Home page logo
/

nanog logo nanog mailing list archives

Re: Is my router owned? How would I know?
From: "Alexei Roudnev" <alex () relcom net>
Date: Sat, 14 Jan 2006 01:52:33 -0800


I use CCR (Cisco COnfiguration Repository, part of snmpstat project) and
have change reports daily, + have syslog reports hourly.
The same (osiris ) with hosts, btw.

----- Original Message ----- 
From: "Rob Thomas" <robt () cymru com>
To: "NANOG" <nanog () merit edu>
Sent: Thursday, January 12, 2006 10:19 AM
Subject: Is my router owned? How would I know?



Hi, NANOGers.

You all know how I love a good segue...  ;)

How can you tell if your router has been owned?  In general the
configuration will be modified.  This is why we advocate using rancid
(or something akin to it) as both a configuration backup tool AND an
early warning tool.  If you have a router running BGP, it also pays
to peer with it externally.  You can use a private ASN and rackspace
with a buddy.  You can use this peering to detect announcements you
don't expect or necessarily condone.

How else can you tell?  Here are some tips:

If there is a new user account, or if the enable and access passwords
have changed, look out!  The miscreants love to scan and find routers
with "cisco" as the access and enable passwords.  They know that
other miscreants are doing the same thing.  In fact this is even more
widespread thanks to a module found in rBot and rxBot.  Yes, even
bots are scanning for routers now.

If there are new or changed ACLs, look out!  The miscreants love to
use routers as IRC bounces.  To avoid detection by IRC server proxy
monitors, the miscreants will block access to the router (generally
all access, sometimes just TCP 23) from those proxy monitors using
ACLs.

If there are new or changed SNMP RW community strings, look out!
One of the tricks they employ is to leave a SNMP RW community
backdoor.  Is this to avoid the actions of we good folk?  No, it's
usually employed in the case where a compromised router is stolen
from one miscreant by another.

If the banner has changed, look out!  As with the ACLs, this is a
method by which the miscreants attempt to fool any proxy monitors.
The most common banner we see identifies the router as a FreeBSD
box.

If tunnels suddenly appear on the router, look out!  Chaining
together lots of routers is also common now.  This provides
obfuscation and sometimes encryption.

Most of the changes are based on templates.  Consider this bundled
clue, where the prowess of the template user isn't at all a factor.

Use the flows.  :)

Thanks,
Rob.
-- 
Rob Thomas
Team Cymru
http://www.cymru.com/
ASSERT(coffee != empty);



  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault