SlideShare a Scribd company logo
ACCESS ROUTEROS USING
MULTI-FACTOR AUTHENTICATION
MIKROTIK USER MEETING 2018
Didiet Kusumadihardja | didiet@arch.web.id
Yogyakarta, Indonesia | 20 Oktober 2018
About Me
Didiet Kusumadihardja | didiet@arch.web.id
2
Didiet Kusumadihardja
 12 tahun pengalaman di IT
RT/RW Net, Startup (e-commerce), Manage
Service, IT Consulting, IT Auditor, Penetration
Tester & Training Service
 Penguji UKK TKJ
 Mikrotik Certified Trainer
 Mikrotik Certified Consultant
https://about.me/didiet
Services Offered
Didiet Kusumadihardja | didiet@arch.web.id
3
1. Network Assessment/Design Service
2. IT General Control Audit Service
3. Vulnerability Assessment & Penetration Testing Service
4. IT Due Diligence Service
5. Training Service
• UU ITE No 11 Tahun 2008
• POJK 38/POJK.03/2016
• SEOJK 21/SEOJK.03/2017
• PBI 16/8/PBI/2014
 PCI DSS
 ISO 27001
Planning Discovery Attack
Reporting
Additional Discovery
Background4
Didiet Kusumadihardja | didiet@arch.web.id
Data Breaches News 2016
Didiet Kusumadihardja | didiet@arch.web.id
5
Data Breaches News 2017
Didiet Kusumadihardja | didiet@arch.web.id
6
Data Breaches News 2018
Didiet Kusumadihardja | didiet@arch.web.id
7
MikroTik Security Fixed
Didiet Kusumadihardja | didiet@arch.web.id
8
 6.38.5 (9 Maret 2017)
www - fixed http server vulnerability
 6.41.3 (8 Maret 2018)
smb - fixed buffer overflow vulnerability, everyone using
this feature is urged to upgrade
 6.42.1 (23 April 2018)
winbox - fixed vulnerability that allowed to gain access to
an unsecured router
 6.42.7 (17 Agustus 2018)
security - fixed vulnerabilities CVE-2018-1156, CVE-
2018-1157, CVE-2018-1158, CVE-2018-1159
Exploits
Didiet Kusumadihardja | didiet@arch.web.id
9
Amount of Time to Crack Passwords
Didiet Kusumadihardja | didiet@arch.web.id
10
Processing Power vs Passwords
Didiet Kusumadihardja | didiet@arch.web.id
11
Reality
Didiet Kusumadihardja | didiet@arch.web.id
12
Dictionary
Attack
Brute Force
Attack
ExploitsPassword Dictionary
Bad Guys
Humans and Password
Didiet Kusumadihardja | didiet@arch.web.id
13
Password Tips
Didiet Kusumadihardja | didiet@arch.web.id
14
Indonesia Regulation
Didiet Kusumadihardja | didiet@arch.web.id
15
How we do it with RouterOS?16
Didiet Kusumadihardja | didiet@arch.web.id
Multi-Factor Authentication on RouterOS
Didiet Kusumadihardja | didiet@arch.web.id
17
 Something you know  Password
 Something you have  SSH Keys
 Somewhere you from  IP Address
Create SSH Public & Private Key
Didiet Kusumadihardja | didiet@arch.web.id
18
1. Generate
2. Save Private Key
3. Copy Public Key
and save to file
1
2
3
For OS X and Linux users can use
‘ssh-keygen’
RouterOS Configuration
Didiet Kusumadihardja | didiet@arch.web.id
19
1. Upload Public Key
2. Create New User
3. Import SSH Key
Login using SSH Keys
Didiet Kusumadihardja | didiet@arch.web.id
20
1
2
Connection > SSH > Auth
Only permit from specific IP address
Didiet Kusumadihardja | didiet@arch.web.id
21
Other Methods (1/3)
Didiet Kusumadihardja | didiet@arch.web.id
22
Port Knocking
https://wiki.mikrotik.com/wiki/Port_Knocking
Other Methods (2/3)
Didiet Kusumadihardja | didiet@arch.web.id
23
VPN then remote access
1. VPN (PPTP/SSTP/OpenVPN)
2. Remote Access (Winbox/SSH)
VPN
Network Address
Other Methods (3/3)
Didiet Kusumadihardja | didiet@arch.web.id
24
Out of Band Network
Management Network
Audit Trail / Log as Evidence
Didiet Kusumadihardja | didiet@arch.web.id
25
Audit Trail / Log using The Dude
Didiet Kusumadihardja | didiet@arch.web.id
26
Summary
Didiet Kusumadihardja | didiet@arch.web.id
27
Defense in Depth Layers
1. Policies, Procedure, and Awareness
2. Physical
3. Perimeter
4. Internal Network
5. Host
6. Application
7. Data
Reference
Didiet Kusumadihardja | didiet@arch.web.id
28
 ArsTechnica. 2012. 25-GPU cluster cracks every standard Windows password in <6 hours.
https://arstechnica.com/information-technology/2012/12/25-gpu-cluster-cracks-every-standard-windows-
password-in-6-hours/.
 BetterBuys. Estimating Password-Cracking Times. https://www.betterbuys.com/estimating-password-cracking-
times/.
 C# Corner. 2015. Passphrase vs Password For Security. https://www.c-
sharpcorner.com/UploadFile/66489a/passphrase-vs-password-for-the-security/.
 Information is beautiful. 2018. World’s Biggest Data Breaches.
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/.
 MikroTik. 2015. Port Knocking. https://wiki.mikrotik.com/wiki/Port_Knocking.
 MikroTik. 2016. Manual: The Dude v6/Syslog. https://wiki.mikrotik.com/wiki/Manual:The_Dude_v6/Syslog.
 NIST. 2017. Easy Ways to Build a Better P@$5w0rd. https://www.nist.gov/blogs/taking-measure/easy-ways-build-
better-p5w0rd.
 Records Management Center. 2017. Identity Theft – Is It All Digital. https://rmcmaine.com/identity-theft-report/.
 Reuters. 2017. Yahoo says all three billion accounts hacked in 2013 data theft. https://www.reuters.com/article/us-
yahoo-cyber/yahoo-says-all-three-billion-accounts-hacked-in-2013-data-theft-idUSKCN1C82O1.
 ScienceDirect. 2017. Towards port-knocking authentication methods for mobile cloud computing.
https://www.sciencedirect.com/science/article/pii/S1084804517302813 (Accessed 2018-09-04).
 The Hacker News. 2018. Hackers Infect Over 200,000 MikroTik Routers With Crypto Mining Malware.
https://thehackernews.com/2018/08/mikrotik-router-hacking.html.
 The New York Times. 2016. Yahoo Says 1 Billion User Accounts Were Hacked.
https://www.nytimes.com/2016/12/14/technology/yahoo-hack.html.
Diijinkan menggunakan sebagian atau seluruh materi pada modul ini, baik berupa ide, foto, tulisan,
konfigurasi dan diagram selama untuk kepentingan pengajaran, dan memberikan kredit kepada penulis
serta link ke www.arch.web.id
29
Didiet Kusumadihardja
Mobile: +62 813 1115 0054
e-mail: didiet@arch.web.id
Didiet Kusumadihardja | didiet@arch.web.id

More Related Content

PDF
IoT Security in Action - Boston Sept 2015
PPTX
Security and Authentication of Internet of Things (IoT) Devices
PPTX
Internet of things security challenges
PPTX
Cybersecurity Implementation and Certification in Practice for IoT Equipment
PDF
IoT security fresh thinking 2017 sep 9
PDF
IoT Security Challenges
PDF
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
PPTX
Internet of Things Security
IoT Security in Action - Boston Sept 2015
Security and Authentication of Internet of Things (IoT) Devices
Internet of things security challenges
Cybersecurity Implementation and Certification in Practice for IoT Equipment
IoT security fresh thinking 2017 sep 9
IoT Security Challenges
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
Internet of Things Security

What's hot (20)

PDF
国际物联网安全标准与认证大解析
PPTX
Enabling Data Protection through PKI encryption in IoT m-Health Devices
PDF
Technology & Policy Interaction Panel at Inform[ED] IoT Security
PPTX
Security Testing for IoT Systems
PDF
Cybersecurity Summit AHR20 Protect Cimetrics
PDF
The Future of Authentication for IoT
PDF
IoT/M2M Security
PDF
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
PDF
Cybersecurity Summit 2020 Slide Deck
PDF
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
PDF
IoT Security Challenges and Solutions
PDF
Security Aspects in IoT - A Review
DOC
Adarsh Resume ISO27001
PPTX
Security for iot and cloud aug 25b 2017
PPTX
IoT Security: Cases and Methods
PDF
1 importance of light weight authentication in iot
PPTX
Addressing Healthcare Challenges Today
PDF
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
PPTX
Industrial IoT Security Standards & Frameworks
国际物联网安全标准与认证大解析
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Security Testing for IoT Systems
Cybersecurity Summit AHR20 Protect Cimetrics
The Future of Authentication for IoT
IoT/M2M Security
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Cybersecurity Summit 2020 Slide Deck
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
IoT Security Challenges and Solutions
Security Aspects in IoT - A Review
Adarsh Resume ISO27001
Security for iot and cloud aug 25b 2017
IoT Security: Cases and Methods
1 importance of light weight authentication in iot
Addressing Healthcare Challenges Today
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Industrial IoT Security Standards & Frameworks
Ad

Similar to Access RouterOS using Multi-Factor Authentication (20)

PPTX
Fools your enemy with MikroTik
PPTX
Presentation ANS Lab.pptx
PDF
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
PDF
ADRecon - Detection CHCON 2018
PDF
State of the ATT&CK
PDF
515727533-sy0-601-07-9082366-06yop-12.pdf
PDF
Appliquez le modèle Zero Trust pour le Hardening de votre Azure AD !
PPTX
Enter The Matrix Securing Azure’s Assets
PPTX
CCSA Treinamento_CheckPoint.pptx
PPTX
DUO-CSC-Information Technology Presentation-Solution.pptx
PDF
Ariyo - EUDAT CDI B2 services documentation
PPTX
How to Simplify and Accelerate Passkey Adoption.pptx
PDF
OpenID 4 Verifiable Credentials + HAIP (Update)
PDF
Compliance and Zero Trust Ambient Mesh
PPTX
Distributed Ledger PKI Risk Management Framework, Rob Campbell
PPTX
FIDO Masterclass
PDF
MikroTik Security
PPTX
Security in microservices architectures
PPTX
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
PPTX
Webinar: Securing IoT with FIDO Authentication
Fools your enemy with MikroTik
Presentation ANS Lab.pptx
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
ADRecon - Detection CHCON 2018
State of the ATT&CK
515727533-sy0-601-07-9082366-06yop-12.pdf
Appliquez le modèle Zero Trust pour le Hardening de votre Azure AD !
Enter The Matrix Securing Azure’s Assets
CCSA Treinamento_CheckPoint.pptx
DUO-CSC-Information Technology Presentation-Solution.pptx
Ariyo - EUDAT CDI B2 services documentation
How to Simplify and Accelerate Passkey Adoption.pptx
OpenID 4 Verifiable Credentials + HAIP (Update)
Compliance and Zero Trust Ambient Mesh
Distributed Ledger PKI Risk Management Framework, Rob Campbell
FIDO Masterclass
MikroTik Security
Security in microservices architectures
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
Webinar: Securing IoT with FIDO Authentication
Ad

More from Didiet Kusumadihardja (6)

PDF
Didiet Cybersecurity Consultant Portfolio - English
PDF
Manajemen wireless rogue
PDF
Personally identifiable information
PDF
Adequate password policy
PDF
Notifikasi penggunaan sistem
PDF
Didiet Cyber Security Consultant Portfolio - Bahasa Indonesia
Didiet Cybersecurity Consultant Portfolio - English
Manajemen wireless rogue
Personally identifiable information
Adequate password policy
Notifikasi penggunaan sistem
Didiet Cyber Security Consultant Portfolio - Bahasa Indonesia

Recently uploaded (20)

PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PPTX
Introduction to Information and Communication Technology
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
artificial intelligence overview of it and more
PDF
Testing WebRTC applications at scale.pdf
PDF
Introduction to the IoT system, how the IoT system works
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPT
tcp ip networks nd ip layering assotred slides
PPTX
Internet___Basics___Styled_ presentation
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
Funds Management Learning Material for Beg
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Introduction to Information and Communication Technology
The New Creative Director: How AI Tools for Social Media Content Creation Are...
artificial intelligence overview of it and more
Testing WebRTC applications at scale.pdf
Introduction to the IoT system, how the IoT system works
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
tcp ip networks nd ip layering assotred slides
Internet___Basics___Styled_ presentation
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Funds Management Learning Material for Beg
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
Sims 4 Historia para lo sims 4 para jugar
SASE Traffic Flow - ZTNA Connector-1.pdf
RPKI Status Update, presented by Makito Lay at IDNOG 10
Introuction about WHO-FIC in ICD-10.pptx
Paper PDF World Game (s) Great Redesign.pdf
international classification of diseases ICD-10 review PPT.pptx
Module 1 - Cyber Law and Ethics 101.pptx

Access RouterOS using Multi-Factor Authentication

  • 1. ACCESS ROUTEROS USING MULTI-FACTOR AUTHENTICATION MIKROTIK USER MEETING 2018 Didiet Kusumadihardja | didiet@arch.web.id Yogyakarta, Indonesia | 20 Oktober 2018
  • 2. About Me Didiet Kusumadihardja | didiet@arch.web.id 2 Didiet Kusumadihardja  12 tahun pengalaman di IT RT/RW Net, Startup (e-commerce), Manage Service, IT Consulting, IT Auditor, Penetration Tester & Training Service  Penguji UKK TKJ  Mikrotik Certified Trainer  Mikrotik Certified Consultant https://about.me/didiet
  • 3. Services Offered Didiet Kusumadihardja | didiet@arch.web.id 3 1. Network Assessment/Design Service 2. IT General Control Audit Service 3. Vulnerability Assessment & Penetration Testing Service 4. IT Due Diligence Service 5. Training Service • UU ITE No 11 Tahun 2008 • POJK 38/POJK.03/2016 • SEOJK 21/SEOJK.03/2017 • PBI 16/8/PBI/2014  PCI DSS  ISO 27001 Planning Discovery Attack Reporting Additional Discovery
  • 5. Data Breaches News 2016 Didiet Kusumadihardja | didiet@arch.web.id 5
  • 6. Data Breaches News 2017 Didiet Kusumadihardja | didiet@arch.web.id 6
  • 7. Data Breaches News 2018 Didiet Kusumadihardja | didiet@arch.web.id 7
  • 8. MikroTik Security Fixed Didiet Kusumadihardja | didiet@arch.web.id 8  6.38.5 (9 Maret 2017) www - fixed http server vulnerability  6.41.3 (8 Maret 2018) smb - fixed buffer overflow vulnerability, everyone using this feature is urged to upgrade  6.42.1 (23 April 2018) winbox - fixed vulnerability that allowed to gain access to an unsecured router  6.42.7 (17 Agustus 2018) security - fixed vulnerabilities CVE-2018-1156, CVE- 2018-1157, CVE-2018-1158, CVE-2018-1159
  • 9. Exploits Didiet Kusumadihardja | didiet@arch.web.id 9
  • 10. Amount of Time to Crack Passwords Didiet Kusumadihardja | didiet@arch.web.id 10
  • 11. Processing Power vs Passwords Didiet Kusumadihardja | didiet@arch.web.id 11
  • 12. Reality Didiet Kusumadihardja | didiet@arch.web.id 12 Dictionary Attack Brute Force Attack ExploitsPassword Dictionary Bad Guys
  • 13. Humans and Password Didiet Kusumadihardja | didiet@arch.web.id 13
  • 14. Password Tips Didiet Kusumadihardja | didiet@arch.web.id 14
  • 16. How we do it with RouterOS?16 Didiet Kusumadihardja | didiet@arch.web.id
  • 17. Multi-Factor Authentication on RouterOS Didiet Kusumadihardja | didiet@arch.web.id 17  Something you know  Password  Something you have  SSH Keys  Somewhere you from  IP Address
  • 18. Create SSH Public & Private Key Didiet Kusumadihardja | didiet@arch.web.id 18 1. Generate 2. Save Private Key 3. Copy Public Key and save to file 1 2 3 For OS X and Linux users can use ‘ssh-keygen’
  • 19. RouterOS Configuration Didiet Kusumadihardja | didiet@arch.web.id 19 1. Upload Public Key 2. Create New User 3. Import SSH Key
  • 20. Login using SSH Keys Didiet Kusumadihardja | didiet@arch.web.id 20 1 2 Connection > SSH > Auth
  • 21. Only permit from specific IP address Didiet Kusumadihardja | didiet@arch.web.id 21
  • 22. Other Methods (1/3) Didiet Kusumadihardja | didiet@arch.web.id 22 Port Knocking https://wiki.mikrotik.com/wiki/Port_Knocking
  • 23. Other Methods (2/3) Didiet Kusumadihardja | didiet@arch.web.id 23 VPN then remote access 1. VPN (PPTP/SSTP/OpenVPN) 2. Remote Access (Winbox/SSH) VPN Network Address
  • 24. Other Methods (3/3) Didiet Kusumadihardja | didiet@arch.web.id 24 Out of Band Network Management Network
  • 25. Audit Trail / Log as Evidence Didiet Kusumadihardja | didiet@arch.web.id 25
  • 26. Audit Trail / Log using The Dude Didiet Kusumadihardja | didiet@arch.web.id 26
  • 27. Summary Didiet Kusumadihardja | didiet@arch.web.id 27 Defense in Depth Layers 1. Policies, Procedure, and Awareness 2. Physical 3. Perimeter 4. Internal Network 5. Host 6. Application 7. Data
  • 28. Reference Didiet Kusumadihardja | didiet@arch.web.id 28  ArsTechnica. 2012. 25-GPU cluster cracks every standard Windows password in <6 hours. https://arstechnica.com/information-technology/2012/12/25-gpu-cluster-cracks-every-standard-windows- password-in-6-hours/.  BetterBuys. Estimating Password-Cracking Times. https://www.betterbuys.com/estimating-password-cracking- times/.  C# Corner. 2015. Passphrase vs Password For Security. https://www.c- sharpcorner.com/UploadFile/66489a/passphrase-vs-password-for-the-security/.  Information is beautiful. 2018. World’s Biggest Data Breaches. http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/.  MikroTik. 2015. Port Knocking. https://wiki.mikrotik.com/wiki/Port_Knocking.  MikroTik. 2016. Manual: The Dude v6/Syslog. https://wiki.mikrotik.com/wiki/Manual:The_Dude_v6/Syslog.  NIST. 2017. Easy Ways to Build a Better P@$5w0rd. https://www.nist.gov/blogs/taking-measure/easy-ways-build- better-p5w0rd.  Records Management Center. 2017. Identity Theft – Is It All Digital. https://rmcmaine.com/identity-theft-report/.  Reuters. 2017. Yahoo says all three billion accounts hacked in 2013 data theft. https://www.reuters.com/article/us- yahoo-cyber/yahoo-says-all-three-billion-accounts-hacked-in-2013-data-theft-idUSKCN1C82O1.  ScienceDirect. 2017. Towards port-knocking authentication methods for mobile cloud computing. https://www.sciencedirect.com/science/article/pii/S1084804517302813 (Accessed 2018-09-04).  The Hacker News. 2018. Hackers Infect Over 200,000 MikroTik Routers With Crypto Mining Malware. https://thehackernews.com/2018/08/mikrotik-router-hacking.html.  The New York Times. 2016. Yahoo Says 1 Billion User Accounts Were Hacked. https://www.nytimes.com/2016/12/14/technology/yahoo-hack.html.
  • 29. Diijinkan menggunakan sebagian atau seluruh materi pada modul ini, baik berupa ide, foto, tulisan, konfigurasi dan diagram selama untuk kepentingan pengajaran, dan memberikan kredit kepada penulis serta link ke www.arch.web.id 29 Didiet Kusumadihardja Mobile: +62 813 1115 0054 e-mail: didiet@arch.web.id Didiet Kusumadihardja | didiet@arch.web.id