I will talk about brute force awareness in VPN products and about essential information that you should collect when accessing these products and how this information is important for you to better understand your position on the network. In this last part I will use as an example an environmental solutions company that is using CISCO ASA products to access the internal network.
This article will be divided into two parts
As we know, there are several manufacturers on the market that offer hardware with VPN support for a direct channel into internal corporate or non-corporate networks. Example solutions:
But these are not the only ways to set up a VPN between two networks. More advanced home routers also support VPN. I don't see any great advantage in attacking these, because they are rarely found in business environments, I don't see the value in the profitable pursuit. These are some manufacturers:
Asus, tp-link, netgear, linksys, keenetic.
Returning to the large manufacturers mentioned as the first example, what these products have in common is the possibility of connecting to services generally enabled for remote management, for example SSH, TELNET, WEB Portal and FTP. Although brute force tools exist for these products, many only work by attacking the web portal that these services have. But what to do when the WEB service is not available? As you know, if we have other services running, we can attack from those services. Another point about brute force tools: many limit you to testing just one host. We explore what is vulnerable, so it is not feasible to attack just one host for initial access. In this case when you want to test multiple hosts. So what you should do is test using a specific port for remote access. With this you will be able to test different hosts using common tools, such as the MSF module.
As you noticed, the default username and password as shown in the image above was tested first. To avoid wasting time, you can specify the default username and password to be tested first, if found, brute force will stop testing new users and passwords, and you already have a valid username and password to connect , but this is optional.
In short, if you are interested in brute force testing a product, know that the WEB service is not the only way to do this. You may think this because some tools will only work based on the WEB service.
For each product there is information to be collected, this information can help you proceed in the post-exploitation phase and show how you can be seen from an access point of view. I will show you, in this example we will connect to the CISCO VPN, from the Cisco ASA line. The target will be:
From this point, the first thing to do is list the routes that we can attack, this can be done using the route print -4 command, but this will only be useful to know what the IPv4 range format is. This way we can do a ping scan to discover new routes.
Route format consulted with the route print -4 command
Although we can use the route print command to obtain the routes, the result can be confusing. Therefore, I recommend using Nirsoft's NetRouteView for this functionality.
Download: Для просмотра ссылки ВойдиилиЗарегистрируйся
We discovered 4 routes to attack, but not all routes have active hosts, the 192.168.40.0/24 route only has the gateway, we will focus on the 192.168.3.0/24 route where it has several hosts. I will use NETSCAN to scan, you can use any one you prefer.