SlideShare a Scribd company logo
1 of 124
Download to read offline
Owning the LAN in 2018
Defeating MACsec and 802.1x-2010
DEF CON 26
Gabriel “solstice” Ryan
Disclaimers & Updates
These slides are an early version designed for pre-release prior to DEF CON 26.
All content will be updated by the time of the presentation at DEF CON 26 in
August. Final versions of all content will be available at:
§ https://www.digitalsilence.com/blog/
About: Digital Silence
Denver-based security consulting firm:
§ Penetration testers who give a !@#$
§ Red teaming
§ Penetration Testing
§ Reverse-engineering / advanced appsec / research
Twitter (for those of you who are into that sort of thing): @digitalsilence_
About: Gabriel Ryan (a.k.a. solstice)
Co-Founder / Senior Security Assessment Manager @ Digital Silence
§ Former Gotham Digital Silence, former OGSystems
§ Red teamer / Researcher / New Dad
Twitter: @s0lst1c3
LinkedIn: ms08067
Email: gabriel@digitalsilence.com
Introduction to 802.1x
The 802.1x authentication protocol:
§ Authentication protocol
§ Used to protect a local area network (LAN) or wireless
local area network (WLAN) with rudimentary authentication
What is 802.1x?
§ Authentication protocol
§ Used to protect a local area network (LAN) or wireless
local area network (WLAN) with rudimentary authentication
802.1.x defines an exchange between three parties:
§ supplicant – the client device that wishes to connect to the
LAN [1][2][9]
§ authenticator – a network device such as a switch that
provides access to the LAN [1][2][9]
§ authentication server – a host that runs software that
implements RADIUS or some other Authorization,
Authentication, and Accounting (AAA) protocol [1][2][9]
§ authenticator can be thought of as a gatekeeper
§ supplicant connects to a switch port and provides the authenticator
with its credentials [1][2][9]
§ authenticator forwards credentials to the authentication server [1][2][9]
§ Authentication server validates the credentials, and either allows or
denies access the network [1][2][9]
802.1x is (typically) a four step sequence:
1. Initialization
2. Initiation
3. EAP Negotiation
4. Authentication
[1][2][9]
Ports have two states:
§ Authorized – traffic is unrestricted
§ Unauthorized – traffic is restricted to 802.1x
[1][2][9]
Step 1: Initialization
1. Supplicant connects to switch port, which is disabled
2. Authenticator detects new connection, enables switch port
in unauthorized state
[1][2][9]
Step 2: Initiation
1. (optional) Supplicant sends EAPOL-Start frame [1][2][9]
2. Authenticator responds with EAP-Request-Identity frame
[1][2][9]
3. Supplicant sends EAP-Response-Identity frame (contains
an identifier such as a username) [1][2][9]
4. Authenticator encapsulates EAP-Response-Identity in a
RADIUS Access-Request frame and forwards it to
Authentication Server [1][2][9]
Step 3: EAP Negotiation
Long story short:
supplicant and
authentication
server haggle until
they decide on an
EAP method that
they’re both
comfortable with.
[1][2][9]
Step 4: Authentication
§ Specific details of how authentication should work are
dependent on the EAP method chosen by the
authentication server and supplicant [1][2][9]
§ Always will result in a EAP-Success or EAP-Failure
message [1][2][9]
§ Port is set to authorized state if EAP-Success, otherwise
remains unauthorized [1][2][9]
What is EAP?
Extensible Authentication Protocol (EAP):
It’s an authentication framework:
§ Not really a protocol, only defines message formats
§ Individual EAP implementations are called ”EAP methods”
§ Think of it as a black box for performing authentication
Notable EAP methods…
EAP-MD5
EAP-MD5: Security Issues
Entire process occurs over plaintext (bad bad bad bad bad)
Brad Antoniewicz and Josh Wright in 2008: [13]
§ attacker can capture MD5-Challenge-Request and MD5-Challenge-
Response by passively sniffing traffic [13]
§ Dictionary attack can be used to obtain a password using captured
data [13]
EAP-MD5: Security Issues
Fanbao Liu and Tao Xie in 2012: [19]
§ EAP-MD5 credentials can be recovered even more
efficiently using length-recovery attack [19]
EAP-PEAP
EAP-PEAP: Security Issues
Remember – EAP also used for wireless authentication.
Brad Antoniewicz and Josh Wright in 2008: [13]
§ attacker can use a rogue access point attack to force the supplicant
to authenticate with a rogue authentication server [13][20]
§ So long as the supplicant accepts the certificate presented by the
attacker’s authentication server, the supplicant will transmit an EAP
challenge and response to the attacker [13][21]
§ can be cracked to obtain a plaintext username and password [13][21]
EAP-PEAP: Security Issues
MS-CHAPv2 is the strongest Inner Authentication protocol
available for use with EAP-PEAP and EAP-TTLS:
§ vulnerable to a cryptographic weakness discovered by Moxie
Marlinspike and David Hulton in 2012 [22]
§ MS-CHAPv2 challenge and response can be reduced to a single 56-
bits of DES encryption [22][23]
§ The 56-bits can be converted into a password-equivalent NT hash
within 24 hours with a 100% success rate using FPGA-based
hardware [22][23]
EAP-TLS
EAP-TLS
EAP-TLS was introduced by RFC 5216 in response to
weaknesses in EAP methods such as EAP-PEAP and EAP-
TTLS:
§ strength lies in use of mutual certificate-based authentication during the
outer authentication process [24]
§ prevents the kinds of MITM attacks that affect weaker EAP methods [24]
§ Poor adoption rate [25]
Brief History of Wired Port Security
Brief History of Wired Port Security
2001 – the 802.1x-2001 standard is created to provided
rudimentary authentication for LANs [1]
2004 – the 802.1x-2004 standard is created as an
extension of 802.1x-2001 to facilitate the use of
802.1x in WLANs extended 802.1x-2001 for use
in WLAN [2]
Brief History of Wired Port Security
2005 – Steve Riley demonstrates that 802.1x-
2004 can be bypassed by inserting a hub
between supplicant and authenticator [3]
§ Interaction limited to injecting UDP packets (TCP race
condition) [4]
Brief History of Wired Port Security
2011 – “Abb” of Gremwell Security creates Marvin: [5]
§ Bypasses 802.1x by introducing rogue device directly
between supplicant and switch [5]
§ No hub necessary: rogue device configured as a bridge [5]
§ Full interaction with network using packet injection [5]
Brief History of Wired Port Security
2011 – Alva Duckwall’s 802.1x-2004 bypass: [4]:
§ Transparent bridge used to introduce rogue device
between supplicant and switch [4]
§ No packet injection necessary: network interaction granted
by using iptables to source NAT (SNAT) traffic originating
from device [4]
§ More on this attack later...
Brief History of Wired Port Security
2017 – Valérian Legrand creates Fenrir: [6]:
§ Works similarly to Duckwall’s tool, but implements NATing
in Python using Scapy (instead of making calls to iptables /
arptables / ebtables) [6]
§ Modular design, support for responder, etc…
MAC Filtering and MAC Authentication
Bypass (MAB)
Fun fact: not all devices support 802.1x….
Not all devices support 802.1x:
§ Enterprise organizations with 802.1x protected networks
need to deploy them anyways
§ Solution: disable 802.1x on the port used by the device –
this is known as a port security exception
§ 802.1x usually replaced with MAC filtering or some other
weak form of access control
Port security exceptions:
§ Historically, very prevalent due to widespread lack of
802.1x support by peripheral devices (printers, IP
cameras, etc)
§ Low hanging fruit for attackers – much easier than trying
to actually bypass 802.1x using a bridge or hub
Demo: MAB
Current State of Wired Port Security
Relatively new technology: 802.1x-2010
Uses MACsec to provide:
§ hop-by-hop Layer 2 encryption [3][4][6][7]
§ Packet-by-packet integrity check [3][4][6][7]
Mitigates bridge-based attacks that affect 802.1x-2004 [7]
802.1x-2010: Vendor Support
Largest manufacturers of enterprise networking
hardware now support 802.1x-2010 and MACsec:
§ Limited to high end equipment
§ Full support for all 802.1x-2010 features varies by make
and model
802.1x-2010: Adoption Rates
Loaded question, since adoption rates for 802.1x
itself remain low. With that said:
§ MACsec and 802.1x-2010 are just beginning to take off
§ adoption rate steadily increasing
Improvements in Peripheral Device Security
Most printer manufacturers offer at least one
affordable model that supports 802.1x:
§ Legacy hardware phased out, replaced with 802.1x
capable models
§ Port security exceptions becoming less prevalent (many
sad red teamers)
Improvements in Peripheral Device Security
Goal of this project: tip the scales back in favor of
attackers
§ explore ways in which 802.1x-2010 and MACsec can be
bypassed
§ Address the reduced prevalence of port security
exceptions by identifying alternative methods for
attacking peripheral devices
Improvements to Bridge-Based Bypass
Techniques
Classical Bridge-based 802.1x Bypass
§ Developed by Alva Duckwall in 2014 [4]
§ Uses transparent bridge to silently introduce rogue device between
supplicant and authenticator [4]
§ Network interaction achieved by using iptables to source NAT (SNAT)
traffic originating from device [4]
§ Hidden SSH service created on rogue device by forwarding traffic to
the supplicant’s IP address on a specified port to bridge’s IP address
on port 22 [4]
Improvement: Leveraging Native EAPOL Forwarding
Linux kernel will not forward EAPOL packets over a
bridge. Existing tools deal with this problem by
either:
§ patching the Linux kernel
§ Relying on high level libraries such as Scapy
Improvement: Leveraging Native EAPOL Forwarding
Problems with both of these approaches:
§ Relying on Kernel patches can become unwieldy: no
publicly available Kernel patches for modern kernel
versions
§ Relying on high level tools such as Scapy can make the
bridge slow under heavy loads [17][18]
Improvement: Leveraging Native EAPOL Forwarding
Fortunately, the situation
has dramatically improved
since Duckwall’s
contribution:
§ as of 2012, EAPOL bridging can be enabled using the proc
file system [11]
§ that means no more patching :D [11]
Improvement: Bypassing Sticky MAC
Most modern authenticators use some form of Sticky
MAC:
§ dynamically associates the MAC address of the supplicant
to the switch port once the supplicant has successfully
authenticated [28][29]
§ if another MAC address is detected on the switch port, a
port security violation occurs and the port is blocked [28][29]
Improvement: Bypassing Sticky MAC
Our updated
implementation:
§ sets the bridge and PHY
interfaces to the MAC
address of the
authenticator
§ sets the upstream interface
to the MAC address of the
supplicant
Improvement: Support for Side Channel Interaction
In Duckwall’s original bypass,
outbound ARP and IP traffic is
initially blocked while the
transparent bridge is initialized
[4]:
§ Prevents us from using a
side channel device, such
as an LTE modem
Improvement: Bypassing Sticky MAC
Our updated implementation:
§ added a firewall exception
that allows outbound traffic
from our side channel
interface only
§ allows the user to specify a
desired egress destination
port
Demo: Improvements to Bridge-Based
Bypass Techniques
Introduction to MACsec and 802.1x-2010
Introduction to 802.1x-2010 and MACsec
All traditional 802.1x bypasses (hub, injection, or
bridge based) take advantage of the same
fundamental security issues that affect 802.1x-2004:
[3][4][6][7]
§ The protocol does not provide encryption
§ The protocol does not support authentication on a packet-
by-packet basis
Introduction to 802.1x-2010 and MACsec
These security issues are addressed in 802.1x-
2010, which uses MACsec to provide: [7]
§ Layer 2 encryption performed on a hop-by-hop basis
§ Packet-by-packet integrity checks
Introduction to 802.1x-2010 and MACsec
Support for hop-by-hop encryption particularly
important: [7]
§ Protects against bridge-based attacks
§ Allows network administrators with a means to inspect data
in transit
Introduction to 802.1x-2010 and MACsec
The 802.1x-2010 protocol works in three stages:
[7][8][9]
1. Authentication and Master Key Distribution
2. Session Key Agreement
3. Session Secure
Things to think about…
“IEEE Std 802.11 specifies media-dependent cryptographic
methods to protect data transmitted using the 802.11 MAC
over wireless networks. Conceptually these cryptographic
methods can be considered as playing the same role within
systems and interface stacks as a MAC Security Entity.” –
IEEE 802.1x-2010 Standard – Section 6.6 [9]
Parallels between MACsec and WPA
2003 – WPA1 is released
Hop-by-hop Layer 2 Encryption:
§ access point to station
Authentication provided by:
§ Extensible Authentication Protocol (EAP)
§ Pre-Shared Key (as a fallback / alternative)
Shift of focus due to WPA
Injection-based Attacks no longer possible due to Layer 2
encryption
Focus shifts to attacking authentication mechanism
§ Pre-Shared Key (PSK) – WPA Handshake Capture and Dictionary
Attack
§ EAP – Rogue AP attacks against weak EAP methods
2010 – 802.1x-2010 is released
Hop-by-hop Layer 2 Encryption using MACsec:
§ device to switch / switch to switch
Authentication provided by:
§ Extensible Authentication Protocol (EAP)
§ Pre-Shared Key (as a fallback / alternative)
Shift of focus due to MACsec
Bridge and injection-based attacks no longer possible due to
Layer 2 encryption
Focus shifts to attacking authentication mechanism
§ Pre-Shared Key (PSK) – some kind of dictionary attack??? (still
working on that)
§ EAP – attacks against weak EAP methods (main takeaway of this talk)
Defeating MACsec Using Rogue
Gateway Attacks
Defeating MACsec Using Rogue Gateway Attacks
Most important takeaway about 802.1x-2010 (from
an attacker’s perspective): [7]
§ It still uses EAP to authenticate devices to the network
§ EAP is only as secure as the EAP method used
Supported EAP methods:
The 802.1x-2010 standard allows any EAP method so long
as it: [7]
§ Supports mutual authentication
§ Supports derivation of keys that are at least 128 bits in length
§ Generates an MSK of at least 64 octets
Plenty of commonly seen weak EAP methods that meet these
requirements (EAP-PEAP, EAP-TTLS, etc).
I THINK YOU SEE
WHERE THIS IS
GOING
Our lab environment:
Option 1: MITM style bypass
Option 2: Direct Access
Let’s build a rogue device…
Step 1: Device Core
Step 2: Mechanically Assisted Bypass
FRONT BACK
Step 2: Mechanically Assisted Bypass
Need a way of manipulating the push switch:
§ Using relays will lead to impedance issues unless you’re an
electrical engineer (which I am certainly not…)
§ Option B: use solenoids
Step 2: Mechanically Assisted Bypass
Push Solenoid
Pull Solenoid
Step 2: Mechanically Assisted Bypass
Step 2: Mechanically Assisted Bypass
Step 3: Establish a Side Channel
Step 4: Plant the Device
Step 5: Rogue Gateway Attack
Step 6: Bait n Switch
Demo: Defeating MACsec Using Rogue
Gateway Attacks
Dealing With Improvements to Peripheral
Device Security
Improvements to Peripheral Device Security
Improved 802.1x support by peripheral devices:
§ bypassing port security by looking for policy exceptions has
become difficult
Improvements to Peripheral Device Security
Important caveat:
§ Improved adoption of 802.1x does not necessarily imply
strong port security for peripheral devices
§ Back to EAP: most EAP methods have major security
issues
Improvements to Peripheral Device Security
Adoption rates for secure EAP methods very poor
across all device types:
§ Secure EAP methods are often challenging to deploy at scale
We can expect these adoption rates to be even lower for
peripheral devices:
§ Already painful to configure
§ Not always centrally manageable through Group Policy (besides,
is a domain joined printer really a good idea?)
Improvements to Peripheral Device Security
What this means:
§ Peripheral devices are still a viable attack vector for
bypassing port security
EAP-MD5 Forced Reauthentication
Attack
EAP-MD5 Forced Reauthentication Attack
EAP-MD5 is widely used to protect peripheral
devices such as printers:
§ Easy to setup and configure
§ Still better than MAC filtering
EAP-MD5 Forced Reauthentication Attack
Leveraging what we know about how to attack EAP-MD5 and
802.1x-2004:
1. Use bridge-based approach to place rogue device between supplicant
and authenticator
2. Wait for the supplicant to authenticate, and sniff the EAP-MD5-
Challenge and EAP-MD5-Response when it does [13]
3. Crack credentials, connect to network using Bait n’ Switch
EAP-MD5 Forced Reauthentication Attack
One major drawback to this approach:
§ We must wait for the supplicant to reauthenticate with the switch
Realistically, this will not happen unless supplicant is
unplugged
§ disabling a virtual network interface is not enough
§ Using mechanical splitters is an option, but the less overhead the
better
EAP-MD5 Forced Reauthentication Attack
First two steps of the EAP authentication process: [1][2][9]
1. (optional) supplicant sends the authenticator an EAPOL-Start frame
2. The authenticator sends the supplicant an EAP-Request-Identity frame
Problem: supplicant has no way of verifying if incoming EAP-
Request-Identity frame has been sent in response to an
EAPOL-Start.
EAP-MD5 Forced Reauthentication Attack
What this means: we can force reauthentication by sending
an EAPOL-Start frame to the authenticator as if it came from
the supplicant (MAC spoofing):
§ Result: authenticator will send EAP-Request-Identity frame to the
actual supplicant, kickstarting the reauthentication process
§ Both the authenticator and supplicant believe that the other party has
initiated the reauthentication attempt
Demo: Forced Reauthentication
EAP-MD5 Forced Reauthentication Attack
EAP-MD5 Forced Reauthentication Attack:
1. Introduce rogue device into the network between authenticator and
supplicant
2. Start transparent bridge and passively sniff traffic
3. Force reauthentication by sending spoofed EAPOL-Start frame to
the authenticator
4. Captured and crack EAP-MD5-Challenge and EAP-MD5-
Response
Demo: EAP-MD5 Forced
Reauthentication Attack
EAP-MD5 Forced Reauthentication Attack
Proposed Mitigation – safety-bit in the EAP-Request-Identity
frame:
§ set to 1 when the frame was sent in response to an EAPOL-Start frame
§ Checked when supplicant receives an EAP-Request-Identity frame
§ Authentication process aborted if safety bit set to 1 and supplicant did
not recently issue EAPOL-Start frame
Leveraging Rogue Gateway Attacks
Against Peripheral Devices
Rogue Gateway Attacks Against Peripheral Devices
Other commonly used weak EAP methods used by peripheral
devices include EAP-TTLS and EAP-PEAP: [13]
§ Attacks are considerably more involved compared to EAP-MD5
§ Authentication occurs through an encrypted tunnel, so a MITM is
necessary to capture the challenge and response [13]
Rogue Gateway Attacks Against Peripheral Devices
Solution – use Rogue Gateway Attack:
§ No mechanical splitters needed this time: attack can be
implemented in software using transparent bridge
Step 1: Plant the Device
Step 2: Perform the Attack
Closing Thoughts
Closing Thoughts
Our contributions:
§ Rogue Gateway and Bait n Switch – Bypass 802.1x-2011 by attacking
its authentication mechanism
§ Updated & improved existing 802.1x-2004 bypass techniques
§ EAP-MD5 Forced Reauthentication attack – improved attack against
EAP-MD5 on wired networks
Closing Thoughts
Key takeaways (1 of 2):
§ Port security is still a positive thing (keep using it!)
§ Port security is not a substitute for a layered approach to network
security (i.e. deploying 802.1x does not absolve you from patch
management responsibilities)
Closing Thoughts
Key takeaways (2 of 2):
§ Benefits provided by 802.1x can be undermined due to continued use
of EAP as authentication mechanism
§ Improved 802.1x support by peripheral device manufacturers largely
undermined by lack of support for 802.1x-2010 and low adoptions /
support rates for strong EAP methods
Blog post & whitepaper:
https://www.digitalsilence.com/blog/
Tool:
github.com/s0lst1c3/silentbridge
References:
[1] http://www.ieee802.org/1/pages/802.1x-2001.html
[2] http://www.ieee802.org/1/pages/802.1x-2004.html
[3] https://blogs.technet.microsoft.com/steriley/2005/08/11/august-article-802-1x-on-wired-networks-considered-harmful/
[4] https://www.defcon.org/images/defcon-19/dc-19-presentations/Duckwall/DEFCON-19-Duckwall-Bridge-Too-Far.pdf
[5] https://www.gremwell.com/marvin-mitm-tapping-dot1x-links
References:
[6]https://hackinparis.com/data/slides/2017/2017_Legrand_Valerian_802.1x_Network_Access_Control_and_Bypass_Techniques.pdf
[7] https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networking-services/deploy_guide_c17-663760.html
[8] https://1.ieee802.org/security/802-1ae/
[9] https://standards.ieee.org/findstds/standard/802.1X-2010.html
[10] http://www.ieee802.org/1/files/public/docs2013/ae-seaman-macsec-hops-0213-v02.pdf
References:
[11] https://www.gremwell.com/linux_kernel_can_forward_802_1x
[12] https://www.intel.com/content/www/us/en/support/articles/000006999/network-and-i-o/wireless-networking.html
[13]http://www.willhackforsushi.com/presentations/PEAP_Shmoocon2008_Wright_Antoniewicz.pdf
[14] https://link.springer.com/content/pdf/10.1007%2F978-3-642-30955-7_6.pdf
[15] https://support.microsoft.com/en-us/help/922574/the-microsoft-extensible-authentication-protocol-message-digest-5-eap
References:
[16] https://tools.ietf.org/html/rfc3748
[17] https://code.google.com/archive/p/8021xbridge/source/default/commits
[18] https://github.com/mubix/8021xbridge
[19] https://hal.inria.fr/hal-01534313/document
[20] https://sensepost.com/blog/2015/improvements-in-rogue-ap-attacks-mana-1%2F2/
References:
[21] https://tools.ietf.org/html/rfc4017
[22] http://web.archive.org/web/20160203043946/https:/www.cloudcracker.com/blog/2012/07/29/cracking-ms-chap-v2/
[23] https://crack.sh/
[24] https://tools.ietf.org/html/rfc5216
[25] https://4310b1a9-a-93739578-s-sites.googlegroups.com/a/riosec.com/home/articles/Open-Secure-Wireless/Open-Secure-
Wireless.pdf?attachauth=ANoY7cqwzbsU93t3gE88UC_qqtG7cVvms7FRutz0KwK1oiBcEJMlQuUmpGSMMD7oZGyGmt4M2HaBhHFb07j8Gvmb_H
WIE8rSfLKDvB0AI80u0cYwSNi5ugTP1JtFXsy1yZn8-85icVc32PpzxLJwRinf2UGzNbEdO97Wsc9xcjnc8A8MaFkPbUV5kwsMYHaxMiWwTcE-
A8Dp49vv-tmk86pNMaeUeumBw_5vCZ6C3Pvc07hVbyTOsjqo6C6WpfVhd_M0BNW0RQtI&attredirects=0
References:
[26] https://txlab.wordpress.com/2012/01/25/call-home-ssh-scripts/
[27] https://txlab.wordpress.com/2012/03/14/improved-call-home-ssh-scripts/
[28] https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_37_se/command/reference/cr1/cli3.html#wp1948361
[29] https://www.juniper.net/documentation/en_US/junos/topics/concept/port-security-persistent-mac-learning.html
[30] https://tools.ietf.org/html/rfc3579
References:
[31] https://tools.ietf.org/html/rfc5281

More Related Content

What's hot

Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Edureka!
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabricANSItunCERT
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA FirepowerAnwesh Dixit
 
Mapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE ActivitiesMapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE ActivitiesMITRE ATT&CK
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdfJoniGarcia9
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
 
Arista reinventing data center switching
Arista   reinventing data center switchingArista   reinventing data center switching
Arista reinventing data center switchingVLCM2015
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxNajahIdrissiMoulayRa
 
Metasploit
MetasploitMetasploit
Metasploithenelpj
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CKArpan Raval
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxArianeSpano
 

What's hot (20)

20 palo alto site to site
20 palo alto site to site20 palo alto site to site
20 palo alto site to site
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
OpenStack Framework Introduction
OpenStack Framework IntroductionOpenStack Framework Introduction
OpenStack Framework Introduction
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabric
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
Mapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE ActivitiesMapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE Activities
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdf
 
SD WAN
SD WANSD WAN
SD WAN
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
Metasploit framwork
Metasploit framworkMetasploit framwork
Metasploit framwork
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Arista reinventing data center switching
Arista   reinventing data center switchingArista   reinventing data center switching
Arista reinventing data center switching
 
Fortinet
FortinetFortinet
Fortinet
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptx
 
Metasploit
MetasploitMetasploit
Metasploit
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 

Similar to Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010

Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
Here Be Dragons: Security Maps of the Container New World
Here Be Dragons: Security Maps of the Container New WorldHere Be Dragons: Security Maps of the Container New World
Here Be Dragons: Security Maps of the Container New WorldC4Media
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hackingPranshu Pareek
 
Wi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and PrivacyWi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and PrivacyKarri Huhtanen
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsRightScale
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A Pulsar Use Case In Federated Learning - Pulsar Summit NA 2021
A Pulsar Use Case In Federated Learning - Pulsar Summit NA 2021A Pulsar Use Case In Federated Learning - Pulsar Summit NA 2021
A Pulsar Use Case In Federated Learning - Pulsar Summit NA 2021StreamNative
 
What is this DevOps thing and why do I need it?
What is this DevOps thing and why do I need it?What is this DevOps thing and why do I need it?
What is this DevOps thing and why do I need it?Safe Swiss Cloud
 
8021x feature config_guide
8021x feature config_guide8021x feature config_guide
8021x feature config_guideWilson Ospina
 
Exploring Risk and Mapping the Internet of Things with Autonomous Drones
Exploring Risk and Mapping the Internet of Things with Autonomous DronesExploring Risk and Mapping the Internet of Things with Autonomous Drones
Exploring Risk and Mapping the Internet of Things with Autonomous DronesPraetorian
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssueIshan Girdhar
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.pptSagarBedarkar3
 

Similar to Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010 (20)

Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Here Be Dragons: Security Maps of the Container New World
Here Be Dragons: Security Maps of the Container New WorldHere Be Dragons: Security Maps of the Container New World
Here Be Dragons: Security Maps of the Container New World
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
 
Wi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and PrivacyWi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and Privacy
 
Basic Network Security_Primer
Basic Network Security_PrimerBasic Network Security_Primer
Basic Network Security_Primer
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Docker at Flux7
Docker at Flux7Docker at Flux7
Docker at Flux7
 
Security events in 2014
Security events in 2014Security events in 2014
Security events in 2014
 
A Pulsar Use Case In Federated Learning - Pulsar Summit NA 2021
A Pulsar Use Case In Federated Learning - Pulsar Summit NA 2021A Pulsar Use Case In Federated Learning - Pulsar Summit NA 2021
A Pulsar Use Case In Federated Learning - Pulsar Summit NA 2021
 
What is this DevOps thing and why do I need it?
What is this DevOps thing and why do I need it?What is this DevOps thing and why do I need it?
What is this DevOps thing and why do I need it?
 
8021x feature config_guide
8021x feature config_guide8021x feature config_guide
8021x feature config_guide
 
VPN
VPNVPN
VPN
 
Vp ns
Vp nsVp ns
Vp ns
 
Comprehensive Guide On Network Security
Comprehensive Guide On Network SecurityComprehensive Guide On Network Security
Comprehensive Guide On Network Security
 
Exploring Risk and Mapping the Internet of Things with Autonomous Drones
Exploring Risk and Mapping the Internet of Things with Autonomous DronesExploring Risk and Mapping the Internet of Things with Autonomous Drones
Exploring Risk and Mapping the Internet of Things with Autonomous Drones
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.ppt
 
Oracle soa cloud project
Oracle soa cloud projectOracle soa cloud project
Oracle soa cloud project
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010

  • 1. Owning the LAN in 2018 Defeating MACsec and 802.1x-2010 DEF CON 26 Gabriel “solstice” Ryan
  • 2. Disclaimers & Updates These slides are an early version designed for pre-release prior to DEF CON 26. All content will be updated by the time of the presentation at DEF CON 26 in August. Final versions of all content will be available at: § https://www.digitalsilence.com/blog/
  • 3. About: Digital Silence Denver-based security consulting firm: § Penetration testers who give a !@#$ § Red teaming § Penetration Testing § Reverse-engineering / advanced appsec / research Twitter (for those of you who are into that sort of thing): @digitalsilence_
  • 4. About: Gabriel Ryan (a.k.a. solstice) Co-Founder / Senior Security Assessment Manager @ Digital Silence § Former Gotham Digital Silence, former OGSystems § Red teamer / Researcher / New Dad Twitter: @s0lst1c3 LinkedIn: ms08067 Email: gabriel@digitalsilence.com
  • 6. The 802.1x authentication protocol: § Authentication protocol § Used to protect a local area network (LAN) or wireless local area network (WLAN) with rudimentary authentication
  • 7. What is 802.1x? § Authentication protocol § Used to protect a local area network (LAN) or wireless local area network (WLAN) with rudimentary authentication
  • 8. 802.1.x defines an exchange between three parties: § supplicant – the client device that wishes to connect to the LAN [1][2][9] § authenticator – a network device such as a switch that provides access to the LAN [1][2][9] § authentication server – a host that runs software that implements RADIUS or some other Authorization, Authentication, and Accounting (AAA) protocol [1][2][9]
  • 9. § authenticator can be thought of as a gatekeeper § supplicant connects to a switch port and provides the authenticator with its credentials [1][2][9] § authenticator forwards credentials to the authentication server [1][2][9] § Authentication server validates the credentials, and either allows or denies access the network [1][2][9]
  • 10. 802.1x is (typically) a four step sequence: 1. Initialization 2. Initiation 3. EAP Negotiation 4. Authentication [1][2][9]
  • 11. Ports have two states: § Authorized – traffic is unrestricted § Unauthorized – traffic is restricted to 802.1x [1][2][9]
  • 12. Step 1: Initialization 1. Supplicant connects to switch port, which is disabled 2. Authenticator detects new connection, enables switch port in unauthorized state [1][2][9]
  • 13. Step 2: Initiation 1. (optional) Supplicant sends EAPOL-Start frame [1][2][9] 2. Authenticator responds with EAP-Request-Identity frame [1][2][9] 3. Supplicant sends EAP-Response-Identity frame (contains an identifier such as a username) [1][2][9] 4. Authenticator encapsulates EAP-Response-Identity in a RADIUS Access-Request frame and forwards it to Authentication Server [1][2][9]
  • 14. Step 3: EAP Negotiation Long story short: supplicant and authentication server haggle until they decide on an EAP method that they’re both comfortable with. [1][2][9]
  • 15. Step 4: Authentication § Specific details of how authentication should work are dependent on the EAP method chosen by the authentication server and supplicant [1][2][9] § Always will result in a EAP-Success or EAP-Failure message [1][2][9] § Port is set to authorized state if EAP-Success, otherwise remains unauthorized [1][2][9]
  • 17. Extensible Authentication Protocol (EAP): It’s an authentication framework: § Not really a protocol, only defines message formats § Individual EAP implementations are called ”EAP methods” § Think of it as a black box for performing authentication
  • 20.
  • 21. EAP-MD5: Security Issues Entire process occurs over plaintext (bad bad bad bad bad) Brad Antoniewicz and Josh Wright in 2008: [13] § attacker can capture MD5-Challenge-Request and MD5-Challenge- Response by passively sniffing traffic [13] § Dictionary attack can be used to obtain a password using captured data [13]
  • 22. EAP-MD5: Security Issues Fanbao Liu and Tao Xie in 2012: [19] § EAP-MD5 credentials can be recovered even more efficiently using length-recovery attack [19]
  • 24.
  • 25. EAP-PEAP: Security Issues Remember – EAP also used for wireless authentication. Brad Antoniewicz and Josh Wright in 2008: [13] § attacker can use a rogue access point attack to force the supplicant to authenticate with a rogue authentication server [13][20] § So long as the supplicant accepts the certificate presented by the attacker’s authentication server, the supplicant will transmit an EAP challenge and response to the attacker [13][21] § can be cracked to obtain a plaintext username and password [13][21]
  • 26. EAP-PEAP: Security Issues MS-CHAPv2 is the strongest Inner Authentication protocol available for use with EAP-PEAP and EAP-TTLS: § vulnerable to a cryptographic weakness discovered by Moxie Marlinspike and David Hulton in 2012 [22] § MS-CHAPv2 challenge and response can be reduced to a single 56- bits of DES encryption [22][23] § The 56-bits can be converted into a password-equivalent NT hash within 24 hours with a 100% success rate using FPGA-based hardware [22][23]
  • 27.
  • 29. EAP-TLS EAP-TLS was introduced by RFC 5216 in response to weaknesses in EAP methods such as EAP-PEAP and EAP- TTLS: § strength lies in use of mutual certificate-based authentication during the outer authentication process [24] § prevents the kinds of MITM attacks that affect weaker EAP methods [24] § Poor adoption rate [25]
  • 30. Brief History of Wired Port Security
  • 31. Brief History of Wired Port Security 2001 – the 802.1x-2001 standard is created to provided rudimentary authentication for LANs [1] 2004 – the 802.1x-2004 standard is created as an extension of 802.1x-2001 to facilitate the use of 802.1x in WLANs extended 802.1x-2001 for use in WLAN [2]
  • 32. Brief History of Wired Port Security 2005 – Steve Riley demonstrates that 802.1x- 2004 can be bypassed by inserting a hub between supplicant and authenticator [3] § Interaction limited to injecting UDP packets (TCP race condition) [4]
  • 33. Brief History of Wired Port Security 2011 – “Abb” of Gremwell Security creates Marvin: [5] § Bypasses 802.1x by introducing rogue device directly between supplicant and switch [5] § No hub necessary: rogue device configured as a bridge [5] § Full interaction with network using packet injection [5]
  • 34. Brief History of Wired Port Security 2011 – Alva Duckwall’s 802.1x-2004 bypass: [4]: § Transparent bridge used to introduce rogue device between supplicant and switch [4] § No packet injection necessary: network interaction granted by using iptables to source NAT (SNAT) traffic originating from device [4] § More on this attack later...
  • 35. Brief History of Wired Port Security 2017 – Valérian Legrand creates Fenrir: [6]: § Works similarly to Duckwall’s tool, but implements NATing in Python using Scapy (instead of making calls to iptables / arptables / ebtables) [6] § Modular design, support for responder, etc…
  • 36. MAC Filtering and MAC Authentication Bypass (MAB)
  • 37.
  • 38. Fun fact: not all devices support 802.1x….
  • 39.
  • 40. Not all devices support 802.1x: § Enterprise organizations with 802.1x protected networks need to deploy them anyways § Solution: disable 802.1x on the port used by the device – this is known as a port security exception § 802.1x usually replaced with MAC filtering or some other weak form of access control
  • 41. Port security exceptions: § Historically, very prevalent due to widespread lack of 802.1x support by peripheral devices (printers, IP cameras, etc) § Low hanging fruit for attackers – much easier than trying to actually bypass 802.1x using a bridge or hub
  • 43. Current State of Wired Port Security
  • 44. Relatively new technology: 802.1x-2010 Uses MACsec to provide: § hop-by-hop Layer 2 encryption [3][4][6][7] § Packet-by-packet integrity check [3][4][6][7] Mitigates bridge-based attacks that affect 802.1x-2004 [7]
  • 45. 802.1x-2010: Vendor Support Largest manufacturers of enterprise networking hardware now support 802.1x-2010 and MACsec: § Limited to high end equipment § Full support for all 802.1x-2010 features varies by make and model
  • 46. 802.1x-2010: Adoption Rates Loaded question, since adoption rates for 802.1x itself remain low. With that said: § MACsec and 802.1x-2010 are just beginning to take off § adoption rate steadily increasing
  • 47. Improvements in Peripheral Device Security Most printer manufacturers offer at least one affordable model that supports 802.1x: § Legacy hardware phased out, replaced with 802.1x capable models § Port security exceptions becoming less prevalent (many sad red teamers)
  • 48. Improvements in Peripheral Device Security Goal of this project: tip the scales back in favor of attackers § explore ways in which 802.1x-2010 and MACsec can be bypassed § Address the reduced prevalence of port security exceptions by identifying alternative methods for attacking peripheral devices
  • 49. Improvements to Bridge-Based Bypass Techniques
  • 50. Classical Bridge-based 802.1x Bypass § Developed by Alva Duckwall in 2014 [4] § Uses transparent bridge to silently introduce rogue device between supplicant and authenticator [4] § Network interaction achieved by using iptables to source NAT (SNAT) traffic originating from device [4] § Hidden SSH service created on rogue device by forwarding traffic to the supplicant’s IP address on a specified port to bridge’s IP address on port 22 [4]
  • 51. Improvement: Leveraging Native EAPOL Forwarding Linux kernel will not forward EAPOL packets over a bridge. Existing tools deal with this problem by either: § patching the Linux kernel § Relying on high level libraries such as Scapy
  • 52. Improvement: Leveraging Native EAPOL Forwarding Problems with both of these approaches: § Relying on Kernel patches can become unwieldy: no publicly available Kernel patches for modern kernel versions § Relying on high level tools such as Scapy can make the bridge slow under heavy loads [17][18]
  • 53. Improvement: Leveraging Native EAPOL Forwarding Fortunately, the situation has dramatically improved since Duckwall’s contribution: § as of 2012, EAPOL bridging can be enabled using the proc file system [11] § that means no more patching :D [11]
  • 54. Improvement: Bypassing Sticky MAC Most modern authenticators use some form of Sticky MAC: § dynamically associates the MAC address of the supplicant to the switch port once the supplicant has successfully authenticated [28][29] § if another MAC address is detected on the switch port, a port security violation occurs and the port is blocked [28][29]
  • 55. Improvement: Bypassing Sticky MAC Our updated implementation: § sets the bridge and PHY interfaces to the MAC address of the authenticator § sets the upstream interface to the MAC address of the supplicant
  • 56. Improvement: Support for Side Channel Interaction In Duckwall’s original bypass, outbound ARP and IP traffic is initially blocked while the transparent bridge is initialized [4]: § Prevents us from using a side channel device, such as an LTE modem
  • 57. Improvement: Bypassing Sticky MAC Our updated implementation: § added a firewall exception that allows outbound traffic from our side channel interface only § allows the user to specify a desired egress destination port
  • 58. Demo: Improvements to Bridge-Based Bypass Techniques
  • 59. Introduction to MACsec and 802.1x-2010
  • 60. Introduction to 802.1x-2010 and MACsec All traditional 802.1x bypasses (hub, injection, or bridge based) take advantage of the same fundamental security issues that affect 802.1x-2004: [3][4][6][7] § The protocol does not provide encryption § The protocol does not support authentication on a packet- by-packet basis
  • 61. Introduction to 802.1x-2010 and MACsec These security issues are addressed in 802.1x- 2010, which uses MACsec to provide: [7] § Layer 2 encryption performed on a hop-by-hop basis § Packet-by-packet integrity checks
  • 62. Introduction to 802.1x-2010 and MACsec Support for hop-by-hop encryption particularly important: [7] § Protects against bridge-based attacks § Allows network administrators with a means to inspect data in transit
  • 63. Introduction to 802.1x-2010 and MACsec The 802.1x-2010 protocol works in three stages: [7][8][9] 1. Authentication and Master Key Distribution 2. Session Key Agreement 3. Session Secure
  • 64.
  • 65.
  • 66.
  • 67. Things to think about… “IEEE Std 802.11 specifies media-dependent cryptographic methods to protect data transmitted using the 802.11 MAC over wireless networks. Conceptually these cryptographic methods can be considered as playing the same role within systems and interface stacks as a MAC Security Entity.” – IEEE 802.1x-2010 Standard – Section 6.6 [9]
  • 69. 2003 – WPA1 is released Hop-by-hop Layer 2 Encryption: § access point to station Authentication provided by: § Extensible Authentication Protocol (EAP) § Pre-Shared Key (as a fallback / alternative)
  • 70. Shift of focus due to WPA Injection-based Attacks no longer possible due to Layer 2 encryption Focus shifts to attacking authentication mechanism § Pre-Shared Key (PSK) – WPA Handshake Capture and Dictionary Attack § EAP – Rogue AP attacks against weak EAP methods
  • 71. 2010 – 802.1x-2010 is released Hop-by-hop Layer 2 Encryption using MACsec: § device to switch / switch to switch Authentication provided by: § Extensible Authentication Protocol (EAP) § Pre-Shared Key (as a fallback / alternative)
  • 72.
  • 73. Shift of focus due to MACsec Bridge and injection-based attacks no longer possible due to Layer 2 encryption Focus shifts to attacking authentication mechanism § Pre-Shared Key (PSK) – some kind of dictionary attack??? (still working on that) § EAP – attacks against weak EAP methods (main takeaway of this talk)
  • 74. Defeating MACsec Using Rogue Gateway Attacks
  • 75. Defeating MACsec Using Rogue Gateway Attacks Most important takeaway about 802.1x-2010 (from an attacker’s perspective): [7] § It still uses EAP to authenticate devices to the network § EAP is only as secure as the EAP method used
  • 76. Supported EAP methods: The 802.1x-2010 standard allows any EAP method so long as it: [7] § Supports mutual authentication § Supports derivation of keys that are at least 128 bits in length § Generates an MSK of at least 64 octets Plenty of commonly seen weak EAP methods that meet these requirements (EAP-PEAP, EAP-TTLS, etc).
  • 77. I THINK YOU SEE WHERE THIS IS GOING
  • 79. Option 1: MITM style bypass
  • 81. Let’s build a rogue device…
  • 83. Step 2: Mechanically Assisted Bypass FRONT BACK
  • 84. Step 2: Mechanically Assisted Bypass Need a way of manipulating the push switch: § Using relays will lead to impedance issues unless you’re an electrical engineer (which I am certainly not…) § Option B: use solenoids
  • 85. Step 2: Mechanically Assisted Bypass Push Solenoid Pull Solenoid
  • 86. Step 2: Mechanically Assisted Bypass
  • 87. Step 2: Mechanically Assisted Bypass
  • 88. Step 3: Establish a Side Channel
  • 89. Step 4: Plant the Device
  • 90. Step 5: Rogue Gateway Attack
  • 91. Step 6: Bait n Switch
  • 92. Demo: Defeating MACsec Using Rogue Gateway Attacks
  • 93. Dealing With Improvements to Peripheral Device Security
  • 94. Improvements to Peripheral Device Security Improved 802.1x support by peripheral devices: § bypassing port security by looking for policy exceptions has become difficult
  • 95. Improvements to Peripheral Device Security Important caveat: § Improved adoption of 802.1x does not necessarily imply strong port security for peripheral devices § Back to EAP: most EAP methods have major security issues
  • 96. Improvements to Peripheral Device Security Adoption rates for secure EAP methods very poor across all device types: § Secure EAP methods are often challenging to deploy at scale We can expect these adoption rates to be even lower for peripheral devices: § Already painful to configure § Not always centrally manageable through Group Policy (besides, is a domain joined printer really a good idea?)
  • 97. Improvements to Peripheral Device Security What this means: § Peripheral devices are still a viable attack vector for bypassing port security
  • 99. EAP-MD5 Forced Reauthentication Attack EAP-MD5 is widely used to protect peripheral devices such as printers: § Easy to setup and configure § Still better than MAC filtering
  • 100. EAP-MD5 Forced Reauthentication Attack Leveraging what we know about how to attack EAP-MD5 and 802.1x-2004: 1. Use bridge-based approach to place rogue device between supplicant and authenticator 2. Wait for the supplicant to authenticate, and sniff the EAP-MD5- Challenge and EAP-MD5-Response when it does [13] 3. Crack credentials, connect to network using Bait n’ Switch
  • 101. EAP-MD5 Forced Reauthentication Attack One major drawback to this approach: § We must wait for the supplicant to reauthenticate with the switch Realistically, this will not happen unless supplicant is unplugged § disabling a virtual network interface is not enough § Using mechanical splitters is an option, but the less overhead the better
  • 102. EAP-MD5 Forced Reauthentication Attack First two steps of the EAP authentication process: [1][2][9] 1. (optional) supplicant sends the authenticator an EAPOL-Start frame 2. The authenticator sends the supplicant an EAP-Request-Identity frame Problem: supplicant has no way of verifying if incoming EAP- Request-Identity frame has been sent in response to an EAPOL-Start.
  • 103. EAP-MD5 Forced Reauthentication Attack What this means: we can force reauthentication by sending an EAPOL-Start frame to the authenticator as if it came from the supplicant (MAC spoofing): § Result: authenticator will send EAP-Request-Identity frame to the actual supplicant, kickstarting the reauthentication process § Both the authenticator and supplicant believe that the other party has initiated the reauthentication attempt
  • 105. EAP-MD5 Forced Reauthentication Attack EAP-MD5 Forced Reauthentication Attack: 1. Introduce rogue device into the network between authenticator and supplicant 2. Start transparent bridge and passively sniff traffic 3. Force reauthentication by sending spoofed EAPOL-Start frame to the authenticator 4. Captured and crack EAP-MD5-Challenge and EAP-MD5- Response
  • 107. EAP-MD5 Forced Reauthentication Attack Proposed Mitigation – safety-bit in the EAP-Request-Identity frame: § set to 1 when the frame was sent in response to an EAPOL-Start frame § Checked when supplicant receives an EAP-Request-Identity frame § Authentication process aborted if safety bit set to 1 and supplicant did not recently issue EAPOL-Start frame
  • 108. Leveraging Rogue Gateway Attacks Against Peripheral Devices
  • 109. Rogue Gateway Attacks Against Peripheral Devices Other commonly used weak EAP methods used by peripheral devices include EAP-TTLS and EAP-PEAP: [13] § Attacks are considerably more involved compared to EAP-MD5 § Authentication occurs through an encrypted tunnel, so a MITM is necessary to capture the challenge and response [13]
  • 110. Rogue Gateway Attacks Against Peripheral Devices Solution – use Rogue Gateway Attack: § No mechanical splitters needed this time: attack can be implemented in software using transparent bridge
  • 111. Step 1: Plant the Device
  • 112. Step 2: Perform the Attack
  • 114. Closing Thoughts Our contributions: § Rogue Gateway and Bait n Switch – Bypass 802.1x-2011 by attacking its authentication mechanism § Updated & improved existing 802.1x-2004 bypass techniques § EAP-MD5 Forced Reauthentication attack – improved attack against EAP-MD5 on wired networks
  • 115. Closing Thoughts Key takeaways (1 of 2): § Port security is still a positive thing (keep using it!) § Port security is not a substitute for a layered approach to network security (i.e. deploying 802.1x does not absolve you from patch management responsibilities)
  • 116. Closing Thoughts Key takeaways (2 of 2): § Benefits provided by 802.1x can be undermined due to continued use of EAP as authentication mechanism § Improved 802.1x support by peripheral device manufacturers largely undermined by lack of support for 802.1x-2010 and low adoptions / support rates for strong EAP methods
  • 117. Blog post & whitepaper: https://www.digitalsilence.com/blog/ Tool: github.com/s0lst1c3/silentbridge
  • 118. References: [1] http://www.ieee802.org/1/pages/802.1x-2001.html [2] http://www.ieee802.org/1/pages/802.1x-2004.html [3] https://blogs.technet.microsoft.com/steriley/2005/08/11/august-article-802-1x-on-wired-networks-considered-harmful/ [4] https://www.defcon.org/images/defcon-19/dc-19-presentations/Duckwall/DEFCON-19-Duckwall-Bridge-Too-Far.pdf [5] https://www.gremwell.com/marvin-mitm-tapping-dot1x-links
  • 120. References: [11] https://www.gremwell.com/linux_kernel_can_forward_802_1x [12] https://www.intel.com/content/www/us/en/support/articles/000006999/network-and-i-o/wireless-networking.html [13]http://www.willhackforsushi.com/presentations/PEAP_Shmoocon2008_Wright_Antoniewicz.pdf [14] https://link.springer.com/content/pdf/10.1007%2F978-3-642-30955-7_6.pdf [15] https://support.microsoft.com/en-us/help/922574/the-microsoft-extensible-authentication-protocol-message-digest-5-eap
  • 121. References: [16] https://tools.ietf.org/html/rfc3748 [17] https://code.google.com/archive/p/8021xbridge/source/default/commits [18] https://github.com/mubix/8021xbridge [19] https://hal.inria.fr/hal-01534313/document [20] https://sensepost.com/blog/2015/improvements-in-rogue-ap-attacks-mana-1%2F2/
  • 122. References: [21] https://tools.ietf.org/html/rfc4017 [22] http://web.archive.org/web/20160203043946/https:/www.cloudcracker.com/blog/2012/07/29/cracking-ms-chap-v2/ [23] https://crack.sh/ [24] https://tools.ietf.org/html/rfc5216 [25] https://4310b1a9-a-93739578-s-sites.googlegroups.com/a/riosec.com/home/articles/Open-Secure-Wireless/Open-Secure- Wireless.pdf?attachauth=ANoY7cqwzbsU93t3gE88UC_qqtG7cVvms7FRutz0KwK1oiBcEJMlQuUmpGSMMD7oZGyGmt4M2HaBhHFb07j8Gvmb_H WIE8rSfLKDvB0AI80u0cYwSNi5ugTP1JtFXsy1yZn8-85icVc32PpzxLJwRinf2UGzNbEdO97Wsc9xcjnc8A8MaFkPbUV5kwsMYHaxMiWwTcE- A8Dp49vv-tmk86pNMaeUeumBw_5vCZ6C3Pvc07hVbyTOsjqo6C6WpfVhd_M0BNW0RQtI&attredirects=0
  • 123. References: [26] https://txlab.wordpress.com/2012/01/25/call-home-ssh-scripts/ [27] https://txlab.wordpress.com/2012/03/14/improved-call-home-ssh-scripts/ [28] https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_37_se/command/reference/cr1/cli3.html#wp1948361 [29] https://www.juniper.net/documentation/en_US/junos/topics/concept/port-security-persistent-mac-learning.html [30] https://tools.ietf.org/html/rfc3579