0% found this document useful (0 votes)
138 views6 pages

Nac Bypass

Nac bypass article

Uploaded by

cedibe7692
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
138 views6 pages

Nac Bypass

Nac bypass article

Uploaded by

cedibe7692
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

The Hacker Recipes Search Ctrl K Tools Exegol

new_releases Welcome to THR v2!


Network Access Control On this page
Theory
Active Directory
Basics
Reconnaissance
Infrastructure & auth flow
Movement Theory Offensive tooling (dropbox)
Persistence
NAC (Network Access Control) acts as a kind of a gatekeeper to the local network Hardware
infrastructure. Its usually works with whitelists, blacklists, authentication requirements or Initial setup
Web services host scanning to restrict access and keep unwanted devices out of the network. DHCP configuration
Reconnaissance
Wi-Fi configuration
Configuration Basics Abuse
Accounts and sessions
NAC is a principle. It can be setup with several measures. MAC-based only
User inputs
Authentication only
Filtering of MAC addresses
MAC-based + authentic…
Authentication with username & password
Systems & services
Using a Hub
Authentication with certificates
Using a transparent…
Evasion Fingerprinting
Mitigation
Host checks
Physical Resources
NAC aims at protecting against the including, but not limited to, scenarios.
Locks
Networking Employees bringing rogue devices (willingly or not)
Network Access Control Service providers acting inside the IT / OT network*
Machines Attackers trying to gain access to the internal network
Super secret zones *IT/OT network: Information Technology (workstations, users, shares, ...) and Operational
Technology (machines, productionl lines, ...).
Intelligence gathering
Infrastructure & auth flow
Radio
Most commonly, NAC solution are based on 802.1x which is a standard for port based
Mobile apps network access. It will interact with the switches (most likely and mainly via SNMP) and
allow or block ports based on the preset rules. There are 3 actors involved:
Contributing to THR
The supplicant: the client that is asking for network access
Guide
The authenticator: the device that acts as the gatekeeper and to which the clients
Template connects - most likely a switch.
The authentication server: something in the background that validates the requests and
grants or denies access to the supplicant.
By default, the ports are in an unauthorized state and will only be allowed to transmit and
receive EAPOL frames (Extensible Authentication Protocol Over LAN), which basically is
encapsulated EAP.

1. These EAPOL frames are forwarded from "the client desiring access to the network" to
"the switch".
2. The switch unpacks the EAPOL and forwards the EAP packet to an authentication server,
which in most cases will be a RADIUS server.

From there everything goes vice versa. As EAP is more a framework than a protocol, it
contains several EAP methods for authentication. The most commonly known variants are
EAP-TLS, EAP-MD5, EAP-PSK and EAP-IKEv2, allowing to authenticate by preshared keys,
passwords, certificates or other mechanisms.

Authors
The Hacker Recipes Ctrl K Tools Exegol

new_releases Welcome to THR v2! On this page


Theory
Active Directory
Basics
Reconnaissance
Infrastructure & auth flow
Movement
Offensive tooling (dropbox)
Persistence
Hardware
802.1x auth flow (Wikipedia)
Initial setup
Web services When all checks are passed, the port will be switched to authorized and thus be allowed for DHCP configuration
Reconnaissance normal network traffic.
Wi-Fi configuration
Configuration
An infrastructure that is capable of talking 802.1x is needed for all this to work properly. The Abuse
Accounts and sessions
infrastructure is comprised of supplicants (i.e. clients), authenticators (i.e. switches) and MAC-based only
User inputs authentication servers (i.e. RADIUS servers). Authentication only

A short overview from Gartner lists and reviews many NAC solutions: NAC Reviews & MAC-based + authentic…
Systems & services
Ratings. Using a Hub
Using a transparent…
Evasion
Mitigation
Physical
Offensive tooling (dropbox) Resources
Locks
Networking Hardware
Network Access Control
A device, known as "dropbox", is needed to carry out according attacks when conducting
Machines
NAC penetration tests. The following setup is a commonly used for this type of
Super secret zones
engagement.

Raspberry Pi 4 8GB
Intelligence gathering
SD card
Radio 3.5” TFT with Case
Additional USB Ethernet Adapter Power Adapter
Mobile apps Keyboard
(optional) Powerbank
Contributing to THR
(optional) LTE USB modem
Guide
Template

Raspberry Pi drop box

The Raspberry can be flushed with the official ARM image of Kali.

The integrated wireless interface can be used to spawn a hotspot to be able to connect via
SSH.

Initial setup
The following commands can then be run to install the necessary libraries and tools.
Authors
sudo apt-get install isc-dhcp-server
sudo apt-get install hostapd
sudo systemctl enable isc-dhcp-server
sudo systemctl unmask hostapd
The Hacker Recipes sudo Ctrl K
systemctl enable hostapd Tools Exegol

new_releases Welcome to THR v2! DHCP configuration On this page


The DHCP configuration file is located at /etc/dhcp/dhcpd.conf and can be edited to Theory
Active Directory
determine how the dropbox will act as a DHCP server. Basics
Reconnaissance
Infrastructure & auth flow
Movement default-lease-time 600;
Offensive tooling (dropbox)
Persistence max-lease-time 7200;
subnet 192.168.200.0 netmask 255.255.255.0 { Hardware
range 192.168.200.2 192.168.200.20; Initial setup
Web services option subnet-mask 255.255.255.0;
DHCP configuration
Reconnaissance option broadcast-address 192.168.200.255;
} Wi-Fi configuration
Configuration
Abuse
Accounts and sessions
MAC-based only
User inputs Wi-Fi configuration Authentication only
The host access point daemon (hostapd) configuration file is located at MAC-based + authentic…
Systems & services /etc/hostapd/hostapd.conf and can be edited to determine how the dropbox will act as a Using a Hub
wireless access point. Using a transparent…
Evasion
Mitigation
interface=wlan0
Physical Resources
driver=nl80211
Locks ssid=kali_hotspot
Networking hw_mode=g
channel=11
Network Access Control
macaddr_acl=0
Machines ignore_broadcast_ssid=0
Super secret zones auth_algs=1
wpa=2
wpa_passphrase=Sup3rS3cr3tW1F1P@ss!
Intelligence gathering wpa_key_mgmt=WPA-PSK
wpa_pairwise=CCMP
Radio wpa_group_rekey=86400
ieee80211n=1
wme_enabled=1
Mobile apps

Contributing to THR
Guide
Template Abuse
There are several scenarios to take into consideration with specific bypass possibilities.

Companies usually have devices that don't fully support 802.1x. Among them can be
printers, VOIP equipment, cameras, etc. These will usually be granted access to the
network only by having their MAC address in a whitelist. This is often dubbed "MAC-based
NAC".

MAC-based and 802.1x are usually managed one of many ways:


by setting up each physical RJ45 port (i.e. the authenticator) in the building to do either
MAC-based NAC or 802.1x -> MAC-based bypass
by having the authenticator (i.e. port) check if the devices than connect support 802.1x
and switch to MAC-based if they don't
by mixing MAC-based and authentication (i.e. 802.1x): the MAC address is checked and
authentication then takes place -> MAC-based + authentication

Devices like the Basilisk, Basilisk Zero, or Skunk can be helpful in NAC-bypass engagements.
Nota bene: keep in mind ghosted Linux machines will require custom iptable rules to work
smoothly.

MAC-based only Authors

MAC Authentication Bypass (MAB) can be done by spoofing an authorized MAC address.

The first step in spoofing an authorized MAC address is to find one. This can be done by
physically searching addresses on printers, labels, IP phones and similar equipment, or by
using Wireshark to manually inspect broadcast and multicast packets that travel on the
The Hacker Recipes Ctrl K
network and obtain some MAC addresses in the traffic.c.
Tools Exegol

macchanger can then be used to spoof the a MAC address. Once there, cables can be
new_releases Welcome to THR v2! swapped to access the customer's network.
On this page
bash Theory
Active Directory # manually set the address
macchanger -m "AA:BB:CC:DD:EE:FF" eth0 Basics
Reconnaissance
Infrastructure & auth flow
Movement # reset the address to the permanent physical MAC
Offensive tooling (dropbox)
Persistence macchanger -p eth0
Hardware
Initial setup
Web services Some errors may be raised when the interface settings cannot be changed. This is usually due to DHCP configuration
Reconnaissance the interface being used.
Wi-Fi configuration
Configuration bash
ifdown eth0 Abuse
Accounts and sessions macchanger -m "AA:BB:CC:DD:EE:FF" eth0
MAC-based only
User inputs ifup eth0
Authentication only
MAC-based + authentic…
Systems & services
Using a Hub
Authentication only Using a transparent…
Evasion
Same thing as MAC-based + authentication, without the MAC-based verification bypass. Mitigation
Physical Resources
A regular authentication to 802.1x (and others) systems can be conducted with xsupplicant
Locks
(C).
Networking
Network Access Control MAC-based + authentication
Machines
In this case, access to the network is granted if the supplicant's MAC address is whitelisted
Super secret zones
and if the authentication then succeeds.

Intelligence gathering Just like with MAC-based bypass, the first step is to find an authorized MAC address.

The second step is to access the port without authentication, which leaves at least two
Radio
possible ways, both relying on the dropbox.

Mobile apps Using a Hub


Contributing to THR Use a Hub, switch the MAC address to the victim's one, connect the drop box and the
Guide victim to the same ethernet port. The “real” device will do the auth stuff, putting the port
into authorized mode, and allow both devices to connect to the network. As both have the
Template
same MAC, the switch will only have one entry in its ARP / SAT table, not raising suspicion.

But there is a downside to this method. As long as stateless protocols like UDP are used, both
devices can communicate just fine. However when it comes to using stateful protocols like TCP,
they will for certain run into issues, as one device behind the Hub will be the first to receive and
drop or answer a package e.g. in the 3-way-handshake. One could unplug the original device after
it opened the port and have a fully capable device inside the network, but this might very quickly
raise alarms, when the device is somewhat monitored and will block access to the network when
the next authentication needs to be done.

Using a transparent bridge


This idea involves a device that - simply spoken - in a first instance just lets all the traffic
traverse it by means of forwarding rules, being totally transparent to the network and all the
participants. Tt then does some tcpdump magic to sniff traffic like ARP, NetBIOS but also
Kerberos, Active Directory, web etc., extracting the needed info to spoof the victim and the
networks gateway to stay under the radar. With this info the needed rules in ebtables,
iptables etc. are automatically created, and will allow an attacker to interact with the
network mimicking the victim.

There is an awesome tool called nac_bypass from Mick Schneider which he walks through
in this blog post.
Authors
The steps are as follows:

find a target deivce and put the dropbox in between


start the nac_bypass_setup.sh script
The Hacker Recipes Ctrl K Tools Exegol

new_releases Welcome to THR v2! On this page


Theory
Active Directory
Basics
Reconnaissance
Infrastructure & auth flow
Movement
Offensive tooling (dropbox)
Persistence
Hardware
Initial setup
Web services
DHCP configuration
Reconnaissance
Wi-Fi configuration
Configuration
Abuse
Accounts and sessions
MAC-based only
User inputs To manually specify the interfaces, one can do so with the -1 and -2 switches. By default it will Authentication only
treat the lower device as switch side facing, and the next one as victim facing interface.
MAC-based + authentic…
Systems & services
Using a Hub
Wait until the script gathered the MAC address of the attacked system, the IP of the
attacked system and the gateway's MAC address in order to perform the attack. If all Using a transparent…
Evasion
went well the following info will show up and the device should be able to talk to the Mitigation
network:
Physical Resources
Locks
Networking
Network Access Control
Machines
Super secret zones

Intelligence gathering
run other offensive tools for NTLM capture, relay, etc.
Radio
Responder needs to bet set up to listen on the bridge interface, but change the answering IP
Mobile apps address to the one of the victim.
bash
Contributing to THR responder --interface br0 --externalip $VICTIM

Guide
Template

Mitigation
In general an 802.1x implementation will prevent employees or service providers from
connecting rogue devices to the network. To a certain extend it may also block script
kiddies that don't have the l33t skillz to bypass it. For more advanced adversaries, the
attacks will most likely be successful.

Here are some general guidelines for keeping things as secure as possible:

Separate devices that authenticate by MAC only


Reduce the time for re-authentication to minimize the hub attack scenario. Leaving ports
open after a successful 802.1x authentication for an hour will pose a much higher risk
than 5 minutes.
Use MACSec if possible. This will at least make it much harder for an attacker to gather
the needed info to play for Man in the Middle.
Monitoring:
Uncommon link up/downs on switches
Speed / duplex changes
Changes in framesizes (e.g. Windows vs Linux)
Changed TTLs Authors

Access to systems and services that normally don´t get accessed (firewall logs)
Monitor network traffic and detect attacks / unknown patterns (IDS/IPS/SIEM)
Unneeded ports must be disabled/disconnected.
Don't expose unneeded info. Stickers with IP/MAC addresses will make it much easier for
The Hacker Recipes Tools
Ctrl K Same goes for access to IP phone or printer menus to gather network intel.
an attacker. Exegol
Restrict them as much as possible.
Restrict access to the systems. If someone is not able to get in between, he can't carry
new_releases Welcome to THR v2! out attacks.
On this page
Awareness: train employees to ask questions and inform people, when they see a
Theory
Active Directory suspicious device hanging from a printer or stuff like that.
Basics
Reconnaissance
Infrastructure & auth flow
Movement
Offensive tooling (dropbox)
Persistence Resources Hardware
Initial setup
Web services DEF CON 19 - Alva 'Skip' Duckwall - A Bridge Too Far: Defeating Wir…
Wir…
Share DHCP configuration
Reconnaissance
Wi-Fi configuration
Configuration
Abuse
Accounts and sessions
MAC-based only
User inputs
Authentication only
MAC-based + authentic…
Systems & services
Using a Hub
Using a transparent…
Evasion
Mitigation
Physical Resources
Watch on
Locks
Networking
https://www.gremwell.com/marvin-mitm-tapping-dot1x-links
Network Access Control
Machines https://github.com/Orange-Cyberdefense/fenrir-ocd 802.1x bypass tool
Super secret zones
https://github.com/nccgroup/phantap An "invisible" network tap aimed at red teams

https://github.com/s0lst1c3/silentbridge 802.1x-2010 and 802.1x-2004 bypass toolkit


Intelligence gathering
https://github.com/SySS-Research/Lauschgeraet
Radio
https://github.com/Zero3K/xsupplicant 802.1X/WPA/WPA2/IEEE802.11i implementation for
Mobile apps GNU/Linux/BSD/Windows

Contributing to THR
Guide Contribute to this page Last updated: 10/24/24, 1:12 AM
Template

Previous page Next page


Locks HID injection

Authors

You might also like