Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Transcript of RMLL2009
Network virtualisation using Netkit and Dynamips
07.08.09 Network and security architect and Chef Security Officer (CSO) of French Ministry of Education
Teacher at INSA Rouen (French Engineer School)
Blog: http://blog.foll.name Netkit
Linux network emulation Netkit's Features
Created by the italian university Roma 3
Run on Linux
Based on UML (User Mode Linux)
Just need to download and unzip three (big) files
Don't need to have "root" privileges to install or use it
Permit to simulate complex networks
Can access to guest/outside using TAP interfaces. DEMO
http://www.youtube.com/watch?v=zrY0Q-hNyNw Is netkit (ie linux) suitable to play with/to teach networks?
Support of IPv4/IPv6 for routing and firewalling.
Many dynamic routing protocols (BGP, OSPF, RIP, IS-IS) thanks to Quagga.
Supports many network protocols (GRE, 802.1Q, IPSec, STP, ...) and even MPLS!
Netkit images integrate most of tools usefull for networkers (tcpdump, dsniff, snort, nmap, ...)
Netkit images are based on debian unstable and it's possible to add packages with an "apt-get". Limitations
Quagga isn't a real Cisco CLI
Doesn't support proprietary protocols like EIGRP.
Doesn't support weired layer 2 protocols like ATM
Doesn't support the whole Spanning Tree family
Lack of many networks features (L2TPv3, VTP, full support of MPLS, ...) "Need to buy cisco appliances
just to play at home???" Dynamips/Dynagen/GNS3
By Christophe Fillot, Université de Technologie Compiègne
Dynamips is a Cisco emulator
Like Gameboy, Super NES, ...
You provide the firmware, Dynamips emulate the hardware.
Works with 1700, 2600, 3600, 3700, and 7200.
Doesn't support Catalyst (ie switch) but supports NM-16ESW cards (ie switch cards).
Can access to guest host using TAP interfaces.
Text based front end for Dynamips
A graphical front end for Dynagen DEMO
http://www.youtube.com/watch?v=tgXFJAjf-B0 Using Netkit & GNS3 together?
On the same guest host? It's possible by bridging TAP interfaces OK, netkit and Dynamips are nice tools to learn networks but what else?
You want to try the Kaminsky's DNS flaw in various scenarios (patched/unpatched system, recursive/forwarding cache, timing issue, ...)
netkit is your friend!
You've hacked a router during a pentest (the good old cisco/cisco default password :))
You can reproduce the exact configuration on your laptop ("show run" and then "copy/paste") in order to make tests before breaking everything.
And what about using a Dynamips machine to play with the cisco router you've just hacked? Kaminsky's DNS flaw
If a cache DNS server doesn't randomize its source port request, you can inject false records on it
You can tell to "ns.orange.fr" that gmail.com has the address 18.104.22.168 (or anything else).
Very nice in order to run "man in the middle" attacks.
How does it work?
You ask to the cache server "what is azerty123.foll.local".
Before he gets answer from authoritative DNS server of foll.local, you send fake answer with additional record saying that www.foll.local has 22.214.171.124 as IP address.
You just have to guess the "query ID" (16bits) and answer before the real server does. Netkit lab
First with authoritative DNS servers (root, master of "local.", master of "foll.local.") and the web server "www.foll.local".
Second with a client and two cache dns:
cachedns isn't patched and all its request are from the source port 12345.
cachedns2 is patched and each request is sent by a random source port.
The router R has access to these networks and has a third interface on TAP in order to access to the guest.
We attack the client from the guest with metasploit. Demo
The lab is available on http://blog.foll.name Using Dynamips as a pentester?
Few attacks on a router/switch
Use of DTP to force the port to which you're connected to become a trunk.
Use STP to become the root of the tree.
Play with dynamic routing protocol to do re-draw network topology
Mount tunnel between your host and a hacked router
Why use Dynamips?
You can use TAP to access to outside.
No need to collect a bunch of tools to emulate proprietary protocols (like yersinia for DTP)
Some protocols aren't supported at all on linux (EIGRP, L2TPv3, ...) and may be very useful for a hacker. Thanks
for your attention