Staying Persistent in Software Defined Networks

by Gregory Pickett
Sept. 19, 2017 0 comments Black Hat belen_caty Pen Testing & Audits

In this session, we'll cover the weaknesses in ONIE, ways to reach the platform through these Network Operating Systems, and what can happen if we don't properly protect the Control Plane these switches run on. I'll even demonstrate with a drive-by web-attack that is able to pivot through a Windows management station to reach the isolated control plane network, and infect one of these ONIE-based switches with malware, malware that's there even after a refresh. You'll even get the source code to take home with you to see how easily it's done. Finally, we'll talk about how to compensate for these issues so that your network doesn't become infected with and manipulated by this sort of persistent firmware-level malware.

https://www.blackhat.com/us-15/briefings.html#staying-persistent-in-software-defined-networks