CONTENTS. Foundations. Case Study: The Black Hat Hassle Acknowledgments Introduction



Similar documents
Network Security and Firewall 1

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Cisco ASA, PIX, and FWSM Firewall Handbook

The Trivial Cisco IP Phones Compromise

IINS Implementing Cisco Network Security 3.0 (IINS)

Securing Cisco Network Devices (SND)

Build Your Own Security Lab

CYBERTRON NETWORK SOLUTIONS

Implementing Cisco IOS Network Security

Linux Network Security

Building Secure Network Infrastructure For LANs

Troubleshooting and Maintaining Cisco IP Networks Volume 1

Specialized Programme on Internetworking Design and LAN WAN Administration

Tim Bovles WILEY. Wiley Publishing, Inc.

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Course Contents CCNP (CISco certified network professional)

Securing end devices

Cisco Configuring Commonly Used IP ACLs

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Executive Summary. AUGUST 2002 Secure Use of VLANs: Security Assessment

ASM Educational Center (ASM) Est. 1992

- Introduction to PIX/ASA Firewalls -

Architecture Overview

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

CCIE Security Written Exam ( ) version 4.0

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Table of Contents. Introduction

Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router Firewalls. Intrusion Detection Systems

Securing Networks with PIX and ASA

Networking: EC Council Network Security Administrator NSA

CS5008: Internet Computing

General Network Security

Exam Questions SY0-401

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Securing E-Commerce. Agenda. The Security Problem IC Security: Key Elements Designing and Implementing _06_2000_c1_sec3

Cisco Certified Network Expert (CCNE)

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Understanding Security Testing

8 steps to protect your Cisco router

Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking

information security and its Describe what drives the need for information security.

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Interconnecting Cisco Networking Devices Part 2

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Cisco Networking Professional-6Months Project Based Training

- Basic Router Security -

Vulnerability Assessment and Penetration Testing

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Top-Down Network Design

Blended Security Assessments

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

(d-5273) CCIE Security v3.0 Written Exam Topics

Basics of Internet Security

Why Is MPLS VPN Security Important?

"Charting the Course...

Basic & Advanced Administration for Citrix NetScaler 9.2

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION


Juniper / Cisco Interoperability Tests. August 2014

IMPLEMENTING CISCO SWITCHED NETWORKS V2.0 (SWITCH)

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

PROFESSIONAL SECURITY SYSTEMS

C)PTC Certified Penetration Testing Consultant

NetBrain Workstation Professional Edition 2.3 Release notes

State of Texas. TEX-AN Next Generation. NNI Plan

Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009

Testing Network Security Using OPNET

Network Security: Introduction

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

Cyber Essentials. Test Specification

INFORMATION SECURITY TRAINING CATALOG (2015)

Web Application Security

Secure Software Programming and Vulnerability Analysis

CISCO IOS NETWORK SECURITY (IINS)

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

NSFOCUS Web Application Firewall White Paper

Cisco Which VPN Solution is Right for You?

Network Security Fundamentals

How To Understand and Configure Your Network for IntraVUE

Who is Watching You? Video Conferencing Security

Troubleshooting an Enterprise Network

Configuring the Transparent or Routed Firewall

Working knowledge of TCP/IP protocol Suite IPX/SPX protocols Suite, MCSE or CNE or experienced in supporting a LAN environment.

Security Toolsets for ISP Defense

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

IPv6 Security Best Practices. Eric Vyncke Distinguished System Engineer

Cisco Certified Security Professional (CCSP)

INTRUSION DETECTION SYSTEMS and Network Security

Chapter 8 Security Pt 2

CCT vs. CCENT Skill Set Comparison

Transcription:

CONTENTS Foreword Case Study: The Black Hat Hassle Acknowledgments Introduction xvii xx xxiii xxv Foundations Case Study: ebay Surprise 2 1 Cisco Network Design Models and Security Overview 5 Cisco Network Design Models: A Security Perspective 7 The Fiat Earth Model 7 The Star Model 9 The Two-Tier Model 10 The Ring Model 11 The Mesh and Partial Mesh Model 12 Network Security Zones 14 IDS Sensor Deployment Guidelines 17 Cisco Hierarchical Design and Network Security 18 The Core Layer 19 The Distribution Layer 20 The Access Layer 21 22 2 Cisco Network Security Elements 23 Common Cisco Device Security Features 24 Cisco Firewalls 27 Packet-Filtering Firewalls 27 Stateful Packet-Filtering Firewalls 28 Proxy Filters 29 ix

Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions 30 PIX Firewall Failover Types of Cisco Firewall Hardware Cisco Secure IDS and Attack Prevention Hardware Standalone IDS Sensors _ Modular IDS Sensors Cisco IOS IDS Software 6 Cisco PIX Firewalls as IDS Sensors Cisco Traffic Anomaly Detector XT 5600 J Cisco Secure IDS Management Consoles Cisco VPN Solutions 44 IPSec ; 46 PPTP 47 Cisco AAA and Related Services Overview of AAA Methodology 4g Cisco and AAA Security Implications of Cisco Internetwork Design and Security Elements 57 Real-World Cisco Security Issues Why Do Hackers Want to Enable Your Box? What Attackers Gain Cisco Appliances and Networks: an Attacker's Perspective oz Attacking Network Protocols Hiding Tracks and Forensics on Routers and Switches Cisco Network Device Security Auditing and Penetration Testing Foundations The Evaluation Process "I Am Enabled": Hacking the Box ' 74 Case Study: The One with a Nessus Report > Profiling and Enumerating Cisco Networks... 7g Online Searching and "Cisco Googledorks" Basic Searching Searching Using Google Operators Googling for Enable Routing Enumeration Autonomous System Discovery and Mapping: BGPv4 o4 Interrogation Internet Routing Registries, Route Servers, and Lookmg Glasses ob Querymg

Contents 0 Mapping IP Addresses to Autonomous Systems 92 2 Enumerating an Autonomous System 95 3 Finding Autonomous Systems That Belong to an Organization 99 4 AS Path Enumeration, Building BGP Trees, and Finding 6 Border Routers 101 7 Routing Domain Number Discovery and Network Mapping 9 forigps 108 0 Mapping RIP, IGRP, and IRDP 108 1 Enumerating OSPF 114 2 Analyzing OSPF Enumeration Data 116 1 121 6 7 ' 5 Enumerating and Fingerprinting Cisco Devices 123 7 Sniffing for Cisco-Specific Protocols 124 g Dissecting CDP Frames 128 Passive Enumeration and Fingerprinting of Cisco Devices 133 2 Active Enumeration and Fingerprinting of Cisco Devices 135 5 Active Enumeration and Fingerprinting of Cisco Routers 136 Active Enumeration and Fingerprinting of Catalyst Switches 143 7 ' Active Enumeration and Fingerprinting of Other Cisco Appliances.. 149 8 Using IOS 11.X Memory Leak to Enumerate Remote Cisco Routers.. 156 9 170 2 5 6 Getting In from the Outside: Dead Easy 171 7 Password Attacks 172 Mass Guessing/Bruteforcing Attacks Against Open 9 * Cisco Telnet Servers 173 3 Password Guessing and Bruteforcing Attacks Against 1 Other Open Cisco Services 180 SNMP Community Guessing, Exploitation, and Safeguards 189 Cisco SNMP Basics 189 SNMP Mass Scanning 193 SNMP Bruteforcing and Dictionary Attacks 196 1 SNMP Browsing and Cisco Device Reconfiguration 199 j Command-Line Remote Cisco Device SNMP a Manipulation IOS Hosts 207 i Command-Line Remote Cisco Device SNMP I Manipulation CatOS Switches 213 l Exploiting TFTP Servers to Take Over Cisco Hosts 221 A Enumerating TFTP Servers 221 Sniffing Out Cisco Configuration Files 223. Bruteforcing TFTP Servers to Snatch Configs 224 Cisco Device Wardialing 225 Cisco Router Wardialing 101: Interfaces, Configurations, and Reverse Telnet 225

Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions Discovering the Numbers to Dial In 228 Gettine into a Cisco Router or an Access Server 230 234 Hacking Cisco Devices:The Intermediate Path A Primer on Protocol Implementation Investigation and Abuse: Cisco SNMP Attacks SilverCreek SimpleTester and SimpleSleuth j Oulu University PROTOS Project 247 From SNMP Fuzzing to DoS and Reflective DDoS 251 From SNMP Stress Testing to Nongeneric DoS 252 Hidden Menace Undocumented SNMP Communities and Remote Access *~r Getting In via Observation Skills Alone 256 Brief SNMPv3 Security Analysis 259 A Primer on Data Input Validation Attack Cisco HTTP Exploitation... 260 Basics of Cisco Web Configuration Interface 260 Cisco IOS HTTP Administrative Access 263 Cisco ATA-186 HTTP Device Configuration Disclosure 264 VPN Concentrator HTTP Device Information Leakage 265 Other Cisco HTTPd Flaws a More Sophisticated Approach 265 Cisco IOS 2GB HTTP GET Buffer Overflow Vulnerability 266 Assessing Security of a Cisco Web Service 267 SPIKE and Its Relatives 268 The Peach Fuzzer 271 Cisco IOS Exploitation:The ProperWay 273 Cisco IOS Architecture Foundations 2/ Cisco IOS Memory Dissection 2/b An Exploitation Primer: IOS TFTP Buffer Overflow 281 Defeating Check Heaps 284 The Curse and the Blessing of IOS Reverse Engineering 2yi IOS Features and Commands That Can Be (Ab)used by Reverse Engineers A Minimalistic Reverse Engineering Arsenal 293 Cracking Secret Keys, Social Engineering, and Malicious Physical Access 297 Cisco Appliance Password Cracking Cracking Type-7 Passwords L Cracking MD5 Password Hashes 3U1 Social Engineering Attacks 237

Contents Local Device Access 308 Local Router Password Reset or Recovery 308 Local Switch Password Reset or Recovery 310 Local PIX Firewall Password Reset or Recovery 313 Local Cisco VPN Concentrator Password Reset or Recovery 315 316 10 Exploiting and Preserving Access 317 Common Cisco Router, Switch, or Firewall Reconfigurations by Attackers 318 Is Anyone Here? 318 Covering Tracks 320 Looking Around 323 Using a Hacked IOS Router to Hide Tracks 327 Using a Hacked IOS Router or PIX Firewall to Allow Malicious Traffic Through 328 Using a Hacked IOS Router to Mirror, Capture, and Modify Bypassing Traffic 330 Sniffing Traffic from a Hacked PIX Firewall 332 Sniffing the Network Using a Cisco Catalyst Switch 333 (Ab)using Remote SPAN 336 The Secret CatOS Enable Engineer Mode 337 Further IOS Exploitation and Device Access Preservation 340 IOS Binary Patching: Myth and Reality 340 TCLing the Router for Fun and Profit 353 360 11 Denial of Service Attacks Against Cisco Devices 361 DoS Attack Motives 362 Types of DoS Attacks 363 Consumption of Resources 363 Disruption of Information Flow 364 Disruption of Communication 364 Cisco DoS Assessment Tools 364 Cisco Global Exploiter 365 Cisco TCP Test Tool 366 Well-Known Cisco DoS Vulnerabilities 367 Cisco Devices Generic DoS 367 ICMP Remote DoS Vulnerabilities 367 Malformed SNMP Message DoS Vulnerability 369 Examples of Specific DoS Attacks Against Cisco Routers 370 Cisco IOS Malformed IKE Packet Remote DoS Vulnerability 370 Cisco 44020 Bug 370

XiV Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions Examples of Specific DoS Attacks Against Catalyst Switches and Other Cisco Networking Devices 372 Cisco Catalyst Memory Leak DoS Vulnerability 372 Incorrect TCP Checksum Attack Disrupting Communication Through a PIX Firewall 373 Cisco Broadband OS TCP/IP Stack DoS Vulnerability 373 Cisco Aironet APlxOO Malformed HTTP GET DoS Vulnerability... 374 Cisco Catalyst Nonstandard TCP Flags Remote DoS Vulnerability... 375 Abusing Cisco Appliances for Nasty DDoS Deeds 376 Mass Cisco Pinging, the SNMP Way 376 Mass Cisco Pinging, the Telnet Way MKI 376 Mass Cisco Pinging, the Telnet Way MK II 378 Mass Cisco Flood, the SNMP Way 379 DDoS Massive: Revenge of the Kiddies 382 Direct DDoS Attacks 382 Reflective DDoS Attacks 382 ihateperl.pl 3 f, 1 OOO drdos 390 Protocol Exploitation in Cisco Networking Environments Case Study: The Flying OSPF Hell 394 12 SpanningTree,VLANs,EAP-LEAP,andCDP 397 Spanning Tree Protocol Exploitation 398 Inserting a Rogue Root Bridge Modifying a Traffic Path Without Becoming Root 410 Recalculating STP and Data Sniffing 411 STP DoS Attacks Exploiting VLANs 4 DTP Abuse 4i 802.1q and ISL Exploitation Double Tagging VLAN Hopping 419 Private VLAN Hopping 420 Makine Unidirectional Attacks Bidirectional 421 VTP Exploitation VLAN Query Protocol (VQP) Attacks 423 Lateral Means of Bypassing VLAN Segmentation 426 Cisco EAP-LEAP Cracking J" EAP-LEAP Basics 432 EAP-LEAP Cracking 432

Contents Attacking CDP 438 A Sneaky CDP Attack 438 440 13 HSRP, GRE, Firewalls, and VPN Penetration 443 HSRP Exploitation 444 GRE Exploitation 447 An MTU-Based Attack Against GRE 447 GRE Packet Injection 448 Cisco Firewall Penetration 453 Attacking PIX Protocol Fixups 453 Attacking PIX MailGuard 453 Attacking PIX FTP Fixup 454 TCP RESET Attacks Against PIX Firewalls 456 Cisco VPN Hacking 459 IPSec-Related Attacks 460 Cisco PPTP Hacking 467 470 14 Routing Protocols Exploitation 471 Introduction to Routing Attacks 472 Setting Up a Rogue Router 474 Attacking Distance-Vector Routing Protocols 474 Attacking RIP 475 Malicious Route Insertion via RIP 475 RIP Downgrading Attack 481 RIP MD5 Hash Cracking Attack 482 Attacking 1GRP 486 Malicious Route Insertion via IGRP 487 Attacking EIGRP 488 Malicious Route Insertion via EIGRP 488 DoS Attacks Against EIGRP Networks 492 Attacking Authenticated EIGRP 494 Attacking Link State Routing Protocols 498 Malicious Route Insertion via OSPF 499 Becoming a Designated or Backup Designated OSPF Router 504 OSPF MD5 Hash Cracking Attack 506 Direct Attack Against an OSPF Router: The OoopSPF Exploit 507 Possible DoS Attacks Against OSPF 509 Attacking BGPv4 512 Malicious BGP Router Reconfiguration 513 Attack Scenarios for Malicious BGP Router Reconfiguration 516 BGP Router Masquerading Attack 519

Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions Man-in-the-Middle Attacks Against BGP Routers 520 Cracking BGP MD5 Authentication 522 Blind DoS Attacks Against BGP Routers 523 Appendixes A Case Study: The Epic Battle Network Appliance Security Testing Template 530 533 B Lab Router Interactive Cisco Auto Secure Configuration Example 539 C Undocumented Cisco Commands Index 549 593