-
Notifications
You must be signed in to change notification settings - Fork 0
/
firewalls_and_aaa_configs.txt
692 lines (568 loc) · 14.9 KB
/
firewalls_and_aaa_configs.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
----------------------------------------- General Configs & Connectivity -----------------------------------------
Firewall:
conf t
int f0/0
no shut
ip address 2.2.2.1 255.255.255.0
exit
int f1/0
no shut
ip address 10.0.1.1 255.255.255.0
exit
int f2/0
no shut
ip address 10.0.2.1 255.255.255.0
exit
int f3/0
no shut
ip address 1.1.1.1 255.255.255.0
exit
int f1/0
ip nat inside
exit
int f2/0
ip nat inside
exit
access-list 1 permit 10.0.0.0 0.0.2.255
ip nat inside source list 1 interface f1/0 overload
ip nat inside source list 1 interface f2/0 overload
int f3/0
ip nat outside
ip domain-name firewall
crypto key generate rsa general-keys modulus 1024
ip ssh version 2
username saar secret saar
line vty 0 4
login local
transport input ssh
end
write
WebServer:
service nginx start
(ip configurado pelo gns3)
SMTP Server:
ifconfig eth0 2.2.2.3 netmask 255.255.255.0 up
route add default gw 2.2.2.1
PC1:
ifconfig eth0 10.0.1.2 netmask 255.255.255.0 up
route add default gw 10.0.1.1
PC2:
ip 10.0.2.2/24 10.0.2.1
ip dns 1.1.1.2
save
DNS-1:
nano /etc/hosts
2.2.2.2 saar.lab saar
nano /etc/network/interfaces
iface eth0 inet static
address 1.1.1.2
netmask 255.255.255.0
gateway 1.1.1.1
-------------------------------------- SMTP SCRIPTS -----------------------------------------
smtp_req.py:
import smtplib
import email.utils
from email.mime.text import MIMEText
# Create the message
msg = MIMEText('This is the body of the message.')
msg['To'] = email.utils.formataddr(('Recipient', 'recipient@example.com'))
msg['From'] = email.utils.formataddr(('Author', 'author@example.com'))
msg['Subject'] = 'Simple test message'
server = smtplib.SMTP('2.2.2.2', 25)
server.set_debuglevel(True) # show communication with the server
try:
server.sendmail('author@example.com', ['recipient@example.com'], msg.as_string())
finally:
server.quit()
smtp_resp.py:
import smtpd
import asyncore
class CustomSMTPServer(smtpd.SMTPServer):
def process_message(self, peer, mailfrom, rcpttos, data):
print 'Receiving message from:', peer
print 'Message addressed from:', mailfrom
print 'Message addressed to :', rcpttos
print 'Message length :', len(data)
return
server = CustomSMTPServer(('2.2.2.3', 25), None)
asyncore.loop()
-------------------------------------- Classical Firewall --------------------------------------
sh ip access-lists
sh access-list
sh ip inspect sessions
no access-list IN_PRIVATES
no ip access-list extended IN_PRIVATES
ip access-list extended IN_PRIVATES
permit tcp 10.0.0.0 0.0.3.255 host 10.0.1.1 eq 22
deny ip any 10.0.0.0 0.0.3.255
permit tcp 10.0.0.0 0.0.3.255 host 2.2.2.2 eq 80
permit tcp 10.0.0.0 0.0.3.255 host 2.2.2.2 eq 443
permit tcp 10.0.0.0 0.0.3.255 host 2.2.2.3 eq pop3
permit tcp 10.0.0.0 0.0.3.255 host 2.2.2.3 eq 993
permit tcp 10.0.0.0 0.0.3.255 host 2.2.2.3 eq smtp
permit icmp 10.0.0.0 0.0.3.255 host 2.2.2.2
permit icmp 10.0.0.0 0.0.3.255 host 2.2.2.3
deny ip 10.0.0.0 0.0.3.255 2.2.2.0 0.0.0.255
permit udp 10.0.0.0 0.0.3.255 any eq 53
permit tcp 10.0.0.0 0.0.3.255 any eq 80
permit tcp 10.0.0.0 0.0.3.255 any eq 443
permit icmp 10.0.0.0 0.0.3.255 any
deny ip any any
exit
no ip access-list extended OUT_PRIVATES
ip access-list extended OUT_PRIVATES
deny ip any any
exit
no ip access-list extended IN_DMZ
ip access-list extended IN_DMZ
permit udp 2.2.2.0 0.0.0.3 1.1.1.0 0.0.0.255 eq 53
permit tcp 2.2.2.0 0.0.0.3 1.1.1.0 0.0.0.255 eq smtp
permit icmp 2.2.2.0 0.0.0.3 1.1.1.0 0.0.0.255
permit tcp any host 2.2.2.1 eq 22
deny ip any any
exit
no ip access-list extended OUT_DMZ
ip access-list extended OUT_DMZ
permit tcp 10.0.0.0 0.0.3.255 2.2.2.0 0.0.0.3 eq 993
permit tcp 10.0.0.0 0.0.3.255 2.2.2.0 0.0.0.3 eq pop3
permit tcp any 2.2.2.0 0.0.0.3 eq 80
permit tcp any 2.2.2.0 0.0.0.3 eq 443
permit tcp any 2.2.2.0 0.0.0.3 eq smtp
permit icmp any 2.2.2.0 0.0.0.3
deny ip any any
exit
no ip access-list extended OUT_DMZ
ip access-list extended OUT_DMZ
permit tcp 10.0.0.0 0.0.3.255 host 2.2.2.3 eq 993
permit tcp 10.0.0.0 0.0.3.255 host 2.2.2.3 eq pop3
permit tcp any host 2.2.2.2 eq 80
permit tcp any host 2.2.2.2 eq 443
permit tcp any host 2.2.2.3 eq smtp
permit icmp any host 2.2.2.2
permit icmp any host 2.2.2.3
deny ip any any
exit
no ip access-list extended IN_OUT
ip access-list extended IN_OUT
permit tcp any host 2.2.2.2 eq 80
permit tcp any host 2.2.2.2 eq 443
permit tcp any host 2.2.2.3 eq smtp
permit tcp any host 1.1.1.1 eq 22
permit icmp any host 2.2.2.2
permit icmp any host 2.2.2.3
deny ip any any
exit
ip inspect name RETURN-TRAFFIC udp
ip inspect name RETURN-TRAFFIC tcp
ip inspect name RETURN-TRAFFIC icmp
int f1/0
ip inspect RETURN-TRAFFIC in
ip access-group IN_PRIVATES in
ip access-group OUT_PRIVATES out
exit
int f2/0
ip inspect RETURN-TRAFFIC in
ip access-group IN_PRIVATES in
ip access-group OUT_PRIVATES out
exit
int f0/0
ip inspect RETURN-TRAFFIC in
ip access-group IN_DMZ in
ip access-group OUT_DMZ out
exit
int f3/0
ip access-group IN_OUT in
ip inspect RETURN-TRAFFIC in
exit
-------------------------------------- ZBPF Firewall --------------------------------------
zone security PRIVATE-1
zone security PRIVATE-2
zone security OUT
zone security DMZ
exit
int f1/0
zone-member security PRIVATE-1
exit
int f2/0
zone-member security PRIVATE-2
exit
int f3/0
zone-member security OUT
exit
int f0/0
zone-member security DMZ
exit
access-list 100 permit ip any 2.2.2.0 0.0.0.252
class-map type inspect match-any DMZ-SERVERS-ALLOWED
match access-group 100
exit
class-map type inspect match-any DNS-TRAFFIC
match protocol DNS
exit
class-map type inspect match-any HTTP-TRAFFIC
match protocol HTTP
match protocol HTTPS
exit
class-map type inspect match-any ICMP-TRAFFIC
match protocol ICMP
exit
class-map type inspect match-any SMTP-TRAFFIC
match protocol SMTP
exit
class-map type inspect match-any USER-EMAIL-TRAFFIC
match protocol POP3
match protocol IMAP
exit
policy-map type inspect PRIV-TO-DMZ-POLICY
class type inspect DMZ-SERVERS-ALLOWED
drop
class type inspect HTTP-TRAFFIC
inspect
class type inspect ICMP-TRAFFIC
inspect
class type inspect USER-EMAIL-TRAFFIC
inspect
class type inspect SMTP-TRAFFIC
inspect
class type inspect DNS-TRAFFIC
inspect
exit
exit
policy-map type inspect PRIV-TO-OUT-POLICY
class type inspect HTTP-TRAFFIC
inspect
class type inspect ICMP-TRAFFIC
inspect
class type inspect DNS-TRAFFIC
inspect
exit
exit
policy-map type inspect DMZ-TO-OUT-POLICY
class type inspect ICMP-TRAFFIC
inspect
class type inspect SMTP-TRAFFIC
inspect
exit
exit
policy-map type inspect OUT-TO-DMZ-POLICY
class type inspect DMZ-SERVERS-ALLOWED
drop
class type inspect HTTP-TRAFFIC
inspect
class type inspect ICMP-TRAFFIC
inspect
class type inspect SMTP-TRAFFIC
inspect
exit
exit
zone-pair security PRIV-1-DMZ source PRIVATE-1 destination DMZ
service-policy type inspect PRIV-TO-DMZ-POLICY
exit
zone-pair security PRIV-2-DMZ source PRIVATE-2 destination DMZ
service-policy type inspect PRIV-TO-DMZ-POLICY
exit
zone-pair security PRIV-1-OUT source PRIVATE-1 destination OUT
service-policy type inspect PRIV-TO-OUT-POLICY
exit
zone-pair security PRIV-2-OUT source PRIVATE-2 destination OUT
service-policy type inspect PRIV-TO-OUT-POLICY
exit
zone-pair security DMZ-OUT source DMZ destination OUT
service-policy type inspect DMZ-TO-OUT-POLICY
exit
zone-pair security OUT-DMZ source OUT destination DMZ
service-policy type inspect OUT-TO-DMZ-POLICY
exit
------------------------------------ Defense against DoS Attacks ------------------------------------
ICMP Flood e TCP SYN Flood
------ Direct connection between victim and attacker ------
victim:
conf t
int f0/0
no shut
ip address 192.168.1.1 255.255.255.0
exit
int f0/1
no shut
ip address 192.168.2.1 255.255.255.0
exit
service tcp-small-servers
------ Defense using a ZBPF ------
firewall:
conf t
int f0/0
no shut
ip address 192.168.1.1 255.255.255.0
exit
int f1/0
no shut
ip address 192.168.2.1 255.255.255.0
exit
victim:
ifconfig eth0 192.168.1.2 netmask 255.255.255.0 up
route add default gw 192.168.1.1
python2 -m SimpleHTTPServer 80
zbpf no firewall:
#remove policies
int f1/0
no zone-member security OUT
exit
int f0/0
no zone-member security IN
exit
access-list 100 permit ip any 192.168.1.0 0.0.0.253
class-map type inspect match-any HTTP-SERVER-ACCESS-ONLY
match access-group 100
exit
zone security IN
zone security OUT
exit
int f1/0
zone-member security OUT
exit
int f0/0
zone-member security IN
exit
class-map type inspect match-any HTTP-TRAFFIC
match protocol HTTP
match protocol HTTPS
exit
class-map type inspect match-any ICMP-TRAFFIC
match protocol ICMP
exit
parameter-map type inspect PARMAP
tcp synwait-time 3
no policy-map type inspect OUT-TO-IN-POLICY
policy-map type inspect OUT-TO-IN-POLICY
class type inspect HTTP-SERVER-ACCESS-ONLY
drop
class type inspect ICMP-TRAFFIC
inspect
police rate 128000 burst 8000
class type inspect HTTP-TRAFFIC
inspect PARMAP
police rate 128000 burst 8000
exit
exit
no zone-pair security OUT-TO-IN source OUT destination IN
zone-pair security OUT-TO-IN source OUT destination IN
service-policy type inspect OUT-TO-IN-POLICY
exit
-------------------------------------------------- AAA --------------------------------------------------
---------- TACACS ----------
Telnet Client:
ip 192.168.2.2/24
C7200 Administrated Router:
conf t
int f1/0
no shut
ip address 192.168.2.1 255.255.255.0
exit
int f0/0
no shut
ip address 192.168.1.1 255.255.255.0
exit
username admin-router secret admin-router
aaa new-model
aaa authentication login default group tacacs+ local
tacacs server TACACS-AUTH
address ipv4 192.168.1.2
single-connection
key gns3
exit
aaa authorization exec default group tacacs+
aaa authorization commands 1 default group tacacs+
aaa accounting exec default start-stop group tacacs+
aaa accounting network default start-stop group tacacs+
enable secret admin-router
exit
AAA Apliance - AAA Server:
key = saar
users & pass's:
saarAdmin:saarAdmin (privilege 15 - must have permission to use all IOS commands)
saarShow:saarShow (privilege 4 - can only show commands)
saarBrief:saarBrief (privilege 2 - can only use "show ip int brief")
- é capaz de estar a faltar "deny .*" nas configs de comandos
/etc/tacacs+/tac_plus.conf: (enable persistence)
accounting file = /var/log/tac_plus.acct
key = gns3
user = saarAdmin {
name = "saarAdmin"
login = cleartext saarAdmin
member = admin
}
# Grupo admin default do ficheiro tac_plus
user = saarShow {
name = "saarShow"
login = cleartext saarShow
service = exec {
priv-lvl = 4
}
cmd = show {
permit .*
}
}
user = saarBrief {
name = "saarBrief"
login = cleartext saarBrief
service = exec {
priv-lvl = 2
}
cmd = show {
permit ip int br
deny .*
}
}
---------- RADIUS ----------
Telnet Client:
ip 192.168.2.2/24
C7200 Administrated Router:
conf t
int f1/0
no shut
ip address 192.168.2.1 255.255.255.0
exit
int f0/0
no shut
ip address 192.168.1.1 255.255.255.0
exit
username admin-router secret admin-router
aaa new-model
aaa authentication login default group radius local
radius server RADIUS-AUTH
address ipv4 192.168.1.2 auth-port 1812 acct-port 1813
key gns3
exit
aaa authorization exec default group radius local
aaa authorization network default group radius local
aaa accounting exec default start-stop group radius
aaa accounting network default start-stop group radius
enable secret admin-router
exit
AAA Apliance - AAA Server:
secret = gns3
/etc/freeradius/3.0/users:
saarAdmin Cleartext-Password := "saarAdmin"
Reply-Message = "Welcome %{User-Name}",
Service-Type = Administrative-User,
Cisco-AVPair += "shell:priv-lvl=15"
saarShow Cleartext-Password := "saarShow"
Reply-Message = "Welcome %{User-Name}",
Service-Type = NAS-Prompt-User,
Cisco-AVPair += "shell:priv-lvl=4"
saarBrief Cleartext-Password := "saarBrief"
Reply-Message = "Welcome %{User-Name}",
Service-Type = NAS-Prompt-User,
Cisco-AVPair += "shell:priv-lvl=2"
---------- 802.1X Authentication ----------
Docker attacker:
ip 192.168.1.2/24
IOSvL2 switch:
en
conf t
int vlan 1
ip address 192.168.1.3 255.255.255.0
no shut
exit
aaa new-model
radius server 8021X-RADIUS
address ipv4 192.168.1.4 auth-port 1812 acct-port 1813
key gns3
exit
aaa authentication dot1x default group radius
dot1x system-auth-control
interface gi0/0
description Access Port
switchport mode access
authentication port-control auto
dot1x pae authenticator
exit
AAA Apliance - RADIUS Server:
ip 192.168.1.4/24
/etc/freeradius/3.0/users:
bob:gns3
alice:gns3
(users default)
-------------------------------- Additional Exercises --------------------------------
----------------- Disable SSH Server with CBC mode -----------------
Attacker Outside:
192.168.1.2/24
gw 192.168.1.1/24
Client Inside:
192.168.2.2/24
gw 192.168.2.1/24
ASA:
en
conf t
int gi0/0
nameif inside
security-level 100
ip address 192.168.2.1 255.255.255.0
no shut
exit
int gi0/1
nameif outside
security-level 0
ip address 192.168.1.1 255.255.255.0
no shut
exit
policy-map global_policy
class inspection_default
inspect icmp
exit
exit
enable password saar
username saar password saar
aaa authentication ssh console LOCAL
crypto key generate rsa modulus 1024
ssh 192.168.2.2 255.255.255.0 trust
ssh cipher encryption custom aes128-ctr:aes192-ctr:aes256-ctr
exit
----------------- DNS Doctoring -----------------
ASA:
en
conf t
int gi0/0
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
no shut
exit
int gi0/1
nameif outside
security-level 100
ip address 192.168.2.1 255.255.255.0
no shut
exit
policy-map global_policy
class inspection_default
inspect icmp
exit
exit
access-list extended OUT_to_IN permit ip any any
access-group OUT_to_IN in interface outside
access-group OUT_to_IN out interface inside
object network dns-server
host 192.168.1.4
nat (inside,outside) source static 192.168.1.3 200.0.0.10
static (inside,outside) 200.0.0.20 192.168.1.4 netmask 255.255.255.255
exit
policy-map global_policy
class inspection_default
inspect dns
exit
Internal-Client:
ip 192.168.1.3 255.255.255.0 192.168.1.1
ip dns 192.168.1.4
External-Client:
ip 192.168.2.2 255.255.255.0 192.168.2.1
ip dns 192.168.1.4
Web-Server:
192.168.1.2/24
gw 192.168.1.1
service nginx start
DNS-Server:
nano /etc/hosts
192.168.1.2 saar.lab saar
ip 192.168.1.4 255.255.255.0
gateway 192.168.1.1