Find Jobs
Hire Freelancers

Exploiting OSPF authentication to inject malicious routing updates -- 2

$30-250 USD

Imefungwa
Imechapishwa almost 3 years ago

$30-250 USD

Kulipwa wakati wa kufikishwa
I want you to prepare a screen recording of this attack along with a audio commentary in English. Exploiting OSPF authentication to inject malicious routing updates 1. Preparing a router 2. Choice of attack technique (e.g. LSA falsification) 3. Vulnerability selection (e.g. MD5 packet authentication) 4. Preparing a malicious routing update 5. Injecting the update and causing the planned effect Attacker: This definition includes: 1) any OSPF router that has been taken over 2) any malware capable of interacting with the OSPF routing domain 3) any defective or misconfigured legitimate OSPF peer. From a security perspective, this paper consolidates all possible OSPF situations into two opposing scenarios. The first scenario requires that OSPF Cryptographic Authentication or Simple Password Authentication must be present on all links in the routing domain. The second scenario occurs when Null Authentication is adopted. If one link is not protected, then the entire routing domain becomes potentially vulnerable; if an attacker is able to obtain even a single copy of any OSPF message, then the authentication provided by Simple Password is compromised and the security of the entire routing domain is compromised. The security of the entire routing domain drops immediately in the second scenario. In the first scenario using Cryptographic Authentication, there are two types of entities that can attack or pose threats: insiders and outsiders. An attacking entity is considered an insider if it is in possession of the secret key for any OSPF Cryptographic Authentication session either through: cryptanalysis, social engineering, extortion, or access to compromised/subverted routing resources. This also includes threats from malfunctioning or misconfigured OSPF routers. Vulnerabilities and attack vectors: [login to view URL] [login to view URL] Example scenario: Route spoofing: First, the attacker sets up a virtual machine a VM with the same IP address as the victim's website, and the gateway of this VM is configured to the attacker's IP. Second, the attacker uses adjacency spoofing attack to make the attacker's computer an edge router to join the whole OSPF network. Third, the attacker distributes fake LSAs to the OSPF network. All routers forward the url requests of the attacker's site in the campus network to the spoofed edge router. Finally, the attacker forwards these url requests to a virtual machine with the same IP address as the real site. Route spoofing is very dangerous for the spoofed site because the IP address of the spoofed site is the same as the IP address of the real site.
Kitambulisho cha mradi: 30315484

Kuhusu mradi

3 mapendekezo
Mradi wa mbali
Inatumika 3 yrs ago

Unatafuta kupata pesa?

Faida za kutoa zabuni kwenye Freelancer

Weka bajeti yako na muda uliopangwa
Pata malipo kwa kazi yako
Eleza pendekezo lako
Ni bure kujiandikisha na kutoa zabuni kwa kazi
3 wafanyakazi huru wana zabuni kwa wastani $293 USD kwa kazi hii
Picha ya Mtumiaji
Hello, I am Cyber Security Expert and ready to do OSPF authentication to inject malicious routing. initiate chat with me Thanks
$600 USD ndani ya siku 8
4.9 (90 hakiki)
6.3
6.3
Picha ya Mtumiaji
Hello Dear, I am an Expert Network Engineer and I am working as Expert Network Engineer at a Multinational ISP. I have great hands-on experience for more than 15 years in various network technologies. I have Cisco CCNA & CCNP (Routing & Switching) and CCNP Enterprise (Enterprise Core & Enterprise Advanced Infrastructure Implementation) certifications. I have Juniper JNCIA-Junos (JN0-102) and JNCIA (Cloud) certifications. I have very good knowledge in Cisco wireless technology, VOIP & Network Security. My specialties: - Design/implement medium and large scale enterprise networks. - Configure Cisco Routers (ASR 1K & 9k, 2900, 2800, ISR 4K, 878, 888), Switches (Cat 6500, 3750, 3850, 2900, 2960, SG- 300, SG-500, [Nexus 5K, 7K and 9K]), Firewalls ([ASA 5505, 5506x, 5508], Fortigate, Palo Alto) and Wireless Acess Points 1800 and 2700. - Configure Juniper Routers (M7, M10, MX 480, MX 960) and SRX (300, 500). - Huawei, Mikrotik, HP & Ubiquiti devices Expert. - Packet Tracer, GNS-3, EVE-NG, VMWare workstation & VirtualBox Expert. - Routing protocols (RIP, OSPF, EIGRP, ISIS & BGP) Configuration and troubleshooting Expert and Switching Expert (VLANs, STP, VTP...). - VPN Configuration Expert (IPSEC/L2TP, GRE/PPTP, OPENVPN & SoftEther). - Linux, Unix & windows servers Expert. - Wireshark Traffic Capture & Analysis Expert. - Write technical reports and summaries. Thanks to check my profile and let me know if you are interested. Best Regards,
$30 USD ndani ya siku 1
4.7 (92 hakiki)
5.4
5.4
Picha ya Mtumiaji
I am a Cyber and information security expert and I have passed CEH. I invest my time and skills to help people protect their business from Cybercriminals. My specialties are 10+-years of experience, Information Security and Assurance, Vulnerability Assessment, Cyber Security, Penetration Testing, IT security, Cyber Security Consultant, API Security, Mobile Application Security, Source Code Audit, Web Server Pen-testing. I started my journey in the information security domain in 2010. I have a team to collaborate with on different Cyber Security projects. We have a big team managing my service. We can assess your website taking into account OWASP Top Ten and SANS/CWE Top 25. In the last few years, I did more than 100 Penetration-Tests and Security Assessments. Most of them on Web and Mobile applications with a Finance Background implemented with various technologies and frameworks such as J2EE, ASP, PHP, PYTHON, SQL Server, Linux, AWS, Azure, File Server, and internal and external networking security testing. Based on my daily work I am experienced with all common attack vectors and mitigation techniques. I did a lot of work as a penetration tester with different clients in the world and contacted them fluently in English. For details, we can talk to each other in our inbox.
$249 USD ndani ya siku 5
4.8 (6 hakiki)
4.3
4.3

Kuhusu mteja

Bedera ya POLAND
Szczecin, Poland
0.0
0
Njia ya malipo imethibitishwa
Mwanachama tangu Apr 21, 2020

Uthibitishaji wa Mteja

Asante! Tumekutumia kiungo cha kudai mkopo wako bila malipo kwa barua pepe.
Hitilafu fulani imetokea wakati wa kutuma barua pepe yako. Tafadhali jaribu tena.
Watumiaji Waliosajiliwa Jumla ya Kazi Zilizochapishwa
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Onyesho la kukagua linapakia
Ruhusa imetolewa kwa Uwekaji wa Kijiografia.
Muda wako wa kuingia umeisha na umetoka nje. Tafadhali ingia tena.