当前位置:网站首页>[network security] sharing of experience and ideas of an emergency battle
[network security] sharing of experience and ideas of an emergency battle
2022-06-25 06:14:00 【It old culvert】

Preface
The following data have been desensitized , Chat records will not be screenshot , Just share experiences and ideas , This is a very interesting investigation
Confirm the situation , Gather information
Read the chat records , The customer's network is through EOC Device management terminal , About one or two thousand . Then in the early morning every day, hundreds of machines are out of control , Resume after restart , The address remains the same . Suspected of being attacked , There are a lot of in the inclusion arp package , My colleagues suspect that arp Deceptive attack .
There are four traffic packets , The volume is not small . I asked where I got it , The customer replied : Caught on a port .

Confirm the information
Open the four bags and see what happens , All the good guys are yellow , All are arp package .

With some other bags ,LLDP、DHCPv4,IGMPv3,ssdp,ICMP v6



Some strange messages have been found here , Namely dhcp and arp Of . There are some problems with the structure of the two .


Protocol analysis
The investigation is still difficult , Because the customer only gave this thing , In addition, I propose that in order to prevent proliferation hazards, it is not allowed to temporarily cut off the network of the off-line host . Then we can only analyze whether there is a problem with the message structure .
Extract keywords : Capture packets from a certain port , a large number of arp package , Anomalous dhcp package ,netbios agreement ,ssdp Fields in the package .
Network topology analysis
Asked the customer for a topology map , For analysis , The customer gave a very simple hand painting , For the sake of secrecy, I simplified it a little more .

In Topology , You can know , In fact, the network is not complicated , The attacker should not directly take down the core switch or domain controller . And because the network is huge , Thousands of hosts , It is impossible for O & m not to write sniffing function .
DHCP Sniffing can effectively prevent dhcp offer message , To prevent forgery DHCP The purpose of the server to provide false services to the terminal . Once enabled, you need to manually specify the trust port .
Actually , I guess the customer just wants to express how they manage the following host groups .
Exception field analysis
1.arp message
Let's take a look at normal arp The structure of the message :

ARP The structure of the message is simple , There are only request and response packets .
ARP The principle of deception : The attacker sniffs first ARP package , Then steal a host's mac Address , Stream data to the attacker's host .

Let's look at the... In the bag arp message :
There are three main equipment reissues H equipment 、J equipment 、TP equipment .

The only exception is J On the device ARP message , It is very simple , We use the dialogue of the little shark to filter , Filter out all about J equipment ARP message .

The exception is Trailer On this field , Because it's normal ARP The message uses Padding Field instead of all 0 fill .
trailer Field is used when the bytes are excessive , Carrying excess bytes , Non zero filling occurs .
however , After a long time of screening , No obvious signs of attack : Are meaningless bytes . It's not like arp Deceptive attack , Thought no entrance had been broken through .



2.dhcp message
The message with problems in the traffic packet is dhcp discover message , This message is used to request the address , Because it doesn't know dhcp sever So use the full address 0 To request .
Here is a prompt for a moment little endian code , This situation is caused by the disorder of high and low potentials .

So this is actually where , I have told my colleagues , this 7 It's a network problem , As for what the network problem is, I can't say it for a while . Next, I will analyze what I am not sure 3 Where is Cheng .
3. Messages of other protocols
It was also later , I'm going to write a report , Then the customer 1 A few more bags came at halfpastten , It is a package captured in a short time after restart and recovery . I got up and analyzed again .
Take a look at other findings , These findings were bounced back by the customer , It's OK .
stay SSDP In the message , Found fields that seem to be connected to the outside :

Then the host name and the domain controller are found in other messages , Spicy is frightening me , Domain control is k It fell off ???
Customer : That's a machine for grabbing bags , Don't worry .



Conclusion
This is not really a problem of cyber attacks , The above is what I wrote after sorting out my thoughts , In case of emergency, I think with the idea of network security , In fact, from the perspective of network workers , The answer is obvious .
First, let's review the topology :

classical OLT Building networks , Drag it down ONU Equipment management .ONU The device is an optical network unit device , Generally, the installation includes Optical receiver 、 Uplink optical transmitter 、 Multiple The bridge The device monitored by the amplifier network is called an optical node .PON Use a single fiber to connect to OLT, then OLT Connect to ONU.
And then look at it DHCP message , There is a short time little endian code ; At the same time ARP In the message , Meaningless extra byte padding occurs .
There's only one conclusion ONU There's something wrong with the equipment , The optical fiber or optical module is damaged , Cause data transfer failure . From the above analysis ,dhcp discover The package is unresponsive ,arp The package construct is also complete . Appear many times at the same time igmp The application message of adding and leaving groups is not responded . The conclusion is : Because there is a problem with optical signal transmission , This led to the disconnection of one of the following mainframes , Not a cyber attack .
边栏推荐
- MySQL uses the where condition to find strange results: solve
- What elements are indispensable for the development of the character? What are the stages
- Technology inventory: past, present and future of Message Oriented Middleware
- Gavin's insight on transformer live class - line by line analysis and field experiment analysis of insurance BOT microservice code of insurance industry in the actual combat of Rasa dialogue robot pro
- Research Report on demand and Competitive Prospect of global and Chinese welding personal protective equipment industry 2022-2027
- SAP ui5 beginner tutorial No. 28 - Introduction to the integration test tool OPA for SAP ui5 applications
- SAP ui5 tutorial for beginners part XXVI - detailed steps for using OData service with mock server trial version
- Mongodb basic concept learning - set
- Analysis report on production and sales demand and sales prospect of global and Chinese phosphating solution Market 2022-2028
- SAP ui5 beginner tutorial 25 - using proxy server to solve the cross domain problem of SAP ui5 application accessing remote OData service trial version
猜你喜欢

Pre knowledge of asynchronous operation
Wind farm visualization: wind farm data
SAP ui5 Application Development Tutorial Part 30 - parameter transfer in the routing process of SAP ui5
SAP ui5 date type sap ui. model. type. Analysis of date parsing format
Linus' speech recordings, which were lost in 1994, were made public

【LeetCode】40. Combined summation II (2 strokes of wrong questions)
Vscode voice notes to enrich information (Part 1)
SAP ui5 beginner tutorial No. 28 - Introduction to the integration test tool OPA for SAP ui5 applications
Introduction to sap ui5 tools

Invalid bound statement (not found)
随机推荐
Click to send text messages without response is a common problem for many users in building the elegant grass Dragonfly Q system - solve the problem of clicking to send text messages without response
Global and China financial guarantee marketing strategy and channel dynamic construction report 2022
Research Report on marketing channel analysis and competitive strategy of China's polycarbonate industry 2022
Day21 performance test process
Tablespace free space
RT thread i/o device model and layering
Analysis report on investment and financing status and operation benefits of global and Chinese dental industry (2022 Edition)
SAP ui5 date type sap ui. model. type. Analysis of date parsing format
[open source sharing] deeply study KVM, CEPH, fuse features, including open source projects, code cases, articles, videos, architecture brain maps, etc
Gavin's insight on transformer live class - line by line analysis and field experiment analysis of insurance BOT microservice code of insurance industry in the actual combat of Rasa dialogue robot pro
Introduction to MySQL test run test framework
Optimal Parking
Rhcsa--- day 6 operation
Differences and connections between sap ui5 and openui5
JS implementation mouse can achieve the effect of left and right scrolling
MySQL tuning --01--- optimization steps and system performance parameters
Mount command - file system mount
Socket, network model notes
Global and Chinese medical protective clothing market supply and demand research and investment value proposal report 2022-2028
Go quiz: considerations for function naming return value from the go interview question (more than 80% of people answered wrong)