Through the Looking-Glass, and what Eve found there
http://www.s3.eurecom.fr/lg/
Luca 'kaeso' Bruno <lucab@debian.org>, Mariano 'emdel' Graziano <graziano@eurecom.fr>
Through the Looking-Glass, and what Eve found there - - PowerPoint PPT Presentation
Through the Looking-Glass, and what Eve found there http://www.s3.eurecom.fr/lg/ Luca 'kaeso' Bruno <lucab@debian.org>, Mariano 'emdel' Graziano <graziano@eurecom.fr> About us S3 group at Eurecom (FR) - System security
Luca 'kaeso' Bruno <lucab@debian.org>, Mariano 'emdel' Graziano <graziano@eurecom.fr>
2 10/08/2014
3 10/08/2014
4 10/08/2014
5 10/08/2014
6 10/08/2014
7 10/08/2014
8 10/08/2014
9 10/08/2014
10 10/08/2014
11 10/08/2014
http://www.caida.org/research/topology/as_core_network/2014/
12 10/08/2014
http://blog.thousandeyes.com/4-real-bgp-troubleshooting-scenarios/
13 10/08/2014
14 10/08/2014
15 10/08/2014
Public IP (data+BGP) Private admin (telnet/SSH) Public web (looking-glass)
Internet
AS64496
NOC
AS64497
NOC
AS64498
NOC
Private net Public net
16 10/08/2014
17 10/08/2014
18 10/08/2014
19 10/08/2014
– Enable CGI/mod_php/mod_perl – Protect config files – Protect private SSH keys
20 10/08/2014
– Improper escaping – XSS/CSRF/etc.
21 10/08/2014
– Embedded third-party tools – Forked/modified modules
22 10/08/2014
– Missing input escaping – Command injection to router – Known bugs in router CLI
23 10/08/2014
– Reroute/blackhole local traffic – Announce bogus BGP prefixes
24 10/08/2014
25 10/08/2014
– Stored in cleartext: IPs, usernames
– Configuration files at known URLs
– XSS vulnerabilities in LG, to target
26 10/08/2014
27 10/08/2014
28 10/08/2014
29 10/08/2014
as.txt CHANGELOG communities.txt COPYING favicon.ico lg.cgi lg.conf makeaslist.pl makedb.pl README
30 10/08/2014
31 10/08/2014
32 10/08/2014
33 10/08/2014
34 10/08/2014
– Automated resource mapping
– Automated command injection – Automated attacks from multiple AS
35 10/08/2014
– But other NOC services often are under the
36 10/08/2014
37 10/08/2014
38 10/08/2014
39 10/08/2014
40 10/08/2014
– CVE-2014-3931 in MRLG
–
fastping.c:546 Riempie_Ritardi( *((long *)&(icp->icmp_data[8])) , triptime );
41 10/08/2014
42 10/08/2014
– WONTFIX by upstream
– But you get host time in ICMP echo request!
– And you have 100 probes on every try
43 10/08/2014
44 10/08/2014
45 10/08/2014
46 10/08/2014
47 10/08/2014
48 10/08/2014
– and escalate quickly!
49 10/08/2014
Thanks to all the members of NOPS team, who helped in bug-finding
50 10/08/2014
– Type-0, Type-5, Type-4 (cisco-sr-20130318-type4)
– Cisco, AAA Command Authorization by-pass (cisco-
sr-20060125-aaatcl)
– Juniper, Unauthorized user can obtain root access
using CLI (JSA10420)
– Juniper, Multiple privilege escalation vulnerabilities
in Junos CLI (JSA10608)
51 10/08/2014