vlan hopping attack

secure vlan trunking
1. VLAN Hopping with Switch Spoofing
2. VLAN Hopping with double-tagged

.............................................................................

vlan hopping with Switch Spoofing
to Gain Access to a Trunk
DTP can make switch administration easier,but it also can expose switch ports to be compromised.

說明
a switch port is left to its default configuration(trunking mode is auto) . Normally, the switch port would wait to be asked by another switch in the auto or on mode to become a trunk.
Possible as follows:
A well-behaved end user:
 1. would not use DTP at all,
 2. so the port would come up in access mode with a single-access VLAN.
A malicious user:
 1. might exploit the use of DTP
 2. and attempt to negotiate a trunk with the switch port.
後果
This makes the PC appear to be another switch; in effect, the PC is spoofing a switch

危害
After the trunk is negotiated, the attacker has access to any VLAN that is permitted to pass over the trunk

solution1
to configure every switch port to have an expected and controlled behavior
configure it to static access mode
(config-if)# switchport mode access

solution2
turn off DTP on all ports
(config-if)#switchport nonegotiate

the way ,an end user never will be able to send any type of spoofed traffic that will make the switch port begin trunking.

 

.............................................................

 

VLAN Hopping with double-tagged
an attacker positioned on one access VLAN can craft and send frames with spoofed 802.1Q tags so that the packet payloads ultimately appear on a totally different VLAN, all without the use of a router

the attack success conditions must exist
1. The attacker is connected to an access switch port.
2. The same switch must have an 802.1Q trunk.
3. The trunk must have the attacker's access VLAN as its native VLAN

VLAN Hopping Attack Process
環境說明:attacker連接之access port為vlan1 , 該switch使用trunk且native vlan為1
1.
Attacker Sends a Double-Tagged Packet onto His Local Access VLAN
attack on vlan1 ---[vlan1][vlan20][payload]---> (access)switch A
2.
When switch A Is Ready to Forward the Packet onto the Trunk,
the First Tag Is Stripped Because it Is the Same as the Trunk's Native VLAN
switch A(trunk) ===[vlan20][payload]===> (trunk)switch B
3.
The Packet Is Received by switch B; as the Second Tag Is Stripped,
it Appears to Identify the Source VLAN as VLAN 20
switch B(access) ---[payload]---> USER on vlan20
4.
The Packet Originally from VLAN 1 Is Now Sent into VLAN 20


solution0
避免native vlan和user的access vlan設為同一個

solution1
configure trunk links with the following steps:
Step 1. Set the native VLAN of a trunk to a bogus or unused VLAN ID.
Step 2. Prune the native VLAN off both ends of the trunk
ps:
Although maintenance protocols such as CDP, PAgP, and DTP normally are carried over the native VLAN of a trunk, they will not be affected if the native VLAN is pruned from the trunk.
They still will be sent and received on the native VLAN as a special case even if the native VLAN ID is not in the list of allowed VLANs
ex:
suppose that an 802.1Q trunk should carry only VLANs 10 and 20. You
should set the native VLAN to an unused value, such as 800. Then you should remove
VLAN 800 from the trunk so that it is confined to the trunk link itself.
Switch(config)# vlan 800
Switch(config-vlan)# name bogus_native
Switch(config-vlan)# exit
Switch(config)# interface gigabitethernet 1/1
Switch(config-if)# switchport trunk encapsulation dot1q
Switch(config-if)# switchport trunk native vlan 800
Switch(config-if)# switchport trunk allowed vlan remove 800
Switch(config-if)# switchport mode trunk


soluction2
to force all 802.1Q trunks to add tags to frames for the native VLAN, too
說明:
The double-tagged VLAN hopping attack won't work because the switch won't remove the
first tag with the native VLAN ID
步驟
1. that tag will remain on the spoofed frame as it enters the trunk
2. At the far end of the trunk, the same tag will be examined, and the frame will stay on the original access VLAN

To force a switch to tag the native VLAN on all its 802.1Q trunks
(config)# vlan dot1q tag native

2011-09-13 00:33:08發表 0000-00-00 00:00:00修改   

數據分析
程式開發
計算機組織與結構
資料結構與演算法
Database and MySql
manage tool
windows
unix-like
linux service
network
network layer3
network layer2
network WAN
network service
作業系統
數位鑑識
資訊安全解決方案
資訊安全威脅
Cisco security

Cisco network
Cisco layer3
Cisco layer2



  登入      [牛的大腦] | [單字我朋友] Powered by systw.net