hacktricks/network-services-pentesting/49-pentesting-tacacs+.md

80 lines
4.8 KiB
Markdown
Raw Normal View History

2022-09-30 10:27:15 +00:00
# 49 - Pentesting TACACS+
{% hint style="success" %}
Learn & practice AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
Learn & practice GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
2022-09-30 10:27:15 +00:00
<details>
2022-09-30 10:27:15 +00:00
<summary>Support HackTricks</summary>
2024-01-03 10:43:38 +00:00
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
2022-09-30 10:27:15 +00:00
</details>
{% endhint %}
2022-09-30 10:27:15 +00:00
**Try Hard Security Group**
<figure><img src="/.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg" alt=""><figcaption></figcaption></figure>
{% embed url="https://discord.gg/tryhardsecurity" %}
***
2024-02-11 02:07:06 +00:00
## Basiese Inligting
2022-09-30 10:27:15 +00:00
Die **Terminal Access Controller Access Control System (TACACS)** protokol word gebruik om gebruikers wat probeer om toegang tot routers of Network Access Servers (NAS) te verkry, sentraal te valideer. Die opgegradeerde weergawe, **TACACS+**, skei die dienste in outentisering, magtiging en rekeningkunde (AAA).
2022-09-30 10:27:15 +00:00
```
PORT STATE SERVICE
49/tcp open tacacs
```
**Standaard poort:** 49
2022-09-30 10:27:15 +00:00
## Onderbreek Verifikasiesleutel
2022-09-30 10:27:15 +00:00
As die kliënt en TACACS-bediener kommunikasie deur 'n aanvaller onderbreek word, kan die **versleutelde verifikasiesleutel onderbreek word**. Die aanvaller kan dan 'n **lokale brute-force aanval teen die sleutel probeer sonder om in die logs opgemerk te word**. As die aanvaller daarin slaag om die sleutel te brute-force, verkry hy toegang tot die netwerktoerusting en kan die verkeer ontsleutel met behulp van gereedskap soos Wireshark.
2022-09-30 10:27:15 +00:00
2024-02-11 02:07:06 +00:00
### Uitvoering van 'n MitM-aanval
2022-09-30 10:27:15 +00:00
'n **ARP-spoofing-aanval kan gebruik word om 'n Man-in-the-Middle (MitM) aanval uit te voer**.
2022-09-30 10:27:15 +00:00
### Brute-forcing van die Sleutel
2022-09-30 10:27:15 +00:00
[Loki](https://c0decafe.de/svn/codename\_loki/trunk/) kan gebruik word om die sleutel te brute-force:
2022-09-30 10:27:15 +00:00
```
sudo loki_gtk.py
```
If the key is successfully **bruteforced** (**usually in MD5 encrypted format)**, **we can access the equipment and decrypt the TACACS-encrypted traffic.**
2022-09-30 10:27:15 +00:00
### Decrypting Traffic
Sodra die sleutel suksesvol gekraak is, is die volgende stap om die **TACACS-enkripteer verkeer te dekripteer**. Wireshark kan geënkripteerde TACACS-verkeer hanteer as die sleutel verskaf word. Deur die gedekripteerde verkeer te analiseer, kan inligting soos die **banner wat gebruik word en die gebruikersnaam van die admin** gebruiker verkry word.
2022-09-30 10:27:15 +00:00
Deur toegang te verkry tot die beheerpaneel van netwerktoerusting met die verkryde geloofsbriewe, kan die aanvaller beheer oor die netwerk uitoefen. Dit is belangrik om te noem dat hierdie aksies slegs vir opvoedkundige doeleindes is en nie sonder behoorlike magtiging gebruik moet word nie.
2022-09-30 10:27:15 +00:00
## References
2022-09-30 10:27:15 +00:00
2024-02-03 16:02:14 +00:00
* [https://medium.com/@in9uz/cisco-nightmare-pentesting-cisco-networks-like-a-devil-f4032eb437b9](https://medium.com/@in9uz/cisco-nightmare-pentesting-cisco-networks-like-a-devil-f4032eb437b9)
**Try Hard Security Group**
<figure><img src="/.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg" alt=""><figcaption></figcaption></figure>
{% embed url="https://discord.gg/tryhardsecurity" %}
2022-09-30 10:27:15 +00:00
{% hint style="success" %}
Learn & practice AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
Learn & practice GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
2022-09-30 10:27:15 +00:00
<details>
2022-09-30 10:27:15 +00:00
<summary>Support HackTricks</summary>
2024-01-03 10:43:38 +00:00
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
2022-09-30 10:27:15 +00:00
</details>
{% endhint %}