Find Jobs
Hire Freelancers

Exploiting OSPF authentication to inject malicious routing updates -- 2

$30-250 USD

Închis
Data postării: aproape 3 ani în urmă

$30-250 USD

Plata la predare
I want you to prepare a screen recording of this attack along with a audio commentary in English. Exploiting OSPF authentication to inject malicious routing updates 1. Preparing a router 2. Choice of attack technique (e.g. LSA falsification) 3. Vulnerability selection (e.g. MD5 packet authentication) 4. Preparing a malicious routing update 5. Injecting the update and causing the planned effect Attacker: This definition includes: 1) any OSPF router that has been taken over 2) any malware capable of interacting with the OSPF routing domain 3) any defective or misconfigured legitimate OSPF peer. From a security perspective, this paper consolidates all possible OSPF situations into two opposing scenarios. The first scenario requires that OSPF Cryptographic Authentication or Simple Password Authentication must be present on all links in the routing domain. The second scenario occurs when Null Authentication is adopted. If one link is not protected, then the entire routing domain becomes potentially vulnerable; if an attacker is able to obtain even a single copy of any OSPF message, then the authentication provided by Simple Password is compromised and the security of the entire routing domain is compromised. The security of the entire routing domain drops immediately in the second scenario. In the first scenario using Cryptographic Authentication, there are two types of entities that can attack or pose threats: insiders and outsiders. An attacking entity is considered an insider if it is in possession of the secret key for any OSPF Cryptographic Authentication session either through: cryptanalysis, social engineering, extortion, or access to compromised/subverted routing resources. This also includes threats from malfunctioning or misconfigured OSPF routers. Vulnerabilities and attack vectors: [login to view URL] [login to view URL] Example scenario: Route spoofing: First, the attacker sets up a virtual machine a VM with the same IP address as the victim's website, and the gateway of this VM is configured to the attacker's IP. Second, the attacker uses adjacency spoofing attack to make the attacker's computer an edge router to join the whole OSPF network. Third, the attacker distributes fake LSAs to the OSPF network. All routers forward the url requests of the attacker's site in the campus network to the spoofed edge router. Finally, the attacker forwards these url requests to a virtual machine with the same IP address as the real site. Route spoofing is very dangerous for the spoofed site because the IP address of the spoofed site is the same as the IP address of the real site.
ID-ul proiectului: 30315484

Despre proiect

3 propuneri
Proiect la distanță
Activ: 3 ani în urmă

Vrei să câștigi bani?

Avantajele de a licita pe platforma Freelancer

Stabilește bugetul și intervalul temporal
Îți primești plata pentru serviciile prestate
Evidențiază-ți propunerea
Te înregistrezi și licitezi gratuit pentru proiecte
3 freelanceri plasează o ofertă medie de $293 USD pentru proiect
Avatarul utilizatorului
Hello, I am Cyber Security Expert and ready to do OSPF authentication to inject malicious routing. initiate chat with me Thanks
$600 USD în 8 zile
4,9 (90 recenzii)
6,3
6,3
Avatarul utilizatorului
Hello Dear, I am an Expert Network Engineer and I am working as Expert Network Engineer at a Multinational ISP. I have great hands-on experience for more than 15 years in various network technologies. I have Cisco CCNA & CCNP (Routing & Switching) and CCNP Enterprise (Enterprise Core & Enterprise Advanced Infrastructure Implementation) certifications. I have Juniper JNCIA-Junos (JN0-102) and JNCIA (Cloud) certifications. I have very good knowledge in Cisco wireless technology, VOIP & Network Security. My specialties: - Design/implement medium and large scale enterprise networks. - Configure Cisco Routers (ASR 1K & 9k, 2900, 2800, ISR 4K, 878, 888), Switches (Cat 6500, 3750, 3850, 2900, 2960, SG- 300, SG-500, [Nexus 5K, 7K and 9K]), Firewalls ([ASA 5505, 5506x, 5508], Fortigate, Palo Alto) and Wireless Acess Points 1800 and 2700. - Configure Juniper Routers (M7, M10, MX 480, MX 960) and SRX (300, 500). - Huawei, Mikrotik, HP & Ubiquiti devices Expert. - Packet Tracer, GNS-3, EVE-NG, VMWare workstation & VirtualBox Expert. - Routing protocols (RIP, OSPF, EIGRP, ISIS & BGP) Configuration and troubleshooting Expert and Switching Expert (VLANs, STP, VTP...). - VPN Configuration Expert (IPSEC/L2TP, GRE/PPTP, OPENVPN & SoftEther). - Linux, Unix & windows servers Expert. - Wireshark Traffic Capture & Analysis Expert. - Write technical reports and summaries. Thanks to check my profile and let me know if you are interested. Best Regards,
$30 USD în 1 zi
4,7 (92 recenzii)
5,4
5,4
Avatarul utilizatorului
I am a Cyber and information security expert and I have passed CEH. I invest my time and skills to help people protect their business from Cybercriminals. My specialties are 10+-years of experience, Information Security and Assurance, Vulnerability Assessment, Cyber Security, Penetration Testing, IT security, Cyber Security Consultant, API Security, Mobile Application Security, Source Code Audit, Web Server Pen-testing. I started my journey in the information security domain in 2010. I have a team to collaborate with on different Cyber Security projects. We have a big team managing my service. We can assess your website taking into account OWASP Top Ten and SANS/CWE Top 25. In the last few years, I did more than 100 Penetration-Tests and Security Assessments. Most of them on Web and Mobile applications with a Finance Background implemented with various technologies and frameworks such as J2EE, ASP, PHP, PYTHON, SQL Server, Linux, AWS, Azure, File Server, and internal and external networking security testing. Based on my daily work I am experienced with all common attack vectors and mitigation techniques. I did a lot of work as a penetration tester with different clients in the world and contacted them fluently in English. For details, we can talk to each other in our inbox.
$249 USD în 5 zile
4,8 (6 recenzii)
4,3
4,3

Despre client

Steagul POLAND
Szczecin, Poland
0,0
0
Metoda de plată a fost confirmată
Membru din apr. 21, 2020

Verificarea clientului

Mulțumim! Ți-am trimis prin e-mail linkul pe care trebuie să-l accesezi pentru a revendica creditul gratuit.
A apărut o eroare la trimiterea e-mailului. Încearcă din nou.
Utilizatori înregistrați Totalul proiectelor postate
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Se încarcă previzualizarea
S-a oferit permisiunea de depistare a locației.
Ți-a expirat sesiunea pentru conectare sau te-ai deconectat. Conectează-te din nou.