Find Jobs
Hire Freelancers

Exploiting OSPF authentication to inject malicious routing updates -- 2

$30-250 USD

Closed
Posted almost 3 years ago

$30-250 USD

Paid on delivery
I want you to prepare a screen recording of this attack along with a audio commentary in English. Exploiting OSPF authentication to inject malicious routing updates 1. Preparing a router 2. Choice of attack technique (e.g. LSA falsification) 3. Vulnerability selection (e.g. MD5 packet authentication) 4. Preparing a malicious routing update 5. Injecting the update and causing the planned effect Attacker: This definition includes: 1) any OSPF router that has been taken over 2) any malware capable of interacting with the OSPF routing domain 3) any defective or misconfigured legitimate OSPF peer. From a security perspective, this paper consolidates all possible OSPF situations into two opposing scenarios. The first scenario requires that OSPF Cryptographic Authentication or Simple Password Authentication must be present on all links in the routing domain. The second scenario occurs when Null Authentication is adopted. If one link is not protected, then the entire routing domain becomes potentially vulnerable; if an attacker is able to obtain even a single copy of any OSPF message, then the authentication provided by Simple Password is compromised and the security of the entire routing domain is compromised. The security of the entire routing domain drops immediately in the second scenario. In the first scenario using Cryptographic Authentication, there are two types of entities that can attack or pose threats: insiders and outsiders. An attacking entity is considered an insider if it is in possession of the secret key for any OSPF Cryptographic Authentication session either through: cryptanalysis, social engineering, extortion, or access to compromised/subverted routing resources. This also includes threats from malfunctioning or misconfigured OSPF routers. Vulnerabilities and attack vectors: [login to view URL] [login to view URL] Example scenario: Route spoofing: First, the attacker sets up a virtual machine a VM with the same IP address as the victim's website, and the gateway of this VM is configured to the attacker's IP. Second, the attacker uses adjacency spoofing attack to make the attacker's computer an edge router to join the whole OSPF network. Third, the attacker distributes fake LSAs to the OSPF network. All routers forward the url requests of the attacker's site in the campus network to the spoofed edge router. Finally, the attacker forwards these url requests to a virtual machine with the same IP address as the real site. Route spoofing is very dangerous for the spoofed site because the IP address of the spoofed site is the same as the IP address of the real site.
Project ID: 30315484

About the project

3 proposals
Remote project
Active 3 yrs ago

Looking to make some money?

Benefits of bidding on Freelancer

Set your budget and timeframe
Get paid for your work
Outline your proposal
It's free to sign up and bid on jobs
3 freelancers are bidding on average $293 USD for this job
User Avatar
Hello, I am Cyber Security Expert and ready to do OSPF authentication to inject malicious routing. initiate chat with me Thanks
$600 USD in 8 days
4.9 (90 reviews)
6.3
6.3
User Avatar
Hello Dear, I am an Expert Network Engineer and I am working as Expert Network Engineer at a Multinational ISP. I have great hands-on experience for more than 15 years in various network technologies. I have Cisco CCNA & CCNP (Routing & Switching) and CCNP Enterprise (Enterprise Core & Enterprise Advanced Infrastructure Implementation) certifications. I have Juniper JNCIA-Junos (JN0-102) and JNCIA (Cloud) certifications. I have very good knowledge in Cisco wireless technology, VOIP & Network Security. My specialties: - Design/implement medium and large scale enterprise networks. - Configure Cisco Routers (ASR 1K & 9k, 2900, 2800, ISR 4K, 878, 888), Switches (Cat 6500, 3750, 3850, 2900, 2960, SG- 300, SG-500, [Nexus 5K, 7K and 9K]), Firewalls ([ASA 5505, 5506x, 5508], Fortigate, Palo Alto) and Wireless Acess Points 1800 and 2700. - Configure Juniper Routers (M7, M10, MX 480, MX 960) and SRX (300, 500). - Huawei, Mikrotik, HP & Ubiquiti devices Expert. - Packet Tracer, GNS-3, EVE-NG, VMWare workstation & VirtualBox Expert. - Routing protocols (RIP, OSPF, EIGRP, ISIS & BGP) Configuration and troubleshooting Expert and Switching Expert (VLANs, STP, VTP...). - VPN Configuration Expert (IPSEC/L2TP, GRE/PPTP, OPENVPN & SoftEther). - Linux, Unix & windows servers Expert. - Wireshark Traffic Capture & Analysis Expert. - Write technical reports and summaries. Thanks to check my profile and let me know if you are interested. Best Regards,
$30 USD in 1 day
4.7 (92 reviews)
5.4
5.4
User Avatar
I am a Cyber and information security expert and I have passed CEH. I invest my time and skills to help people protect their business from Cybercriminals. My specialties are 10+-years of experience, Information Security and Assurance, Vulnerability Assessment, Cyber Security, Penetration Testing, IT security, Cyber Security Consultant, API Security, Mobile Application Security, Source Code Audit, Web Server Pen-testing. I started my journey in the information security domain in 2010. I have a team to collaborate with on different Cyber Security projects. We have a big team managing my service. We can assess your website taking into account OWASP Top Ten and SANS/CWE Top 25. In the last few years, I did more than 100 Penetration-Tests and Security Assessments. Most of them on Web and Mobile applications with a Finance Background implemented with various technologies and frameworks such as J2EE, ASP, PHP, PYTHON, SQL Server, Linux, AWS, Azure, File Server, and internal and external networking security testing. Based on my daily work I am experienced with all common attack vectors and mitigation techniques. I did a lot of work as a penetration tester with different clients in the world and contacted them fluently in English. For details, we can talk to each other in our inbox.
$249 USD in 5 days
4.8 (6 reviews)
4.3
4.3

About the client

Flag of POLAND
Szczecin, Poland
0.0
0
Payment method verified
Member since Apr 21, 2020

Client Verification

Thanks! We’ve emailed you a link to claim your free credit.
Something went wrong while sending your email. Please try again.
Registered Users Total Jobs Posted
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Loading preview
Permission granted for Geolocation.
Your login session has expired and you have been logged out. Please log in again.