SlideShare a Scribd company logo
Fools your enemy with Mikrotik
BY: DIDIET KUSUMADIHARDJA
MIKROTIK USER MEETING (MUM) 2016
JAKARTA, INDONESIA
14 OCTOBER 2016
About Me
Didiet Kusumadihardja
1. IT Security Specialist
 PT. Mitra Solusi Telematika
2. Trainer & IT Consultant
 Arch Networks
MTCNA, MTCINE, MTCWE, MTCUME, MTCTCE, MTCRE
Didiet Kusumadihardja - didiet@arch.web.id
2
PT. Mitra Solusi Telematika
Didiet Kusumadihardja - didiet@arch.web.id
3
Gedung TMT 2. GF
Jl. Cilandak KKO
Jakarta
Global
IT Security
Incident
Didiet Kusumadihardja - didiet@arch.web.id
4
Global IT Security Incident 2014
Didiet Kusumadihardja - didiet@arch.web.id
5
Entire Network Canceled
Global IT Security Incident 2015
Didiet Kusumadihardja - didiet@arch.web.id
6
3 Tahun di Hack ( 2012 – 2015)
Global IT Security Incident 2016
Didiet Kusumadihardja - didiet@arch.web.id
7
500 Juta Account
3 Miliar Account ???
Source: Tech Times
Indonesia
IT Security
Incident
Didiet Kusumadihardja - didiet@arch.web.id
8
Didiet Kusumadihardja - didiet@arch.web.id
9
Source: Akamai
INDONESIA
IS
SAFE?
Indonesia IT Security Incident 2013
Didiet Kusumadihardja - didiet@arch.web.id
10
polri.go.id
2013
Deface
Motive: Fame?
Indonesia IT Security Incident 2016
Didiet Kusumadihardja - didiet@arch.web.id
11
Teman Ahok
DDoS Attack
Motive: Politics?
Indonesia IT Security Incident 2016
Didiet Kusumadihardja - didiet@arch.web.id
12
Videotron
Kebayoran Baru
Jakarta Selatan
Motive: Curiosity?
Source: Carnegie Mellon UniversityDidiet Kusumadihardja - didiet@arch.web.id
13
IT Security
Trends
Gak Perlu
Pinter Buat
Hacking
Hacking Tools Example
Didiet Kusumadihardja - didiet@arch.web.id
14
Cain & Abel
Kali Linux
Didiet Kusumadihardja - didiet@arch.web.id
15
Source: SCMagazine
Modern Business
Cybercrime as
a Service (CaaS)
How Hackers
do it?
Didiet Kusumadihardja - didiet@arch.web.id
16
Hacking Phase
1.Reconnaissance
2.Scanning
3.Gaining Access
4.Maintaining Access
5.Clearing Tracks
Source: Ethical Hacking by EC-CouncilDidiet Kusumadihardja - didiet@arch.web.id
17
Hacking Phase (Cont’d)
1.Reconnaissance
2.Scanning
3.Gaining Access
4.Maintaining Access
5.Clearing Tracks
Information Gathering
OS Detail Open Port
Version
Device Type
Application Vulnerability
Exploit Vulnerability
Escalate Privilege
Backdoors
Delete/overwrite Event/Logs
Data harvesting
Didiet Kusumadihardja - didiet@arch.web.id
18
Hacking Phase Analogy
1.Reconnaissance
2.Scanning
3.Gaining Access
4.Maintaining Access
5.Clearing Tracks
Didiet Kusumadihardja - didiet@arch.web.id
19
When we fools them?
1.Reconnaissance
2.Scanning
3.Gaining Access
4.Maintaining Access
5.Clearing Tracks
Didiet Kusumadihardja - didiet@arch.web.id
20
Why at Scanning Phase?
Didiet Kusumadihardja - didiet@arch.web.id
21
TELNET SSH
Scanning Tools
SoftPerfect Network Scanner
The Dude
Didiet Kusumadihardja - didiet@arch.web.id
22
How to fools
them?
Didiet Kusumadihardja - didiet@arch.web.id
23
Use a bait
Didiet Kusumadihardja - didiet@arch.web.id
24
Honey Pot
Hacker
Bait
Web Server Example
Web Server
HTTP HTTPS
=
Didiet Kusumadihardja - didiet@arch.web.id
25
Confuse your enemy
Didiet Kusumadihardja - didiet@arch.web.id
26
HTTP HTTPS
Server Farm Network Example
192.168.1.2  DNS Server
192.168.1.5  Web Server
192.168.1.10  DB Server
192.168.1.15  Mail Server
SERVER X
Didiet Kusumadihardja - didiet@arch.web.id
27
192.168.1.0/24
Confuse your enemy
192.168.1.1  Fake Server 1
192.168.1.2  DNS Server
192.168.1.3  Fake Server 2
192.168.1.4  Fake Server 3
192.168.1.5  Web Server
192.168.1.6  Fake Server 4
192.168.1.7  Fake Server 5
192.168.1.8  Fake Server 6
192.168.1.9  Fake Server 7
192.168.1.10  DB Server
192.168.1.11  Fake Server 8
192.168.1.12  Fake Server 9
192.168.1.13  Fake Server 10
192.168.1.14  Fake Server 11
192.168.1.15  Mail Server
Didiet Kusumadihardja - didiet@arch.web.id
28
192.168.1.0/24
How we do it with
Mikrotik?
Didiet Kusumadihardja - didiet@arch.web.id
29
NAT
(Network Address Translation)
Didiet Kusumadihardja - didiet@arch.web.id
30
Fake NAT
Didiet Kusumadihardja - didiet@arch.web.id
31
Fake Ports at your Web Server
HTTP & HTTPS to
Legitimate Server
Other Ports to
Fake Server
Didiet Kusumadihardja - didiet@arch.web.id
32
Simple NAT for Web Server
INTERNET
ROUTER WEB SERVER
192.168.2.3
Chain Action
NAT (Port Mapping)
Didiet Kusumadihardja - didiet@arch.web.id
33
Add Additional NAT for Bait
Web Server
192.168.2.3 Fake Server
(Honey Pot)
192.168.2.4
Didiet Kusumadihardja - didiet@arch.web.id
34
Chain Action
Fake Server at your Server Farm Network
Only one legitimate
server
Others are Fake Server
Didiet Kusumadihardja - didiet@arch.web.id
35
Another Example
Web Server
192.168.2.3
Fake Server
(Honey Pot)
192.168.2.4
Didiet Kusumadihardja - didiet@arch.web.id
36
Chain Action
Combine with Honey Pot
Didiet Kusumadihardja - didiet@arch.web.id
37
KFSensor
Others HoneyPot: Honeyd, Kippo, Dionaea, Nepenthes
What Hacker See (NMAP)
Before After
Didiet Kusumadihardja - didiet@arch.web.id
38
Nmap / Zenmap
What Hacker See (SoftPerfect NetScan)
Before After
Didiet Kusumadihardja - didiet@arch.web.id
39
SoftPerfect Network Scanner
I don’t want to use HoneyPot
Didiet Kusumadihardja - didiet@arch.web.id
40
Step 1: Chain
Step 2: Action
What we see, If someone PING
Didiet Kusumadihardja - didiet@arch.web.id
41
SRC-MAC ADDRESS
SRC-IP ADDRESS
What we see, If someone NMAP
Didiet Kusumadihardja - didiet@arch.web.id
42
Mikrotik LOG:
The Dude, Hotspot & Userman
Didiet Kusumadihardja - didiet@arch.web.id
43
IP Address  MAC Address  User ID  Person
Use Case 1
Didiet Kusumadihardja - didiet@arch.web.id
44
Internet Café
(WARNET)
University
Office
Insider Threat
Use Case 2
Didiet Kusumadihardja - didiet@arch.web.id
45
Analytics
For Fun
Learn hacking method
from hacker / script kiddies
Research
http://public.honeynet.id
(Low Interaction Honeypot)
(High Interaction Honeypot)
Thank you
.
.
Question?
DIDIET
KUSUMADIHARDJA
didiet@arch.web.id
http://didiet.arch.web.id/
https://www.facebook.com/ArchNetID/
Didiet Kusumadihardja - didiet@arch.web.id
46

More Related Content

PDF
MikroTik Security
PDF
Mikro tik advanced training
PDF
Mikrotik Bridge Deep Dive
PDF
MikroTik Firewall : Securing your Router with Port Knocking
PDF
BGP on mikrotik
PDF
MPLS on Router OS V7 - Part 2
PDF
VLAN on mikrotik
PDF
Ccnp workbook network bulls
MikroTik Security
Mikro tik advanced training
Mikrotik Bridge Deep Dive
MikroTik Firewall : Securing your Router with Port Knocking
BGP on mikrotik
MPLS on Router OS V7 - Part 2
VLAN on mikrotik
Ccnp workbook network bulls

What's hot (20)

PPTX
MikroTik MTCNA
PPT
Chap 10 igmp
PDF
IPv6 with Mikrotik
PDF
Mikrotik firewall mangle
PDF
Using Mikrotik Switch Features to Improve Your Network
PPTX
ccna networking ppt
PDF
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
PDF
Mikrotik Load Balancing with PCC
PPTX
IP Multicasting
PDF
Mikrotik Hotspot
PDF
Mikrotik router os qos best practice
PDF
Difference b/w STP RSTP PVST & MSTP
DOC
Basic command to configure mikrotik
PDF
Mikrotik fasttrack
PPTX
Routing Protocols and Concepts - Chapter 1
PDF
ISP Load Balancing with Mikrotik ECMP
PDF
How BGP Works
PDF
MikroTik Multicast Routing [www.imxpert.co]
PPTX
CCNA PPT
PDF
Network LACP/Bonding/Teaming with Mikrotik
MikroTik MTCNA
Chap 10 igmp
IPv6 with Mikrotik
Mikrotik firewall mangle
Using Mikrotik Switch Features to Improve Your Network
ccna networking ppt
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Mikrotik Load Balancing with PCC
IP Multicasting
Mikrotik Hotspot
Mikrotik router os qos best practice
Difference b/w STP RSTP PVST & MSTP
Basic command to configure mikrotik
Mikrotik fasttrack
Routing Protocols and Concepts - Chapter 1
ISP Load Balancing with Mikrotik ECMP
How BGP Works
MikroTik Multicast Routing [www.imxpert.co]
CCNA PPT
Network LACP/Bonding/Teaming with Mikrotik
Ad

Viewers also liked (20)

PDF
CAPsMANv2 | Wireless APs Controller by MikroTik
PDF
Detecting network virus using mikrotik
PDF
Mikrotik Network Simulator (MUM Presentation Material 2013)
PDF
Wireless Project Using CAPsMAN
PDF
MUM Madrid 2016 - Mikrotik y Suricata
PDF
Hotspot on Mikrotik Router
PDF
Mikrotik Hotspot User Manager
PDF
Using mikrotik with radius
PDF
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
PDF
Network Monitoring System
PDF
(Mikrotik)MTCNA presentation Material-IDN
PDF
MikroTik BGP Security - MUM 2014 (rofiq fauzi)
PPTX
Trabajo Practico Nº 1.IFTS Nº1.
PDF
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
PPTX
Gerência fácil com RoMON
PDF
AfterGlow
PPTX
Mikrotik
PPTX
Microsoft Office356 - prezentacja mozliwosci
PPTX
mikrotik
PDF
Choosing MikroTik for Your Network
CAPsMANv2 | Wireless APs Controller by MikroTik
Detecting network virus using mikrotik
Mikrotik Network Simulator (MUM Presentation Material 2013)
Wireless Project Using CAPsMAN
MUM Madrid 2016 - Mikrotik y Suricata
Hotspot on Mikrotik Router
Mikrotik Hotspot User Manager
Using mikrotik with radius
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
Network Monitoring System
(Mikrotik)MTCNA presentation Material-IDN
MikroTik BGP Security - MUM 2014 (rofiq fauzi)
Trabajo Practico Nº 1.IFTS Nº1.
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Gerência fácil com RoMON
AfterGlow
Mikrotik
Microsoft Office356 - prezentacja mozliwosci
mikrotik
Choosing MikroTik for Your Network
Ad

Similar to Fools your enemy with MikroTik (20)

PPTX
Introduction to ThousandEyes
PDF
Access RouterOS using Multi-Factor Authentication
PDF
BRKSEC-2288.pdf
PDF
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
PPTX
Introduction To ThousandEyes
PPTX
CyberSecurityAwarenessPresentation2024.09.pptx
PPTX
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
PPTX
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
PPTX
EMEA Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
PPTX
December Patch Tuesday 2020
PPTX
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
DOC
Ketan H Murudkar
PDF
Advanced Security on Kubernetes with Istio
DOCX
PDF
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
PPTX
Itn instructor ppt_chapter1 exploring the network smartskills
PDF
Cisco @ Conference Board of Canada: Connecting Education with the 21st century
DOC
CV_Nitin
PDF
Andrea Zwirner - Magento security and hardening strategies
DOC
UTHAYAKUMAR RESUME
Introduction to ThousandEyes
Access RouterOS using Multi-Factor Authentication
BRKSEC-2288.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
Introduction To ThousandEyes
CyberSecurityAwarenessPresentation2024.09.pptx
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
EMEA Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
December Patch Tuesday 2020
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
Ketan H Murudkar
Advanced Security on Kubernetes with Istio
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
Itn instructor ppt_chapter1 exploring the network smartskills
Cisco @ Conference Board of Canada: Connecting Education with the 21st century
CV_Nitin
Andrea Zwirner - Magento security and hardening strategies
UTHAYAKUMAR RESUME

More from Didiet Kusumadihardja (6)

PDF
Didiet Cybersecurity Consultant Portfolio - English
PDF
Manajemen wireless rogue
PDF
Personally identifiable information
PDF
Adequate password policy
PDF
Notifikasi penggunaan sistem
PDF
Didiet Cyber Security Consultant Portfolio - Bahasa Indonesia
Didiet Cybersecurity Consultant Portfolio - English
Manajemen wireless rogue
Personally identifiable information
Adequate password policy
Notifikasi penggunaan sistem
Didiet Cyber Security Consultant Portfolio - Bahasa Indonesia

Recently uploaded (20)

PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
PDF
Introduction to the IoT system, how the IoT system works
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PPTX
Database Information System - Management Information System
PDF
simpleintnettestmetiaerl for the simple testint
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PPTX
E -tech empowerment technologies PowerPoint
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPTX
Funds Management Learning Material for Beg
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PDF
The Evolution of Traditional to New Media .pdf
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Design_with_Watersergyerge45hrbgre4top (1).ppt
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
newyork.pptxirantrafgshenepalchinachinane
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
Introduction to the IoT system, how the IoT system works
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Database Information System - Management Information System
simpleintnettestmetiaerl for the simple testint
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
E -tech empowerment technologies PowerPoint
The New Creative Director: How AI Tools for Social Media Content Creation Are...
SAP Ariba Sourcing PPT for learning material
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
artificialintelligenceai1-copy-210604123353.pptx
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Funds Management Learning Material for Beg
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
The Evolution of Traditional to New Media .pdf
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION

Fools your enemy with MikroTik

Editor's Notes

  • #2: GREETINGS!