62
Fear the Evil FOCA Attacking Internet Connections with IPv6 Chema Alonso @chemaAlonso [email protected]

Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Embed Size (px)

DESCRIPTION

Talk delivered by Chema Alonso in DEFCON 21 about man in the middle attacks using IPv6 with Evil FOCA.

Citation preview

Page 1: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Fear the Evil FOCAAttacking Internet Connections with IPv6

Chema Alonso@chemaAlonso

[email protected]

Page 2: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Spain is different

Page 3: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Spain is different

Page 4: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Spain is different

Page 5: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Spain is different

Page 6: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6
Page 7: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

ipconfig

Page 8: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

IPv6 is on your box!

Page 9: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

And it works!: route print

Page 10: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

And it works!: ping

Page 11: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

And it works!: ping

Page 12: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

LLMNR

Page 13: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

ICMPv6 (NDP)• No ARP– No ARP Spoofing– Tools anti-ARP Spoofing are useless

• Neighbor Discovery Protocol uses ICPMv6– NS: Neighbor Solicitation– NA: Neighbor Advertisement

Page 14: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

And it works!: Neightbors

Page 15: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

NS/NA

Page 16: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Level 1: Mitm with NA Spoofing

Page 17: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

NA Spoofing

Page 18: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

NA Spoofing

Page 19: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Demo 1: Mitm using NA Spoofing and capturng SMB files

Page 20: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Spaniards!

Page 21: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6
Page 22: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 1: Evil FOCA

Page 23: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 2: Connect to SMB Server

Page 24: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 3: Wireshark

Page 25: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 4: Follow TCP Stream

Page 26: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

LEVEL 2: SLAAC Attack

Page 27: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

ICMPv6: SLAAC• Stateless Address Auto Configuration• Devices ask for routers• Routers public their IPv6 Address• Devices auto-configure IPv6 and Gateway– RS: Router Solicitation– RA: Router Advertisement

Page 28: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Rogue DHCPv6

Page 29: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

DNS Autodiscovery

Page 30: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

And it works!: Web Browser

Page 31: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Not in all Web Browsers…

Page 32: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Windows Behavior• IPv4 & IPv6 (both fully configured)– DNSv4 queries A & AAAA

• IPv6 Only (IPv4 not fully configured)– DNSv6 queries A

• IPv6 & IPv4 Local Link– DNSv6 queries AAAA

Page 33: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

From A to AAAA

Page 34: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

DNS64 & NAT64

Page 35: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Demo 2: 8ttp colonSLAAC SLAAC

Page 36: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 1: No AAAA record

Page 37: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 2: IPv4 not fully conf. DHCP attack

Page 38: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 3: Evil FOCA SLAAC Attack

Page 39: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 4: Victim has Internet over IPv6

Page 40: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Level 3: WPAD attack in IPv6

Page 41: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

WebProxy AutoDiscovery• Automatic configuation of Web Proxy

Servers• Web Browsers search for WPAD DNS

record• Connect to Server and download

WPAD.pac• Configure HTTP connections through

Proxy

Page 42: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

WPAD Attack• Evil FOCA configures DNS Answers

for WPAD• Configures a Rogue Proxy Server

listening in IPv6 network• Re-route all HTTP (IPv6) connections

to Internet (IPv4)

Page 43: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Demo 3: WPAD IPv6 Attack

Page 44: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 1: Victim searhs for WPAD A record using LLMNR

Page 45: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 2: Evil FOCA answers with AAAA

Page 46: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 3: Vitim asks (then) for WPAD AAAA Record using LLMNR

Page 47: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 4: Evil FOCA confirms WPAD IPv6 address…

Page 48: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 5: Victims asks for WPAD.PAC file in EVIL FOCA IPv6 Web Server

Page 49: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 6: Evil FOCA Sends WPAD.PAC

Page 50: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 7: Evil FOCA starts up a Proxy

Page 51: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Bonus Level

Page 52: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

HTTP-s Connections• SSL Strip

– Remove “S” from HTTP-s links

• SSL Sniff– Use a Fake CA to create dynamicly Fake CA

• Bridging HTTP-s– Between Server and Evil FOCA -> HTTP-s– Between Evil FOCA and victim -> HTTP

• Evil FOCA does SSL Strip and Briding HTTP-s (so far)

Page 53: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Google Results Page• Evil FOCA will:– Take off Google Redirect– SSL Strip any result

Page 54: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 8: Victim searchs Facebook in Google

Page 55: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 9: Connects to Facebook

Page 56: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Step 10: Grab password with WireShark

Page 57: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Other Evil FOCA Attacks• MiTM IPv6

– NA Spoofing– SLAAC attack– WPAD (IPv6)– Rogue DHCP

• DOS– IPv6 to fake MAC using NA

Spoofing (in progress)– SLAAC DOS using RA

Storm

• MiTM IPv4– ARP Spoofing– Rogue DHCP (in

progress)– DHCP ACK injection– WPAD (IPv4)

• DOS IPv4– Fake MAC to IPv4

• DNS Hijacking

Page 58: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

SLAAC D.O.S.

Page 59: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Conclusions• IPv6 is on your box

– Configure it or kill it (if possible)

• IPv6 is on your network– IPv4 security controls are not enough– Topera (port scanner over IPv6)– Slowloris over IPv6– Kaspersky POD– Michael Lynn & CISCO GATE– SUDO bug (IPv6)– …

Page 60: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Big Thanks to• THC (The Hacker’s Choice)– Included in Back Track/Kali– Parasite6– Redir6– Flood_router6– …..

• Scappy

Page 61: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Street Fighter “spanish” Vega

Page 62: Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6

Enjoy Evil FOCA• http://www.informatica64.com/evilfoca

/• Next week, Defcon Version at:• http://blog.elevenpaths.com

[email protected] • @chemaalonso