Lab #2 NET332 By Asma AlOsaimi.

Slides:



Advertisements
Similar presentations
Password Cracking, Network Sniffing, Man-in-the-Middle attacks, and Virtual Private Networks Lab 2 – Class Discussion Group 3 Ruhull Alam Bhuiyan Keon.
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
IS Network and Telecommunications Risks
1 Computer System Evolution Central Data Processing System: - with directly attached peripherals (card reader, magnetic tapes, line printer). Local Area.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
1 Last Class! Today: r what have we learned? r where is the networking world going? r question and answers r evaluation.
Guide to Computer Network Security
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
1 Protocol Interaction (ISO’s Open Systems Interconnection (OSI model)) the 7 layers.
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
The Basics of Networking. Rick Graziani What is networking? Communication! An interconnection of computers and other devices: –Printers.
Chapter 15 Networks. Chapter Goals Types of networks Topologies Open Systems Home Internet connections 15-2.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Lab #2 CT1406 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
1 Chapter Overview Network Communications The OSI Reference Model.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
 1DT014 Datakommunikation I › (Thur) 9-14 › Polacksbacken, Skrivsal  9 Questions › 5 Short questions › 4 Long questions.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
Advanced Higher Computing Computer Networking Topic 1: Network Protocols and Standards.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1.
WHAT’S A WIRELESS AP? AND WHY DO I NEED ONE? Network Components & How They Work.
Defining Network Infrastructure and Network Security Lesson 8.
TECH TIP – Videoconferencing settings for Apple AirPort Extreme wireless access point. SYMPTOM / ISSUE After connecting a set-top videoconferencing system.
MTA Network Fundamental Cram Sesion
Web Server Administration
CompTIA Security+ Study Guide (SY0-401)
Introduction An introduction to the software and organization of the Internet Lab.
NETWORK Unit 1 Module: 2 Objective: 7.
CONNECTING TO THE INTERNET
Lec 2: Protocols.
Introduction to Computers
Lecture 6: TCP/IP Networking By: Adal Alashban
Data Networking Fundamentals
Introduction to Networking Prof. Ananjan Maiti. Overview of the course OSI and TCP/IP Models:  Open Systems Interconnection (OSI)  Transmission Control.
The Open System Interconnection (OSI) Model & Network Protocols.
Security in Networking
CompTIA Security+ Study Guide (SY0-401)
Chapter 9 Windows on the Internet
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Packet Sniffing.
Introduction An introduction to the software and organization of the Internet Lab.
Guide to Computer Network Security
POWERPOINT PRESENTATION ON NETWORKING Presented by Ms
Firewalls Routers, Switches, Hubs VPNs
Chapter Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of various network.
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
NETWORK Unit 1 Module: 2 Objective: 7.
NETWORK Unit 1 Module: 2 Objective: 7.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Introduction to Network Security
OSI Reference Model Kashif Ishaq.
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Internet protocol stack
COMPUTER NETWORKING Presented by Pushpanjali Associate professor
Presentation transcript:

Lab #2 NET332 By Asma AlOsaimi

"Security has been a major concern in today’s computer networks "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies, many of the attacks cost companies their reputation and cost them millions of pounds. Many attacks are implemented using inside knowledge from previous and even current employees."

Part#1: Network Fundamentals

Outline LANs LAN Routers / Gateways Wireless Connection Firewalls NAT Network Protocols Protocol Analysis cs490ns - cotter

Single Machine Security Risk: Physical Security Access to Machine (loss of equipment) Hack Machine (loss of information) cs490ns - cotter

Local Area Networks Security Risk: Physical Security Hub / Switch Access to Machine (loss of equipment) Access to Hub / Switch (loss/ leak of information) Hack Machine (loss/ leak of information) Hub / Switch cs490ns - cotter

Local Area Networks (Routers / Gateways) 11/27/2017 Local Area Networks (Routers / Gateways) Internet Router / Gateway cs490ns - cotter cs490ns - cotter

Local Area Networks (Access Technologies) 56 Kbps Modem Establish a point-to-point connection to ISP Use PPTP (etc.) to establish an internet connection Private link DSL Full Time, Broadband connection Uses existing telecom facilities Cable Modem Shares existing cable TV facility with others cs490ns - cotter

Wireless Connection WAP + Internet Router cs490ns - cotter 11/27/2017

Firewalls Provides a mechanism to control / monitor access to the LAN Internet cs490ns - cotter

Network Address Translation Many networks configured with private IP addresses (10.0.0.0, 172.16.0.0, 192.168.0.0) Addresses are not routed. Must convert to public address for Internet access. To addresses that are routed. May also have many hosts sharing limited network addresses. If only 1 network address, then service is called Port Address Translation - PAT NAT provides the translation services cs490ns - cotter

Network Address Translation cs490ns - cotter

Network Protocols cs490ns - cotter

LAN Physical Layer Protocols Ethernet 10base5 10base2 10baseT, 100baseT, 1000baseT Wireless Networks 802.11a 802.11b 802.11g Token Ring etc. cs490ns - cotter

WAN Physical Layer Protocols Telecommunications DS0, DS1, DS3 SONET ISDN etc. Metro Area Protocols Cellular Telephone FDDI WiMAX cs490ns - cotter

Network Layer Protocols Internet Protocol (IP) Routes packets across the network Manages packet fragmentation across network Internet Control Message Protocol (ICMP) Provides support for IP and TCP Address Resolution Protocol (ARP) Provides address resolution between network layer and data link layer addresses. cs490ns - cotter

Transport Layer Protocols Transmission Control Protocol (TCP) Provides reliable end-to-end packet transport Provides packet flow control User Datagram Protocol (UDP) Provides simplified end-to-end packet transport No control overhead No packet fragmentation cs490ns - cotter

Application Layer Protocols Support specific network applications FTP HTTP( www) SMTP, POP3,IMAP (E-MAIL) cs490ns - cotter

Protocol Analysis Packet Sniffers WireShark (Ethereal) Etherpeek EtherDetect Zx Sniffer AnalogX PacketMon Colasoft Capsa AirMagnet Enterprise (Wireless monitoring) etc. cs490ns - cotter

Summary LANs LAN Routers / Gateways Wireless Connection Firewalls NAT 11/27/2017 Summary LANs LAN Routers / Gateways Wireless Connection Firewalls NAT Network Protocols Protocol Analysis cs490ns - cotter cs490ns - cotter

Part#2:Introduction to security

Who is vulnerable? Financial institutions and banks Internet service providers Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK 15-441 Networks Fall 2002

Common security attacks and their countermeasures Finding a way into the network Firewalls Exploiting software bugs, buffer overflows Intrusion Detection Systems Denial of Service IDS TCP hijacking IPSec Packet sniffing Encryption (SSH, SSL, HTTPS) Social problems Education 15-441 Networks Fall 2002

Common security attacks

What is a vulnerable system? A vulnerability is a weakness in software, hardware that enables the attacker to compromise the confidentiality, integrity or availability of that system. An attacker can use a vulnerability to compromise a system. For example a weakness in a protocol allows the attacker to run arbitrary code. If you understand the vulnerability, it will help you to implement the appropriate security control

Part#3: CT1406 LAB

CT1406 Lab Setup Back Track 5 10.170.25.202 Metasploitable (Ubuntu) 10.170.25.100 Windows Server 2008 10.170.25.101 Windows PC 10.170.25.201

Pentest ? A pentest is a method of evaluating and testing the security of a system, network, or application by performing actions that are meant to simulate the actions of a malicious attacker.

Metasploit Metasploit framework provides you with information on security vulnerabilities which can be used to exploit a system. Penetration testers can also use this tool to launch manual or automated scans.