Author Topic: get into 802.1X protected networks  (Read 7179 times)

0 Members and 1 Guest are viewing this topic.

Offline RedBullAddicted

  • Moderator
  • Sir
  • *
  • Posts: 519
  • Cookies: 189
    • View Profile
get into 802.1X protected networks
« on: July 25, 2012, 12:10:59 pm »
Hi,

I 'd like to use this threat to share some ideas to get into 802.1X protected networks. Maybe someone of you had the same challange.

A couple of days ago I've been to a customer site to do some network analysis. One of the admins told me that they have implemented network security features to make sure a visitor with a connection to the corporate network can not access the inside ressources. I asked if I could take a look at it and was put in a meeting room with some network jacks on the wall. As I plugged my notebook in I realized quickly that I could only access some pages on the internet and nothimg else. I couldn't even scan the subnet I was in. So I unplugged my notebook, started a network capturing software and plugged back in again. With the capture I was able to see that there was some 802.1X going on.

Packets to look for
EAPOL Start
EAP Request, Identity
EAP Response Identity
EAP Request PEAP and so on...

what is 802.1X and how is it working (short version)
- 802.1X is an IEEE standard to provide port-based access control
- Involves the use of EAPOL protocol for encapsulating authentication information
- Typically implemented along with a RADIUS Server
- Three major components: Supplicant (End-user device like pc), Authenticator (Edge device like Switch), Authentication server (Determine the validity of user credential provideed by a supplicant by accessing a database of usernames and passwords)
- Different authentication methods for example MAC-based, certificate based or client software based.
If someone is interessted I can give more in-depth informations about that.

On my way to the meeting room I could see that the company was using thin clients for there employees with a virtual desktop enviroment such as citrix xendesktop or vmware view. From another project were I implemented network authentication I remembered that there are some problems with thin clients. Mostly you are not able to connect these thin clients to your Active Directory. The only practical possibility is to do a MAC-based authentication. I went to the printer in front of the meeting room and took a network status report page where the MAC address of the printer was listed. I disconnected from the network and changed the MAC-adress of my network card to the one of the printer. I plugged in again and suddenly I was put into a different subnet. First I was in a subnet 192.168.1.X/24 with a DHCP Server 192.168.1.10 and the same as DNS. Then I had access to a subnet 10.10.5.X/24 with DHCP 10.10.1.10 and the same as DNS.

After some scanning the two new found subnets I realized that I was put in some kind of printer vlan with access control lists implemented. I could do DNS request to the dns server. I could get a an ip address from DHCP and I could access another server on some ports which I think was the mail server for a scan to mail function and the print server. Sadly I wasn't able to remote desktop to one of theses servers.

I went to the next room were some employees were working. One desk fortunately was empty and I told the others that I was from the IT department and need to look for that thin client. Now I had another MAC-address from a client located in the client network.

From this new network I was able to remote desktop to some machines in different subnets. You need to know how MAC-based authentication is working. You need to add each machine with the MAC-address as username and password to your active directory. normally you should use different domains for authentication and you should restrict the possibility of logging in to a client called dummy or such to make sure nobody can log in to a client using MAC-adress as username and password. With active directory you need to store the password in reverse order. I tried to login to a server with this credentials and access was granted.   

Every security feature is only as good as the way it is implemented.

I hope this is interessting for you and hopefully there is somebody out there who can use this or has some different experience to share.
Deep into that darkness peering, long I stood there, wondering, fearing, doubting, dreaming dreams no mortal ever dared to dream before. - Edgar Allan Poe

Offline dr0n3_x

  • NULL
  • Posts: 2
  • Cookies: 0
    • View Profile
Re: get into 802.1X protected networks
« Reply #1 on: August 09, 2012, 05:26:05 am »
In this case 802.1x worked as NAP(network access protection) it one one of NAP enforment type

802.1x access points enforcement type uses Ethernet switches or W acesss points that support 802.1x authentication...

system administrators can use this type of network access protection to grant full network access to compliant computers and non compliant computers are connected to remediation part fo the network or completely prevented from connecting to main network...

802.1x uses of two methods to authenticate and control new coming users

1 . USE and ACL(access control List)(google these for more info)

2 . USE VLAN(Virtual Lan)
                                          {VLAN can not communicate with one another unless we connect them using a device like router.. also when u connect to network and your pc is not compliant you cant communicate with other VLAN and as well as other non compliant clients..}