Digging tunnels with SSH

SSH tunnels are an old trick, which is recently getting increasingly popular with all this content filtering happening at the corporate or even at the national level. This article demonstrates how to use SSH tunnels, bypass content filters and avoid port restrictions, even through HTTP proxy servers. . . . → Read More: Digging tunnels with SSH

ARP spoofing attack and defense

As described in Wikipedia, ARP spoofing (otherwise known as ARP poisoning or Arp Poison Routing – APR) is a Layer 2 attack that can be carried out in most internal networks and therefore is extremely dangerous. It’s main purpose is to sniff the communication of a client talking to a server, by intercepting or even modifying the traffic in order to decrypt the already encrypted traffic. This article will guide you through the process of understanding, demonstrating and protecting your network against this attack. . . . → Read More: ARP spoofing attack and defense

DHCP starvation - quick and dirty

The DHCP starvation attack is quite simple to implement and therefore quite dangerous, especially if it grows to a DHCP spoofing attack. It can be used to implement a Denial of Service (DoS) attack against the DHCP server on the local network, thus preventing legitimate clients from accessing network resources. In this article we will demonstrate how this attack can be deployed and later we will go through the steps necessary to mitigate it on Cisco equipment with the help of DHCP snooping. . . . → Read More: DHCP starvation – quick and dirty

IP over DNS

Sometimes while you are performing a penetration test, you need to break out from a supposedly isolated network like an internal VLAN in a bank, or a process network full of SCADA equipment. Such networks should be completely isolated from the Internet, so there is no chance that someone who has network access can implant a backdoor and either sneak out information or allow access from the outside. This article demonstrates how the often overlooked DNS service can be used to build a covert channel and why when you configure an isolated network, you shouldn’t allow even name resolution of external hosts. To demonstrate this we will use the NSTX tunnel software to build a dns tunnel and bypass firewall. . . . → Read More: IP over DNS

DTP - Share it

The one thing that is always overlooked, when someone tries to secure a network, is the user side. It is rare to see a DMZ network, that is protected by a firewall from the users. The general idea is that if you are an internal user, you have legitimate access to the servers, so there is no need to protect them from you. In this article we will discuss a frequently overlooked feature of Cisco switches called DTP, we will explain why is it dangerous and what are the steps to disable it. . . . → Read More: DTP – Share it

Wireless WEP (in)security

Wireless security has been a great concern for the IT security professionals from at least a decade. It is difficult to protect something that you can’t see, that goes through walls and that everyone close enough can eavesdrop, especially when the only wifi security in place is the deprecated wireless encryption protocol WEP. In this article we will break the wireless security of a demo network and we will obtain the wep key. We will use arp injection in order to facilitate this so called wep crack and we will do that so fast, that from now on you will always have second thoughts about wifi security. . . . → Read More: Wireless WEP (in)security

Metasploitable - your first training ground

Metasploitable is a VMWare based virtual machine running Ubuntu 8.04 server. A number of vulnerable services have been included, some of which are an install of tomcat 5.5 (with weak credentials), distcc, tikiwiki, twiki, and an older version of mysql server. . . . → Read More: Metasploitable – your first training ground