Find Jobs
Hire Freelancers

Exploiting OSPF authentication to inject malicious routing updates -- 2

$30-250 USD

已关闭
已发布将近 3 年前

$30-250 USD

货到付款
I want you to prepare a screen recording of this attack along with a audio commentary in English. Exploiting OSPF authentication to inject malicious routing updates 1. Preparing a router 2. Choice of attack technique (e.g. LSA falsification) 3. Vulnerability selection (e.g. MD5 packet authentication) 4. Preparing a malicious routing update 5. Injecting the update and causing the planned effect Attacker: This definition includes: 1) any OSPF router that has been taken over 2) any malware capable of interacting with the OSPF routing domain 3) any defective or misconfigured legitimate OSPF peer. From a security perspective, this paper consolidates all possible OSPF situations into two opposing scenarios. The first scenario requires that OSPF Cryptographic Authentication or Simple Password Authentication must be present on all links in the routing domain. The second scenario occurs when Null Authentication is adopted. If one link is not protected, then the entire routing domain becomes potentially vulnerable; if an attacker is able to obtain even a single copy of any OSPF message, then the authentication provided by Simple Password is compromised and the security of the entire routing domain is compromised. The security of the entire routing domain drops immediately in the second scenario. In the first scenario using Cryptographic Authentication, there are two types of entities that can attack or pose threats: insiders and outsiders. An attacking entity is considered an insider if it is in possession of the secret key for any OSPF Cryptographic Authentication session either through: cryptanalysis, social engineering, extortion, or access to compromised/subverted routing resources. This also includes threats from malfunctioning or misconfigured OSPF routers. Vulnerabilities and attack vectors: [login to view URL] [login to view URL] Example scenario: Route spoofing: First, the attacker sets up a virtual machine a VM with the same IP address as the victim's website, and the gateway of this VM is configured to the attacker's IP. Second, the attacker uses adjacency spoofing attack to make the attacker's computer an edge router to join the whole OSPF network. Third, the attacker distributes fake LSAs to the OSPF network. All routers forward the url requests of the attacker's site in the campus network to the spoofed edge router. Finally, the attacker forwards these url requests to a virtual machine with the same IP address as the real site. Route spoofing is very dangerous for the spoofed site because the IP address of the spoofed site is the same as the IP address of the real site.
项目 ID: 30315484

关于此项目

3提案
远程项目
活跃3 年前

想赚点钱吗?

在Freelancer上竞价的好处

设定您的预算和时间范围
为您的工作获得报酬
简要概述您的提案
免费注册和竞标工作
3威客以平均价$293 USD来参与此工作竞价
用户头像
Hello, I am Cyber Security Expert and ready to do OSPF authentication to inject malicious routing. initiate chat with me Thanks
$600 USD 在8天之内
4.9 (90条评论)
6.3
6.3
用户头像
Hello Dear, I am an Expert Network Engineer and I am working as Expert Network Engineer at a Multinational ISP. I have great hands-on experience for more than 15 years in various network technologies. I have Cisco CCNA & CCNP (Routing & Switching) and CCNP Enterprise (Enterprise Core & Enterprise Advanced Infrastructure Implementation) certifications. I have Juniper JNCIA-Junos (JN0-102) and JNCIA (Cloud) certifications. I have very good knowledge in Cisco wireless technology, VOIP & Network Security. My specialties: - Design/implement medium and large scale enterprise networks. - Configure Cisco Routers (ASR 1K & 9k, 2900, 2800, ISR 4K, 878, 888), Switches (Cat 6500, 3750, 3850, 2900, 2960, SG- 300, SG-500, [Nexus 5K, 7K and 9K]), Firewalls ([ASA 5505, 5506x, 5508], Fortigate, Palo Alto) and Wireless Acess Points 1800 and 2700. - Configure Juniper Routers (M7, M10, MX 480, MX 960) and SRX (300, 500). - Huawei, Mikrotik, HP & Ubiquiti devices Expert. - Packet Tracer, GNS-3, EVE-NG, VMWare workstation & VirtualBox Expert. - Routing protocols (RIP, OSPF, EIGRP, ISIS & BGP) Configuration and troubleshooting Expert and Switching Expert (VLANs, STP, VTP...). - VPN Configuration Expert (IPSEC/L2TP, GRE/PPTP, OPENVPN & SoftEther). - Linux, Unix & windows servers Expert. - Wireshark Traffic Capture & Analysis Expert. - Write technical reports and summaries. Thanks to check my profile and let me know if you are interested. Best Regards,
$30 USD 在1天之内
4.7 (92条评论)
5.4
5.4
用户头像
I am a Cyber and information security expert and I have passed CEH. I invest my time and skills to help people protect their business from Cybercriminals. My specialties are 10+-years of experience, Information Security and Assurance, Vulnerability Assessment, Cyber Security, Penetration Testing, IT security, Cyber Security Consultant, API Security, Mobile Application Security, Source Code Audit, Web Server Pen-testing. I started my journey in the information security domain in 2010. I have a team to collaborate with on different Cyber Security projects. We have a big team managing my service. We can assess your website taking into account OWASP Top Ten and SANS/CWE Top 25. In the last few years, I did more than 100 Penetration-Tests and Security Assessments. Most of them on Web and Mobile applications with a Finance Background implemented with various technologies and frameworks such as J2EE, ASP, PHP, PYTHON, SQL Server, Linux, AWS, Azure, File Server, and internal and external networking security testing. Based on my daily work I am experienced with all common attack vectors and mitigation techniques. I did a lot of work as a penetration tester with different clients in the world and contacted them fluently in English. For details, we can talk to each other in our inbox.
$249 USD 在5天之内
4.8 (6条评论)
4.3
4.3

关于客户

POLAND的国旗
Szczecin, Poland
0.0
0
付款方式已验证
会员自4月 21, 2020起

客户认证

谢谢!我们已通过电子邮件向您发送了索取免费积分的链接。
发送电子邮件时出现问题。请再试一次。
已注册用户 发布工作总数
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
加载预览
授予地理位置权限。
您的登录会话已过期而且您已经登出,请再次登录。