Network attacks

In the beginning there was nothing, which exploded. ~ Terry Pratchett, Lords and Ladies

Warning: Do not execute these on a network or system that you do not own. Execute only on your own network or system for learning purposes. Do not execute these on any production network or system, unless Rules of engagement have been agreed on, and you have a Get out of jail free card.

What?

Routers and switches route and direct packets on the network and enable communications at the lowest layer. Gaining control over these devices, one can likely gain control over the entire network.

Why?

  • Modifying the configuration of a router enables the redirection of packets, giving a hacker the ability to intercept, sniff and manipulate packets.
  • Gaining control over switches can give a great level of control on the network.
  • Even unprivileged access can lead to a full compromise.

How?

  • Identify a device that will facilitate more intelligent attacks.
  • Do port and service scanning for further service enumeration.
  • Do vulnerability scanning.
  • Use active exploitation.

Concretely