Network Vulnerabilities: NAC Bypass and VLAN Hopping - Paiet/SEC-335 GitHub Wiki
- NAC bypass
- NAC grants access based on rules
- Rules can be
- AV defs
- Applied patches
- Software versions
- All the above
- NAC can be bypassed by...
- Pretending to be a whitelisted device
- Some devices can't participate in NAC
- Network printers
- VoIP phones
- Just hijack the ethernet port
- Spoof the IP and/or MAC of whitelisted device
- MiTM attack
- Compromise an authorized device
- Use IPv6
- Some admins overlook IPv6 setup for their NAC
- Use Rogue AP
- NAC Authorized device connects to Rogue AP
- Attacker compromises authorized device
- Attacker uses compromised device as relay into NAC network
- VLAN hopping
- Used to defeat VLAN segregation
- Frogger the VLAN Hopper
- VLAN Double-Tagging
- Adding an additional VLAN tag to Ethernet frame
- Allows you to perform VLAN Hopping attack
- Attacker must be on native VLAN
- VLAN Hopping
- Because of double-tagged frame
- SwitchA receives double-tagged frame and strips off first tag
- Native VLAN is not retagged
- SwitchA forwards frame to SwitchB over trunk link
- SwitchB sees tag for desired VLAN and forwards frame to victim
- Craft attack with Scapy
sendp(Ether(dst='ff:ff:ff:ff:ff:ff', src='00:50:56:39:25:60')/Dot1Q(vlan=1)/Dot1Q(vlan=20)/ IP(dst='255.255.255.255', src='10.0.0.166')/ICMP(), iface='eth0')
- Breakdown of commands
- Source MAC address: 00:50:56:39:25:60
- Destination MAC address: broadcast
- Inner VLAN tag 20
- Outer VLAN tag 1
- Destination IP address: broadcast
- Source IP address: 10.0.0.166
- Outgoing interface: eth0