Cahier groupe n°5 : Différence entre versions

De Wiki d'activités IMA
(Session 5 (12/11/2015))
(Session 10 (04/01/2016))
 
(22 révisions intermédiaires par le même utilisateur non affichées)
Ligne 6 : Ligne 6 :
 
: Address - '''193.48.57.165'''<br/>
 
: Address - '''193.48.57.165'''<br/>
 
:  
 
:  
; Wifi hotspot
+
; WiFi hotspot - Particular task
: Name -  
+
: Name - Troubadour
: address - '''172.26.79.11'''<br/>
+
: Address (first part) - '''172.26.79.11'''<br/>
: Sub-network address - '''10.10.10.2'''<br/>
+
: Address (second part) - '''10.10.10.2'''<br/>
 +
: Username/password - Cisco/Cisco
  
 
; Website
 
; Website
: address : [http://troubadour.lol/ troubadour.lol]
+
: HTTP Address : [http://troubadour.lol/]
:
+
: HTTPS Address : [https://troubadour.lol/]
  
== Specification of the specific task ==
+
; Group WiFi hotspot
=== Presentation of the particular task  ===
+
: Username/password - user/toto
The specific task consist in configuring one of the two wifi access point (AP). Those APs are connected to the Cisco Catalyst 6009 switches to provide further redundancy.
 
=== Hardware used for the particular task  ===
 
We use a Cisco Aironet 2600 wifi access point.
 
[[Image:Product image large.jpg|thumb|Cisco Aironet 2600 access point]]
 
  
 
=== Progress ===
 
=== Progress ===
Ligne 37 : Ligne 34 :
 
; <span style="color: green;">Wifi WEP crack </span>
 
; <span style="color: green;">Wifi WEP crack </span>
 
; <span style="color: green;">Wifi WPA crack </span>
 
; <span style="color: green;">Wifi WPA crack </span>
;<span style="color: green;">Buying troubadour.lol domain name </span>
 
 
;<span style="color: green;">DNS - Bind configuration</span>
 
;<span style="color: green;">DNS - Bind configuration</span>
 +
: Buying troubadour.lol domain name and the certificate
 +
: Bind server, IPv4 and IPv6 configuration
 
;<span style="color: green;">SSL Certificate </span>
 
;<span style="color: green;">SSL Certificate </span>
;<span style="color: red;">DNSSEC</span>
+
;<span style="color: green;">DNSSEC</span>
 +
;<span style="color: orange;">RAID5</span>
 +
;<span style="color: red;">Crypted SD card</span>
 +
;<span style="color: green;">FreeRadius ID server configuration </span>
 +
;<span style="color: green;">WPA2-EAP-secured wifi network </span>
 +
;<span style="color: red;">PCBX configuration </span>
 +
 
 +
== Specification of the specific task ==
 +
=== Presentation of the particular task  ===
 +
The specific task consist in configuring one of the two wifi access point (AP). Those APs are connected to the Cisco Catalyst 6009 switches to provide further redundancy.
 +
=== Hardware used for the particular task  ===
 +
We use a Cisco Aironet 2600 wifi access point.
 +
[[Image:Product image large.jpg|thumb|Cisco Aironet 2600 access point]]
  
 
== Progress monitoring ==  
 
== Progress monitoring ==  
Ligne 68 : Ligne 78 :
 
* Creation of the AP (SSID = "troubadour")
 
* Creation of the AP (SSID = "troubadour")
 
* Filtering half of the eeePC
 
* Filtering half of the eeePC
 +
* Penetration test by MAC spoof from an eeePC :
 +
ifconfig wlan0 hw ether XX:XX:XX:XX:XX:XX
  
 
=== Session 4 (22/10/2015) ===
 
=== Session 4 (22/10/2015) ===
Ligne 78 : Ligne 90 :
 
* Successful wifi WEP encryption crack
 
* Successful wifi WEP encryption crack
 
* SSH accessibility of the VM.
 
* SSH accessibility of the VM.
[[Fichier:crack_wep_denech.jpg|150px|thumb|left|WEP Encryption crack]]
+
[[Fichier:crack_wep_denech.jpg|center|thumb|300px|WEP Encryption crack]]
<br/><br/>
 
  
 
=== Session 6 (19/11/2015) ===
 
=== Session 6 (19/11/2015) ===
Ligne 98 : Ligne 109 :
 
* Configuration of the DNS server following [https://wiki.gandi.net/fr/hosting/using-linux/tutorials/debian/bind this tutorial]
 
* Configuration of the DNS server following [https://wiki.gandi.net/fr/hosting/using-linux/tutorials/debian/bind this tutorial]
 
* Beginning of SSL configuration while Gandi processes the DNS change
 
* Beginning of SSL configuration while Gandi processes the DNS change
[[Fichier:dns2_denech.png|200px|thumb|DNS analyse by digicert.com]]
+
[[Fichier:dns2_denech.png|100px|thumb|DNS analyse by digicert.com]]
 
* Successful DNS configuration :
 
* Successful DNS configuration :
 
<br />
 
<br />
Ligne 106 : Ligne 117 :
  
 
=== Session 8 (26/11/2015) ===
 
=== Session 8 (26/11/2015) ===
[[Fichier:ssl2_denech.png|thumb|Firefox is happy, the connexion is secured]]
 
 
* End of SSL certification following [https://wiki.gandi.net/fr/hosting/using-linux/tutorials/ubuntu/ssl this tutorial]
 
* End of SSL certification following [https://wiki.gandi.net/fr/hosting/using-linux/tutorials/ubuntu/ssl this tutorial]
 
* Fixing a conflict in /etc/apache2/ports.conf
 
* Fixing a conflict in /etc/apache2/ports.conf
Ligne 113 : Ligne 123 :
 
** All other modules listenning to 443 port were commented out
 
** All other modules listenning to 443 port were commented out
 
* Successful SSL configuration for www.troubadour.lol and troubadour.lol
 
* Successful SSL configuration for www.troubadour.lol and troubadour.lol
[[Fichier:dnssec_denech.png|thumb|Results on the different test of zonemaster.com]]
+
 
 +
[[Fichier:ssl2_denech.png|thumb|300px|center|Firefox is happy, the connexion is secured]]
 +
 
 
* Fixing a bug on the IPv6 address, causing the DNSSEC to fail
 
* Fixing a bug on the IPv6 address, causing the DNSSEC to fail
 
** TCP and UDP transit didn't seem to work
 
** TCP and UDP transit didn't seem to work
** Port 53 seemed closed (according to [https://www.zonemaster.fr/test/9b93b0fe724c9298 zonemaster.com]
+
** Port 53 seemed closed (according to [https://www.zonemaster.fr/test/9b93b0fe724c9298 zonemaster.com])
** A full rebuild of Bind worked
+
** A correct rebuild of Bind worked
 +
 
 +
[[Fichier:dnssec_denech.png|thumb|300px|center|Results on the different test of zonemaster.com]]
 +
<br/><br/>
 +
 
 +
=== Session 9 (03/12/2015) ===
 +
[[Fichier:raid5_denech.png|thumb|right|RAID5 configuration]]
 +
* Configuration of the Radius server
 +
** New client, VLAN and user
 +
** PEAP encryption instead of MD5
 +
* RAID5 configuration
 +
[[Fichier:wifi_denech.png|thumb|left|WiFi interface connected to our hotspot]]
 +
<br/><br/><br/><br/><br/><br/><br/><br/>
 +
=== Session 10 (04/01/2016)===
 +
* Correction of errors on the raid5 drives
 +
** The drive mount sequence was wrong (Automatic mount of an non-existent raid drive)
 +
** Removing the mdadm deamon solved the problem
 +
** Only downside : the raid has to be configured on each reboot
 +
** Automatic "md127" appears
 +
mdadm --stop /dev/md127
 +
[  37.984366] md: md127 stopped.
 +
[  37.984382] md: unbind<xvdf>
 +
[  37.984388] md: export_rdev(xvdf)
 +
[  37.984420] md: unbind<xvdd>
 +
[  37.984425] md: export_rdev(xvdd)
 +
mdadm: stopped /dev/md127
 +
* This commands are mandatory for a correct detection of our raid on md0
 +
* Test with a file on the raid
 +
** Even with one disk less (here xvde) we can mount the raid and see its content
 +
 
 +
[[Fichier:Testraid5_jed.jpg|thumb|600px|center|Successful test of the RAID5 drives]]

Version actuelle datée du 4 janvier 2016 à 16:26

Useful information

Gabriel Pagola Nielsen & Jérémie Denéchaud

Xen Vitural Machine
Name - troubadour
Address - 193.48.57.165
WiFi hotspot - Particular task
Name - Troubadour
Address (first part) - 172.26.79.11
Address (second part) - 10.10.10.2
Username/password - Cisco/Cisco
Website
HTTP Address : [1]
HTTPS Address : [2]
Group WiFi hotspot
Username/password - user/toto

Progress

Particular task - PART 1
Configuration of the wifi AP
Route through Polytech gateway (172.26.79.254)
MAC address filtering on half the eeePC
Tests
Particular task PART 2
Route through local gateway (10.10.10.254)
Telnet accessibility
Configuration of the xen VM
Creation & installation of packages
SSH accessibility
Wifi WEP crack
Wifi WPA crack
DNS - Bind configuration
Buying troubadour.lol domain name and the certificate
Bind server, IPv4 and IPv6 configuration
SSL Certificate
DNSSEC
RAID5
Crypted SD card
FreeRadius ID server configuration
WPA2-EAP-secured wifi network
PCBX configuration

Specification of the specific task

Presentation of the particular task

The specific task consist in configuring one of the two wifi access point (AP). Those APs are connected to the Cisco Catalyst 6009 switches to provide further redundancy.

Hardware used for the particular task

We use a Cisco Aironet 2600 wifi access point.

Cisco Aironet 2600 access point

Progress monitoring

Session 1 (01/10/2015)

Steps to follow :

  • Connecting via serial link to the Cisco Aironet 2600
  • Adapting the configuration for insecure network
  • Accessing the hotspot via ethernet
  • Using the web interface to configure mac address filtering

Session 2 (08/10/2015)

  • Configuration of the Wifi AP
minicom -os //9600 bauds
en
config
interface BVI 1
ip address 172.26.79.11 255.255.240.0
end
write
  • Using the web interface to configure mac address filtering (root:Cisco)
  • Different tests to enable mac filtering
    • Unknown problem that lead to the reset of the Access point

Session 3 (15/10/2015)

  • Reset of the Access point
  • Mac address filtering working correctly
  • Creation of the AP (SSID = "troubadour")
  • Filtering half of the eeePC
  • Penetration test by MAC spoof from an eeePC :
ifconfig wlan0 hw ether XX:XX:XX:XX:XX:XX

Session 4 (22/10/2015)

  • Creation of the virtual drives
  • Configuration of the xen virtual machine "troubadour"
xen-create-image --hostname=troubadour --ip=193.48.57.165 --netmask=255.255.255.240 --gateway=193.48.57.174 --dir=/usr/local/xen 
--mirror=http://debian.polytech-lille.fr/debian/ --dist=jessie --passwd

Session 5 (12/11/2015)

  • Successful wifi WEP encryption crack
  • SSH accessibility of the VM.
WEP Encryption crack

Session 6 (19/11/2015)

  • Wifi WPA encryption crack attempt almost successful
  • Cap file & handshake captured
  • dictionnary created with the powerful command crunch:
crunch 8 8 -o wl.txt -t %%%%%%%%
  • Problems with apt-get to download aircrack on tutur



Session 7 (25/11/2015)

Crack of the WPA key
  • Aircrack of the previously captured cap file
  • Successful WPA crack
  • Configuration of the wifi hotspot for the local network
ip default-gateway 10.10.10.254
  • Telnet accessibility from a VM
  • Configuration of the DNS server following this tutorial
  • Beginning of SSL configuration while Gandi processes the DNS change
DNS analyse by digicert.com
  • Successful DNS configuration :


Bind is correctly feeding the domain name



Session 8 (26/11/2015)

  • End of SSL certification following this tutorial
  • Fixing a conflict in /etc/apache2/ports.conf
    • Apache2 would not restart because of an already-listened-to 443 port
    • The port 443 was listened by a previous module
    • All other modules listenning to 443 port were commented out
  • Successful SSL configuration for www.troubadour.lol and troubadour.lol
Firefox is happy, the connexion is secured
  • Fixing a bug on the IPv6 address, causing the DNSSEC to fail
    • TCP and UDP transit didn't seem to work
    • Port 53 seemed closed (according to zonemaster.com)
    • A correct rebuild of Bind worked
Results on the different test of zonemaster.com



Session 9 (03/12/2015)

RAID5 configuration
  • Configuration of the Radius server
    • New client, VLAN and user
    • PEAP encryption instead of MD5
  • RAID5 configuration
WiFi interface connected to our hotspot









Session 10 (04/01/2016)

  • Correction of errors on the raid5 drives
    • The drive mount sequence was wrong (Automatic mount of an non-existent raid drive)
    • Removing the mdadm deamon solved the problem
    • Only downside : the raid has to be configured on each reboot
    • Automatic "md127" appears
mdadm --stop /dev/md127
[   37.984366] md: md127 stopped.
[   37.984382] md: unbind<xvdf>
[   37.984388] md: export_rdev(xvdf)
[   37.984420] md: unbind<xvdd>
[   37.984425] md: export_rdev(xvdd)
mdadm: stopped /dev/md127
  • This commands are mandatory for a correct detection of our raid on md0
  • Test with a file on the raid
    • Even with one disk less (here xvde) we can mount the raid and see its content
Successful test of the RAID5 drives