40
K &T :: IGS :: MAF K &T :: IGS :: MAF 1 VLANs Layer 2 Attacks: VLANs Layer 2 Attacks: Their Relevance Their Relevance and and Their Kryptonite Their Kryptonite

VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

Embed Size (px)

Citation preview

Page 1: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

K &T :: IGS :: MAFK &T :: IGS :: MAF 11

VLANs Layer 2 Attacks:VLANs Layer 2 Attacks:

Their Relevance Their Relevance and and

Their KryptoniteTheir Kryptonite

Page 2: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF22

Security is only as strong as the weakest linkSecurity is only as strong as the weakest link Layer 2 attacks are timeworn but still relevant in today's networking Layer 2 attacks are timeworn but still relevant in today's networking

environmentenvironment Crime and security survey show different types of attacks for the year of Crime and security survey show different types of attacks for the year of

2007. CSI / FBI surveys also show that 9 of 19 types of attacks could 2007. CSI / FBI surveys also show that 9 of 19 types of attacks could target routers and switches target routers and switches

Attacks (o

ther)

Possible Layer 2

Page 3: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

Cisco 3600, 2600 routersCisco 3600, 2600 routers Cisco 2900, 3500, 4006 switchesCisco 2900, 3500, 4006 switches Wifi Netgear & Cisco-LinksysWifi Netgear & Cisco-Linksys

ToolsTools ScapyScapy YersiniaYersinia MacofMacof TCPDumpTCPDump Cain & AbelCain & Abel EtterCapEtterCap EtherealEthereal

K &T :: IGS :: MAFK &T :: IGS :: MAF

33

Equipment Equipment

Attacks Attacks ARP AttacksARP Attacks MAC Flooding Attack/ CAM Table Overflow AttacksMAC Flooding Attack/ CAM Table Overflow Attacks DHCP Starvation AttackDHCP Starvation Attack CDP AttackCDP Attack Spanning-Tree AttackSpanning-Tree Attack Multicast Brute ForceMulticast Brute Force VLAN Trunking Protocol AttackVLAN Trunking Protocol Attack Private VLAN AttackPrivate VLAN Attack VLAN Hopping AttackVLAN Hopping Attack Double-Encapsulated 802.1Q/Nested VLAN AttackDouble-Encapsulated 802.1Q/Nested VLAN Attack VLAN Management Policy server VMPS/ VLAN VLAN Management Policy server VMPS/ VLAN

Query Protocol VQP AttackQuery Protocol VQP Attack

Page 4: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

How to get a lab for testing purposesHow to get a lab for testing purposes

K &T :: IGS :: MAFK &T :: IGS :: MAF 44

Page 5: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

Just ask HD Moore’s ISPJust ask HD Moore’s ISP Someone was ARP poisoning the IP Someone was ARP poisoning the IP

addressaddressExample: Metasploit.com ISP PIMPED! Example: Metasploit.com ISP PIMPED!

13:04:39.768055 00:15:f2:4b:cd:3a > 00:15:f2:4b:d0:c9, ethertype ARP (0x0806), length 60: arp reply 216.75.15.1 is-at 00:15:f2:4b:cd:3a13:04:39.768055 00:15:f2:4b:cd:3a > 00:15:f2:4b:d0:c9, ethertype ARP (0x0806), length 60: arp reply 216.75.15.1 is-at 00:15:f2:4b:cd:3a13:04:40.397616 00:15:f2:4b:cd:3a > 00:15:f2:4b:d0:c9, ethertype ARP (0x0806), length 60: arp reply 216.75.15.1 is-at 00:05:dc:0c:84:0013:04:40.397616 00:15:f2:4b:cd:3a > 00:15:f2:4b:d0:c9, ethertype ARP (0x0806), length 60: arp reply 216.75.15.1 is-at 00:05:dc:0c:84:0013:04:40.397686 00:15:f2:4b:cd:3a > 00:15:f2:4b:d0:c9, ethertype ARP (0x0806), length 60: arp reply 216.75.15.1 is-at 00:15:f2:4b:cd:3a13:04:40.397686 00:15:f2:4b:cd:3a > 00:15:f2:4b:d0:c9, ethertype ARP (0x0806), length 60: arp reply 216.75.15.1 is-at 00:15:f2:4b:cd:3a

K &T :: IGS :: MAFK &T :: IGS :: MAF 55

Page 6: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 66

ARP Poisoning: Simple and effectiveARP Poisoning: Simple and effective ARP may be used most but least respectedARP may be used most but least respected 250 other servers are hosted on the same local network at the same 250 other servers are hosted on the same local network at the same

service provider metasploit.com that were still vulnerable a month agoservice provider metasploit.com that were still vulnerable a month ago No authentication built into protocolNo authentication built into protocol Information leakageInformation leakage

Page 7: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 77

Page 8: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

ARP attack demoARP attack demoExample:Example:

11stst of its kind. Human ARP attack of its kind. Human ARP attack

K &T :: IGS :: MAFK &T :: IGS :: MAF 88

Page 9: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

Port SecurityPort Security Non changing ARP entries (don’t waste your time)Non changing ARP entries (don’t waste your time) DHCP Snooping (the network device maintains a record of DHCP Snooping (the network device maintains a record of

the MAC address that are connected to ARP port)the MAC address that are connected to ARP port) Arpwatch (listens to arp replies)Arpwatch (listens to arp replies) ArpONArpON

K &T :: IGS :: MAFK &T :: IGS :: MAF 99

Page 10: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 1010

MAC flooding attacks are often ignored in the corporate environment. MAC flooding – switch ports act like a hub when overloaded CAM table - table fills and the switch begins to echo any received frame

to all port (traffic bleeds out). Tools to perform this attack:

Dsniff Macof Cain & Able Ettercap

Page 11: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 1111

Macof at work flooding the Cisco switch

Page 12: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 1212

Switch is bleeding out the traffic

Page 13: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

Same as the ARP attack mitigationSame as the ARP attack mitigation

Limit amount of MAC addresses to be learned / port.Limit amount of MAC addresses to be learned / port.

Static MAC addresses configuration (not scalable but Static MAC addresses configuration (not scalable but most secure).most secure).

K &T :: IGS :: MAFK &T :: IGS :: MAF 1313

Page 14: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 1414

A DHCP Scope exhaustion (client spoofs other clients)A DHCP Scope exhaustion (client spoofs other clients) Installation of a rogue DHCP serverInstallation of a rogue DHCP server ToolsTools

YersiniaYersinia GobblerGobbler

Page 15: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 1515

Page 16: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF1616

Possible to setup a rogue DHCP server.The attacker may hijack traffic and this can have

devastating results.

Page 17: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

Demo TimeDemo Time DHCP Starvation Demo DHCP Starvation Demo

K &T :: IGS :: MAFK &T :: IGS :: MAF 1717

Page 18: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

By limiting the number of MAC addresses By limiting the number of MAC addresses on a switch port will reduce the risk of on a switch port will reduce the risk of DHCP starvation attacks.DHCP starvation attacks.

DHCP Snooping – monitors and restricts DHCP Snooping – monitors and restricts DHCPDHCP

K &T :: IGS :: MAFK &T :: IGS :: MAF 1818

Page 19: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 1919

• Cisco Discovery Protocol allows Cisco devices to Cisco Discovery Protocol allows Cisco devices to communicate amongst one another (IP address, software communicate amongst one another (IP address, software version, router model, etc) CDP is clear text and version, router model, etc) CDP is clear text and unauthenticated.unauthenticated.

• CDP Denial Of Service (Many companies do not upgrade their CDP Denial Of Service (Many companies do not upgrade their IOS often enough to 12.2.x and current versions of CatOS) IOS often enough to 12.2.x and current versions of CatOS)

• CDP cache overflow – a software bug can reset the switchCDP cache overflow – a software bug can reset the switch

• Power exhaustion – claiming to be a VoIP phone an attacker Power exhaustion – claiming to be a VoIP phone an attacker can reserve electrical powercan reserve electrical power

• CDP cache pollution – CDP table becomes unusable because CDP cache pollution – CDP table becomes unusable because it contains a lot of false information it contains a lot of false information

Page 20: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF2020

Page 21: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

Turn the sh*t offTurn the sh*t off Router # no cdp enableRouter # no cdp enable Switch (enable) set cdp disable 1/23Switch (enable) set cdp disable 1/23 The question is why is CDP enabled on a The question is why is CDP enabled on a

network? IP phones are popular, CDP is network? IP phones are popular, CDP is used in order to determine the actual used in order to determine the actual power requirement for the phone.power requirement for the phone.

K &T :: IGS :: MAFK &T :: IGS :: MAF 2121

Page 22: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 2222

Sending RAW Configuration BPDUSending RAW Configuration BPDU Sending RAW TCN BPDUSending RAW TCN BPDU DoS sending RAW Configuration BPDUDoS sending RAW Configuration BPDU DoS Sending RAW TCN BPDUDoS Sending RAW TCN BPDU Claiming Root RoleClaiming Root Role Claiming Other RoleClaiming Other Role Claiming Root Role Dual-Home (MITM)Claiming Root Role Dual-Home (MITM)

STP Attack – involves an attacker spoofing the root STP Attack – involves an attacker spoofing the root bridge in the topology bridge in the topology

AttacksAttacks

Page 23: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF2323

STP sending conf BPDUs DoSSTP sending conf BPDUs DoS

Page 24: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

Spanning tree functions must be disabled on all user Spanning tree functions must be disabled on all user interfaces but maintained for Network to Network interfaces but maintained for Network to Network Interfaces to avoid a network loop. Interfaces to avoid a network loop.

Enable Enable root guard root guard on Cisco equipment, or BPDU on Cisco equipment, or BPDU guard on users ports to disable the thus of priority zero guard on users ports to disable the thus of priority zero and hence becoming a root bridge.and hence becoming a root bridge.

Example:Example:#spanning-tree portfast dbduguard#spanning-tree portfast dbduguard#interface fa0/10#interface fa0/10#spanning-tree guard root#spanning-tree guard root

K &T :: IGS :: MAFK &T :: IGS :: MAF 2424

Page 25: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 2525

This involves spoofing, in rapid This involves spoofing, in rapid succession, a series of multicast framessuccession, a series of multicast frames

Frames leak into other VLANs if the Frames leak into other VLANs if the routing mechanism in place between the routing mechanism in place between the VLANSVLANS

Injecting packets into multicast also can Injecting packets into multicast also can cause a DoS scenariocause a DoS scenario

Page 26: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

Buy more capable switches!Buy more capable switches! The Layer 2 multicast packets should be The Layer 2 multicast packets should be

constrained within the ingress VLAN. No constrained within the ingress VLAN. No packets should be 'leaked' to other packets should be 'leaked' to other VLANs.VLANs.

K &T :: IGS :: MAFK &T :: IGS :: MAF 2626

Page 27: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 2727

VTP has the ability to add and remove VLAN from the VTP has the ability to add and remove VLAN from the network. (Someone will get fired if this happens!)network. (Someone will get fired if this happens!)

VTP involves a station sending VTP messages through VTP involves a station sending VTP messages through the network, advertising that there are no VLANs.the network, advertising that there are no VLANs.

All client VTP switches erase their VLANs once All client VTP switches erase their VLANs once receiving the messagereceiving the message

Attacks:Attacks: Sending VTP PacketSending VTP Packet Deleting all VTP VLANsDeleting all VTP VLANs Deleting one VLANDeleting one VLAN Adding one VLANAdding one VLAN

Page 28: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 2828

If you like your job don’t use VTP!If you like your job don’t use VTP!

Page 29: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 2929

Private VLANs only isolate traffic at Private VLANs only isolate traffic at Layer 2Layer 2

Forward all traffic via Layer 3 to get to the Forward all traffic via Layer 3 to get to the private VLANprivate VLAN

ScapyScapy is your best friend! is your best friend!

Page 30: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 3030

Page 31: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

Configure VLAN access lists on the Configure VLAN access lists on the router interface router interface

Example:Example: # vlan access-map map_name (0-65535)# vlan access-map map_name (0-65535)

K &T :: IGS :: MAFK &T :: IGS :: MAF 3131

Page 32: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 3232

Attacker configures a system to spoof Attacker configures a system to spoof itself as a switch by emulating either itself as a switch by emulating either 802.1q or ISL802.1q or ISL

Another variation involves tagging Another variation involves tagging transmitted frames with two 802.1q transmitted frames with two 802.1q headers. headers.

Page 33: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 3333

Page 34: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 3434

Disable auto-trunkingDisable auto-trunking Unused ports, other than trunk port should be removed.Unused ports, other than trunk port should be removed.

For backbone switch to switch connections, explicitly For backbone switch to switch connections, explicitly configure trunkingconfigure trunking

Do not use the user native VLAN as the trunk port native Do not use the user native VLAN as the trunk port native VLANVLAN

Do not use VLAN 1 as the switch management VLANDo not use VLAN 1 as the switch management VLAN

Page 35: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 3535

VLAN numbers and identification are VLAN numbers and identification are carried in a special extended format.carried in a special extended format.

Instead, outside of a switch, the tagging Instead, outside of a switch, the tagging rules are dictated by standards such as ISL rules are dictated by standards such as ISL or 802.1Q. or 802.1Q.

This allows the forwarding path to maintain This allows the forwarding path to maintain

VLAN isolation from end to end without loss VLAN isolation from end to end without loss of information. of information.

Page 36: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 3636

Page 37: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 3737

Ensure that the native VLAN is not Ensure that the native VLAN is not assigned to any portassigned to any port

Force all traffic on the trunk to always Force all traffic on the trunk to always carry a tagcarry a tag

Page 38: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 3838

The VLAN Management Policy Server is for assigning dynamically The VLAN Management Policy Server is for assigning dynamically created VLANs based on MAC/IP address or HTTP authentication created VLANs based on MAC/IP address or HTTP authentication (URT). VMPS is a centralized host information database which is can (URT). VMPS is a centralized host information database which is can be downloaded to servers via TFTP. be downloaded to servers via TFTP.

All VMPS traffic is in clear text, unauthenticated and over UDP, and All VMPS traffic is in clear text, unauthenticated and over UDP, and may be misused for hijacking purposes may be misused for hijacking purposes

Page 39: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 3939

VMPS traffic shall be transmitted on a Out Of Band VMPS traffic shall be transmitted on a Out Of Band basis (user traffic separate network) or not used.basis (user traffic separate network) or not used.

Page 40: VLANs Layer 2 Attacks - DEF CON® Hacking · PDF fileVLAN Layer 2 Attacks K &T :: IGS :: MAF 2 Security is only as strong as the weakest link Layer 2 attacks are timeworn but still

VLAN Layer 2 Attacks

K &T :: IGS :: MAFK &T :: IGS :: MAF 4040

Manage switches in as secure a manner as possible (SSH, OOB, permit Manage switches in as secure a manner as possible (SSH, OOB, permit lists, etc.)lists, etc.)

Always use a dedicated VLAN ID for all trunk ports. Be paranoid: do not Always use a dedicated VLAN ID for all trunk ports. Be paranoid: do not use VLAN 1 for anything.use VLAN 1 for anything.

Deploy port security.Deploy port security. Set users ports to a non trunking state.Set users ports to a non trunking state. Deploy port-security whenever possible for user ports.Deploy port-security whenever possible for user ports. Selectively use SNMP and treat community strings like root passwords.Selectively use SNMP and treat community strings like root passwords. Have a plan for the ARP security issues in your network.Have a plan for the ARP security issues in your network. Use private VLANS where appropriate to further divide L2 networks. Use private VLANS where appropriate to further divide L2 networks.

Disable all unused ports and put them in an unused VLAN.Disable all unused ports and put them in an unused VLAN. Consider 802.1X for the future and ARP inspectionConsider 802.1X for the future and ARP inspection Use BPDU guard, Root guardUse BPDU guard, Root guard Disable CDP whenever possibleDisable CDP whenever possible Ensure DHCP attack preventionEnsure DHCP attack prevention