SlideShare a Scribd company logo
or
How to Find SD-WANs and not to Lose
Yourself
Denis Kolegov
Oleg Broslavsky
Anton Nikolaev
SD-WAN Internet Census, Zeronighst 2018
Not (really) so long time ago,
we decide to start a big SD-WAN
journey
SD-WAN
NewHope
SD-WAN Internet Census, Zeronighst 2018
“SD-WAN is perfectly safe for implementing wide-
area networks affordably, efficiently and securely.”
Perfectly safe?
Not exactly...
XSS
Client-side Authentication
?
! // TODO: fix in prod ?
OS Command Injection
OS Command Injection
Unfortunately, this talk is not about sophisticated hacking
techniques (cause you do not need them to hack SD-WAN)
This talk about how to find those
low-hanging fruits on the Internet?
The Main Questions
• How many SD-WAN nodes on the Internet?
• Do we need new techniques to scan
and fingerprint them?
• How to find vulnerable SD-WAN nodes?
Approach
Best EffortWhen you have to underline the best effort approach but
you don’t know exactly how to
But nevertheless,
let’s start!
SD-WAN Essence
or
That Boring Part of Slides Again
SD-WAN Internet Census, Zeronighst 2018
F*ck that shit! We are hackers!
Just kidding.
We need it for understanding.
Traditional WAN vs
Software-defined WAN
SD-WAN Internet Census, Zeronighst 2018
Search Engines
Straightforward
Examples
More Sophisticated
Examples
Query Correction
html:Sonus
+ title:
"SBC Management
Application"
More Query Correction!
We can use
corrections to
build full
product map!
https://github.com/sdnewhop/sdwannewhope/issues/7
Query Confidence
Firm CertainTentative
SD-WAN Internet Census, Zeronighst 2018
Version Leakage
Version Leakage Patterns
How to Find Them All?
Let’s help Dora!
We have a
leakage!
We have a
NMAP!
Pen Pineapple Apple
SD-WAN
Infiltrator!
SD-WAN Infiltrator
SD-WAN Internet Census, Zeronighst 2018
What About Really Hard
Cases?
Easy Peasy Lemon Squeezy?
Difficult Difficult Lemon Difficult!
SSH Fingerprinting
SD-WAN version in
/etc/issue message
masscan
our
banner
zgrab
/sdnewhop/zgrab2
/nmap/nmap/issues/1389
Websocket
• Nmap can’t scan Websocket
• No standard NSE Websocket
libraries
• Weird behavior in custom
NSE Websocket libraries
Indirect Version Leakage
Stop! What about Internet
scanning?
SD-WAN Internet Census, Zeronighst 2018
You should scan
all Internet using
masscan
-Johny, Johny?
-Yes, papa
-Scanning Internet?
-No, papa
-Telling lies?
-No, papa
> well you kinda killed the entire Tomtech network..
> literally everything is down.
> so looks like I can’t help you with servers anymore, sorry.
SD-WAN Internet Census, Zeronighst 2018
SD-WAN Harvester
SD-WAN Harvester
Workflow
Find
SD-WANs
Grab
versions
Run NSE Frontend
Get
results
Results
SD-WAN Map
Top of founded SD-WAN
Vendors
Top of founded SD-WAN
Solutions
Top SD-WAN
Vulnerabilities
Harvester Charts
But seriously, harvester can
build next pie charts by:
• vulnerabilities
• vendors
• products
• countries
• continents
https://github.com/sdnewhop/sdwan-
harvester/tree/master/samples
SD-WAN Internet Census, Zeronighst 2018
Conclusions
• Many different vendors
and related products
have been found
• Most products are
susceptible to version
leakage
• More often products are
leaky and vulnerable
SD-WAN New Hope
https://github.com/sdnewhop/
• Sergey Gordeychik
• Denis Kolegov
• Oleg Broslavsky
• Max Gorbunov
• Nikita Oleksov
• Nikolay Tkachenko
• Anton Nikolaev
• SD-WAN Internet Census
• SD-WAN Harvester
• SD-WAN Infiltrator
• SD-WAN Threat Landscape
THANKS FOR ATTENTION
@dnkolegov
@yalegko
@manmoleculo

More Related Content

PDF
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
PPTX
Root via sms. 4G security assessment
PDF
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
PDF
D1 t1 t. yunusov k. nesterov - bootkit via sms
PPTX
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
PDF
How to hide your browser 0-days
PPT
[ENG] IPv6 shipworm + My little Windows domain pwnie
PDF
How to hack a telecom and stay alive
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Root via sms. 4G security assessment
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
D1 t1 t. yunusov k. nesterov - bootkit via sms
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
How to hide your browser 0-days
[ENG] IPv6 shipworm + My little Windows domain pwnie
How to hack a telecom and stay alive

What's hot (20)

PDF
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
PPTX
Ransomware - what is it, how to protect against it
PDF
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
PDF
Cumulonimbus fortification-secure-your-data-in-the-cloud
PDF
PPTX
BSides London 2015 - Proprietary network protocols - risky business on the wire.
PPTX
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
PDF
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
PPT
Denis Baranov: Root via XSS
ODP
PLMCE - Security and why you need to review yours
PDF
Defcon 22-jesus-molina-learn-how-to-control-every-room
PPTX
How to hide your browser 0-day @ Disobey
PDF
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
ODP
Security its-more-than-just-your-database-you-should-worry-about
PDF
Challenges Building Secure Mobile Applications
PDF
BalCCon2k18 - Towards the perfect cryptocurrency wallet
PDF
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
PDF
Threat Con 2021: What's Hitting my Honeypots
PDF
Adventures in Femtoland: 350 Yuan for Invaluable Fun
PPTX
Reverse Engineering the TomTom Runner pt. 1
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
Ransomware - what is it, how to protect against it
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Cumulonimbus fortification-secure-your-data-in-the-cloud
BSides London 2015 - Proprietary network protocols - risky business on the wire.
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
Denis Baranov: Root via XSS
PLMCE - Security and why you need to review yours
Defcon 22-jesus-molina-learn-how-to-control-every-room
How to hide your browser 0-day @ Disobey
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
Security its-more-than-just-your-database-you-should-worry-about
Challenges Building Secure Mobile Applications
BalCCon2k18 - Towards the perfect cryptocurrency wallet
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
Threat Con 2021: What's Hitting my Honeypots
Adventures in Femtoland: 350 Yuan for Invaluable Fun
Reverse Engineering the TomTom Runner pt. 1
Ad

Similar to SD-WAN Internet Census, Zeronighst 2018 (20)

PDF
Securing Rails
PDF
Going mobile - tip, tricks and tools for building mobile web-apps
DOCX
Streaming Media Player
PDF
Sensepost assessment automation
PDF
Building Droids with JavaScript
PDF
Hacklu2011 tricaud
PDF
Beyond The Padlock: New Ideas in Browser Security UI
PDF
Єгор Попович, CTO @Tesseract, (Lviv, Ukraine) "Blockchain user: myth or reali...
PDF
Cracking Wep And Wpa Wireless Networks
PDF
Ultimate Guide to Setup DarkComet with NoIP
DOCX
Step by Step on How to Setup DarkComet
PDF
Atlassian - Software For Every Team
PDF
Java Tools and Techniques for Solving Tricky Problem
PDF
Puppet for SysAdmins
PPT
Dmk blackops2006 ccc
PDF
Puppet@Citygrid - Julien Rottenberg - PuppetCamp LA '12
PPT
Web Application Hacking
PDF
7 New Tools Java Developers Should Know
PDF
Os Nightingale
PDF
Alex jeff presentation_final_2
Securing Rails
Going mobile - tip, tricks and tools for building mobile web-apps
Streaming Media Player
Sensepost assessment automation
Building Droids with JavaScript
Hacklu2011 tricaud
Beyond The Padlock: New Ideas in Browser Security UI
Єгор Попович, CTO @Tesseract, (Lviv, Ukraine) "Blockchain user: myth or reali...
Cracking Wep And Wpa Wireless Networks
Ultimate Guide to Setup DarkComet with NoIP
Step by Step on How to Setup DarkComet
Atlassian - Software For Every Team
Java Tools and Techniques for Solving Tricky Problem
Puppet for SysAdmins
Dmk blackops2006 ccc
Puppet@Citygrid - Julien Rottenberg - PuppetCamp LA '12
Web Application Hacking
7 New Tools Java Developers Should Know
Os Nightingale
Alex jeff presentation_final_2
Ad

More from Sergey Gordeychik (10)

PPTX
Vulnerabilities of machine learning infrastructure
PDF
MALIGN MACHINE LEARNING MODELS
PDF
AI for security or security for AI - Sergey Gordeychik
PDF
Practical analysis of the cybersecurity of European smart grids
PDF
Too soft[ware defined] networks SD-Wan vulnerability assessment
PPTX
Recon: Hopeless relay protection for substation automation
PDF
The Great Train Robbery: Fast and Furious
PDF
Cybersecurity Assessment of Communication-Based Train Control systems
PDF
Greater China Cyber Threat Landscape - ISC 2016
PDF
SCADA StrangeLove Practical security assessment of European Smartgrid
Vulnerabilities of machine learning infrastructure
MALIGN MACHINE LEARNING MODELS
AI for security or security for AI - Sergey Gordeychik
Practical analysis of the cybersecurity of European smart grids
Too soft[ware defined] networks SD-Wan vulnerability assessment
Recon: Hopeless relay protection for substation automation
The Great Train Robbery: Fast and Furious
Cybersecurity Assessment of Communication-Based Train Control systems
Greater China Cyber Threat Landscape - ISC 2016
SCADA StrangeLove Practical security assessment of European Smartgrid

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Electronic commerce courselecture one. Pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Cloud computing and distributed systems.
PPT
Teaching material agriculture food technology
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Empathic Computing: Creating Shared Understanding
Dropbox Q2 2025 Financial Results & Investor Presentation
Diabetes mellitus diagnosis method based random forest with bat algorithm
Electronic commerce courselecture one. Pdf
NewMind AI Monthly Chronicles - July 2025
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Review of recent advances in non-invasive hemoglobin estimation
Cloud computing and distributed systems.
Teaching material agriculture food technology
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Spectral efficient network and resource selection model in 5G networks
Encapsulation_ Review paper, used for researhc scholars
Advanced methodologies resolving dimensionality complications for autism neur...
MYSQL Presentation for SQL database connectivity
Chapter 3 Spatial Domain Image Processing.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Empathic Computing: Creating Shared Understanding

SD-WAN Internet Census, Zeronighst 2018