hacking on l2 switches

38
HACKING ON L2 DEVICES

Upload: navaneetha-sankar

Post on 10-Jun-2015

253 views

Category:

Technology


1 download

DESCRIPTION

My presentation to my juniors. https://www.dropbox.com/s/d8ghsc8hvbf2yyg/hacking_l2.pptx

TRANSCRIPT

Page 1: Hacking on L2 Switches

HACKING ON L2 DEVICES

Page 2: Hacking on L2 Switches

Why We need Layer 2 security?

OSI layer was build to allow different layers to work without knowledge of each other.

Layer 2 can be very weak link in the network.

Page 3: Hacking on L2 Switches

If any one of the layer hacked, communications are compromised.

Page 4: Hacking on L2 Switches

Topics

1. MAC Attacks2. VLAN hopping attacks3. ARP attacks4. Spanning Tree Attacks5. DHCP Starvation Attack

Page 5: Hacking on L2 Switches

MAC ATTACKS

Page 6: Hacking on L2 Switches

What is MAC and CAM ?

MAC is 48 Bit L2 address

1234.5678.9ABC

First 24 bits is manufacture code Assigned by IEEE00-50-56XX-XXXX

Second 24 bits is specific interface,Assigned by ManufactureXXXX-XXC0-00-01

Content Addressable memory (CAM) table stores information such as MAC addressed available on physical ports with their associated VLAN parameters.

http://www.nirsoft.net/utils/mac_address_lookup_find.html

Page 7: Hacking on L2 Switches

Normal CAM operation (1/3)

Page 8: Hacking on L2 Switches

Normal CAM operation (2/3)

Page 9: Hacking on L2 Switches

Normal CAM operation (3/3)

Page 10: Hacking on L2 Switches

How Bypass the CAM?

1. Due to hardware restrictions, CAM has fixed size memory

2. Different switches has different size of CAM table

3. Overload the CAM to bypass the MAC table restriction

Page 11: Hacking on L2 Switches

CAM Overflow attack

Page 12: Hacking on L2 Switches

CAM Overflow attack

Page 14: Hacking on L2 Switches

Duration of this attack

• 63 bits of source (MAC, VLAN, misc) creates 17 Bits of hash value and it will get stored in the CAM table.

• In a Cisco Catalyst 5650, we can store appox. 131,000 CAM entries

• Dsniff macof tool can create 1,55,000 MAC entries in a minute.

Page 15: Hacking on L2 Switches

How to overcome this attack?

We can overcome this attack by enabling switch port security such as1. Static Secure MAC Addresses2. Dynamic Secure MAC addresses3. Sticky secure MAC addresses.

Limitations:

1. A secure port can’t be a SPAN port2. A secure port cannot be an 802.1X port.3. A secure port cannot belong to an EtherChannel port-channel

interface.

Cisco# conf t Cisco(config)# interface fastethernet0/1 Cisco(config-if)# switchport mode access Cisco(config-if)# switchport port-security Cisco(config-if)# switchport port-security maximum 5Cisco(config-if)# switchport port-security violation restrict Cisco(config-if)# switchport port-security mac-address aaaa.aaaa.aaaa Cisco(config-if)# switchport port-security mac-address bbbb.bbbb.bbbb

Page 16: Hacking on L2 Switches

VLAN Hopping Attack

Page 17: Hacking on L2 Switches

What is mean by Trunk Port?

• Trunk port have access to all the VLANs by default.• It used to route traffic of multiple VLANs across the same

physical link.• Encapsulation can be 802.1Q or ISL (Cisco preparatory)

Page 18: Hacking on L2 Switches

Rogue Trunk / Switch Spoof attack

1. A computer can spoof as a switch with 802.1Q or ISL signaling.2. DTP signaling is required.3. Requires trunking favorable setting on the switch port.

Page 19: Hacking on L2 Switches

Double encapsulated VLAN attack

1. Attacker sends double tagged 802.1Q frames2. Switch can perform only one level of decapsulation, so the frame

will be forwarded as per the second tag.3. VLAN hopping occurs

Page 21: Hacking on L2 Switches

Security practices to avoid the attacks• Always use dedicated VLAN ID for all trunk ports• Disable Unused ports and put them on unused VLANs• Don’t use VLAN1 for anything• Set DTP off

Page 22: Hacking on L2 Switches

ARP Attacks

Page 23: Hacking on L2 Switches

An ARP request messageshould be placed in a frameand broadcast to allcomputers on the network

Each computer receives therequest and examines theIP address

The computer mentioned inthe request sends aresponse; all othercomputers process anddiscard the request withoutsending a response

ARP recall

Page 24: Hacking on L2 Switches

Gratuitous ARP is used by hosts to announce their IP address to the local network and avoid duplicate IP addresses on the network; routers and other network hardware may use cache information gained from gratuitous ARPs

Gratuitous ARP

Page 25: Hacking on L2 Switches

ARP Spoofing• ARP has no security on IP / MAC addresses

• Host W broadcasts I’m 1.2.3.1 with MAC 12:34:56:78:9A:BC in regular interval

• When the host x requests the MAC of gateway, it will be overwritten by the gratuitous ARP packet

Even a static ARP entry for 1.2.3.1 on Y will get overwritten by the Gratuitous ARP on some Oss.

Page 27: Hacking on L2 Switches

Sniffed outputSniffed credentials by Cain and Abel

Page 28: Hacking on L2 Switches

ARP Spoof Mitigation

• Some IDS systems will watch for an unusually high amount of ARP traffic

• ARPWatch, AntiARP tools are available to avoid ARP spoofing

• Static ARP on critical systems• ARP firewall feature is implemented in some Cisco devices.

Page 29: Hacking on L2 Switches

STP Attacks

Page 30: Hacking on L2 Switches

STP BasicsSTP is used to avoid loops and broadcast storms

Messages are sent using Bridge Protocol Data Units (BPDUs). Basic messages include: configuration, topology change notification/acknowledgment. (TCN/TCA)

Page 31: Hacking on L2 Switches

Standard 802.1d STP takes 30-45 seconds to deal with a failure or Root bridge change.

Sending BPDUs from the attacker can force these changes and create a root bridge change.

Page 32: Hacking on L2 Switches

Now attacker can see any frames

MITM, DoS, etc. all possible

Page 33: Hacking on L2 Switches

STP Attack Mitigation

We can avoid this attack by enabling

Root guardBPDU guard in the switch

Page 34: Hacking on L2 Switches

DHCP attack

Page 35: Hacking on L2 Switches

DHCP Starvation Attack

• This attack performing by broadcasting number of DHCP requests by spoofed source MAC

• If enough request flooded onto the network, the attacker can completely exhaust the address space allocated by the DHCP servers for an indefinite period of time.

Page 36: Hacking on L2 Switches

DHCP Starvation Attack

• Yersinia is used here for DHCP starvation attack.

Page 37: Hacking on L2 Switches

Mitigation of DHCP Starvation attack• Port security should be enabled.• DHCP snooping to be enabled

Cisco(config)#interface range GigabitEthernet1/0/1 - 48Cisco(config-if)#description Access PortsCisco(config-if)#switchport port-securityCisco(config-if)#switchport port-security maximum 4Cisco(config-if)#switchport port-security aging time 5Cisco(config-if)#switchport port-security aging type inactivityCisco(config-if)#switchport port-security violation shutdownCisco(config-if)#exitCisco(config)#interface GigabitEthernet1/0/49Cisco(config-if)#description Uplink to DHCP ServerCisco(config-if)#ip dhcp snooping trustCisco(config-if)#exitCisco(config)#ip dhcp snoopingCisco(config)#ip dhcp snooping vlan 1-10Cisco(config)#ip dhcp snooping database tftp://remotehost.company.com/Ciscodhcpsnoop.txtCisco(config)#ip dhcp snooping verify mac-addressCisco(config)#endCisco#

Page 38: Hacking on L2 Switches

Thank You