Skip to content

Latest commit

 

History

History
54 lines (31 loc) · 2.28 KB

README.md

File metadata and controls

54 lines (31 loc) · 2.28 KB

BGP Spoofing & SSH MiTM

Assumptions

  • You are on a network with numerous systems advertising BGP routers.
  • You have Quagga & BGPD installed and configured and are part of the network

BGP Spoofing


In the above example I am connected to machine 10.1.0.1.
My target will be the machine on 10.45.0.1.

The first step in this process is to modify my own BGPD settings to insert the victim's IP address with a smaller CIDR.
This is done by editing /etc/quagga/bgpd.conf and adding the following line network 10.45.0.0/25 under my own.

This was also done to /etc/quagga/zebra.conf. In this case ip address was modified to suit the intercepted IP on both interfaces.

I reset the BGP and Zebra services and the ip route now appeared as such:

This meant that I was now intercepting all communication to and from 10.45.0.0/25.

If I looked at the routing from another machine, it is again confirmed.

SSH MiTM

I first modified my default SSH port to 1337 and enabled this new port in my nftables. I cant exactly use my SSH while honeypotting it!

I decided against an interactive honeypot as I simply wanted their SSH passwords, they would assume they were already hacked or there was an issue with their password/session in this scenario - but this is only given if I kept the interception going for a short period.

I uploaded the ssh-honeypot to the server and installed it with the following commands

  • apt-get install clang make libssh-dev libjson-c-dev
  • ssh-keygen -t rsa -f ./ssh-honeypot.rsa
  • bin/ssh-honeypot –r ./ssh-honeypot.rsa

I then ran the honeypot with the command bin/ssh-honeypot -h and it was done.
If I attempted to connect to 10.45.0.1 I would get the following result:

A success! I could now from this point monitor any unencrypted data from 10.45.0.1 with the command tcpdump –I ens192 –X src 10.45.0.1. Though in this environment there was no opportunity to do so.

I could also add every single IP in the network to my Zebra and BGP configuration. This would force all IPs to connect through me.