SlideShare a Scribd company logo
1 of 40
Download to read offline
µMIMOSAWRITERROUTER
µMIMOSAWRITERROUTER
Abusing EPC on Cisco Routers to Collect Data.
Joaquim Espinhara Rafael Silva
@jespinhara @rfdslabs
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
www.nsanamegenerator.com
Why this name?
Agenda
1 / About Us
2 / Introduction & Motivation
3 / EPC / Evil / How EPC works / Abusing
EPC
4 / Mimosa / Our approach / Demo /
Potential
5 / Threat Intelligence
6 / Future
7 / Conclusion!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
About us
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
1 / About us
Rafael Silva aka @rfdslabs
CTO at @EstuárioTI
Twitter @rfdslabs
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
1 / About us
Joaquim Espinhara aka @Jespinhara
Senior Security Consultant at @securusglobal
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
Introduction & motivation
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
2 / Introduction & motivation
•  We are NOT exploiting a 0day on Cisco
devices.!
•  We are aware of other methods, like GRE
tunnels, port mirroring, lawful interception, etc.!
•  This is an automated tool to help pentesters /
Threat intelligence to collect interesting data in
a controlled environment.!
•  This is really useful tool for threat intelligence
data gathering.!
•  You have to get ENABLE privilege on the router
to use Mimosa.!
!
2 / Introduction & motivation
2009 / @jespinhara @h2hc about GRE-TUNNELS.
2009 / @rfdslabs tell about EPC to @jespinhara.
2010 / Hacking the Planet…
2011 / Hacking the Planet…
2012 / Hacking the Planet…
2013 / Hacking the Planet…
2014 -2015 / Mimosa released. !
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
EPC
Embedded Packet Capture
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
3 / EPC
The ability to capture IPv4 and IPv6 packets.
A flexible method for specifying the capture buffer size and type.
EXEC-level commands to start and stop the capture.
Show commands to display packet contents on the device.
Facility to export the packet capture in PCAP format.
Extensible infrastructure for enabling packet capture points.!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
3 / EPC / Abuse!
The ability to capture IPv4 and IPv6 packets.
A flexible method for specifying the capture buffer size and type.
EXEC-level commands to start and stop the capture.
Show commands to display packet contents on the device.
Facility to export the packet capture in PCAP format.
Extensible infrastructure for enabling packet capture points.!
• Sniffing
• Choose the sniffer buffer size. More than one buffer and capture point.
• Need some hacking to Enable, cisco/cisco.
• Sniffing on the fly.
• Make your pcap-farm-server.
• All Your Network Are Belong to Us.
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
3 / EPC / How EPC Works!
Define a Capture Buffer and Size and Type (Linear OR Circular):
Define a Capture point (interfaces and directions):
Associate the capture point to our buffer:
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
3 / EPC / How EPC Works!
Start / stop the capture point:
Linear / When the buffer is full, the
capture will stop.
Circular / The buffer will be
overwritten with new packets.!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
3 / EPC / How EPC Works!
Sniffing on the fly:
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
3 / EPC / How EPC Works!
Export the capture in PCAP format to a remote location:
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
3 / EPC / How EPC Works!
The main problem is export the capture to a REMOTE location.
No way to disable the EPC OR block the export to a remote
location L
This is a feature, is not a BUG J!
Mimosa
Framework
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
4 / Mimosa / Our approach!
µMimosa C&C Routers Collectors µMimosa Parser
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
4 / Mimosa Framework!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
4 / Mimosa / Detect Threats!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
Tshark and Bro!
tshark -Y 'http contains "User-Agent:"' -T fields -e http.user_agent -nlr pcapfile!
User Agents
4 / Mimosa / Detect Threats!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
Tshark and Bro!
tshark -T fields -e http.host -e http.request.uri -Y 'http.request.method == "GET"' -nlr pcapfile!
HTTP Requests
4 / Mimosa / Detect Threats!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
Tshark and Bro!
•  tshark -T fields -e http.host -e http.request.uri -Y 'http.request.method == "GET"' -nlr pcapfile!
HTTP Requests
•  tshark -r pcapfile -o "ip.use_geoip:TRUE" -o column.format:""IP_Flags", "%Cus:ip.flags". "IP_src",
"%Cus:ip.src". "IP_dst", "%Cus:ip.dst", "CITY", "%Cus:ip.geoip.city", "Latitude”,
"%Cus:ip.geoip.lat""!
Geo IP
•  tshark -T fields -e http.host -e http.request.uri -Y 'http.request.method == "GET"' -nlr pcapfile!
HTTP Requests
!
User Agents (Client Side Attacks)!
•  tshark -Y 'http contains "User-Agent:"' -T fields -e http.user_agent –r pcapfile!
DNS Requests (Virus Total)
•  tshark -nn -e ip.src -e dns.qry.name -T fields -Y "dns" –r pcaptile!
!
4 / Mimosa / Detect Threats!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
Tshark and Bro!
FTP Creds!
•  tshark -Y "(ftp.response.code == 230 || ftp.request.command == "PASS") ||
(ftp.request.command == "USER")" -nlr pcapfile!
!
POP Creds!
•  tshark -Y "(pop.request.command == "PASS") || (pop.request.command == "USER")" –nlr
pcapfile!
Cookies!
•  tshark -r pcapfile -Y 'http.cookie' -z "proto,colinfo,http.content_type,http.content_type" -z
"proto,colinfo,http.content_length,http.content_length" -z
"proto,colinfo,http.cookie,http.cookie”!
4 / Mimosa / Detect Threats!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
Tshark and Bro!
•  Extract Files With Bro!
4 / Mimosa / Results!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
4 / Mimosa / Results!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
4 / Mimosa / Results!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
4 / Mimosa / Results!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
4 / Mimosa / Results!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
4 / Mimosa / Results!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
4 / Mimosa / Results!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
4 / Mimosa / Results!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
4 / Mimosa / Results!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
4 / Mimosa / Potential!
Some numbers:
• 300 Routers
• 1MB per hour
• 24hr per day
• 365 days per year
• 1hr = 300 MB
• 24hr = 7200 = 7.2 GB
• 365 = 2628000 = 2566,40625 GB = 2,506256104 TB!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
Future
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
6 / Future
Add support to another devices, such as mikrotik and Juniper.
A dashboard for better visualization of the sensitive data.
Other attack options like bruteforce, CVE-XXXX.!
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
Mimosa
https://github.com/rfdslabs/Mimosa-Framework
µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
Download and coding with us.!
Python Based.!
Trank you!
Rafael Silva
rafa.silva@gmail.com
@rfdslabs!
Joaquim Espinhara
espinhara.net@gmail.com
@jespinhara!
Ulisses Albuquerque @urma
Julio Auto @julioauto
Luiz Eduardo @effffn!
Mateusz Sitkowski
Julio Cesar Fort @juliocesarfort
NSA for the insight!

More Related Content

Similar to CONFidence 2015: MIMOSAWRITERROUTER - Abusing EPC on Cisco Router to collect critical data - Joaquim Espinhara, Rafael Silva

Open source tools for optimizing your peering infrastructure @ DE-CIX TechMee...
Open source tools for optimizing your peering infrastructure @ DE-CIX TechMee...Open source tools for optimizing your peering infrastructure @ DE-CIX TechMee...
Open source tools for optimizing your peering infrastructure @ DE-CIX TechMee...Daniel Czerwonk
 
Is your python application secure? - PyCon Canada - 2015-11-07
Is your python application secure? - PyCon Canada - 2015-11-07Is your python application secure? - PyCon Canada - 2015-11-07
Is your python application secure? - PyCon Canada - 2015-11-07Frédéric Harper
 
PyCon Canada 2015 - Is your python application secure
PyCon Canada 2015 - Is your python application securePyCon Canada 2015 - Is your python application secure
PyCon Canada 2015 - Is your python application secureIMMUNIO
 
InfoSec Taiwan 2023: APNIC Community Honeynet Project — Observations and Insi...
InfoSec Taiwan 2023: APNIC Community Honeynet Project — Observations and Insi...InfoSec Taiwan 2023: APNIC Community Honeynet Project — Observations and Insi...
InfoSec Taiwan 2023: APNIC Community Honeynet Project — Observations and Insi...APNIC
 
雲端影音與物聯網平台的軟體工程挑戰:以 Skywatch 為例-陳維超
雲端影音與物聯網平台的軟體工程挑戰:以 Skywatch 為例-陳維超雲端影音與物聯網平台的軟體工程挑戰:以 Skywatch 為例-陳維超
雲端影音與物聯網平台的軟體工程挑戰:以 Skywatch 為例-陳維超台灣資料科學年會
 
μ/log and the next 100 log systems
μ/log and the next 100 log systemsμ/log and the next 100 log systems
μ/log and the next 100 log systemsBruno Bonacci
 
RootedCON 2014 - Kicking around SCADA!
RootedCON 2014 - Kicking around SCADA!RootedCON 2014 - Kicking around SCADA!
RootedCON 2014 - Kicking around SCADA!testpurposes
 
Media Files : Android's New Nightmare
Media Files :  Android's New NightmareMedia Files :  Android's New Nightmare
Media Files : Android's New NightmareOguzhan Topgul
 
Cfgmgmtcamp 2023 — eBPF Superpowers
Cfgmgmtcamp 2023 — eBPF SuperpowersCfgmgmtcamp 2023 — eBPF Superpowers
Cfgmgmtcamp 2023 — eBPF SuperpowersRaphaël PINSON
 
The Next Linux Superpower: eBPF Primer
The Next Linux Superpower: eBPF PrimerThe Next Linux Superpower: eBPF Primer
The Next Linux Superpower: eBPF PrimerSasha Goldshtein
 
Making the gov data more open
Making the gov data more openMaking the gov data more open
Making the gov data more openMarek Sotak
 
Martin Zeiser, Universal Pwn n Play - pacsec -final
Martin Zeiser, Universal Pwn n Play - pacsec -finalMartin Zeiser, Universal Pwn n Play - pacsec -final
Martin Zeiser, Universal Pwn n Play - pacsec -finalPacSecJP
 
Real-Time Web applications with WebSockets
Real-Time Web applications with WebSocketsReal-Time Web applications with WebSockets
Real-Time Web applications with WebSocketsStanislav Zozulia
 
HES2011 - Sebastien Tricaud - Capture me if you can
HES2011 - Sebastien Tricaud - Capture me if you canHES2011 - Sebastien Tricaud - Capture me if you can
HES2011 - Sebastien Tricaud - Capture me if you canHackito Ergo Sum
 
Hackito Ergo Sum 2011: Capture me if you can!
Hackito Ergo Sum 2011: Capture me if you can!Hackito Ergo Sum 2011: Capture me if you can!
Hackito Ergo Sum 2011: Capture me if you can!stricaud
 
What should a hacker know about WebDav?
What should a hacker know about WebDav?What should a hacker know about WebDav?
What should a hacker know about WebDav?Mikhail Egorov
 
How to dominate a country
How to dominate a countryHow to dominate a country
How to dominate a countryTiago Henriques
 
From printed circuit boards to exploits
From printed circuit boards to exploitsFrom printed circuit boards to exploits
From printed circuit boards to exploitsvirtualabs
 
MUM Europe 2017 - Traffic Generator Case Study
MUM Europe 2017 - Traffic Generator Case StudyMUM Europe 2017 - Traffic Generator Case Study
MUM Europe 2017 - Traffic Generator Case StudyFajar Nugroho
 

Similar to CONFidence 2015: MIMOSAWRITERROUTER - Abusing EPC on Cisco Router to collect critical data - Joaquim Espinhara, Rafael Silva (20)

Open source tools for optimizing your peering infrastructure @ DE-CIX TechMee...
Open source tools for optimizing your peering infrastructure @ DE-CIX TechMee...Open source tools for optimizing your peering infrastructure @ DE-CIX TechMee...
Open source tools for optimizing your peering infrastructure @ DE-CIX TechMee...
 
Is your python application secure? - PyCon Canada - 2015-11-07
Is your python application secure? - PyCon Canada - 2015-11-07Is your python application secure? - PyCon Canada - 2015-11-07
Is your python application secure? - PyCon Canada - 2015-11-07
 
PyCon Canada 2015 - Is your python application secure
PyCon Canada 2015 - Is your python application securePyCon Canada 2015 - Is your python application secure
PyCon Canada 2015 - Is your python application secure
 
InfoSec Taiwan 2023: APNIC Community Honeynet Project — Observations and Insi...
InfoSec Taiwan 2023: APNIC Community Honeynet Project — Observations and Insi...InfoSec Taiwan 2023: APNIC Community Honeynet Project — Observations and Insi...
InfoSec Taiwan 2023: APNIC Community Honeynet Project — Observations and Insi...
 
雲端影音與物聯網平台的軟體工程挑戰:以 Skywatch 為例-陳維超
雲端影音與物聯網平台的軟體工程挑戰:以 Skywatch 為例-陳維超雲端影音與物聯網平台的軟體工程挑戰:以 Skywatch 為例-陳維超
雲端影音與物聯網平台的軟體工程挑戰:以 Skywatch 為例-陳維超
 
μ/log and the next 100 log systems
μ/log and the next 100 log systemsμ/log and the next 100 log systems
μ/log and the next 100 log systems
 
RootedCON 2014 - Kicking around SCADA!
RootedCON 2014 - Kicking around SCADA!RootedCON 2014 - Kicking around SCADA!
RootedCON 2014 - Kicking around SCADA!
 
Media Files : Android's New Nightmare
Media Files :  Android's New NightmareMedia Files :  Android's New Nightmare
Media Files : Android's New Nightmare
 
Cfgmgmtcamp 2023 — eBPF Superpowers
Cfgmgmtcamp 2023 — eBPF SuperpowersCfgmgmtcamp 2023 — eBPF Superpowers
Cfgmgmtcamp 2023 — eBPF Superpowers
 
The Next Linux Superpower: eBPF Primer
The Next Linux Superpower: eBPF PrimerThe Next Linux Superpower: eBPF Primer
The Next Linux Superpower: eBPF Primer
 
Enei
EneiEnei
Enei
 
Making the gov data more open
Making the gov data more openMaking the gov data more open
Making the gov data more open
 
Martin Zeiser, Universal Pwn n Play - pacsec -final
Martin Zeiser, Universal Pwn n Play - pacsec -finalMartin Zeiser, Universal Pwn n Play - pacsec -final
Martin Zeiser, Universal Pwn n Play - pacsec -final
 
Real-Time Web applications with WebSockets
Real-Time Web applications with WebSocketsReal-Time Web applications with WebSockets
Real-Time Web applications with WebSockets
 
HES2011 - Sebastien Tricaud - Capture me if you can
HES2011 - Sebastien Tricaud - Capture me if you canHES2011 - Sebastien Tricaud - Capture me if you can
HES2011 - Sebastien Tricaud - Capture me if you can
 
Hackito Ergo Sum 2011: Capture me if you can!
Hackito Ergo Sum 2011: Capture me if you can!Hackito Ergo Sum 2011: Capture me if you can!
Hackito Ergo Sum 2011: Capture me if you can!
 
What should a hacker know about WebDav?
What should a hacker know about WebDav?What should a hacker know about WebDav?
What should a hacker know about WebDav?
 
How to dominate a country
How to dominate a countryHow to dominate a country
How to dominate a country
 
From printed circuit boards to exploits
From printed circuit boards to exploitsFrom printed circuit boards to exploits
From printed circuit boards to exploits
 
MUM Europe 2017 - Traffic Generator Case Study
MUM Europe 2017 - Traffic Generator Case StudyMUM Europe 2017 - Traffic Generator Case Study
MUM Europe 2017 - Traffic Generator Case Study
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 

Recently uploaded (20)

CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 

CONFidence 2015: MIMOSAWRITERROUTER - Abusing EPC on Cisco Router to collect critical data - Joaquim Espinhara, Rafael Silva

  • 2. µMIMOSAWRITERROUTER Abusing EPC on Cisco Routers to Collect Data. Joaquim Espinhara Rafael Silva @jespinhara @rfdslabs µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 3. µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow! www.nsanamegenerator.com Why this name?
  • 4. Agenda 1 / About Us 2 / Introduction & Motivation 3 / EPC / Evil / How EPC works / Abusing EPC 4 / Mimosa / Our approach / Demo / Potential 5 / Threat Intelligence 6 / Future 7 / Conclusion! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 5. About us µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 6. 1 / About us Rafael Silva aka @rfdslabs CTO at @EstuárioTI Twitter @rfdslabs µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 7. 1 / About us Joaquim Espinhara aka @Jespinhara Senior Security Consultant at @securusglobal µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 8. Introduction & motivation µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 9. µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow! 2 / Introduction & motivation •  We are NOT exploiting a 0day on Cisco devices.! •  We are aware of other methods, like GRE tunnels, port mirroring, lawful interception, etc.! •  This is an automated tool to help pentesters / Threat intelligence to collect interesting data in a controlled environment.! •  This is really useful tool for threat intelligence data gathering.! •  You have to get ENABLE privilege on the router to use Mimosa.! !
  • 10. 2 / Introduction & motivation 2009 / @jespinhara @h2hc about GRE-TUNNELS. 2009 / @rfdslabs tell about EPC to @jespinhara. 2010 / Hacking the Planet… 2011 / Hacking the Planet… 2012 / Hacking the Planet… 2013 / Hacking the Planet… 2014 -2015 / Mimosa released. ! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 11. EPC Embedded Packet Capture µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 12. 3 / EPC The ability to capture IPv4 and IPv6 packets. A flexible method for specifying the capture buffer size and type. EXEC-level commands to start and stop the capture. Show commands to display packet contents on the device. Facility to export the packet capture in PCAP format. Extensible infrastructure for enabling packet capture points.! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 13. 3 / EPC / Abuse! The ability to capture IPv4 and IPv6 packets. A flexible method for specifying the capture buffer size and type. EXEC-level commands to start and stop the capture. Show commands to display packet contents on the device. Facility to export the packet capture in PCAP format. Extensible infrastructure for enabling packet capture points.! • Sniffing • Choose the sniffer buffer size. More than one buffer and capture point. • Need some hacking to Enable, cisco/cisco. • Sniffing on the fly. • Make your pcap-farm-server. • All Your Network Are Belong to Us. µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 14. 3 / EPC / How EPC Works! Define a Capture Buffer and Size and Type (Linear OR Circular): Define a Capture point (interfaces and directions): Associate the capture point to our buffer: µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 15. 3 / EPC / How EPC Works! Start / stop the capture point: Linear / When the buffer is full, the capture will stop. Circular / The buffer will be overwritten with new packets.! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 16. 3 / EPC / How EPC Works! Sniffing on the fly: µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 17. 3 / EPC / How EPC Works! Export the capture in PCAP format to a remote location: µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 18. µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow! 3 / EPC / How EPC Works! The main problem is export the capture to a REMOTE location. No way to disable the EPC OR block the export to a remote location L This is a feature, is not a BUG J!
  • 20. 4 / Mimosa / Our approach! µMimosa C&C Routers Collectors µMimosa Parser µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 21. 4 / Mimosa Framework! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 22. 4 / Mimosa / Detect Threats! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow! Tshark and Bro! tshark -Y 'http contains "User-Agent:"' -T fields -e http.user_agent -nlr pcapfile! User Agents
  • 23. 4 / Mimosa / Detect Threats! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow! Tshark and Bro! tshark -T fields -e http.host -e http.request.uri -Y 'http.request.method == "GET"' -nlr pcapfile! HTTP Requests
  • 24. 4 / Mimosa / Detect Threats! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow! Tshark and Bro! •  tshark -T fields -e http.host -e http.request.uri -Y 'http.request.method == "GET"' -nlr pcapfile! HTTP Requests •  tshark -r pcapfile -o "ip.use_geoip:TRUE" -o column.format:""IP_Flags", "%Cus:ip.flags". "IP_src", "%Cus:ip.src". "IP_dst", "%Cus:ip.dst", "CITY", "%Cus:ip.geoip.city", "Latitude”, "%Cus:ip.geoip.lat""! Geo IP •  tshark -T fields -e http.host -e http.request.uri -Y 'http.request.method == "GET"' -nlr pcapfile! HTTP Requests ! User Agents (Client Side Attacks)! •  tshark -Y 'http contains "User-Agent:"' -T fields -e http.user_agent –r pcapfile! DNS Requests (Virus Total) •  tshark -nn -e ip.src -e dns.qry.name -T fields -Y "dns" –r pcaptile! !
  • 25. 4 / Mimosa / Detect Threats! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow! Tshark and Bro! FTP Creds! •  tshark -Y "(ftp.response.code == 230 || ftp.request.command == "PASS") || (ftp.request.command == "USER")" -nlr pcapfile! ! POP Creds! •  tshark -Y "(pop.request.command == "PASS") || (pop.request.command == "USER")" –nlr pcapfile! Cookies! •  tshark -r pcapfile -Y 'http.cookie' -z "proto,colinfo,http.content_type,http.content_type" -z "proto,colinfo,http.content_length,http.content_length" -z "proto,colinfo,http.cookie,http.cookie”!
  • 26. 4 / Mimosa / Detect Threats! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow! Tshark and Bro! •  Extract Files With Bro!
  • 27. 4 / Mimosa / Results! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 28. 4 / Mimosa / Results! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 29. 4 / Mimosa / Results! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 30. 4 / Mimosa / Results! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 31. 4 / Mimosa / Results! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 32. 4 / Mimosa / Results! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 33. 4 / Mimosa / Results! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 34. 4 / Mimosa / Results! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 35. 4 / Mimosa / Results! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 36. 4 / Mimosa / Potential! Some numbers: • 300 Routers • 1MB per hour • 24hr per day • 365 days per year • 1hr = 300 MB • 24hr = 7200 = 7.2 GB • 365 = 2628000 = 2566,40625 GB = 2,506256104 TB! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 38. 6 / Future Add support to another devices, such as mikrotik and Juniper. A dashboard for better visualization of the sensitive data. Other attack options like bruteforce, CVE-XXXX.! µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow!
  • 39. Mimosa https://github.com/rfdslabs/Mimosa-Framework µMIMOSAWRITERROUTER / Confidence 2015 @ Krakow! Download and coding with us.! Python Based.!
  • 40. Trank you! Rafael Silva rafa.silva@gmail.com @rfdslabs! Joaquim Espinhara espinhara.net@gmail.com @jespinhara! Ulisses Albuquerque @urma Julio Auto @julioauto Luiz Eduardo @effffn! Mateusz Sitkowski Julio Cesar Fort @juliocesarfort NSA for the insight!