Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Block MAC Headers from known hacked devices

    Scheduled Pinned Locked Moved Captive Portal
    12 Posts 4 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      ThisIsLivin
      last edited by

      I am trying to block MAC addresses from known Chinese devices that hackers use as bots. I want to make sure I am doing it correctly. Under Captive Portal, I have created a list of blocked MAC headers like this 08:ed:ed:00:00:00/24. Is this the correct format to block all MAC's that start with 08:ed:ed?

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @ThisIsLivin
        last edited by johnpoz

        So known hacked devices all change their mac to start with 08:ed:ed? That is pretty stupid thing to do for these hackers..

        That mac is
        Zhejiang Dahua Technology Co., Ltd.

        Why would normally they make like video camera's be on your captive portal or try and join your network in the first place?

        Normally people don't carry around video cameras ;) So are their cameras in your area that use your network? While I could understand blocking known device types via the mac address - this seems kind of specific and bit tinfoil hatish to be worried about that specific mac.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        T 1 Reply Last reply Reply Quote 0
        • T
          ThisIsLivin @johnpoz
          last edited by ThisIsLivin

          @johnpoz

          Research Internet outage of October 2016. That wasn’t the only one. There are 3 major companies that are known to be used by hackers frequently. I have about a hundred MAC filters to create. I am also using an IP database to create a blacklist to block traffic as well.

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @ThisIsLivin
            last edited by johnpoz

            Not saying camera's don't get hacked... What I am saying is you have these cameras on your network? People don't normally carry camera's around to join a network that uses a captive portal.. Captive portals are normally used for your guest.. Say a phone or a tablet or laptop.

            A captive portal is used to allow access to your network.. How would hacked cameras be joining your network in the first place?

            I think maybe you should do a bit more research on how these bot networks are leveraged.. And sure if you had any sort of video cameras on your network I would isolate them to their own vlan.. And limit their access to the rest of your network.

            I am just not seeing a valid use case for blocking this mac on a captive port, on how a captive portal is leveraged. Simple place to block mac address, using vendor specific would just be your dhcp server.. Not the captive portal. To access a captive portal - normally users have to auth. Say with a token you give them or password you give them..

            Are you saying anything can just join your network via no auth?

            How exactly are using this captive portal? Are you running a internet cafe or provide access in a place of business, a hotel, a bar, etc.. Just not clear on how some hacked video camera would possible have access to join your wifi in the first place ;) Are you worried about the guy next doors video cameras accessing your wifi via zero auth and just allowed in from a wide open captive portal?

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            GertjanG 1 Reply Last reply Reply Quote 0
            • GertjanG
              Gertjan @johnpoz
              last edited by

              I've one of these :
              489bf30a-0112-4e6f-9b21-fed5b1b9bfe2-image.png
              for years now.

              It's a DVR, not a camera - and cameras are hooked up to it the old fashioned way : coax.

              This device has merited it's place in my LAN : it does nothing out of the ordinary.

              Btw : Captive portals are untrusted networks by default.
              Devices connected to it should even be able to communicate among themselves = network isolation.

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @Gertjan
                last edited by johnpoz

                Different Mac.. Then what he wants to block..

                Yeah that company makes video surveillance stuff.. They are big into it.. Just not seeing how that sort of hardware moves about and joins some captive portal network. Which I agree shouldn't be doing anything but talking to the internet.

                Just curious the use case of blocking companies from talking to your captive portal - because the devices they make are known members of bot nets.. The reason why is users expose them to the internet.. Which really should of never been done in the first place.

                There are hundreds of hundreds makes of cameras that use bad firmware that could be exploited. You going to block them all by mac.. I still don't get how cameras that someone puts up on their wall to watch their mailman deliver their mail everyday is going to end up trying to join your network.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • AndyRHA
                  AndyRH
                  last edited by

                  I think there may be a minor misunderstanding.

                  The IoT hacks that are used in the various attacks are devices that are compromised where they sit. The victim does not see the MAC of the device, they see the MAC of the nearest router. Should a hacker decide to attack your network directly, the attack is more likely to come from a more capable device, like a laptop which would have an unpredictable MAC (I would change the MAC if that is what stopped me) and they would have to be in range of your WiFi or in the building to plug in.

                  If you are worried about your network being used to perform an attack limit who can connect through the captive portal with some version of validation. My company requires an employee to register guests. Or limit the bandwidth available if it is more open. Certainly do not allow guests to see each other or your production network.

                  If your data is worth someone showing up to take it, you should have a professional security assessment done because it is worth more than the assessment to protect it.

                  o||||o
                  7100-1u

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @AndyRH
                    last edited by johnpoz

                    @andyrh said in Block MAC Headers from known hacked devices:

                    I think there may be a minor misunderstanding.

                    Concur.. I just do not see how blocking camera makers mac addresses has any valid use case on a captive portal..

                    Now if you wanted to stop iphone users from using your network via captive portal - ok, maybe you hate iphone users ;) I just don't see how some video camera having been hacked or not is going to be trying to access your network via a captive portal. Which normal would have to auth in some fashion anyway.. How would this bad camera have the info to auth with in the first place?

                    Most of these devices have no way to auth to a captive portal in the first place, and for them to use a network that is behind a captive portal, their mac addresses would have to be whitelisted so they do not have to auth to this captive portal.

                    I would be happy to help the user validate his syntax correct.. But without some more info - I don't see the point of doing what he is asking to do at all.. And wanting help him from going down some rabbit hole blocking this and that and the other thing that serves no real purpose.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • T
                      ThisIsLivin
                      last edited by

                      It appears I am using the wrong methodology to block external traffic. I am already blocking all external IP traffic from problematic countries. I wanted to also block all traffic from inside the US from devices known to be used by hackers. I have already tuned my wireless network to be invisible 10' outside my home. If you are within that perimeter my security system has already alerted me to your presence. Is there a way to block external IP packets from specific manufacturers devices?

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @ThisIsLivin
                        last edited by

                        @thisislivin said in Block MAC Headers from known hacked devices:

                        Is there a way to block external IP packets from specific manufacturers devices?

                        Not with mac addresses that is for sure - mac addresses are only layer 2. So unless the devices were directly connected to your wan L2 network..

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • T
                          ThisIsLivin
                          last edited by

                          Thanks for helping a Pfsense newbie.

                          GertjanG 1 Reply Last reply Reply Quote 0
                          • GertjanG
                            Gertjan @ThisIsLivin
                            last edited by

                            @thisislivin said in Block MAC Headers from known hacked devices:

                            Pfsense newbie.

                            As we are all learning every day, So I guess we all are.

                            But you can shift from "think you know" to "know you know" just by looking at something like this :

                            Youtube Video

                            It starts with a wire, 8 conductors .... easy.
                            By the end, you know what 'networks" are, what and IP address is, and a MAC address.

                            No "help me" PM's please. Use the forum, the community will thank you.
                            Edit : and where are the logs ??

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.