Agenda About the speaker Types of hypervisors Attack surface Examples of past and
10/100/1000Mbps Ethernet MAC with Protocol Acceleration MAC-NET Core with Avalon Interface
1 Introduction Ethernet is available in different speeds (10/100/1000 and 10000Mbps) and provides connectivity to meet a wide range of needs from desktop to switches. MorethanIP IP solutions provide a
Sockets vs. RDMA Interface over 10-Gigabit Networks: An In-depth Analysis of the Memory Traffic Bottleneck
Sockets vs. RDMA Interface over 1-Gigabit Networks: An In-depth Analysis of the Memory Traffic Bottleneck Pavan Balaji Hemal V. Shah D. K. Panda Network Based Computing Lab Computer Science and Engineering
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
INTRUDER DETECTION MONITORING APPLICATION USING SNMP PROTOCOL
8-02 Intruder Detection Monitoring Application Using Snmp Protocol INRUDER DEECION MONIORING APPLICAION USING SNMP PROOCOL Vicky Hanggara 1, ransiscus Ati Halim 2, Arnold Aribowo 3 1,2,3 Computer System
Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
H0/H2/H4 -ECOM100 DHCP & HTML Configuration. H0/H2/H4--ECOM100 DHCP Disabling DHCP and Assigning a Static IP Address Using HTML Configuration
H0/H2/H4 -ECOM100 DHCP & HTML 6 H0/H2/H4--ECOM100 DHCP Disabling DHCP and Assigning a Static IP Address Using HTML 6-2 H0/H2/H4 -ECOM100 DHCP DHCP Issues The H0/H2/H4--ECOM100 is configured at the factory
EKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes
Dynamic Host Configuration Protocol (DHCP) 1 1 Dynamic Assignment of IP addresses Dynamic assignment of IP addresses is desirable for several reasons: IP addresses are assigned on-demand Avoid manual IP
User Guide. SUSIAccess. Remote Device Management
User Guide SUSIAccess Remote Device Management Edition 2.0 May 10 2012 Part. No. 200EMBSA01 Printed in Taiwan 2 Advantech SUSIAccess User Manual ADVANTECH SUSIACCESS USER MANUAL... 3 1. SOLUTION OVERVIEW...
Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam
Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Application Protocols for TCP/IP Administration
Application Protocols for TCP/IP Administration BootP, TFTP, DHCP Agenda BootP TFTP DHCP BootP, TFTP, DHCP, v4.4 2 Page 60-1 BootP (RFC 951, 1542, 2132) BootP was developed to replace RARP capabilities
Virtual KNX/EIB devices in IP networks
WEINZIERL ENGINEERING GmbH WEINZIERL ENGINEERING GMBH F. Heiny, Dr. Y. Kyselytsya, Dr. Th. Weinzierl Bahnhofstr. 6 D-84558 Tyrlaching Tel. +49 (0) 8623 / 987 98-03 E-Mail: [email protected] Web: www.weinzierl.de
Subverting the Xen hypervisor
Subverting the Xen hypervisor Rafał Wojtczuk Invisible Things Lab Black Hat USA 2008, August 7th, Las Vegas, NV Xen 0wning Trilogy Part One Known virtulizationbased rootkits Bluepill and Vitriol They install
Tools for Attacking Layer 2 Network Infrastructure
Tools for Attacking Layer 2 Network Infrastructure Kai-Hau Yeung, Dereck Fung, and Kin-Yeung Wong Abstract Data Link layer is considered as the weakest link in a secured network. If an initial attack comes
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
PCI-SIG SR-IOV Primer. An Introduction to SR-IOV Technology Intel LAN Access Division
PCI-SIG SR-IOV Primer An Introduction to SR-IOV Technology Intel LAN Access Division 321211-002 Revision 2.5 Legal NFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,
VLAN for DekTec Network Adapters
Application Note DT-AN-IP-2 VLAN for DekTec Network Adapters 1. Introduction VLAN (Virtual LAN) is a technology to segment a single physical network into multiple independent virtual networks. The VLANs
Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Network Terminology Review
Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized
The irnetbox Manager User Guide
The irnetbox Manager User Guide Chris Dodge RedRat Ltd April 2014 For irnetbox Manager 3.05 1 Contents 1. Introduction...3 2. Initial Network Configuration...3 3. Finding irnetboxes...3 3.1 Device Information
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
Remote Supervisor Adapter II. User s Guide
Remote Supervisor Adapter II User s Guide Remote Supervisor Adapter II User s Guide Note: Before using this information and the product it supports, read the general information in Appendix B, Notices,
Layered Architectures and Applications
1 Layered Architectures and Applications Required reading: Garcia 2.1, 2.2, 2.3 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Why Layering?! 3 Montreal London Paris Alice wants to send a mail to Bob and
Introduction to Embedded Systems. Software Update Problem
Introduction to Embedded Systems CS/ECE 6780/5780 Al Davis logistics minor Today s topics: more software development issues 1 CS 5780 Software Update Problem Lab machines work let us know if they don t
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1
Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain
OneCommand NIC Teaming and VLAN Manager
OneCommand NIC Teaming and VLAN Manager Version 2.0.3 for Windows Server 2003 Windows Server 2008 Windows Server 2008 R2 User Manual P005238-01A Rev. A One Network. One Company. Connect with Emulex. Copyright
HDHomeRun Troubleshooting Guide (20090415)
HDHomeRun Troubleshooting Guide (20090415) HDHomeRun Software release 20090415 contains enhancements and improvements used in this guide. Please download and install the latest HDHomeRun software: http://www.silicondust.com/downloads
Design Issues in a Bare PC Web Server
Design Issues in a Bare PC Web Server Long He, Ramesh K. Karne, Alexander L. Wijesinha, Sandeep Girumala, and Gholam H. Khaksari Department of Computer & Information Sciences, Towson University, 78 York
