Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems...

54
1 © Ofir Arkin, 2006 Ofir Arkin, NAC (in)Security Bypassing Network Access Control Systems Ofir Arkin, CTO Blackhat USA 2006 [email protected] http://www.insightix.com

Transcript of Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems...

Page 1: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

1

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Bypassing NetworkAccess Control

Systems

Ofir Arkin, CTOBlackhat USA 2006

[email protected]://www.insightix.com

Page 2: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

2

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

What this talk is about?

Introduction to NAC The components of a NAC solution_ Pre-Admission・ Element Detection・ Risk Profiling・ Quarantine Methods・ Managed Vs. Unmanaged Elements・ Enforcement at L2 Vs. L3

_ Post-Admission・ Behavior related

How to bypass NAC solutions– Software– Hardware

Page 3: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

3

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Ofir Arkin

CTO and Co-Founder, Insightixhttp://www.insightix.com

Founder, The Sys-Security Grouphttp://www.sys-security.com

Computer Security Researcher– Infrastructure Discovery

• ICMP Usage in Scanning• Xprobe2 (The Active OS Fingerprinting Tool)

– VoIP Security– Information Warfare

Member– VoIPSA (Board member, Chair security research committee)

Page 4: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

4

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

NACAn Introduction

Page 5: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

5

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Introduction

The threat of viruses, worms, information theft andthe lack of control of the IT infrastructure leadcompanies to implement security solutions to controlthe access to their internal IT networks

A new breed of software and hardware solutions froma variety of vendors has emerged recently

All are tasked with one goal – controlling the accessto a network using different methods and solutions

NAC - An Introduction

Page 6: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

6

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Introduction

Network Access Control (NAC) is a set oftechnologies and defined processes, which its aim isto control access to the network

A common criterion for NAC does not exist andtherefore the definition of what does a NAC solutionshould contain varies from one vendor to another– Cisco Network Admission Control

– Microsoft NAP

– Trusted Computing Group (TCG) Trusted Network Connect(TNC)

– Other

NAC - An Introduction

Page 7: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

7

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

NAC Capabilities

Page 8: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

8

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

The Basic Capabilities

The most essential capabilities any NAC solutionmust have are the ability to detect a new elementconnecting to the network, and the ability to verifywhether or not it complies with a defined securitypolicy

If the element does not comply with the definedsecurity policy, the NAC solution must restrict theelement’s access to the network

NAC Capabilities

Page 9: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

9

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

NAC Functions

The following is a list of functions that may, or maynot, be included with a vendor’s NAC offering:

– Element detection (must) – The ability to detect newelements as they are introduced to the network

– Authentication – The ability to authenticate each useraccessing the network no matter where they areauthenticating from and/or which device they are using

NAC Capabilities

Page 10: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

10

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

NAC Functions

– End point security assessment – The ability to assesswhether a newly introduced network element complies withthe security policy. These checks may include the ability togather knowledge regarding an element’s operating system,the presence of an anti virus software, the list of installedpatches, etc.

– Remediation – The process of quarantine an element notcomplying with the defined security policy until the issuescausing it to be non-compliant are fixed. When quarantinedthe element is able to access a defined set of remediationservers allowing the user fixing the non-compliant issues

– Enforcement (must) – If the element does not comply withthe defined security policy, the NAC solution must restrict theelement’s access to the network.

NAC Capabilities

Page 11: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

11

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

NAC Functions

– Authorization – The ability to verify access by users tonetwork resources complies with an authorization schemedefined in an existing authorization system (such as ActiveDirectory, RADIUS servers, etc.) allowing enforcing identity-based policies

– Post-Admission Protection – Is the process ofcontinuously monitoring users, elements and their sessionsfor suspicious activity (i.e. worms, viruses, malware, etc.). Ifdetected the action taken by a NAC system may vary fromisolating the offending system to dropping the session. Postadmission protection functions similar to Intrusion PreventionSystems (IPS), and may be used as a means

NAC Capabilities

Page 12: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

12

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Element Detection

Page 13: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

13

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Element Detection

Software– DHCP Proxy

– DHCP Extensions

– Broadcast Listeners

– Switch Integration

– 802.1x

Hardware– In-Line devices

– Out-of-Band devices

A List of Methods

Page 14: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

14

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

DHCP ProxyElement Detection

Source: Sygate / Symantec

Page 15: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

15

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

DHCP ProxyElement Detection

Source: Sygate / Symantec

Page 16: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

16

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

DHCP Proxy

Strengths– Most organizations use DHCP

– Easy to deploy

Element Detection

Page 17: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

17

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

DHCP Proxy

Weaknesses– Must use agent software– Agent software is usually restricted to Windows-based

operating systems– Detection at L3 hence enforcement at L3– Elements can infect and/or penetrate other elements on their

subnet, and cannot be stopped– No actual knowledge regarding the enterprise network

• No knowledge of what is on the network• No knowledge on actual network topology lead existence of

other, uncovered venues to access the network• Exceptions needs to be manually inputted (if at all)• Not a complete solution (does not detect everything)

– Cannot be extended to include remote users

Element Detection

Page 18: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

18

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

DHCP Proxy

Bypass– Assigning a static IP Address

– Elements can infect and/or penetrate other elements on theirsubnet, and cannot be stopped

– NAT (Not able to detect masquerading elements behind anallowed elements)

– Mimicking exceptions

Element Detection

Page 19: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

19

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

DHCP ExtensionsElement Detection

Source: Microsoft

Page 20: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

20

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

DHCP Extensions

Strengths– Does not need to replace the existing DHCP supporting

infrastructure

Weaknesses– Client-based software must support DHCP extensions (or

use specialized client software)

Element Detection

Page 21: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

21

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Broadcast ListenersElement Detection

Page 22: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

22

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Broadcast Listeners

Weaknesses– Must be deployed on each and every subnet

– A lot of moving parts

– Knowledge regarding the enterprise network must beobtained prior to deployment (i.e. which are the differentsubnets, where are the locations to be deployed, etc.)

– Exceptions are hard to configure (i.e. the only informationavailable is a MAC address and an IP address)

– No knowledge on actual network topology lead existence ofother, uncovered venues to access the network

– Cannot be extended to include remote users

Element Detection

Page 23: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

23

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Broadcast Listeners

Bypass– Static ARP entries

– NAT

– Mimicking exceptions

Element Detection

Page 24: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

24

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Switch IntegrationElement Detection

Page 25: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

25

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Switch Integration

Weaknesses– Must have prior knowledge regarding the entire list of

switches it needs to integrate with (receive information from)

– Depends on the ability to query a switch using SNMP

– Depends on a switch to provide with information regarding anew element operating on the network (SNMP trap)

– Provides poor information regarding elements operating onthe network (their MAC address and their IP address)

– Cannot be extended to include remote users

Element Detection

Page 26: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

26

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Switch Integration

Bypass– Find and connect to an unmanaged switch

– Connect two switches through a hub

– Connect elements through a switch or a hub

– NAT

– Mimicking allowed elements (“No Port Security”)• The same MAC address of an existing element and a different

IP address

• The same MAC address and IP address of an existing element

Element Detection

Page 27: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

27

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

802.1xElement Detection

Source: Cisco

Page 28: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

28

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

802.1xElement Detection

Source: Cisco

Page 29: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

29

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

802.1x

Strengths– Can prevent elements to connect to the network even before

assigned an IP address

Weaknesses– Difficult manageability

• All elements on the network must be configured to use 802.1x• Legacy networking elements must be upgraded to support 802.1x

– Not all of the networking elements can support 802.1x– Not all of the elements residing on the network are 802.1x capable

(can authenticate) (i.e. legacy equipment, AS-400, printers, etc.)– The cost for implementing a solution which is based on 802.1x is

high (time, resources, infrastructure upgrade, etc.)– No knowledge on actual network topology lead existence of other,

uncovered venues to access the network

Element Detection

Page 30: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

30

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

802.1x

Bypass– Mimicking exceptions (i.e. a printer)

– NAT

Element Detection

Page 31: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

31

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

In-Line DevicesElement Detection

Page 32: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

32

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

In-Line Devices

Strengths Weaknesses

– No knowledge on actual network topology lead existence of other,uncovered venues to access the network

– Deployment must involve a network re-architecture– Deployment must be as close as possible to the access layer to be

efficient and productive– A possible point of failure– Deployment is time consuming– Extremely Costly– Detection at L3 only– Infection of other elements on the same subnet and/or switch is

possible– Some elements may only generate L2 traffic

Element Detection

Page 33: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

33

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

In-Line Devices

Bypass– Mimicking an element

– NAT

– Elements can infect and/or penetrate other elements on thesame switch/subnet, and cannot be stopped

Element Detection

Page 34: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

34

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Out-of-Band DevicesElement Detection

Page 35: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

35

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Out-of-Band Devices

Strengths– Fast to implement

– Less moving parts

– Real-time

– Detection at L2

Weaknesses

Element Detection

Page 36: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

36

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

End Point Security Assessment

Page 37: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

37

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

End Point Security Assessment

Agent-based– Strengths

• Provides a wealth of information regarding a host (OS, patches,A/V Signatures)

• Can provide a full featured solution

– Weaknesses• Usually available for Microsoft Windows operating systems only

• Management can be a nightmare

• No awareness of the entire network, not everything is covered

Agent-based Solutions

Page 38: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

38

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

End Point Security Assessment

Agent-less– Strength

• No need to install additional software

• Deployment might be fast (depends on the tye of solution)

– Weaknesses• Information regarding a certain element might not always be

available (i.e. querying the host to receive a certain property ofthe host may not unveil the requiered information)

Agent-less Solutions

Page 39: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

39

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

End Point Security Assessment

It all breaks down to what is being checked, and doesthe information is helpful or not?– Patches

• Security related patches (and other patches) are not enrolledinto the enterprise as soon as they are available

• It may take up to a year to enroll a major update of an operatingsystem (i.e. Microsoft Windows XP SP2)

– Zero day is not blocked• The checks performed may be useless. Zero day viruses,

worms, and vulnerabilities do not have remediation

– Understanding the real risk• The risk from an element does not only rely on the version of

the A/V signature file it may be running (I.e. information theft,unauthorized access, etc.)

Risks

Page 40: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

40

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Enforcement/Quarantine

Page 41: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

41

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Quarantine Methods

Separate Subnet/VLAN– Separate, non-routable, network address space

– Weaknesses• Creates a self infecting quarantine area of restricted elements

• In the case of DHCP, it is easily bypassed by assigning anelement a static IP address (and changing routes)

Enforcement/Quarantine

Page 42: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

42

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Quarantine Methods

Switch Integration– Shutting down a switch port

• Shutting down a switch port without knowing the topology of thenetwork and without relating to who is connected to thatparticular switch

• Creates situations in which legitimate elements may bedisconnected from the network

• Must have a prior knowledge on who are all of the switcheswhich are available on the network

• Must have SNMP R/W access to all of the switches• Unmanaged switches are a big issue

– ACLs• ACLs provides enforcement at L3 only. Not all routers are

capable of using them. Creates an extra load on a router

Enforcement/Quarantine

Page 43: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

43

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Quarantine Methods

ARP Poisoning– Strengths

• Effective method

• Performed at L2

• Does not rely on switch integration

– Weaknesses• Must be deployed and/or connected to each subnet

Enforcement/Quarantine

Page 44: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

44

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Other Problematic Issues

Page 45: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

45

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Other Problematic Issues

Authentication as the only supervision means– No supervision on an element’s action on the network once it

is cleared to operate

Authorization is not part of NAC

Enforcement at L2 Vs. at L3

Managed Vs. Unmanaged Elements

No knowledge regarding the ‘big picture’

Page 46: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

46

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Example

Page 47: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

47

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Microsoft NAP

Page 48: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

48

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Microsoft NAP Components

Source: Microsoft Source: Microsoft

Page 49: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

49

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Microsoft NAP ComponentsInteraction

Source: Microsoft

Page 50: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

50

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Microsoft NAP

Strengths

Weaknesses

Page 51: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

51

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

The Required

Page 52: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

52

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Questions?

Page 53: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

53

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Resources

Microsoft NAPhttp://www.microsoft.com/technet/itsolutions/network/nap/default.mspx

Cisco NAChttp://www.cisco.com/en/US/netsol/ns466/networking_solutions_package.html

TCGhttps://www.trustedcomputinggroup.org/home

Page 54: Bypassing Network Access Control Systems - Black Hat · Bypassing Network Access Control Systems ... whether a newly introduced network element complies with the security policy.

54

© Ofir Arkin, 2006Ofir Arkin, NAC (in)Security

Thank You