July 19, 2018

PCAP :: TACACS+ .PCAP File

(Last Updated On: 15th October 2017)

In this post, I would like to share a .PCAP file of a TACACS+ TCP stream. This file was captured in a lab environment and is for educational purposes only.

TACACS+ communication is encrypted by default so I have included the TACACS+ key so that you can see the decrypted information.

Download link: https://blog.synack.co.uk/download/pcap-tacacs-pcap-file/

Key: Cisco123

Let me explain a little about the capture…

  • We can see the initial TCP 3-way handshake occurs from a source of 10.1.1.1 with a destination port of 49 (TACACS+). The device starts by sending an SYN request to 10.1.1.10.
  • Device 10.1.1.10 responds with a source port of 49 to destination 10.1.1.1 with a TCP SYN-ACK
  • 10.1.1.1 receives the SYN-ACK and responds with an ACK

 

  • After the TCP 3-way handshake has finished, device 10.1.1.1 sends a TACACS+ authentication request. At this stage, you can use the key to decrypted and analyse the TACACS+ communication. We can see that a user: synack has sent a login authentication request to 10.1.1.10.
  • Device 10.1.1.10 sends an acknowledgement and then sends a TACACS+ packet back to 10.1.1.1. Once this TACACS+ message is decrypted we can see that the TACACS+ server has now asked for a password for user: synack.
  • Device 10.1.1.1 sends an acknowledgement to say that is has received the request for the password.
  • Device 10.1.1.1 then sends the password: Password1 back to the TACACS+ server
  • The TACACS+ server responds with an authentication passed. This means that the user: synack has now been authenticated
  • The TCP session is now torn down with the device 10.1.1.1 sending a FIN-ACK

 

Previous «
Next »

Security Solutions Consulting Engineer @ Cisco - CCNA R&S/CCNA Security, CCDA & CCNP R&S - Currently working on CCIE Security. Sharing my knowledge and passion for technology. All views are mine and NOT of my company.

Leave a Reply

Subscribe to SYNACK via Email

%d bloggers like this: