Network Data Management Protocol (NDMP) - PORT 10000

Basic info

What is NDMP?

Network Data Management Protocol (NDMP) is an open protocol standardized by the Storage Networking Industry Association (SNIA) that provides:

  • Direct backup - NAS to tape/backup device without server intermediary

  • LAN-free backups - Reduced network traffic

  • Centralized backup management - Control multiple NAS devices

  • Vendor interoperability - Works across different NAS vendors

  • Snapshot integration - Leverages storage snapshots

Architecture

Key Components:

1. Data Management Application (DMA)

  • Backup software (Veritas NetBackup, Veeam, Commvault)

  • Controls backup/restore operations

  • Initiates NDMP sessions

2. NDMP Server (Data Server)

  • NAS device being backed up

  • Provides file system access

  • Handles data movement

3. NDMP Tape Server

  • Controls tape drives

  • Writes backup data

  • Can be same or different device

NDMP Versions

Version History:

  • NDMP v2 - Original (1997)

  • NDMP v3 - Added extensions (1999)

  • NDMP v4 - Improved error handling (2000)

  • NDMP v5 - Latest, Windows support (2010)

Version Differences:

  • Authentication methods vary

  • Protocol extensions

  • Feature support

Common Use Cases

Enterprise Backup Solutions:

  • NetApp FAS/AFF arrays

  • Dell EMC Isilon

  • Hitachi NAS platforms

  • Pure Storage FlashBlade

  • Cohesity DataPlatform

Backup Software Integration:

  • Veritas NetBackup

  • Commvault

  • Veeam Backup & Replication

  • IBM Spectrum Protect

  • Dell EMC Avamar

Use Cases:

  • Enterprise NAS backup

  • Data protection

  • Disaster recovery

  • Compliance archiving

  • Database backups (Oracle, SQL Server via NAS)

Default Port

Port 10000 - NDMP

Reconnaissance & Enumeration

Port Scanning

Basic Nmap Scan

Sample Output:

Service Fingerprinting

Banner Grabbing

NDMP Version Detection

File System Enumeration

Shodan Queries

Authentication Testing

NDMP Authentication Types

1. None (No Authentication)

  • No credentials required

  • Common in internal networks

  • CRITICAL vulnerability if exposed

2. Text (Clear-text)

  • Username/password in plaintext

  • No encryption

  • Easily intercepted

3. MD5

  • Challenge-response authentication

  • MD5 hash of password

  • Still vulnerable to attacks

Authentication Process:

Check Authentication Requirements

Using Nmap Scripts

Default Credentials

Common Default Credentials:

Testing Default Credentials:

Brute Force Authentication

Using Metasploit

Custom Brute Force Script

Exploitation Techniques

Unauthorized Backup Access

List Backups

Download Backup Data

File System Enumeration

List File Systems

Directory Listing (If Supported)

Credential Harvesting

Extract Backup Configuration

Common Credential Locations in Backups:

Backup Manipulation

Inject Malicious Files

Corrupt Backups (DoS)

Ransomware Deployment

Backup Compromise in Ransomware Attacks:

Modern Ransomware Tactics:

  • Delete backup catalogs

  • Corrupt backup data

  • Disable backup schedules

  • Exfiltrate backup data before encryption

Known Vulnerabilities & CVEs

CVE-2009-3725: Buffer Overflow (Veritas NetBackup)

Affected: Veritas NetBackup NDMP implementation

Impact: Remote code execution

Description: Buffer overflow in NDMP server component

CVE-2012-0897: Authentication Bypass (EMC Celerra)

Affected: EMC Celerra NDMP implementation

Impact: Unauthorized access

CVE-2017-14623: Information Disclosure (NetApp)

Affected: NetApp Data ONTAP NDMP

Impact: Information disclosure

Authentication Weaknesses

Common Issues:

  • No authentication enabled (default in some configs)

  • Weak default passwords

  • Clear-text authentication (NDMP_AUTH_TEXT)

  • MD5 authentication (weak by modern standards)

Protocol-Level Issues

Design Weaknesses:

  • No encryption by default

  • Credentials sent in clear (AUTH_TEXT)

  • Weak authentication methods

  • No MFA support

  • Session hijacking possible

Defense & Hardening

Enable Authentication

NetApp Configuration:

Dell EMC Configuration:

General Best Practices:

Network Security

Firewall Rules:

Network Segmentation:

Access Control

Limit NDMP Users:

IP-Based Access Control:

Monitoring & Detection

Enable Logging:

Log Analysis:

Intrusion Detection:

Network Monitoring:

Encryption

Encrypt Backup Data:

VPN for NDMP Traffic:

Regular Security Practices

Tools & Scripts

Essential Tools

  1. nmap - Discovery and enumeration

  2. Metasploit - NDMP modules

  3. ndmpcopy - NDMP client utility

  4. Wireshark - Protocol analysis

  5. Vendor tools - NetApp CLI, Dell EMC tools

Metasploit Modules

Protocol Analysis with Wireshark

Cheat Sheet

Quick Reference

Important Concepts

Default Credentials

Conclusion

NDMP, while designed to optimize backup operations, introduces significant security risks when exposed or misconfigured. The protocol's focus on efficiency over security, combined with weak default configurations and authentication options, makes NDMP services attractive targets for data theft and ransomware attacks.

Key Takeaways:

  1. Enable authentication - Never run NDMP without authentication

  2. Network segmentation - Isolate backup network

  3. Strong passwords - Change defaults, use complex passwords

  4. Firewall rules - Restrict to backup servers only

  5. Monitor actively - Log all NDMP activity

  6. Encrypt backups - Use backup software encryption

  7. Regular audits - Review configurations and access

  8. Update regularly - Apply vendor security patches

  9. Test restores - Verify backup integrity

  10. Incident response - Plan for backup compromise

Attack Vectors:

  • No authentication (misconfiguration)

  • Default credentials

  • Clear-text authentication (AUTH_TEXT)

  • Network exposure

  • Backup data theft

  • Credential harvesting from backups

  • Backup corruption/deletion

  • Ransomware enabler (destroy backups)

Critical for Ransomware Defense:

  • NDMP is prime target in ransomware attacks

  • Attackers delete/corrupt backups first

  • Then encrypt production data

  • Victims cannot recover

  • Securing NDMP is crucial for disaster recovery

Remember to only perform these techniques during authorized security assessments. Unauthorized access is illegal and unethical.

Additional Resources

circle-check

Last updated