Cahier groupe n°5 : Différence entre versions

De Wiki d'activités IMA
(Session 5 (12/11/2015))
m (Useful information)
Ligne 7 : Ligne 7 :
 
:  
 
:  
 
; Wifi hotspot
 
; Wifi hotspot
: Name -  
+
: Name - Troubadour
: address - '''172.26.79.11'''<br/>
+
: Address (first part) - '''172.26.79.11'''<br/>
: Sub-network address - '''10.10.10.2'''<br/>
+
: Address (second part) - '''10.10.10.2'''<br/>
  
 
; Website
 
; Website
: address : [http://troubadour.lol/ troubadour.lol]
+
: HTTP Address : [http://troubadour.lol/]
:
+
: HTTPS Address : [https://troubadour.lol/]
  
 
== Specification of the specific task ==
 
== Specification of the specific task ==

Version du 3 décembre 2015 à 09:18

Useful information

Gabriel Pagola Nielsen & Jérémie Denéchaud

Xen Vitural Machine
Name - troubadour
Address - 193.48.57.165
Wifi hotspot
Name - Troubadour
Address (first part) - 172.26.79.11
Address (second part) - 10.10.10.2
Website
HTTP Address : [1]
HTTPS Address : [2]

Specification of the specific task

Presentation of the particular task

The specific task consist in configuring one of the two wifi access point (AP). Those APs are connected to the Cisco Catalyst 6009 switches to provide further redundancy.

Hardware used for the particular task

We use a Cisco Aironet 2600 wifi access point.

Cisco Aironet 2600 access point

Progress

Particular task - PART 1
Configuration of the wifi AP
Route through Polytech gateway (172.26.79.254)
MAC address filtering on half the eeePC
Tests
Particular task PART 2
Route through local gateway (10.10.10.254)
Telnet accessibility
Configuration of the xen VM
Creation & installation of packages
SSH accessibility
Wifi WEP crack
Wifi WPA crack
Buying troubadour.lol domain name
DNS - Bind configuration
SSL Certificate
DNSSEC

Progress monitoring

Session 1 (01/10/2015)

Steps to follow :

  • Connecting via serial link to the Cisco Aironet 2600
  • Adapting the configuration for insecure network
  • Accessing the hotspot via ethernet
  • Using the web interface to configure mac address filtering

Session 2 (08/10/2015)

  • Configuration of the Wifi AP
minicom -os //9600 bauds
en
config
interface BVI 1
ip address 172.26.79.11 255.255.240.0
end
write
  • Using the web interface to configure mac address filtering (root:Cisco)
  • Different tests to enable mac filtering
    • Unknown problem that lead to the reset of the Access point

Session 3 (15/10/2015)

  • Reset of the Access point
  • Mac address filtering working correctly
  • Creation of the AP (SSID = "troubadour")
  • Filtering half of the eeePC
  • Penetration test by MAC spoof from an eeePC :
ifconfig wlan0 hw ether XX:XX:XX:XX:XX:XX

Session 4 (22/10/2015)

  • Creation of the virtual drives
  • Configuration of the xen virtual machine "troubadour"
xen-create-image --hostname=troubadour --ip=193.48.57.165 --netmask=255.255.255.240 --gateway=193.48.57.174 --dir=/usr/local/xen 
--mirror=http://debian.polytech-lille.fr/debian/ --dist=jessie --passwd

Session 5 (12/11/2015)

  • Successful wifi WEP encryption crack
  • SSH accessibility of the VM.
WEP Encryption crack

Session 6 (19/11/2015)

  • Wifi WPA encryption crack attempt almost successful
  • Cap file & handshake captured
  • dictionnary created with the powerful command crunch:
crunch 8 8 -o wl.txt -t %%%%%%%%
  • Problems with apt-get to download aircrack on tutur



Session 7 (25/11/2015)

Crack of the WPA key
  • Aircrack of the previously captured cap file
  • Successful WPA crack
  • Configuration of the wifi hotspot for the local network
ip default-gateway 10.10.10.254
  • Telnet accessibility from a VM
  • Configuration of the DNS server following this tutorial
  • Beginning of SSL configuration while Gandi processes the DNS change
DNS analyse by digicert.com
  • Successful DNS configuration :


Bind is correctly feeding the domain name



Session 8 (26/11/2015)

Firefox is happy, the connexion is secured
  • End of SSL certification following this tutorial
  • Fixing a conflict in /etc/apache2/ports.conf
    • Apache2 would not restart because of an already-listened-to 443 port
    • The port 443 was listened by a previous module
    • All other modules listenning to 443 port were commented out
  • Successful SSL configuration for www.troubadour.lol and troubadour.lol
Results on the different test of zonemaster.com
  • Fixing a bug on the IPv6 address, causing the DNSSEC to fail
    • TCP and UDP transit didn't seem to work
    • Port 53 seemed closed (according to zonemaster.com
    • A full rebuild of Bind worked