IPv6 Network Reconnaissance:



Similar documents
IPv6 Network Reconnaissance:

Recent Advances in IPv6 Security. Fernando Gont

Security Assessments of IPv6 Networks and Firewalls

Practical Security Assessment of IPv6 Networks and Devices. Fernando Gont

Security Implications of the Internet Protocol version 6 (IPv6)

IPv6.marceln.org.

The Truth about IPv6 Security

IPv6 Hardening Guide for Windows Servers

IPv6 Network Security.

IPv6 for SMB s: Easy or Hard?

IPv6 Infrastructure Security

Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna Marc Heuse

About Me. Work at Jumping Bean. Developer & Trainer Contact Info: mark@jumpingbean.co.za

IPv6 in Axis Video Products

IP(v6) security. Matěj Grégr. Brno University of Technology, Faculty of Information Technology. Slides adapted from Ing.

Host Configuration (Linux)

IPv6 Functionality. Jeff Doyle IPv6 Solutions Manager

IPv6 Security Analysis

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

IPv6 Infrastructure Security Jeffrey L Carrell Network Conversions Network Security Consultant, IPv6 SME/Trainer

Linux as an IPv6 dual stack Firewall

IPv6 Security Best Practices. Eric Vyncke Distinguished System Engineer

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc.

Getting started with IPv6 on Linux

Security Assessment of Neighbor Discovery for IPv6

Are You Ready to Teach IPv6?

IPv6 Addressing. Awareness Objective. IPv6 Address Format & Basic Rules. Understanding the IPv6 Address Components

Implementing DHCPv6 on an IPv6 network

Vulnerabili3es and A7acks

IPv6 Security. Scott Hogg. Global Technology Resources, Inc. Director of Technology Solutions CCIE #5133, CISSP #4610

Cisco QuickVPN Installation Tips for Windows Operating Systems

Keywords: IPv6, transition, security, network, IPv4 security of IPv6 still has a long way to go.

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

Deploying Samba in IPv6 Networks

Introduction to IP v6

Security of IPv6 and DNSSEC for penetration testers

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

IPv6 Diagnostic and Troubleshooting

Basic IPv6 WAN and LAN Configuration

batman-adv scalability

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Discovering IPv6 with Wireshark. presented by Rolf Leutert

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

IPv6 Virtual Labs: How to & Lessons s Learned. IPv6 Virtual Labs:

IPv6 Security problems and mitigations János Mohácsi euronog meeting, Budapest September 2012

Connecting to and Setting Up a Network

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

A Sampling of Internetwork Security Issues Involving IPv6

Chapter 3 Configuring Basic IPv6 Connectivity

IPv6 for Cisco IOS Software, File 2 of 3: Configuring

IPv6 Fundamentals: A Straightforward Approach

About the Technical Reviewers

Personal Firewall Default Rules and Components

Internet Protocols. Addressing & Services. Updated:

Joe Klein, CISSP IPv6 Security Researcher

LAB THREE STATIC ROUTING

VXLAN: Scaling Data Center Capacity. White Paper

Windows 7 Resource Kit

ICS 351: Today's plan

Telematics. 9th Tutorial - IP Model, IPv6, Routing

IPv6 Security: Transition from IPv4 to IPv6

IPv6 Security from point of view firewalls

IPv6 Associated Protocols

Network layer: Overview. Network layer functions IP Routing and forwarding

Bandwidth Management in MPLS Networks

IPv6 Addressing and Subnetting

Vicenza.linux.it\LinuxCafe 1

CloudEngine Series Switches. IPv6 Technical White Paper. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Central America Workshop - Guatemala City Guatemala 30 January - 1 February 07. IPv6 Router s Configuration

Implementation IPV6 in Mikrotik RouterOS. by Teddy Yuliswar

CS 348: Computer Networks. - IP addressing; 21 st Aug Instructor: Sridhar Iyer IIT Bombay

IPv6 Security Nalini Elkins, CEO Inside Products, Inc.

Unverified Fields - A Problem with Firewalls & Firewall Technology Today

TCP/IP Network Essentials. Linux System Administration and IP Services

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

Building Secure Network Infrastructure For LANs

The ntop Project: Open Source Network Monitoring

4m. MONITORING OF ETHERNET/IP NETWORK TRAFFIC.

The Looming Ethernet MAC Address Crisis

Detecting rogue systems

IPv6 Security ::/0. Poland MUM Warsaw March, 2012 Eng. Wardner Maia Brazil

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

IPv6 Addressing. John Rullan Cisco Certified Instructor Trainer Thomas A. Edison CTE HS

IPv6 Fundamentals, Design, and Deployment

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Step-by-Step Guide for Setting Up IPv6 in a Test Lab

IPv6 Protocols & Standards. ISP/IXP Workshops

Tutorial (03) IP addresses & Sub netting

Transcription:

IPv6 Network Reconnaissance: Theory & Practice Fernando Gont

Overview IPv6 changes the Network Reconnaissance game Brute force address scanning attacks undesirable (if at all possible) Security guys will need to evolve in how they do net reconnaissance Pentests/audits Deliberate attacks

IPv6 Network Reconnaissance Address scans DNS-based (AXFR, reverse mappings, etc.) Application-based Inspection of local data structures (NC, routing table, etc.) Inspection of system configuration and log files Snooping routing protocols draft-ietf-opsec-ipv6-host-scanning is your friend :-)

IPv6 Address Scanning Local Networks 4

Overview Leverage IPv6 all-nodes link-local multicast address Employ multiple probe types: Normal multicasted ICMPv6 echo requests (don't work for Windows) Unrecognized options of type 10xxxxxx Combine learned IIDs with known prefixes to learn all addresses Technique implemented in the scan6 tool of SI6's IPv6 toolkit

Possible mitigations Do not respond to multicasted ICMPv6 echo requests Currently implemented in Windows Multicasted IPv6 packets containing unsupported options of type 10xxxxxx should not elicit ICMPv6 errors See draft-gont-6man-ipv6-smurf-amplifier However, it's virtually impossible to mitigate IPv6 address scanning of local networks Think about mdns, etc.

IPv6 Address Scanning Remote Networks 7

Overview IPv6 address-scanning attacks have long been considered unfeasible This myth has been based on the assumption that: IPv6 subnets are /64s, and, Host addresses are randomly selected from that /64

IPv6 addresses in the real world Malone measured (*) the address generation policy of hosts and routers in real networks Address type Percentage SLAAC 50% IPv4-based 20% Teredo 10% Low-byte 8% Privacy 6% Wordy <1% Others <1% Hosts Address type Percentage Low-byte 70% IPv4-based 5% SLAAC 1% Wordy <1% Privacy <1% Teredo <1% Others <1% Routers Malone, D., "Observations of IPv6 Addresses", Passive and Active Measurement Conference (PAM 2008, LNCS 4979), April 2008, <http://www.maths.tcd.ie/~dwmalone/p/addr-pam08.pdf>.

IPv6 addresses embedding IEEE IDs 24 bits 16 bits 24 bits IEEE OUI FF FE Lower 24 bits of MAC Known or guessable Known Unknown In practice, the search space is at most ~2 23 bits feasible! The low-order 24-bits are not necessarily random: An organization buys a large number of boxes In that case, MAC addresses are usually consecutive Consecutive MAC addresses are generally in use in geographicallyclose locations

IPv6 addresses embedding IEEE IDs (II) Virtualization technologies present an interesting case Virtual Box employs OUI 08:00:27 (search space: ~2 23 ) VMWare ESX employs: Automatic MACs: OUI 00:05:59, and next 16 bits copied from the low order 16 bits of the host's IPv4 address (search space: ~2 8 ) Manually-configured MACs:OUI 00:50:56 and the rest in the range 0x000000-0x3fffff (search space: ~2 22 )

IPv6 addresses embedding IPv4 addr. They simply embed an IPv4 address in the IID e.g.: 2000:db8::192.168.0.1 Search space: same as the IPv4 search space feasible!

IPv6 addresses embedding service ports They simply embed the service port the IID e.g.: 2001:db8::80 Search space: smaller than 2 8 feasible!

IPv6 low-byte addresses The IID is set to all-zeros, except for the last byte e.g.: 2000:db8::1 There are other variants.. Search space: usually 2 8 or 2 16 feasible!

IPv6 Address Scanning Practice 15

scan6 tool Address scanning of the SI6 IPv6 toolkit Available for Linux, *BSD, and Mac OS X Supports Ethernet and tunnels Free software Available at: http://www.si6networks.com/tools/ipv6toolkit

Practice Local scans: # scan6 -i eth0 -l -v Remote brute force scan: # scan6 -i eth0 -v -d fc00:1::/64 # scan6 -i eth0 -v -d fc00:1::0-fffff:0-fffff:0-100:0-100 Targetting virtual machines: # scan6 -i eth0 -v -d fc00:1::/64 --tgt-virtual-machines all # scan6 -i eth0 -v -d fc00:1::/64 --tgt-virtual-machines vbox

Practice (III) Target a known IIDs (added yesterday :-) ): # scan6 -i eth0 -d fc00:1::/64 -v --tgt-known-iids FILE

Thanks! Fernando Gont fgont@si6networks.com www.si6networks.com