edoardottt / offensive-onos

My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)

Home Page:https://edoardoottavianelli.it

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Offensive ONOS

My experiments in weaponizing ONOS applications.
This is a part of research activity for my Cybersecurity M.Sc. Thesis (link), focused on detection of Cross App Poisoning Attacks in Software Defined Networks.

This research also led to discovery of CVE-2023-24279 and CVE-2023-30093.

Useful papers to get context:

Requirements

In order to test the applications I've used Mininet to virtualize the data-plane, but it's optional (https://github.com/mininet/mininet/releases/).

Get Started

Compile an ONOS application ready to be installed and activated

make -C apps/APP-NAME compile

Search for .oar (ONOS archive) files

make oar

See this GitHub Gist to understand how to connect ONOS and a Mininet VM.

Links

Changelog

Detailed changes for each release are documented in the release notes.

Contributing

Just open an issue / pull request.


edoardoottavianelli.it to contact me.

About

My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)

https://edoardoottavianelli.it


Languages

Language:Java 57.9%Language:Python 40.2%Language:Makefile 1.2%Language:Shell 0.5%Language:Starlark 0.3%