46
Fools your enemy with Mikrotik BY: DIDIET KUSUMADIHARDJA MIKROTIK USER MEETING (MUM) 2016 JAKARTA, INDONESIA 14 OCTOBER 2016

Didiet Kusumadihardja

Embed Size (px)

Citation preview

Page 1: Didiet Kusumadihardja

Fools your enemy with Mikrotik

BY: DIDIET KUSUMADIHARDJA

MIKROTIK USER MEETING (MUM) 2016

JAKARTA, INDONESIA

14 OCTOBER 2016

Page 2: Didiet Kusumadihardja

About Me

Didiet Kusumadihardja

1. IT Security Specialist

PT. Mitra Solusi Telematika

2. Trainer & IT Consultant

Arch Networks

MTCNA, MTCINE, MTCWE, MTCUME, MTCTCE, MTCRE

Didiet Kusumadihardja - [email protected]

2

Page 3: Didiet Kusumadihardja

PT. Mitra Solusi Telematika

Didiet Kusumadihardja - [email protected]

3

Gedung TMT 2. GF

Jl. Cilandak KKO

Jakarta

Page 4: Didiet Kusumadihardja

Global

IT Security

Incident

Didiet Kusumadihardja - [email protected]

4

Page 5: Didiet Kusumadihardja

Global IT Security Incident 2014

Didiet Kusumadihardja - [email protected]

5

Entire Network Canceled

Page 6: Didiet Kusumadihardja

Global IT Security Incident 2015

Didiet Kusumadihardja - [email protected]

6

3 Tahun di Hack ( 2012 – 2015)

Page 7: Didiet Kusumadihardja

Global IT Security Incident 2016

Didiet Kusumadihardja - [email protected]

7

500 Juta Account

3 Miliar Account ???

Source: Tech Times

Page 8: Didiet Kusumadihardja

Indonesia

IT Security

Incident

Didiet Kusumadihardja - [email protected]

8

Page 9: Didiet Kusumadihardja

Didiet Kusumadihardja - [email protected]

9

Source: Akamai

INDONESIA

IS

SAFE?

Page 10: Didiet Kusumadihardja

Indonesia IT Security Incident 2013

Didiet Kusumadihardja - [email protected]

10

polri.go.id

2013

Deface

Motive: Fame?

Page 11: Didiet Kusumadihardja

Indonesia IT Security Incident 2016

Didiet Kusumadihardja - [email protected]

11

Teman Ahok

DDoS Attack

Motive: Politics?

Page 12: Didiet Kusumadihardja

Indonesia IT Security Incident 2016

Didiet Kusumadihardja - [email protected]

12

Videotron

Kebayoran Baru

Jakarta Selatan

Motive: Curiosity?

Page 13: Didiet Kusumadihardja

Source: Carnegie Mellon UniversityDidiet Kusumadihardja - [email protected]

13

IT Security

Trends

Gak Perlu

Pinter Buat

Hacking

Page 14: Didiet Kusumadihardja

Hacking Tools Example

Didiet Kusumadihardja - [email protected]

14

Cain & Abel

Kali Linux

Page 15: Didiet Kusumadihardja

Didiet Kusumadihardja - [email protected]

15

Source: SCMagazine

Modern Business

Cybercrime as

a Service (CaaS)

Page 16: Didiet Kusumadihardja

How Hackers

do it?

Didiet Kusumadihardja - [email protected]

16

Page 17: Didiet Kusumadihardja

Hacking Phase

1.Reconnaissance

2.Scanning

3.Gaining Access

4.Maintaining Access

5.Clearing Tracks

Source: Ethical Hacking by EC-CouncilDidiet Kusumadihardja - [email protected]

17

Page 18: Didiet Kusumadihardja

Hacking Phase (Cont’d)

1.Reconnaissance

2.Scanning

3.Gaining Access

4.Maintaining Access

5.Clearing Tracks

Information Gathering

OS Detail Open Port

Version

Device Type

Application Vulnerability

Exploit Vulnerability

Escalate Privilege

Backdoors

Delete/overwrite Event/Logs

Data harvesting

Didiet Kusumadihardja - [email protected]

18

Page 19: Didiet Kusumadihardja

Hacking Phase Analogy

1.Reconnaissance

2.Scanning

3.Gaining Access

4.Maintaining Access

5.Clearing TracksDidiet Kusumadihardja - [email protected]

19

Page 20: Didiet Kusumadihardja

When we fools them?

1.Reconnaissance

2.Scanning

3.Gaining Access

4.Maintaining Access

5.Clearing TracksDidiet Kusumadihardja - [email protected]

20

Page 21: Didiet Kusumadihardja

Why at Scanning Phase?

Didiet Kusumadihardja - [email protected]

21

TELNET SSH

Page 22: Didiet Kusumadihardja

Scanning Tools

SoftPerfect Network Scanner

The Dude

Didiet Kusumadihardja - [email protected]

22

Page 23: Didiet Kusumadihardja

How to fools

them?

Didiet Kusumadihardja - [email protected]

23

Page 24: Didiet Kusumadihardja

Use a bait

Didiet Kusumadihardja - [email protected]

24

Honey Pot

HackerBait

Page 25: Didiet Kusumadihardja

Web Server Example

Web Server

HTTP HTTPS

=

Didiet Kusumadihardja - [email protected]

25

Page 26: Didiet Kusumadihardja

Confuse your enemy

Didiet Kusumadihardja - [email protected]

26

HTTP HTTPS

Page 27: Didiet Kusumadihardja

Server Farm Network Example

192.168.1.2 DNS Server

192.168.1.5 Web Server

192.168.1.10 DB Server

192.168.1.15 Mail Server

SERVER X

Didiet Kusumadihardja - [email protected]

27

192.168.1.0/24

Page 28: Didiet Kusumadihardja

Confuse your enemy

192.168.1.1 Fake Server 1

192.168.1.2 DNS Server

192.168.1.3 Fake Server 2

192.168.1.4 Fake Server 3

192.168.1.5 Web Server

192.168.1.6 Fake Server 4

192.168.1.7 Fake Server 5

192.168.1.8 Fake Server 6

192.168.1.9 Fake Server 7

192.168.1.10 DB Server

192.168.1.11 Fake Server 8

192.168.1.12 Fake Server 9

192.168.1.13 Fake Server 10

192.168.1.14 Fake Server 11

192.168.1.15 Mail ServerDidiet Kusumadihardja - [email protected]

28

192.168.1.0/24

Page 29: Didiet Kusumadihardja

How we do it

with Mikrotik?

Didiet Kusumadihardja - [email protected]

29

Page 30: Didiet Kusumadihardja

NAT

(Network Address Translation)

Didiet Kusumadihardja - [email protected]

30

Page 31: Didiet Kusumadihardja

Fake NAT

Didiet Kusumadihardja - [email protected]

31

Page 32: Didiet Kusumadihardja

Fake Ports at your Web Server

HTTP & HTTPS to

Legitimate Server

Other Ports to

Fake Server

Didiet Kusumadihardja - [email protected]

32

Page 33: Didiet Kusumadihardja

Simple NAT for Web Server

INTERNET

ROUTER WEB SERVER

192.168.2.3

Chain Action

NAT (Port Mapping)

Didiet Kusumadihardja - [email protected]

33

Page 34: Didiet Kusumadihardja

Add Additional NAT for Bait

Web Server

192.168.2.3 Fake Server

(Honey Pot)

192.168.2.4

Didiet Kusumadihardja - [email protected]

34

Chain Action

Page 35: Didiet Kusumadihardja

Fake Server at your Server Farm Network

Only one legitimate

server

Others are Fake Server

Didiet Kusumadihardja - [email protected]

35

Page 36: Didiet Kusumadihardja

Another Example

Web Server

192.168.2.3Fake Server

(Honey Pot)

192.168.2.4

Didiet Kusumadihardja - [email protected]

36

Chain Action

Page 37: Didiet Kusumadihardja

Combine with Honey Pot

Didiet Kusumadihardja - [email protected]

37

KFSensor

Others HoneyPot: Honeyd, Kippo, Dionaea, Nepenthes

Page 38: Didiet Kusumadihardja

What Hacker See (NMAP)

Before AfterDidiet Kusumadihardja - [email protected]

38

Nmap / Zenmap

Page 39: Didiet Kusumadihardja

What Hacker See (SoftPerfect NetScan)

Before After

Didiet Kusumadihardja - [email protected]

39

SoftPerfect Network Scanner

Page 40: Didiet Kusumadihardja

I don’t want to use HoneyPot

Didiet Kusumadihardja - [email protected]

40

Step 1: Chain

Step 2: Action

Page 41: Didiet Kusumadihardja

What we see, If someone PING

Didiet Kusumadihardja - [email protected]

41

SRC-MAC ADDRESS

SRC-IP ADDRESS

Page 42: Didiet Kusumadihardja

What we see, If someone NMAP

Didiet Kusumadihardja - [email protected]

42

Mikrotik LOG:

Page 43: Didiet Kusumadihardja

The Dude, Hotspot & Userman

Didiet Kusumadihardja - [email protected]

43

IP Address MAC Address User ID Person

Page 44: Didiet Kusumadihardja

Use Case 1

Didiet Kusumadihardja - [email protected]

44

Internet Café

(WARNET)

University

Office

Insider Threat

Page 45: Didiet Kusumadihardja

Use Case 2

Didiet Kusumadihardja - [email protected]

45

AnalyticsFor Fun

Learn hacking method

from hacker / script kiddies

Research

http://public.honeynet.id

(Low Interaction Honeypot)

(High Interaction Honeypot)

Page 46: Didiet Kusumadihardja

Thank you

.

.

Question?

DIDIET KUSUMADIHARDJA

[email protected]

http://didiet.arch.web.id/

https://www.facebook.com/ArchNetID/Didiet Kusumadihardja - [email protected]

46