SlideShare a Scribd company logo
DefCon 22, Las Vegas 2014
Abusing Software Defined Networks
Gregory Pickett, CISSP, GCIA, GPEN
Chicago, Illinois
gregory.pickett@hellfiresecurity.com
Hellfire Security
Overview
What is it?
Exploiting it!
Fixing it!
Moving Forward
Wrapping Up
Modern Day Networks
Vendor Dependent
Difficult to scale
Complex and Prone to Break
Distributed and Often Inconsistent
Configuration
Uses inflexible and difficult to innovate
protocols
Unable to Consider Other Factors
… And Good Luck If You Want
To Change It!
Enter … Software Defined Networking
Separate the Control and Data Plane
Forwarding Decisions Made By a Controller
Routers and Switches Just Forward Packets
Controllers
Programmed with the Intelligence
Full visibility of the Network
Can consider the totality of the network
before making any decision
Enforce Granular Policy
Enter … Software Defined Networking
Switches
Bare-Metal Only
Any Vendor … Hardware or Software
Solves Lots of Problems
Know the State of the Network Rather Than
Inferring It
Run Development and Production Side-By-Side
More Practical …
Solves Lots of Problems
Less Expensive Hardware
BGP
Maintenance Dry-Out
Customer Egress Selection
Better BGP Security
Faster Convergence
Granular Peering at IXPs
Solves Lots of Problems
Real-World Network Slicing of Flow Space
Network and Server Load Balancing
Security
Dynamic Access Control
Adaptive Traffic Monitoring
Attack Detection and Mitigation
Emerging Standards
Old and Busted
SNMP
BGP
Netconf
LISP
PCEP
New Hotness
OVSDB
Openflow
Introducing Openflow
Purpose
Execute Logic At the Controller
Update Forwarding Tables
Defined
Forwarding Process
Messaging Format
Introducing Openflow
Elements
Controller
Secure Channel
Forwarding Element
Process
Check Flow Table
If Match Found, Execute Action
If No Match, Send Packet to controller
Update Flow Table
Introducing Openflow
Features
Flow Tables
Match/Action Entries
Packet header matched against 1 of N tables
12 fields available for matching
Wildcard matching available
Actions
Forward
Drop
Modify
Enqueue
Leading Platforms
Proprietary
Cisco Application Policy Infrastructure Controller (APIC)
Cisco Extensible Network Controller (XNC)
HP Virtual Application Networks (VAN) SDN Controller
IBM Programmable Network Controller
Open-Source
Nox/Pox
Ryu
Floodlight
Opendaylight
Floodlight
Open-Source Java Controller
Primarily an Openflow-based controller
Supports Openflow v1.0.0
Fork from the Beacon Java Openflow controller
Maintained by Big Switch Networks
Opendaylight
Open-Source Java Controller
Many southbound options including Openflow
Supports Openflow v1.0.0 and v1.3.0
Fork from the Beacon Java Openflow controller
A Linux Foundation Collaborative Project
Supported by Citrix, Red Hat,
Ericsson, Hewlett Packard,
Brocade, Cisco, Juniper,
Microsoft, and IBM
How Prevalent Is It Going To Be?
Gartner: 10 critical IT trends for the next five
years
Major Networking Vendors Have Products or
Products Planned for SDN
InformationWeek 2013 Survey
60% felt that SDN would be part of
their network within 5 Years
43% already have plans to put it in
production
So It’s Gonna Be All …
Not Exactly!
Protocol Weaknesses
Encryption and Authentication via TLS
More of a suggestion than a requirement though …
Started Out Good
Heading Backwards
v1.0.0 over TLS
v1.4.0 over TCP or TLS
Protocol Weaknesses
Controllers
Floodlight … Nope
Opendaylight … Supported but not required
Switches
Arista … No
Brocade … Surprisingly, Yes
Cisco … Another, Yes
Dell … No
Extreme … Another, Yes
HP … No
Protocol Weaknesses
Switches
Huawei … No
IBM … No
Juniper … No
NEC … Another, Yes
Netgear … No
Pronto … Yes
OVS … No
Could Lead To …
Information Disclosure through Interception
Modification through Man-in-the-Middle
And all sorts of DoS Nastiness!
Debug Ports
No Encryption
No Authentication
Just Full Control of the Switch
All Via “dpctl” command-line
tool
Debug Ports
Switches
Arista … Yes
Brocade … Yes
Dell … Yes
Extreme … Yes
HP … Yes
Huawei … Yes
IBM … Yes
Juniper … Yes
NEC … Yes
Debug Ports
Switches
Netgear … Yes
Pronto … Yes
OVS … Yes
DoS Nastiness
Openflow
Centralization Entails Dependency
Dependency Can Be Exploited
How are vendors handing it?
Floodlight
Explored by Solomon, Francis, and Eitan
Their Results … Handling It Poorly
Opendaylight
Unknown but worth investigating
It is Java for God Sake!
Tools
of-switch.py
Impersonates an Openflow switch
Utilizes Openflow v1.00
of-flood.py
Floods an Openflow controller
Disrupting the network and bringing it down
Utilizes Openflow v1.00
Demonstration
Other Controller Weakness
Floodlight
No Encryption for Northbound HTTP API
No Authentication for Northbound HTTP API
Opendaylight
Encryption for Northbound HTTP API
Turned Off by Default
Authentication for Northbound HTTP API
HTTP Basic Authentication
Default Password Weak
Strong Passwords Turned Off
by Default
Could Lead To …
Information Disclosure through Interception
Topology
Credentials
Information Disclosure through
Unauthorized Access
Topology
Targets
And …
Topology, Flow, and Message Modification through
Unauthorized Access
Add Access
Remove Access
Hide Traffic
Change Traffic
Identifying Controllers and Switches
Currently Listening on TCP Port 6633
New Port Defined … TCP Port 6653
Hello’s Exchanged
Feature Request
Controller will send
Switch will not
Tools
of-check.py
Identifies Openflow Services
Reports on their Versions
Compatible with any version of Openflow
of-enum.py
Enumerates Openflow Endpoints
Reports on their Type
Compatible with any version of Openflow
Tools
openflow-enum.nse
Identifies Openflow Services
Reports on their Versions
Compatible with any version of Openflow
Demonstration
Exposure
Number of Known Issues
Bad Enough Inside a Network
Is Anything Outward Facing?
Better Not to Take Anyone’s Word
for It
Just Find Out for Yourself
Reported
While Data Centers/Clouds are the Killer App for SDN
NIPPON EXPRESS
FIDELITY INVESTMENTS
VMWARE
Starting to see it moving toward the
LAN
Caltech
Cern
And WAN
Google, NTT, and AT&T
Discovered (Scanning Project)
Service Discovery Ran on Entire Internet
Seeing Both Controllers and Switches
Still Going Through Results Though
Data Collected Full of Noise
Let’s Just Say that I Now Know
Where All the Tarpits Are!
Some Attacks
Small Local Area Network
One Admin Host
Two User Hosts
One Server
One IDS
Attacker will …
Identify Targets
Enumerate ACLs
Find Sensors
Tool
of-map.py
Downloads flows from an Openflow controller
Uses the flows
To identify targets and target services
To build ACLs
To identify sensors
Works with Floodlight and Opendaylight
via JSON
Demonstration
And Some More Attacks …
Small Local Area Network
One Admin Host
Two User Hosts
One Server
One IDS
Attacker will …
Gain Access to the Server
Isolate the Administrator
Hide from the IDS
And Attack the Server
Tool
of-access.py
Modifies flows on the network through
the Openflow Controller
Adds or Removes access for hosts
Applies transformations to their
network activity
Hides activity from sensors
Works with Floodlight and Opendaylight
via JSON
Demonstration
And Some Pwnage …
Sorry Linux Foundation!
Zero-Day Exploit
Opendaylight has other southbound APIs besides Openflow
No Encryption for Southbound Netconf API
No Authentication for Southbound Netconf API
Just Connect and Exchange Messages
XML-RPC
Remember Java?
Boom Goes Opendaylight
And it runs as “Root”
Demonstration
If No Exploit …
Service Not Available or They Fix It
Not to Worry
Password Guess the !!!!!!
Default Password Weak
Strong Passwords Turned Off
No Account Lockout
No SYSLOG Output
Repeat!
Attacker will …
Identify Targets
Enumerate ACLs
Find Sensors
Gain Access to the Server
Isolate the Administrator
Hide from the IDS
And Attack the Server
And Pwn That Network Too!
Demonstration
Other Exploits Waiting to Be Found!
Floodlight
Northbound HTTP API
Southbound Openflow API
Opendaylight
Northbound HTTP API
Southbound Openflow API
Southbound Netconf API (TCP,SSH)
Southbound Netconf Debug Port
Other Exploits Waiting to Be Found!
Opendaylight
JMX Access
OSGi Console
Lisp Flow Mapping
ODL Internal Clustering RPC
ODL Clustering
Java Debug Access
Where to Look
Identify Additional Encryption and Authentication Issues
Use Them to Explore
Direct Access
Traditional Vulnerabilities
Start with the Basics
Protocol Messaging
Injection for RFI/LFI, Etc.
Identify
Information Disclosure
Unauthorized Access
DoS
Available Solutions
For Now
For the Future
For Now
Transport Layer Security
Feasible?
Realistic?
Hardening … Duh!
VLAN … It’s the Network Stupid!
Code Review Anyone?
For the Future
Denial of Service (SDN Architecture)
Network Partitioning
Controller Clustering
Static Flow Entries
Modification (SDN Applications)
Traffic Counters
Respond to Abnormalities
Verification (SDN Operations)
Impact
With this one box, you get everything they have
There is the Obvious
Own Any Data They Own
Control Any Aspect of Their Operation
Control Their Fate
Opens Up A World of
Possibilities
How It Could Go Right
Vendor Independence and ultimately lower cost
Networks that match the application and the
businesses needs not the other way around
Faster Evolution of the Network
Production-Scale Simulation
and Experimentation
Exchangeable Network Aspects
Dynamic and Truly Active
Defenses
How It Could Go Wrong
Denial of Service
Peer Node
External Node
Selectively Dropping Traffic?
MiTM
Entire Networks
Local Subnets or Hosts
Shadow Operations
Darknets
Uber Admins
Making the Difference
Traditional Means of Securing Controllers Still Apply
Security Needs to Be Part of the Discussion
Until Now … How SDN Can Help Security
But How Secure is SDN?
Analyses being Done
But By Outsiders
Traditional Approach and 2-D
Controller’s Need A Security
Reference and Audit Capability
SDN has the potential to turn the entire Internet
into a cloud
Benefit would be orders of magnitude above what
we see now
But there is hole in the middle of it that could
easily be filled by the likes of the NSA … or
worse yet, China
Let’s Not Let That Happen
And That Start’s Here
Final Thoughts
Toolkit
Updates can be found at http://sdn-toolkit.sourceforge.net/
Links
http://www.sdncentral.com/
https://www.opennetworking.org/
http://www.projectfloodlight.org/
http://www.opendaylight.org/
https://www.coursera.org/course/sdn
https://www.baycollege.edu/Academics/Areas-of-Study/Computer-
Network-Systems/Faculty/Linderoth/2013-sdn-survey-growing-pains.aspx
http://www8.hp.com/h20195/v2/GetDocument.aspx?docname=4AA4-
7944ENW
http://www.openflowhub.org/blog/blog/2012/12/03/sdn-use-case-
multipath-tcp-at-caltech-and-cern/
http://www.networkworld.com/article/2167166/cloud-
computing/vmware--we-re-building-one-of-the-biggest-sdn-deployments-
in-the-industry.html
http://www.networkcomputing.com/networking/inside-googles-software-
defined-network/a/d-id/1234201?
http://cseweb.ucsd.edu/~vahdat/papers/b4-sigcomm13.pdf
http://viodi.com/2014/03/15/ntt-com-leads-all-network-providers-in-
deployment-of-sdnopenflow-nfv-coming-soon/
Defcon 22-gregory-pickett-abusing-software-defined-networks

More Related Content

PDF
Defcon 22-tim-mcguffin-one-man-shop
PDF
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
PDF
Defcon 22-nir-valtman-a-journey-to-protect-pos
PDF
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
PDF
Windows Service Hardening
PDF
Security events in 2014
PDF
PPTX
Multi domain security-management_technical_presentation
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-nir-valtman-a-journey-to-protect-pos
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Windows Service Hardening
Security events in 2014
Multi domain security-management_technical_presentation

What's hot (20)

PPTX
Havex Deep Dive (English)
PDF
Android Application Security
PDF
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
PPTX
Fingerprinting and Attacking a Healthcare Infrastructure
PDF
Malware collection and analysis
PPTX
Vulnerability Inheritance in ICS (English)
PPTX
BSides London 2015 - Proprietary network protocols - risky business on the wire.
PPTX
Check Point sizing security
PPT
checkpoint
PPTX
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
PPTX
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
PDF
IT infrastructure security 101
PPTX
Intro To ECAT
PPTX
Check Point Virtual Systems
PDF
The New Landscape of Airborne Cyberattacks
PPTX
Internet Accessible ICS in Japan (English)
PPTX
I2O Solutions - HDN Network Security Solution
PDF
WTF is Penetration Testing
PDF
Too soft[ware defined] networks SD-Wan vulnerability assessment
PPTX
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Havex Deep Dive (English)
Android Application Security
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
Fingerprinting and Attacking a Healthcare Infrastructure
Malware collection and analysis
Vulnerability Inheritance in ICS (English)
BSides London 2015 - Proprietary network protocols - risky business on the wire.
Check Point sizing security
checkpoint
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
IT infrastructure security 101
Intro To ECAT
Check Point Virtual Systems
The New Landscape of Airborne Cyberattacks
Internet Accessible ICS in Japan (English)
I2O Solutions - HDN Network Security Solution
WTF is Penetration Testing
Too soft[ware defined] networks SD-Wan vulnerability assessment
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ad

Viewers also liked (20)

PDF
Defcon 22-graham-mc millan-tentler-masscaning-the-internet
PDF
Defcon 22-weston-hecker-burner-phone-ddos
PDF
Defcon 22-richard-klafter-and-eric-swanson-check-your-finger
PDF
Defcon 22-phil-polstra-am-i-being-spied-on
PDF
Defcon 22-tess-schrodinger-raxacoricofallapatorius-with-love
PDF
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
PDF
Defcon 22-rmellendick-dakahuna-rf-penetration-testing-your-a
PDF
Defcon 22-robert-rowley-detecting-defending-against-surveill
PDF
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
PDF
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
PDF
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
PDF
Defcon 22-quaddi-r3plicant-hefley-hacking-911
PDF
Risk Analysis using open FAIR and Adoption of right Security Controls
PDF
Software Defined Networks Explained
PDF
Network Forensics and Practical Packet Analysis
PPTX
Practical Applications of Block Chain Technologies
PPTX
PDF
Introdução a Software-defined Networks
PPTX
Keynote Session : The Non - Evolution of Security
PPTX
Keynote Session : Emerging Healthcare Tech & Future Security Impact
Defcon 22-graham-mc millan-tentler-masscaning-the-internet
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-richard-klafter-and-eric-swanson-check-your-finger
Defcon 22-phil-polstra-am-i-being-spied-on
Defcon 22-tess-schrodinger-raxacoricofallapatorius-with-love
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Defcon 22-rmellendick-dakahuna-rf-penetration-testing-your-a
Defcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
Defcon 22-quaddi-r3plicant-hefley-hacking-911
Risk Analysis using open FAIR and Adoption of right Security Controls
Software Defined Networks Explained
Network Forensics and Practical Packet Analysis
Practical Applications of Block Chain Technologies
Introdução a Software-defined Networks
Keynote Session : The Non - Evolution of Security
Keynote Session : Emerging Healthcare Tech & Future Security Impact
Ad

Similar to Defcon 22-gregory-pickett-abusing-software-defined-networks (20)

PPTX
Demystifying Software Defined Networking (SDN)
PPTX
Demystifying Software Defined Networking (SDN)
PPTX
SDN: an introduction
PDF
Introduzione a Software Define Networking
PPTX
Innovation in SDN Tools and Platforms
PPT
OpenFlow tutorial
PPT
OpenFlow Tutorial
PPTX
Software Defined networking (SDN)
PPT
Naveen nimmu sdn future of networking
PPT
Naveen nimmu sdn future of networking
PPTX
Network Virtualization
PDF
SDN - beyond the obvious
PPTX
FIOT_Uni4.pptx
PPTX
19.) security pivot (policy byod nac)
PPTX
19.) security pivot (policy byod nac)
PDF
Ch 01 --- introduction to sdn-nfv
PPTX
Floodlight tutorial - Clemson / Georgia Tech
PDF
Open daylight openstack_meetup_20140218
PDF
Analytics driven SDN and commodity switches
PDF
Introduction to SDN
Demystifying Software Defined Networking (SDN)
Demystifying Software Defined Networking (SDN)
SDN: an introduction
Introduzione a Software Define Networking
Innovation in SDN Tools and Platforms
OpenFlow tutorial
OpenFlow Tutorial
Software Defined networking (SDN)
Naveen nimmu sdn future of networking
Naveen nimmu sdn future of networking
Network Virtualization
SDN - beyond the obvious
FIOT_Uni4.pptx
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
Ch 01 --- introduction to sdn-nfv
Floodlight tutorial - Clemson / Georgia Tech
Open daylight openstack_meetup_20140218
Analytics driven SDN and commodity switches
Introduction to SDN

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation theory and applications.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
Teaching material agriculture food technology
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
A Presentation on Artificial Intelligence
Empathic Computing: Creating Shared Understanding
Group 1 Presentation -Planning and Decision Making .pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
cuic standard and advanced reporting.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation theory and applications.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Teaching material agriculture food technology
A comparative analysis of optical character recognition models for extracting...
Programs and apps: productivity, graphics, security and other tools
Machine learning based COVID-19 study performance prediction
Digital-Transformation-Roadmap-for-Companies.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Dropbox Q2 2025 Financial Results & Investor Presentation
A Presentation on Artificial Intelligence

Defcon 22-gregory-pickett-abusing-software-defined-networks