SlideShare uma empresa Scribd logo
1 de 29
Pentesting in SDN 
@espreto 
Owning the controllers
Who Am I? 
Roberto Soares 
Information Security Consultant 
Conviso Application Security 
@espreto
• Network (traditional) 
• SDN Overview 
• Threat Vectors 
• Pentesting 
• Defense 
• Future
Traditionally… 
• Specific Vendors; 
• Scalability; 
• Complexity; 
• Hardware Focus; 
• Interoperability; 
• etc… 
https://33.media.tumblr.com/tumblr_m8gl3iiTk51qjve0go1_500.gif
Classical Model 
1. Package sent to the switch. 
2. Switch looks in their polices. 
3. Switch forwards the packet to the server.
SDN 
http://www.algoblu.com/en/image/sdn_1.jpg 
(Software Defined Network)
SDN: Architecture 
Data Plane & Control Plane 
“SDN isn’t a technology, it’s a architecture”.
SDN: Technical 
1. Packet is sent to the switch. 
2. Packet header is extracted and sent to the controller. 
3. Controller (check) adds a new flow in the switch table. 
4. Switch forwards the packet to the server.
Vendors 
“SDN is just a fad…”
Controllers 
• Commercial 
• HP VAN SDN 
• Juniper Contrail 
• Oracle SDN 
• Cisco XNC 
• Huawei POF 
•Open-Source 
• Mininet 
• OpenDayLight 
• FloodLight 
• Juniper OpenContrail
OpenFlow 
• Communication between the controller and the switch 
(logical/physical). 
• Routing flow based. 
• Secure channel for transmission. 
• Allows for programming "Flows" (traffic type); 
• Allows for switching different network layers to be combined; 
• Not limited by the platform or be enforced by the protocols. 
“SDN != OpenFlow”
OpenFlow (internal) 
https://www.sdncentral.com/wp-content/uploads/2013/04/figure1.png
It’s time for revision! 
DEMO 1 SDN overview with mininet 
“Why set up your network if you can program it?”
Threat Vectors 
map.ipviking.com
Vectors! 
Control Plane Data Plane 
Admins
Attacks! 
1. Fake/Hijacked traffic flows. 
2. Switch vulnerabilities. 
3. Vulnerabilities on Control Plane communications. 
4. Controller vulnerabilities. 
5. Untrusted apps/plugins on controller. 
6. Vulnerabilities on admin computer. 
7. Lack of resources for security analysis. 
Specific to SDN
Attacks! 
1. Fake/Hijacked traffic flows. 
2. Switch vulnerabilities. 
3. Vulnerabilities on Control Plane communications. 
4. Controller vulnerabilities. 
5. Untrusted apps/plugins on controller. 
6. Vulnerabilities on admin computer. 
7. Lack of resources for security analysis.
Pentesting... 
1. Identify controllers. 
2. Enumerate configs.
Default Ports 
Controllers: 
FloodLight/Mininet/Pox/POF/HP VAN port 6633. 
Oracle SDN port 6522. 
Management Interface: 
FloodLight port 8080. 
OpenDayLight Web Interface port 8080. 
HP VAN SDN & IBM SDN-VE port 8443. 
Cisco XNC HTTP (8080) and HTTPS (8443).
It’s time for revision! 
DEMO 2 sdn_enum_controllers.rb 
https://github.com/espreto
Authentication 
Default passwords: 
FloodLight = floodlight:<null> 
OpenDayLight = admin:admin 
HP VAN SDN = admin:skyline 
Juniper Contrail = admin:contrail123 
IBM SDN-VE = admin:admin 
Cisco XNC = admin:admin
REST APIs 
• FloodLight port 8080 
• (http://localhost:8080/wm/core/controller/switchs/json) 
• OpenDayLight port 80/8080 
• (http://localhost/rest/v1/model/controller-node) 
• HP VAN SDN port 35357/8443 
• (https://localhost:8443/sdn/v2.0/auth) 
• Juniper Contrail port 8081/8082 
• (http://localhost:8081/analytics/uves) 
• IBM SDN-VE port 8443 
• (http://localhost:8443/one/nb/v2) 
• Cisco XNC port 8080 
• (http://localhost:8080/controller/nb/v2/monitor)
It’s time for revision! 
DEMO 3 
https://github.com/espreto 
sdn_enum_configs_api.rb
It’s time for revision! 
DEMO 4 
https://github.com/espreto 
sdn_hp_change_pass.rb
Real World... 
http://cdn.business2community.com/wp-content/uploads/2014/08/real_world_dwight_meme.jpg
Try Hard 
• VLANs? 
• IDS/IPS? 
• NAC? 
• Etc, etc, etc… 
Look: 
idle_timeout, hard_timeout, rtt values, etc. 
“Packet Analysis is your best friend”.
Defense 
• Apply controls in CP and DP; 
• Restrict access APIs; 
• Audit internal malicious activity; 
• Plugins/Applications that add levels of security; 
• Hardening; 
• Secure Development Lifecycle (SDLC); 
• Specialized intrusion tests; 
• Others… 
“Security must not be optional”.
Future... 
…of this research: 
• Coordination of CVEs with vendors; o/ 
• Advanced research with SDN; 
• Donations of Switches (OpenFlow supported);  
• Create a group to share information; 
• And… 
“Opportunities are usually disguised as hard work, so most people don't 
recognize them”. 
Ann Landers.
Questions? 
@espreto 
rsoares[at]conviso.com.br 
robertoespreto[at]gmail.com 
iwantshell.com

Mais conteúdo relacionado

Mais procurados

Process behaviour modelling using lsm
Process behaviour modelling using lsmProcess behaviour modelling using lsm
Process behaviour modelling using lsm
iaemedu
 
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat Security Conference
 

Mais procurados (20)

www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
DDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDNDDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDN
 
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
 
Spectre and Meltdown
Spectre and MeltdownSpectre and Meltdown
Spectre and Meltdown
 
Tinysec
TinysecTinysec
Tinysec
 
Windows Service Hardening
Windows Service HardeningWindows Service Hardening
Windows Service Hardening
 
Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware
 
Nsx security deep dive
Nsx security deep diveNsx security deep dive
Nsx security deep dive
 
The New Landscape of Airborne Cyberattacks
The New Landscape of Airborne CyberattacksThe New Landscape of Airborne Cyberattacks
The New Landscape of Airborne Cyberattacks
 
By25450453
By25450453By25450453
By25450453
 
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKSAN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
 
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
 
2008-03-06 Harris Corp Security Seminar
2008-03-06 Harris Corp Security Seminar2008-03-06 Harris Corp Security Seminar
2008-03-06 Harris Corp Security Seminar
 
Process behaviour modelling using lsm
Process behaviour modelling using lsmProcess behaviour modelling using lsm
Process behaviour modelling using lsm
 
Optimal software-defined network topology for distributed denial of service a...
Optimal software-defined network topology for distributed denial of service a...Optimal software-defined network topology for distributed denial of service a...
Optimal software-defined network topology for distributed denial of service a...
 
14 577
14 57714 577
14 577
 
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
 
2008-10-15 Red Hat Deep Dive Sessions: SELinux
2008-10-15 Red Hat Deep Dive Sessions: SELinux2008-10-15 Red Hat Deep Dive Sessions: SELinux
2008-10-15 Red Hat Deep Dive Sessions: SELinux
 
VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments
 
A review on software defined network security risks and challenges
A review on software defined network security risks and challengesA review on software defined network security risks and challenges
A review on software defined network security risks and challenges
 

Semelhante a BsidesSP: Pentesting in SDN - Owning the Controllers

Scada Strangelove - 29c3
Scada Strangelove - 29c3Scada Strangelove - 29c3
Scada Strangelove - 29c3
qqlan
 

Semelhante a BsidesSP: Pentesting in SDN - Owning the Controllers (20)

The dark side of SDN and OpenFlow
The dark side of SDN and OpenFlowThe dark side of SDN and OpenFlow
The dark side of SDN and OpenFlow
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same Coin
 
Sdn&security
Sdn&securitySdn&security
Sdn&security
 
Demystifying Software Defined Networking (SDN)
Demystifying Software Defined Networking (SDN)Demystifying Software Defined Networking (SDN)
Demystifying Software Defined Networking (SDN)
 
Demystifying Software Defined Networking (SDN)
Demystifying Software Defined Networking (SDN)Demystifying Software Defined Networking (SDN)
Demystifying Software Defined Networking (SDN)
 
Continuous Security: From tins to containers - now what!
Continuous Security: From tins to containers - now what!Continuous Security: From tins to containers - now what!
Continuous Security: From tins to containers - now what!
 
Scada Strangelove - 29c3
Scada Strangelove - 29c3Scada Strangelove - 29c3
Scada Strangelove - 29c3
 
Software Define Network, a new security paradigm ?
Software Define Network, a new security paradigm ?Software Define Network, a new security paradigm ?
Software Define Network, a new security paradigm ?
 
SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.
 
Intrusion Techniques
Intrusion TechniquesIntrusion Techniques
Intrusion Techniques
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
 
Introduction to SDN
Introduction to SDNIntroduction to SDN
Introduction to SDN
 
Tos tutorial
Tos tutorialTos tutorial
Tos tutorial
 
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
 
OpenFlow Tutorial
OpenFlow TutorialOpenFlow Tutorial
OpenFlow Tutorial
 
CampusSDN2017 - Jawdat: SDN Technology Evolvement
CampusSDN2017 - Jawdat: SDN Technology EvolvementCampusSDN2017 - Jawdat: SDN Technology Evolvement
CampusSDN2017 - Jawdat: SDN Technology Evolvement
 
OpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosOpenStack and OpenFlow Demos
OpenStack and OpenFlow Demos
 
Debugging Microservices - QCON 2017
Debugging Microservices - QCON 2017Debugging Microservices - QCON 2017
Debugging Microservices - QCON 2017
 
SDN - a new security paradigm?
SDN - a new security paradigm?SDN - a new security paradigm?
SDN - a new security paradigm?
 
I got 99 trends and a # is all of them
I got 99 trends and a # is all of themI got 99 trends and a # is all of them
I got 99 trends and a # is all of them
 

Último

Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 

Último (20)

AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 

BsidesSP: Pentesting in SDN - Owning the Controllers

  • 1. Pentesting in SDN @espreto Owning the controllers
  • 2. Who Am I? Roberto Soares Information Security Consultant Conviso Application Security @espreto
  • 3. • Network (traditional) • SDN Overview • Threat Vectors • Pentesting • Defense • Future
  • 4. Traditionally… • Specific Vendors; • Scalability; • Complexity; • Hardware Focus; • Interoperability; • etc… https://33.media.tumblr.com/tumblr_m8gl3iiTk51qjve0go1_500.gif
  • 5. Classical Model 1. Package sent to the switch. 2. Switch looks in their polices. 3. Switch forwards the packet to the server.
  • 7. SDN: Architecture Data Plane & Control Plane “SDN isn’t a technology, it’s a architecture”.
  • 8. SDN: Technical 1. Packet is sent to the switch. 2. Packet header is extracted and sent to the controller. 3. Controller (check) adds a new flow in the switch table. 4. Switch forwards the packet to the server.
  • 9. Vendors “SDN is just a fad…”
  • 10. Controllers • Commercial • HP VAN SDN • Juniper Contrail • Oracle SDN • Cisco XNC • Huawei POF •Open-Source • Mininet • OpenDayLight • FloodLight • Juniper OpenContrail
  • 11. OpenFlow • Communication between the controller and the switch (logical/physical). • Routing flow based. • Secure channel for transmission. • Allows for programming "Flows" (traffic type); • Allows for switching different network layers to be combined; • Not limited by the platform or be enforced by the protocols. “SDN != OpenFlow”
  • 13. It’s time for revision! DEMO 1 SDN overview with mininet “Why set up your network if you can program it?”
  • 15. Vectors! Control Plane Data Plane Admins
  • 16. Attacks! 1. Fake/Hijacked traffic flows. 2. Switch vulnerabilities. 3. Vulnerabilities on Control Plane communications. 4. Controller vulnerabilities. 5. Untrusted apps/plugins on controller. 6. Vulnerabilities on admin computer. 7. Lack of resources for security analysis. Specific to SDN
  • 17. Attacks! 1. Fake/Hijacked traffic flows. 2. Switch vulnerabilities. 3. Vulnerabilities on Control Plane communications. 4. Controller vulnerabilities. 5. Untrusted apps/plugins on controller. 6. Vulnerabilities on admin computer. 7. Lack of resources for security analysis.
  • 18. Pentesting... 1. Identify controllers. 2. Enumerate configs.
  • 19. Default Ports Controllers: FloodLight/Mininet/Pox/POF/HP VAN port 6633. Oracle SDN port 6522. Management Interface: FloodLight port 8080. OpenDayLight Web Interface port 8080. HP VAN SDN & IBM SDN-VE port 8443. Cisco XNC HTTP (8080) and HTTPS (8443).
  • 20. It’s time for revision! DEMO 2 sdn_enum_controllers.rb https://github.com/espreto
  • 21. Authentication Default passwords: FloodLight = floodlight:<null> OpenDayLight = admin:admin HP VAN SDN = admin:skyline Juniper Contrail = admin:contrail123 IBM SDN-VE = admin:admin Cisco XNC = admin:admin
  • 22. REST APIs • FloodLight port 8080 • (http://localhost:8080/wm/core/controller/switchs/json) • OpenDayLight port 80/8080 • (http://localhost/rest/v1/model/controller-node) • HP VAN SDN port 35357/8443 • (https://localhost:8443/sdn/v2.0/auth) • Juniper Contrail port 8081/8082 • (http://localhost:8081/analytics/uves) • IBM SDN-VE port 8443 • (http://localhost:8443/one/nb/v2) • Cisco XNC port 8080 • (http://localhost:8080/controller/nb/v2/monitor)
  • 23. It’s time for revision! DEMO 3 https://github.com/espreto sdn_enum_configs_api.rb
  • 24. It’s time for revision! DEMO 4 https://github.com/espreto sdn_hp_change_pass.rb
  • 26. Try Hard • VLANs? • IDS/IPS? • NAC? • Etc, etc, etc… Look: idle_timeout, hard_timeout, rtt values, etc. “Packet Analysis is your best friend”.
  • 27. Defense • Apply controls in CP and DP; • Restrict access APIs; • Audit internal malicious activity; • Plugins/Applications that add levels of security; • Hardening; • Secure Development Lifecycle (SDLC); • Specialized intrusion tests; • Others… “Security must not be optional”.
  • 28. Future... …of this research: • Coordination of CVEs with vendors; o/ • Advanced research with SDN; • Donations of Switches (OpenFlow supported);  • Create a group to share information; • And… “Opportunities are usually disguised as hard work, so most people don't recognize them”. Ann Landers.
  • 29. Questions? @espreto rsoares[at]conviso.com.br robertoespreto[at]gmail.com iwantshell.com

Notas do Editor

  1. O funcionamento de uma rede tradicional não é segredo pra ninguém, pois ela vem sendo utilizado a anos. Basicamente temos vários ativos de rede (roteadores e switches), conectados entre si, podendo possuir multiplas conexoes, visando redundancia, resiliencia e maior largura de banda, se necessário.
  2. Nas redes tradicionais, cada switch tem sua inteligencia no software ou firmware disponibilizado pelo fabricante. Geralmente, o software é proprietário e não temos como adicionar alguma funcionalidade extra e até mesmo correçoes de bugs podem levar meses. A inteligencia é disponibilizada por equipamento, ou seja, precisamos ir de equipamento por equipamento para configurá-los. Não é escalável ao dependermos de fabricantes disponibilizar correções de bug e novas funcionalidades; Não é escalavel quando falamos sobre interoperabilidade entre diversos fabricantes; Não é escalavel conforme aumenta o numero de equipamentos na rede e precisamos ir manulamente em cada um pra configurar.