introduction mitm 101 easy traffic manipulation techniques using scapy

15
Introduction MITM 101 Easy Traffic Manipulation Techniques Using Scapy

Upload: bennett-conley

Post on 13-Dec-2015

233 views

Category:

Documents


8 download

TRANSCRIPT

Page 1: Introduction MITM 101 Easy Traffic Manipulation Techniques Using Scapy

Introduction

MITM 101Easy Traffic Manipulation Techniques Using

Scapy

Page 2: Introduction MITM 101 Easy Traffic Manipulation Techniques Using Scapy

Introduction

Bob Simpson@bobby_simpson

Bob Simpson has fun researching security…

and is CIO for Finley & Cook, PLLC, and inventor of GhostSentry, a technology that uses MITM techniques for good purposes.

Page 3: Introduction MITM 101 Easy Traffic Manipulation Techniques Using Scapy

What is MITM?

MITM (aka MiTM, MitM, etc.)

• NOT just sniffing

• Involves getting in the middle of a two-way conversation

• Often explained as Alice talking to Bob, with Mallory in the middle convincing Alice that she’s Bob, and Bob that she’s Alice.

Picture from https://en.wikipedia.org/wiki/Man-in-the-middle_attack

Page 4: Introduction MITM 101 Easy Traffic Manipulation Techniques Using Scapy

What is MITM?

Let’s do it!

[ DEMO ]

Picture from https://en.wikipedia.org/wiki/Man-in-the-middle_attack

Page 5: Introduction MITM 101 Easy Traffic Manipulation Techniques Using Scapy

What do we get?

• What do we get?• Reconnaissance (fingerprinting)• NTLM capture, relay, escalation, redirection• SSL bypass• Steal and/or break credentials• Or, simple redirection ( … and the resulting

software download, browser exploit, etc)

Page 6: Introduction MITM 101 Easy Traffic Manipulation Techniques Using Scapy

What do we get?

• What do we get?• Pwnage!!!

Page 7: Introduction MITM 101 Easy Traffic Manipulation Techniques Using Scapy

How is it done?

Google it:• Tools:

• Ettercap, Cain and Abel, Arpspoofing, mitmf, websploit, Burp suite, SSL Strip, middler, Fiddler2, Subterfuge, DSniff, wsniff, and commercial stuff (Hack5’s new LanTurtle)

• Methods:

• ICMP redirect, STP Mangling, Route mangling, imposter domains and URLs

• Attacking local systems

• ARP, DNS, STP, hardware

• Attacking remote systems

• DNS, route mangling, proxy and tunneling

Page 8: Introduction MITM 101 Easy Traffic Manipulation Techniques Using Scapy

How is it done?

Why easy is good:

From the DEF CON

ROOTZ Asylum

area:

Page 9: Introduction MITM 101 Easy Traffic Manipulation Techniques Using Scapy

Let’s do it!

Our Setup:• Tools:

• Scapy (packet manipulation for Python)

• NFQUEUE (bindings for netfilter queue)

• Method:

• Bridging

Page 10: Introduction MITM 101 Easy Traffic Manipulation Techniques Using Scapy

Basic Method

• Preparation:• Ubuntu 14.04 (or your own flavor)• Apt-get install bridge-utils, scapy, python-

nfqueue• Execution:• Follow the three steps:

1. Create a Bridge2. Redirect Packets to Scapy3. Mangle to your hearts content

Page 11: Introduction MITM 101 Easy Traffic Manipulation Techniques Using Scapy

Basic Method

Let’s do it!

[ DEMO ]

Page 12: Introduction MITM 101 Easy Traffic Manipulation Techniques Using Scapy

Summary

• Preparation• Ubuntu 14.04 (or your own flavor)• Apt-get install bridge-utils, scapy, python-

nfqueue• Execution• Follow the three steps:

1. Create a Bridge2. Redirect Packets to Scapy3. Mangle to your hearts content

Page 13: Introduction MITM 101 Easy Traffic Manipulation Techniques Using Scapy

Summary

Google Scapy and NFQUEUE for great tutorials

Page 14: Introduction MITM 101 Easy Traffic Manipulation Techniques Using Scapy

Q&A

What would you like to know?

Page 15: Introduction MITM 101 Easy Traffic Manipulation Techniques Using Scapy

The End

Bob Simpson@bobby_simpson