COEN 252 Computer Forensics Router Investigation Significance of

  • Slides: 18
Download presentation
COEN 252: Computer Forensics Router Investigation

COEN 252: Computer Forensics Router Investigation

Significance of Routers n n Targets of attacks, esp. Do. S. Stepping stones for

Significance of Routers n n Targets of attacks, esp. Do. S. Stepping stones for attacks. n Routers store n n Passwords Routing tables Network block information. Tools for investigation.

Characteristics of Routers n Have little storage. n n Use Non-Volatile RAM (NVRAM) n

Characteristics of Routers n Have little storage. n n Use Non-Volatile RAM (NVRAM) n n Saves configuration files Use normal RAM n n Most information comes from logs or is volatile. Current routing tables Listening services Current Passwords Forensics exam needs to get the volatile data!

Gather Volatile Router Data n n n Connect to console port. Need cable and

Gather Volatile Router Data n n n Connect to console port. Need cable and laptop with terminal emulation software. Gather Volatile Data n n Record System Time Determine who is logged on

Gather Volatile Router Data n Gather Volatile Data n n Determine the uptime and

Gather Volatile Router Data n Gather Volatile Data n n Determine the uptime and other data on the router since last boot-up Determine listening sockets n n n Routers run a few services such as telnet that are vulnerabilities. Determining listening sockets lists all current services that might be vulnerable. For example, port 80 (http) is often used for router administration, but port 80 is not normally protected by a firewall.

Gather Volatile Router Data n Gather Volatile Data n n Save the router configuration.

Gather Volatile Router Data n Gather Volatile Data n n Save the router configuration. Review the routing table. n This detects malicious static routes. n n n Modified by attacker at the router. Modified with Routing Information Protocol (RIP) spoofing. Check the interface configuration n Lots of easy to read data.

Gather Volatile Router Data n Gather Volatile Data n View the ARP cache n

Gather Volatile Router Data n Gather Volatile Data n View the ARP cache n Evidence for IP or MAC spoofing

Incidence Investigation n n Direct Compromise Routing Table Manipulation Theft of Information Denial of

Incidence Investigation n n Direct Compromise Routing Table Manipulation Theft of Information Denial of Service

Incidence Investigation: Direct Compromise n Many ways to access a router. n n n

Incidence Investigation: Direct Compromise n Many ways to access a router. n n n Telnet, SSH, SMTP, … Physical Access. Modem Access. n n Listening Services. n n Investigate via listening services. Provide potential attack points. Password Guessing

Incidence Investigation: Direct Compromise n Passwords n n n Password cracking stealing from configuration

Incidence Investigation: Direct Compromise n Passwords n n n Password cracking stealing from configuration files sniffing from net n n snmp, telnet, HTTP, TFTP Console Access n Reboot to get access

Incidence Investigation: Direct Compromise n Modem n n Last user did not log off.

Incidence Investigation: Direct Compromise n Modem n n Last user did not log off. TFTP n n Used to store and reload configuration files. UDP, no security Attacker scans network for router and TFTP server, then guesses configuration file name, and receives it via TFTP. This gives all passwords needed to access a router. Alternatively, router uploads a changed configuration file to the TFTP server and waits for a network reload.

Incidence Investigation: Routing Table Manipulations n Routers use a variety of protocols to update

Incidence Investigation: Routing Table Manipulations n Routers use a variety of protocols to update their routing tables. n n n RIP Open Shortest Path First Enhanced Interior Gateway Routing Protocol (EIGRP) Interior Gateway Routing Protocol (IGRP) Some have no authentication!

Incidence Investigation: Routing Table Manipulations n n Review routing table with “show ip route”

Incidence Investigation: Routing Table Manipulations n n Review routing table with “show ip route” For recovery: n n n Remove static routing entries. Reboot router. Switch to authenticating router updates. (Easier said than done. )

Incident Investigation Theft of Information n n Routers contain network topology and access control.

Incident Investigation Theft of Information n n Routers contain network topology and access control. For recovery: n n change all passwords avoid password reuse

Incident Investigation Do. S n n n Destruction of router’s capability to function. Resource

Incident Investigation Do. S n n n Destruction of router’s capability to function. Resource consumption reduces functionality of router. Bandwidth consumption overwhelms the network bandwidth.

Incident Investigation Do. S n Recovery: n n Elimination of listening services Upgrade of

Incident Investigation Do. S n Recovery: n n Elimination of listening services Upgrade of software Access restriction Authentication

Router Authentication n Routers use Access Control Lists (ACL) n Restrict traffic based on

Router Authentication n Routers use Access Control Lists (ACL) n Restrict traffic based on packet attributes n n n Protocol Source / Destination IP address Port TCP flag ICMP message type Time of day

Routers as Monitors n n Can log traffic based on ACL Logs stored at

Routers as Monitors n n Can log traffic based on ACL Logs stored at a remote site.