idsecconf2010-hacking priv8 network

30
Hacking into Bank priv8 Network [email protected] | y3dips.echo.or.id

Upload: ammar-wk

Post on 18-May-2015

1.638 views

Category:

Technology


2 download

DESCRIPTION

This Paper Presented at IDSECCONF2010

TRANSCRIPT

Page 1: idsecconf2010-hacking priv8 network

Hacking into Bank priv8 Network

[email protected] | y3dips.echo.or.id

Page 2: idsecconf2010-hacking priv8 network
Page 3: idsecconf2010-hacking priv8 network

Private Network

• Old time: Infrastructure Deploy by banks

• Present time: Public infrastructure usage - VPN

Page 4: idsecconf2010-hacking priv8 network
Page 5: idsecconf2010-hacking priv8 network

VPN

• Just like a Phone call between 2 node over public phone infrastructure

• Priv8 network service delivered over a public network infrastructure

Page 6: idsecconf2010-hacking priv8 network

VPN

• a Virtual Private Network

• l2tp, pptp, ipsec, ssl vpn, ssh based vpn (oepn vpn)

Page 7: idsecconf2010-hacking priv8 network

VPNVPN

Page 8: idsecconf2010-hacking priv8 network

Why Using VPN

• Bank eagerly needed a private line!

• Reducing Cost.

• “It should be” Secure.

Page 9: idsecconf2010-hacking priv8 network

Why Attacking VPN

• Yes, Its Private.

• Is it Secure? (relatively).

• The Most Dangerous place are the safest place.

• Rely on the security product.

Page 10: idsecconf2010-hacking priv8 network

Hacking The IPSECs VPN

Page 11: idsecconf2010-hacking priv8 network

The VPN Topology

host client

site client

WEB server

airport

DB server

Internet

IPSEC Tunnel

SITE-TO-SITE

REMOTE ACCESS (software client)

Page 12: idsecconf2010-hacking priv8 network

The IPSECs

Page 13: idsecconf2010-hacking priv8 network

IPSEC

Page 14: idsecconf2010-hacking priv8 network

IPSEC

• Set of Protocols.

• AH, ESP, IKE, Encryption.

• Layer 3, Network

• udp 500, 4500, IP 50,51

Page 15: idsecconf2010-hacking priv8 network

Famous Issue with The IPSECs VPN

Page 16: idsecconf2010-hacking priv8 network

Cisco “password 7” type encoding = l33t :P

Page 17: idsecconf2010-hacking priv8 network

Core Issue !

supportforums.cisco.com

Page 18: idsecconf2010-hacking priv8 network

Aggressive Mode Issue

• Quick Handshake.

• Hash in Plaintext.

• Dedicated IP not a mandatory.

• User (ID) not a mandatory.

Page 19: idsecconf2010-hacking priv8 network

Well Known Tools

• Ike-Scan

• Ike-probe

• IKEprober

• ikecrack-snarf

Page 20: idsecconf2010-hacking priv8 network

Custom Tools?

Page 21: idsecconf2010-hacking priv8 network

How it works

Page 22: idsecconf2010-hacking priv8 network

What Next?

• Crack the PSK with known Tools

• psk-crack

• Build Your Own Cracker (not so hard but not done :P)

Page 23: idsecconf2010-hacking priv8 network

Other Issue• Vendor Issue with the device/protocl

implementation (!google)

• Configuration Issue

• Split tunneling

• Transform Mode

• Credential storing

• Un-encrypted

• Not Secure

Page 24: idsecconf2010-hacking priv8 network

host client

site client

WEB server

airport

DB server

Internet

IPSEC Tunnel

SITE-TO-SITE

REMOTE ACCESS (software client)

[ Show Over ]

Page 25: idsecconf2010-hacking priv8 network
Page 26: idsecconf2010-hacking priv8 network

Survive

• “Eliminate transport mode and the AH protocol, and fold authentication of the ciphertext into the ESP protocol, leaving only ESP in tunnel mode.”

http://www.schneier.com/paper-ipsec.html

Page 27: idsecconf2010-hacking priv8 network

Survive• Dont Use PSK please :)

• Disable Aggresive Mode in the device

• Network Filtering

• Never use Dynamic IP

• Filter IP to connect to Gateway

Page 28: idsecconf2010-hacking priv8 network
Page 29: idsecconf2010-hacking priv8 network

Reference• PSK Cracking using IKE Aggressive Mode - Michael

Thumann

• IPSec VPN Design - Vijay Bollapragada, Mohamed Khalid, Scott Wainner

• Great Old “google” also for “most of the” images.

Page 30: idsecconf2010-hacking priv8 network

Thanks@y3dips