0% found this document useful (0 votes)
88 views

Case Study NAC Bypass and ARP Spoofing

The penetration testers were able to bypass the client's Network Access Control (NAC) solution and conduct ARP spoofing attacks on the internal network by connecting an authenticated device to an unmanaged hub and spoofing the MAC address of the authenticated device. This allowed the testers to intercept network traffic and launch man-in-the-middle attacks without being detected by the NAC solution. The testers used tools like Bettercap to conduct ARP poisoning by sending fake ARP messages linking their MAC address to legitimate IP addresses on the network. This penetration test revealed vulnerabilities that could allow unauthorized access to internal systems and data.

Uploaded by

ablito19
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views

Case Study NAC Bypass and ARP Spoofing

The penetration testers were able to bypass the client's Network Access Control (NAC) solution and conduct ARP spoofing attacks on the internal network by connecting an authenticated device to an unmanaged hub and spoofing the MAC address of the authenticated device. This allowed the testers to intercept network traffic and launch man-in-the-middle attacks without being detected by the NAC solution. The testers used tools like Bettercap to conduct ARP poisoning by sending fake ARP messages linking their MAC address to legitimate IP addresses on the network. This penetration test revealed vulnerabilities that could allow unauthorized access to internal systems and data.

Uploaded by

ablito19
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

LIFARS

your digital world, secured

Case Study–
NAC bypass & ARP spoofing
To ensure the effectiveness of our client’s security implementations LIFARS frequently
conducts penetration tests evaluating their systems can hold up to real world scenarios
and stay resilient. Our cyber resiliency experts deliver calculated attacks against
systems the same way black hat hackers.
In December, our client requested that LIFARS Pen Testing Team perform an internal
black box penetration test as part of a due diligence exercise. The client, an
international financial organization with over 10000 employees and 500 IPv4
addresses, understands the risks they face on a daily basis and the importance of
meeting compliance standards. Therefore, this client requested an external black box
penetration test on their network.
The intent of this assessment was to identify weaknesses in the company’s internet
facing infrastructure and to detail how these vulnerabilities could impact the
organization.
Therefore, the team used ARP poisoning as a main target for mounting other attacks,
such as Man-in-the-middle (MiTM). This security testing effort was conducted with
emphasis on the actual state of the systems examined and no documentation to the
client was provided.

Note: All information in this case study has been modified to maintain confidentiality
of our client
PENETRATION TESTING PHASES

There are various methodologies and approaches that can be used during penetration
testing. LIFARS Pen Testing Team, follows the Penetration Testing Execution Standard
(PTES) as the basis for penetration testing execution. The main phases of PTES are
listed below.
1. Pre-engagement Interactions
2. Intelligence Gathering
3. Threat Modeling
4. Vulnerability Analysis
5. Exploitation
6. Post Exploitation
7. Reporting

KEY FINDINGS

While conducting the penetration test, we discovered that the client network had
implemented Network access control (NAC). This solution is often used on corporate
networks to prevent unauthorized hosts from accessing internally systems and
services.

Bypassing Network Access Control

HUB Switch

~ [~s:1lccccl ...
- §@
~

Atta cker

lI Authenticator


r•1
Victim

Figure 1 NAC Bypass scheme (incogbyte.github.io)


Hardware Used

100 Mb Hub – multiport repeater and PoE injector

Steps to reproduce NAC bypass:

1. First, we had to find an authenticated host and connect it to our hub. As we


have PoE injector, we can also connect to VoIP Phone and PC.

2. After that, we connected to the hub, and start intercepting ARP frames to
identify the valid host MAC address.
C;;>>; l >;U i<.>;i, ,,.,; . <;_ ; ; .. , , ff.
'11"1 l <lll),.1'-. 1:,,. , . II_ I i • < ,_~1, '• :--
:. l :. l J UU .:.1:.:+.1, t.. <.:'.~:o _ HI ::., :erie \ll ' t,tc, lb! l 'J, 1'>1 ,
~?~ noa~:;uc-, . . ~ c::s :o_ , ., S!l.)tr>e GO l-.. C> lb$ l i . lSl .
B l l3$:i'='i ll7' . i- c:: ; :o .;<3 i rr_,:,, , e 1-.N • ,.~~ 10. a 1.

> ~• ·• •" 'I I -I: l'..<1lo:, 1- .. •• ,.. ; ,.► (.1\11,-, ·•i 1• :• . ,.,-, ·•.t' "' , .,1, 11., ·- ol ( t-1tt h i1, :
V ~• ••.. ••• ► • II ~ -., ~ : • •• : ,_~1, 1 IJ,, 1! ~ , , . " <
I" L't ~tt r ,t 1or ; :,f r (.JJ
• • 0 •• •• • • l•3 tin : ,:;1ct ->U y .1,tn: ~cc r-: ~~ ( r>ctc -r, • cc r >utt )
• •• • • •• •"I • •• ••• •• . . •• • - -5 1, ; 1, f ,., , ;_.;,1•.,. I ,11.,:,... ,,., ( m i .. . , t ;
, ... ..... , .• ► , •: .... .. ... I
•'A.i re : : : <.~~ce_ l'J
. . . . .. 'J, . . . ... . . l-:, bit : -:.l ch ll •, ,n k .. e b ~H t H (f ,cte ri.• ~e f , uh j
. .. . . .. i . .. . .. . . . . •• - :,:; bit : l fl( ~·,.i<lu l b( c r .eH ( Jfl ic H t :,
Ty, : : ,_~., ~G~3$EI:-)
1\ A Ii • ~ : 111'6.l- "II I l >l:\-"IIV,'
(,-.l,"l,,. 1 >;,"\AH;.; ,.,. .(,-.l,"IAAfi~,
) ,•,.-J, ,,... ~.., ,, 1 ,i ; ,, .. ... ,, .. ,: ., 1 ,:, ,.. , ,,. - .. 1)

Figure 2 IP & MAC address of the victim

3. At this point, we can connect the hub to the switch, and we wait for Victim
authentication.

4. After successful authentication, we cloned the valid MAC and IP address and
connect to HUB. Now the switch does not recognize the difference between
the attacker and the PC client.

Killer E2400G1gab1tEthernet Contro ller Properti es X

Events Resources Power Management


General Advanced Driver Details

The following properties are available for this network adapter. Click
the propertyyou want to change on the left. and then select its value
on the right.

f.roperty: Value:
ARP Offload "
ECMA
Energy Efficient B hemet
Row Control
r Not Present
lntenupt Moderation
1Pv4 Checksum Offload
Jumbo Frame
Large Send Offload (1Pv4)
Large Send Offload v2 (1Pv4)
Large Send Offload v2 (1Pv6)
Max IRQ per Second
RSS Queues
V

Cancel

Figure 3 MAC address change


ARP Spoofing

ARP poisoning is when an attacker sends false ARP messages over a local area
network to link an attacker’s MAC address with the IP address of a legitimate
computer or server on the network.
Once the attacker’s MAC address is linked to an authentic IP address, the attacker
can receive anything directed to the legitimate MAC address. As a result, the attacker
can make an Man-in-the-middle attack (MiTM).

Switch

Alice
Bob IP: 10.0.0.7
IP: 10.0.0.1 MAC : [aa:aa :aa:aa :aa:aa]
MAC: [bb:bb:bb:bb:bb:bb)

Attacke r
IP 10.0.0 .3
MAC : [cc:cc:cc:cc:cc :cc]

Figure 4 Representation of ARP spoofing

We have used bettercap on Windows to launch an ARP spoofing attack.

Steps to reproduce ARP spoofing attack:

1. We need to scan the network for all hosts, using module net.recon and
net.probe.
(! Gt ID © , 21.o.o.11•11an ... 0* Ill ID ill

2. With this newly obtained set of hosts, we can choose which specific host we
want to target. We can either use the console command or the GUI to execute
this.

From the console command we can type in the cmdlet:

Set arp.spoof.targets TARGET IP

From the GUI we can go to the IP address on the left corner, in this case it is
192.168.1.161. From the pull down menu, we can then choose add to
arp.spoof.targets

792.768.7.767 • 30:24:32 ....


Copy
\D evice\NPF_{10B87E4 E- D3D 1-4 1
Scan Ports
Add to arp.spoof.targets

3. Before starting the ARP spoofing module, we need to start net.sniff . We can
either use the console command or the GUI to execute this.

From the console command we type in the following cmdlet:

net.sniff on

From the GUI we can go to: Advanced -> net.sniff -> net.sniff.on
We have now successfully launched ARP spoofing:

0. 12:56 PM net.sniff.mdns mdn s 192.16 8.1.25 : PTR que ry for _airplay._tcp.local

0. 12:56 PM net.sniff.mdns mdns 192 .168 .1.25 : PTR que ry for _raop._tcp .local

0. 12:56 PM endpoint.new Det ected 192. 168. 1.25 84 :AD:8D:

0. 12:56 PM endpoint.lost Lost 192. 168. 1.25 84:AD:8D:

0. 12:56 PM mod.started arp.spoof

0. 12:56 PM sys.log WARNING : arp.sp oof full dup lex spoo fing enable d. if the rout er has ARP spoo fing mechanis ms. the att ack will fail.

0. 12:56 PM sys.log INFO : arp.spoof arp spoole r starte d. prob ing 3 targe ts.

Verification of ARP spoofing using Wireshark:


36776 304 . 468178 Micro-St 84 :ad: Bd ARP 6 0 192 . 168 . 1. 92 is at dB :cb:Ba
3 682 5 304.47 3401 Micro - St 84 :ad: Bd ARP 60 19 2 .168 i s at d8:cb : 8a
. 1.141
370 17 304.851396 30 : 24:32 84 :ad: Bd ARP 60 192 . 168 i s at 30:24 : 32
. 1. 161
37435 305 . 554 2 25 Micro - St 30:24 : 32 ARP 60 192 . 168 is at d8:cb : 8a
. 1. 205 (d uplicat e use of 1 92 .168 . 1.16 1 de t e cte d !)
3 7436 305. 5 54 32 8 30 : 24: 32 Mic ro - St ARP 60 19 2 . 168 is at 30: 24 : 32
. 1. 161
37437 305. 554439 Micr o-St 30 : 24 : 32 ARP 60 192 . 168 . 1. 0 is at dB:cb : Sa ( duplic ate use o f 192 . 168 . 1 . 1 6 1 det e cted!)
37439 305 . 554640 Micro - St 30 : 24 : 32 ARP 60 192 . 168 . 1. 1 is at dB :cb:Ba (duplic ate us e of 192 . 168 . 1 . 161 det e cted!)
3 7440 305. 5 54786 Micro - St B4 :a d: Bd ARP 60 192 . 168 . 1. 1 is at d8 :cb:8a

CONCLUSION

With ARP spoofing & Man-in-the-Middle (MiTM) attack we were able to sniff user login
data and critical password hashes. These attacks were only successful because we
were able to bypass NAC.

REPORTING

Key issues listed in this case study, and many others, were put into the final report.
The issues were identified at risk levels: low, medium, high and critical. The executive
summary provided a brief summary of vulnerabilities discovered during this
assessment broken down by category. Many of these issues were presented graphically
with recommendations given for resolution of each.

Worried about Attacks Against Your Organization?


For Incident Response and Threat Intelligence consultancy Contact LIFARS
Today Email:contact@lifars.com | Call us at:(212) 222-7061

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy