router forensics

22
TARUNA SINGH 1208213035

Upload: taruna-chauhan

Post on 15-Jul-2015

96 views

Category:

Engineering


2 download

TRANSCRIPT

Page 1: Router forensics

TARUNA SINGH1208213035

Page 2: Router forensics

AGENDA Introduction Overview of Routers Router Attack Topology Common Router Attacks Performing Forensics Incidence Investigation Accessing the Router Documentation What are the “BAD GUYS” doing What are the “GOOD GUYS” doing Why do we need to protect Router Resources Why do we need outer Forensics

Page 3: Router forensics

INTRODUCTION

It is the application of proven scientific methods and techniques in order to recover data from routers in case of an intruder attack and apply forensics( law enforcement, documentation of the incidence) .

Page 4: Router forensics

WHAT IS ROUTER?

A computer that specializes in sending packets over the data network. They are responsible for interconnecting n/w by selecting the bestpath for a packetto travel to theirdestinations.

Page 5: Router forensics

HOW DOES ROUTER WORK

Routers forward data packets from one router to another using various routing protocols and routing table, to choose the optimum path.

The routing table may contain various fields.

Page 6: Router forensics

COMMUNICATION WITH ROUTERS

Through local cable Throughmodem Throughterminalemulation software

Page 7: Router forensics

ROUTER COMPONENTS

ROM POST IOS RAM Flash memory NVRAM

Page 8: Router forensics

PORTS ON ROUTER

LAN Ports

WAN Ports Administrative ports

-Console ports-Auxiliary ports

Page 9: Router forensics

MODES OF ROUTER

Setup Mode User Mode Privileged Mode Global Configuration Mode Interface Mode

Page 10: Router forensics

ROUTER ATTACK TOPOLOGY

Reconnaissance Scanning and enumerationGaining access Escalation of privilegeMaintaining accessCovering tracks and placing backdoors

Page 11: Router forensics

COMMON ROUTER ATTACKS

Denial of Service AttacksPacket Mistreating AttacksRouting Table PoisoningHit and Run AttacksPersistent Attacks

Page 12: Router forensics

PERFORMING FORENSICS

CollectionExaminationAnalysisReporting

Page 13: Router forensics

GATHER VOLATILE ROUTER DATA

Connect to console port for this need cable and laptop with terminal emulation software.Record System Time and determine who is logged on Save the router configuration.Review the routing table to detect malicious static routes modified by attacker.View the ARP cache for evidence for IP or MAC spoofing

Page 14: Router forensics

INCIDENCE INVESTIGATION

Direct compromise: via physical access,

listening services, password guessing by TFTP, console access

Routing table manipulations: by

modifying routing protocols( RIP, IGRP), review routing table with “show IP route”

Theft of Information: via access control

and network topology

DoS: resource and bandwidth consumption

reduces functionality and n/w bandwidth

Page 15: Router forensics

Contd...

FOR RECOVERY:Eliminate listening servicesUpgrade of softwareAccess restrictionAuthenticationChange all passwordsAvoid password reuseRemove static routing entries

Page 16: Router forensics

ACCESSING THE ROUTER

DO

Access the router through the console

Record your entire console session

Run show commandsRecord the actual

time and the router’s time

Record the volatile information

DON’T

REBOOT THE ROUTER

Access the router through the network

Run configuration commands

Rely only on persistent information

Page 17: Router forensics

DOCUMENTATION

Chain of Custody: to prove the integrity

of the evidence

Case reports: employee remediation,

employee termination ,civil proceedings, criminal prosecution, case Summary, bookmarks

Incident response: it is the effort of an

organisation to define and document the nature and scope of a computer security incident.

Page 18: Router forensics

WHAT THE “BAD GUYS” ARE DOING

Internet Router Protocol Attack Suite (IRPAS): A suite of tools designed to abuse

inherent design insecurity in routers and routing protocols –Tools: ass, igrp, hsrp

VIPPR: Can be used to establish MITM for

compromised routers

UltimaRatio: Working exploit tool for use

against 1000, 1600/1700 and 2600 series routers

Research

Page 19: Router forensics

WHAT THE GOOD GUYS ARE DOING

Router Audit Tool (RAT): Written in Perl,

highly customizable, Passive tool to analyze a Cisco router, Scores the overall security of your router, Support for Unix and Windows systems

Books, white papers on securing routersEmploy strong authentication: encrypted

traffic mgmt, two phase authentication, centralised authentication source.

Page 20: Router forensics

WHY WE NEED TO PROTECT ROUTER RESOURCES

Often the “heart” of the network Gaining a lot more attention from attackers Few procedures on hardening routersRouters are much slower to get upgraded to solve security bugsFew people monitor their configurations regularlyFew security measures in placeThere are millions of them

Page 21: Router forensics

NEED FOR ROUTER FORENSICS

Operational TroubleshootingLog Monitoring Data RecoveryData AcquisitionDue Diligence/Regulatory compliance

Page 22: Router forensics