blackholing the internet a live demo
play

Blackholing the Internet: A Live Demo Adam Rapley me@adamrapley.com - PowerPoint PPT Presentation

Blackholing the Internet: A Live Demo Adam Rapley me@adamrapley.com @admrply keybase.io/admrply Who am I? 3nd year Ethical Hacking student at Abertay. Does web things. Artist/Musician. Building and Breaking IoT. What is BGP


  1. Blackholing the Internet: A Live Demo � Adam Rapley � me@adamrapley.com � @admrply � keybase.io/admrply

  2. Who am I? 3nd year Ethical Hacking student at Abertay. Does web things. Artist/Musician. Building and Breaking IoT.

  3. What is BGP • Border Gateway Protocol • Routing algorithm between ASs • Advertise prefixes that you manage • IP prefix • AS-PATH • Avoid loops - This is crucial for later in the talk • Or, y’know… Don’t.

  4. BGP Win Conditions • For the same length prefix • Shortest AS-PATH wins • For different length prefixes • The more specific prefix wins.

  5. ISP Relationships • BT tells Virgin about it’s customers and vice versa • Version tells Sprint about it’s customers and vice versa. • These are shared through BGP UPDATE messages. • Updates from customers are passed to their upstream provider • This is all trust based • No PKI • No validation

  6. How do we get IP addresses? • ICANN assigns IP blocks to RIRs • RIPE in the EU • ARIN in the US • RIRs assign to ISPs • These IP addresses are NOT assigned to ASNs

  7. Implementation Errors • Minimal filtering on the upstream edge router • Rate limiting • Only originating • No local filtering on networks • BGP Propagation • Internal network • As soon as you hit a “backbone AS”, job done.

  8. Real World Examples • AS 7007 • Spamming unassigned blocks • YouTube Pakistan • Hacking Team × Italian Police SpecOps Division • Bitcoin Stealing

  9. Demo Time!

  10. Can we MITM this? • Yes. • Yes we can. • Need to serve the real website! • How do we stop our own next hop router from returning our own traffic • AS-PATH ASN prefixing

  11. Keeping the path open AS 60 AS 500 AS 20 AS 10 AS 700 AS 30 AS 600 AS 50 AS 40

  12. Keeping the path open AS 60 AS 500 AS 20 AS 10 AS 700 AS 30 AS 600 AS 50 AS 40 100.50.0.0/24

  13. Keeping the path open AS 60 AS 500 AS 20 AS 10 AS 700 AS 30 AS 600 AS 50 AS 40 100.50.0.0/24

  14. Keeping the path open AS 60 AS 500 AS 20 AS 10 AS 700 AS 30 AS 600 AS 50 AS 40 100.50.0.0/24

  15. Keeping the path open AS 60 AS 500 AS 20 AS 10 AS 700 AS 30 AS 600 AS 50 AS 40 100.50.0.0/24

  16. Keeping the path open AS 60 AS 500 AS 20 AS 10 AS 700 AS 30 AS 600 AS 50 AS 40 100.50.0.0/24

  17. Keeping the path open AS 60 AS 500 AS 20 AS 10 AS 700 AS 30 AS 600 AS 50 AS 40 100.50.0.0/24

  18. Keeping the path open AS 60 AS 500 AS 20 AS 10 AS 700 AS 30 AS 600 AS 50 AS 40 100.50.0.0/24

  19. Keeping the path open AS 60 AS 500 AS 20 AS 10 AS 700 AS 30 AS 600 AS 50 AS 40 100.50.0.0/24

  20. Keeping the path open AS 60 AS 500 100.50.0.0/25 AS 20 AS 10 AS (With AS 10 and AS 40 in AS-PATH 700 AS 30 AS 600 AS 50 AS 40 100.50.0.0/24

  21. Keeping the path open AS 60 AS 500 100.50.0.0/25 AS 20 AS 10 AS (With AS 10 and AS 40 in AS-PATH 700 AS 30 AS 600 AS 50 AS 40 100.50.0.0/24

  22. Keeping the path open AS 60 AS 500 100.50.0.0/25 AS 20 AS 10 AS (With AS 10 and AS 40 in AS-PATH 700 AS 30 AS 600 AS 50 AS 40 100.50.0.0/24

  23. Keeping the path open AS 60 AS 500 100.50.0.0/25 AS 20 AS 10 AS (With AS 10 and AS 40 in AS-PATH 700 AS 30 AS 600 AS 50 AS 40 100.50.0.0/24

  24. Keeping the path open AS 60 AS 500 100.50.0.0/25 AS 20 AS 10 AS (With AS 10 and AS 40 in AS-PATH 700 AS 30 AS 600 AS 50 AS 40 100.50.0.0/24

  25. Keeping the path open AS 60 AS 500 100.50.0.0/25 AS 20 AS 10 AS (With AS 10 and AS 40 in AS-PATH 700 AS 30 AS 600 AS 50 AS 40 100.50.0.0/24

  26. Hijacking the AS-PATH • Prepend the AS-PATH with the correct route • Right down to the originating AS • set as-path prepend 10 40 600 • Set a static route towards the correct path • set ip route <10>

  27. Mitigations • Know someone at the ISP • Route Flapping • Very ineffective • Secure alternatives • S-BGP • psBGP • soBGP

  28. Mitigations for the Mitigations • Uptake • … • IPv6.

  29. Questions? � Adam Rapley � me@adamrapley.com � @admrply � keybase.io/admrply

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend