SlideShare a Scribd company logo
1 of 29
Download to read offline
ACCESS ROUTEROS USING
MULTI-FACTOR AUTHENTICATION
MIKROTIK USER MEETING 2018
Didiet Kusumadihardja | didiet@arch.web.id
Yogyakarta, Indonesia | 20 Oktober 2018
About Me
Didiet Kusumadihardja | didiet@arch.web.id
2
Didiet Kusumadihardja
 12 tahun pengalaman di IT
RT/RW Net, Startup (e-commerce), Manage
Service, IT Consulting, IT Auditor, Penetration
Tester & Training Service
 Penguji UKK TKJ
 Mikrotik Certified Trainer
 Mikrotik Certified Consultant
https://about.me/didiet
Services Offered
Didiet Kusumadihardja | didiet@arch.web.id
3
1. Network Assessment/Design Service
2. IT General Control Audit Service
3. Vulnerability Assessment & Penetration Testing Service
4. IT Due Diligence Service
5. Training Service
• UU ITE No 11 Tahun 2008
• POJK 38/POJK.03/2016
• SEOJK 21/SEOJK.03/2017
• PBI 16/8/PBI/2014
 PCI DSS
 ISO 27001
Planning Discovery Attack
Reporting
Additional Discovery
Background4
Didiet Kusumadihardja | didiet@arch.web.id
Data Breaches News 2016
Didiet Kusumadihardja | didiet@arch.web.id
5
Data Breaches News 2017
Didiet Kusumadihardja | didiet@arch.web.id
6
Data Breaches News 2018
Didiet Kusumadihardja | didiet@arch.web.id
7
MikroTik Security Fixed
Didiet Kusumadihardja | didiet@arch.web.id
8
 6.38.5 (9 Maret 2017)
www - fixed http server vulnerability
 6.41.3 (8 Maret 2018)
smb - fixed buffer overflow vulnerability, everyone using
this feature is urged to upgrade
 6.42.1 (23 April 2018)
winbox - fixed vulnerability that allowed to gain access to
an unsecured router
 6.42.7 (17 Agustus 2018)
security - fixed vulnerabilities CVE-2018-1156, CVE-
2018-1157, CVE-2018-1158, CVE-2018-1159
Exploits
Didiet Kusumadihardja | didiet@arch.web.id
9
Amount of Time to Crack Passwords
Didiet Kusumadihardja | didiet@arch.web.id
10
Processing Power vs Passwords
Didiet Kusumadihardja | didiet@arch.web.id
11
Reality
Didiet Kusumadihardja | didiet@arch.web.id
12
Dictionary
Attack
Brute Force
Attack
ExploitsPassword Dictionary
Bad Guys
Humans and Password
Didiet Kusumadihardja | didiet@arch.web.id
13
Password Tips
Didiet Kusumadihardja | didiet@arch.web.id
14
Indonesia Regulation
Didiet Kusumadihardja | didiet@arch.web.id
15
How we do it with RouterOS?16
Didiet Kusumadihardja | didiet@arch.web.id
Multi-Factor Authentication on RouterOS
Didiet Kusumadihardja | didiet@arch.web.id
17
 Something you know  Password
 Something you have  SSH Keys
 Somewhere you from  IP Address
Create SSH Public & Private Key
Didiet Kusumadihardja | didiet@arch.web.id
18
1. Generate
2. Save Private Key
3. Copy Public Key
and save to file
1
2
3
For OS X and Linux users can use
‘ssh-keygen’
RouterOS Configuration
Didiet Kusumadihardja | didiet@arch.web.id
19
1. Upload Public Key
2. Create New User
3. Import SSH Key
Login using SSH Keys
Didiet Kusumadihardja | didiet@arch.web.id
20
1
2
Connection > SSH > Auth
Only permit from specific IP address
Didiet Kusumadihardja | didiet@arch.web.id
21
Other Methods (1/3)
Didiet Kusumadihardja | didiet@arch.web.id
22
Port Knocking
https://wiki.mikrotik.com/wiki/Port_Knocking
Other Methods (2/3)
Didiet Kusumadihardja | didiet@arch.web.id
23
VPN then remote access
1. VPN (PPTP/SSTP/OpenVPN)
2. Remote Access (Winbox/SSH)
VPN
Network Address
Other Methods (3/3)
Didiet Kusumadihardja | didiet@arch.web.id
24
Out of Band Network
Management Network
Audit Trail / Log as Evidence
Didiet Kusumadihardja | didiet@arch.web.id
25
Audit Trail / Log using The Dude
Didiet Kusumadihardja | didiet@arch.web.id
26
Summary
Didiet Kusumadihardja | didiet@arch.web.id
27
Defense in Depth Layers
1. Policies, Procedure, and Awareness
2. Physical
3. Perimeter
4. Internal Network
5. Host
6. Application
7. Data
Reference
Didiet Kusumadihardja | didiet@arch.web.id
28
 ArsTechnica. 2012. 25-GPU cluster cracks every standard Windows password in <6 hours.
https://arstechnica.com/information-technology/2012/12/25-gpu-cluster-cracks-every-standard-windows-
password-in-6-hours/.
 BetterBuys. Estimating Password-Cracking Times. https://www.betterbuys.com/estimating-password-cracking-
times/.
 C# Corner. 2015. Passphrase vs Password For Security. https://www.c-
sharpcorner.com/UploadFile/66489a/passphrase-vs-password-for-the-security/.
 Information is beautiful. 2018. World’s Biggest Data Breaches.
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/.
 MikroTik. 2015. Port Knocking. https://wiki.mikrotik.com/wiki/Port_Knocking.
 MikroTik. 2016. Manual: The Dude v6/Syslog. https://wiki.mikrotik.com/wiki/Manual:The_Dude_v6/Syslog.
 NIST. 2017. Easy Ways to Build a Better P@$5w0rd. https://www.nist.gov/blogs/taking-measure/easy-ways-build-
better-p5w0rd.
 Records Management Center. 2017. Identity Theft – Is It All Digital. https://rmcmaine.com/identity-theft-report/.
 Reuters. 2017. Yahoo says all three billion accounts hacked in 2013 data theft. https://www.reuters.com/article/us-
yahoo-cyber/yahoo-says-all-three-billion-accounts-hacked-in-2013-data-theft-idUSKCN1C82O1.
 ScienceDirect. 2017. Towards port-knocking authentication methods for mobile cloud computing.
https://www.sciencedirect.com/science/article/pii/S1084804517302813 (Accessed 2018-09-04).
 The Hacker News. 2018. Hackers Infect Over 200,000 MikroTik Routers With Crypto Mining Malware.
https://thehackernews.com/2018/08/mikrotik-router-hacking.html.
 The New York Times. 2016. Yahoo Says 1 Billion User Accounts Were Hacked.
https://www.nytimes.com/2016/12/14/technology/yahoo-hack.html.
Diijinkan menggunakan sebagian atau seluruh materi pada modul ini, baik berupa ide, foto, tulisan,
konfigurasi dan diagram selama untuk kepentingan pengajaran, dan memberikan kredit kepada penulis
serta link ke www.arch.web.id
29
Didiet Kusumadihardja
Mobile: +62 813 1115 0054
e-mail: didiet@arch.web.id
Didiet Kusumadihardja | didiet@arch.web.id

More Related Content

What's hot

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 

What's hot (20)

国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Cybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect CimetricsCybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect Cimetrics
 
The Future of Authentication for IoT
The Future of Authentication for IoTThe Future of Authentication for IoT
The Future of Authentication for IoT
 
IoT/M2M Security
IoT/M2M SecurityIoT/M2M Security
IoT/M2M Security
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Cybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide Deck
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
Adarsh Resume ISO27001
Adarsh Resume ISO27001Adarsh Resume ISO27001
Adarsh Resume ISO27001
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
 
Addressing Healthcare Challenges Today
Addressing Healthcare Challenges TodayAddressing Healthcare Challenges Today
Addressing Healthcare Challenges Today
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 

Similar to Access RouterOS using Multi-Factor Authentication

ACTAtek corporate presentation march 2013
ACTAtek corporate presentation march 2013ACTAtek corporate presentation march 2013
ACTAtek corporate presentation march 2013
Aurangzeb Mufti
 

Similar to Access RouterOS using Multi-Factor Authentication (20)

Fools your enemy with MikroTik
Fools your enemy with MikroTikFools your enemy with MikroTik
Fools your enemy with MikroTik
 
Presentation ANS Lab.pptx
Presentation ANS Lab.pptxPresentation ANS Lab.pptx
Presentation ANS Lab.pptx
 
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
 
ADRecon - Detection CHCON 2018
ADRecon - Detection CHCON 2018ADRecon - Detection CHCON 2018
ADRecon - Detection CHCON 2018
 
State of the ATT&CK
State of the ATT&CKState of the ATT&CK
State of the ATT&CK
 
Appliquez le modèle Zero Trust pour le Hardening de votre Azure AD !
Appliquez le modèle Zero Trust pour le Hardening de votre Azure AD !Appliquez le modèle Zero Trust pour le Hardening de votre Azure AD !
Appliquez le modèle Zero Trust pour le Hardening de votre Azure AD !
 
Enter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsEnter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s Assets
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
 
Ariyo - EUDAT CDI B2 services documentation
Ariyo - EUDAT CDI B2 services documentationAriyo - EUDAT CDI B2 services documentation
Ariyo - EUDAT CDI B2 services documentation
 
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)
 
Compliance and Zero Trust Ambient Mesh
Compliance and Zero Trust Ambient MeshCompliance and Zero Trust Ambient Mesh
Compliance and Zero Trust Ambient Mesh
 
Distributed Ledger PKI Risk Management Framework, Rob Campbell
Distributed Ledger PKI Risk Management Framework, Rob CampbellDistributed Ledger PKI Risk Management Framework, Rob Campbell
Distributed Ledger PKI Risk Management Framework, Rob Campbell
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
MikroTik Security
MikroTik SecurityMikroTik Security
MikroTik Security
 
Security in microservices architectures
Security in microservices architecturesSecurity in microservices architectures
Security in microservices architectures
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
ACTAtek corporate presentation march 2013
ACTAtek corporate presentation march 2013ACTAtek corporate presentation march 2013
ACTAtek corporate presentation march 2013
 
FIDO2 : vers la fin des mots de passe ? - Par Arnaud Jumelet
FIDO2 : vers la fin des mots de passe ? - Par Arnaud JumeletFIDO2 : vers la fin des mots de passe ? - Par Arnaud Jumelet
FIDO2 : vers la fin des mots de passe ? - Par Arnaud Jumelet
 
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
 

More from Didiet Kusumadihardja

More from Didiet Kusumadihardja (6)

Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
Manajemen wireless rogue
Manajemen wireless rogueManajemen wireless rogue
Manajemen wireless rogue
 
Personally identifiable information
Personally identifiable informationPersonally identifiable information
Personally identifiable information
 
Adequate password policy
Adequate password policyAdequate password policy
Adequate password policy
 
Notifikasi penggunaan sistem
Notifikasi penggunaan sistemNotifikasi penggunaan sistem
Notifikasi penggunaan sistem
 
Didiet Cyber Security Consultant Portfolio - Bahasa Indonesia
Didiet Cyber Security Consultant Portfolio - Bahasa IndonesiaDidiet Cyber Security Consultant Portfolio - Bahasa Indonesia
Didiet Cyber Security Consultant Portfolio - Bahasa Indonesia
 

Recently uploaded

Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 

Recently uploaded (20)

On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 

Access RouterOS using Multi-Factor Authentication

  • 1. ACCESS ROUTEROS USING MULTI-FACTOR AUTHENTICATION MIKROTIK USER MEETING 2018 Didiet Kusumadihardja | didiet@arch.web.id Yogyakarta, Indonesia | 20 Oktober 2018
  • 2. About Me Didiet Kusumadihardja | didiet@arch.web.id 2 Didiet Kusumadihardja  12 tahun pengalaman di IT RT/RW Net, Startup (e-commerce), Manage Service, IT Consulting, IT Auditor, Penetration Tester & Training Service  Penguji UKK TKJ  Mikrotik Certified Trainer  Mikrotik Certified Consultant https://about.me/didiet
  • 3. Services Offered Didiet Kusumadihardja | didiet@arch.web.id 3 1. Network Assessment/Design Service 2. IT General Control Audit Service 3. Vulnerability Assessment & Penetration Testing Service 4. IT Due Diligence Service 5. Training Service • UU ITE No 11 Tahun 2008 • POJK 38/POJK.03/2016 • SEOJK 21/SEOJK.03/2017 • PBI 16/8/PBI/2014  PCI DSS  ISO 27001 Planning Discovery Attack Reporting Additional Discovery
  • 5. Data Breaches News 2016 Didiet Kusumadihardja | didiet@arch.web.id 5
  • 6. Data Breaches News 2017 Didiet Kusumadihardja | didiet@arch.web.id 6
  • 7. Data Breaches News 2018 Didiet Kusumadihardja | didiet@arch.web.id 7
  • 8. MikroTik Security Fixed Didiet Kusumadihardja | didiet@arch.web.id 8  6.38.5 (9 Maret 2017) www - fixed http server vulnerability  6.41.3 (8 Maret 2018) smb - fixed buffer overflow vulnerability, everyone using this feature is urged to upgrade  6.42.1 (23 April 2018) winbox - fixed vulnerability that allowed to gain access to an unsecured router  6.42.7 (17 Agustus 2018) security - fixed vulnerabilities CVE-2018-1156, CVE- 2018-1157, CVE-2018-1158, CVE-2018-1159
  • 9. Exploits Didiet Kusumadihardja | didiet@arch.web.id 9
  • 10. Amount of Time to Crack Passwords Didiet Kusumadihardja | didiet@arch.web.id 10
  • 11. Processing Power vs Passwords Didiet Kusumadihardja | didiet@arch.web.id 11
  • 12. Reality Didiet Kusumadihardja | didiet@arch.web.id 12 Dictionary Attack Brute Force Attack ExploitsPassword Dictionary Bad Guys
  • 13. Humans and Password Didiet Kusumadihardja | didiet@arch.web.id 13
  • 14. Password Tips Didiet Kusumadihardja | didiet@arch.web.id 14
  • 16. How we do it with RouterOS?16 Didiet Kusumadihardja | didiet@arch.web.id
  • 17. Multi-Factor Authentication on RouterOS Didiet Kusumadihardja | didiet@arch.web.id 17  Something you know  Password  Something you have  SSH Keys  Somewhere you from  IP Address
  • 18. Create SSH Public & Private Key Didiet Kusumadihardja | didiet@arch.web.id 18 1. Generate 2. Save Private Key 3. Copy Public Key and save to file 1 2 3 For OS X and Linux users can use ‘ssh-keygen’
  • 19. RouterOS Configuration Didiet Kusumadihardja | didiet@arch.web.id 19 1. Upload Public Key 2. Create New User 3. Import SSH Key
  • 20. Login using SSH Keys Didiet Kusumadihardja | didiet@arch.web.id 20 1 2 Connection > SSH > Auth
  • 21. Only permit from specific IP address Didiet Kusumadihardja | didiet@arch.web.id 21
  • 22. Other Methods (1/3) Didiet Kusumadihardja | didiet@arch.web.id 22 Port Knocking https://wiki.mikrotik.com/wiki/Port_Knocking
  • 23. Other Methods (2/3) Didiet Kusumadihardja | didiet@arch.web.id 23 VPN then remote access 1. VPN (PPTP/SSTP/OpenVPN) 2. Remote Access (Winbox/SSH) VPN Network Address
  • 24. Other Methods (3/3) Didiet Kusumadihardja | didiet@arch.web.id 24 Out of Band Network Management Network
  • 25. Audit Trail / Log as Evidence Didiet Kusumadihardja | didiet@arch.web.id 25
  • 26. Audit Trail / Log using The Dude Didiet Kusumadihardja | didiet@arch.web.id 26
  • 27. Summary Didiet Kusumadihardja | didiet@arch.web.id 27 Defense in Depth Layers 1. Policies, Procedure, and Awareness 2. Physical 3. Perimeter 4. Internal Network 5. Host 6. Application 7. Data
  • 28. Reference Didiet Kusumadihardja | didiet@arch.web.id 28  ArsTechnica. 2012. 25-GPU cluster cracks every standard Windows password in <6 hours. https://arstechnica.com/information-technology/2012/12/25-gpu-cluster-cracks-every-standard-windows- password-in-6-hours/.  BetterBuys. Estimating Password-Cracking Times. https://www.betterbuys.com/estimating-password-cracking- times/.  C# Corner. 2015. Passphrase vs Password For Security. https://www.c- sharpcorner.com/UploadFile/66489a/passphrase-vs-password-for-the-security/.  Information is beautiful. 2018. World’s Biggest Data Breaches. http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/.  MikroTik. 2015. Port Knocking. https://wiki.mikrotik.com/wiki/Port_Knocking.  MikroTik. 2016. Manual: The Dude v6/Syslog. https://wiki.mikrotik.com/wiki/Manual:The_Dude_v6/Syslog.  NIST. 2017. Easy Ways to Build a Better P@$5w0rd. https://www.nist.gov/blogs/taking-measure/easy-ways-build- better-p5w0rd.  Records Management Center. 2017. Identity Theft – Is It All Digital. https://rmcmaine.com/identity-theft-report/.  Reuters. 2017. Yahoo says all three billion accounts hacked in 2013 data theft. https://www.reuters.com/article/us- yahoo-cyber/yahoo-says-all-three-billion-accounts-hacked-in-2013-data-theft-idUSKCN1C82O1.  ScienceDirect. 2017. Towards port-knocking authentication methods for mobile cloud computing. https://www.sciencedirect.com/science/article/pii/S1084804517302813 (Accessed 2018-09-04).  The Hacker News. 2018. Hackers Infect Over 200,000 MikroTik Routers With Crypto Mining Malware. https://thehackernews.com/2018/08/mikrotik-router-hacking.html.  The New York Times. 2016. Yahoo Says 1 Billion User Accounts Were Hacked. https://www.nytimes.com/2016/12/14/technology/yahoo-hack.html.
  • 29. Diijinkan menggunakan sebagian atau seluruh materi pada modul ini, baik berupa ide, foto, tulisan, konfigurasi dan diagram selama untuk kepentingan pengajaran, dan memberikan kredit kepada penulis serta link ke www.arch.web.id 29 Didiet Kusumadihardja Mobile: +62 813 1115 0054 e-mail: didiet@arch.web.id Didiet Kusumadihardja | didiet@arch.web.id