TitaNet Security Flaw Identification

Slides:



Advertisements
Similar presentations
Available & Effective charging solution for electric cars Advanced mobile charging systems.
Advertisements

MD025 Clonezilla Server Andrew Fang. School of Information Technology Computer Systems Major.
Top-Down Network Design Chapter Fourteen Documenting Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
EFFECTIVE GROUP PROJECTS Tips for surviving and succeeding with team assignments.
ISHIKAWA DIAGRAM – Tool for quality management Marit Laos IS Project Management
Network Surveillance Apparatus Team WiFiSpi Aaron Collier, Scott Matheson, Steven Tran-Giang.
Let’s Get Set Up By Michael Crawford. Situation at Hand Basic Needs ◦ Budget of $25-50,000 ◦ Connection to an ISP to access internet Security ◦ Network.
Sixtyf ps project ADCaRS Justin Sam, Alan Ly, Laszlo Anda.
Documenting Network Design
SPEEPLER Spencer Handberg and Tyler Kellond. AGENDA Introductions Project Background How it works Accomplishments Challenges How We Overcame Them Lessons.
Solids Modeling System Migration Presented By 3Tech: Ryan Scott, Jimmy Vuong, Samson Tran.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
On Demand Internet By The Cool Beans Initiative  Hugh Becking  Gary Chung.
By Colin Phan, Ken Lee Marquez, Gyu Beom Choi. Agenda  Introductions  Project Information  Challenges  Successes  Lessons Learned  Budget  The.
NETE Computer Network Analysis and DesignSlide 1 Documenting Network Design NETE-4635 Computer Network Analysis and Design.
Terri Lahey Control System Cyber-Security Workshop October 14, SLAC Controls Security Overview Introduction SLAC has multiple.
Introduce the project Africa IXP (Team 4). Introduce team members.
CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET.
Top-Down Network Design Chapter One Analyzing Business Goals and Constraints Copyright 2004 Cisco Press & Priscilla Oppenheimer.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Managing Chapter 01 Copyright © 2011 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Prototyping the Campus Network Designing and Supporting Computer Networks.
Objectives how to use a systematic, top-down process when designing computer networks focuses on the first step in top-down network design: analyzing your.
Project Management Methodology Project Closing. Project closing stage Must be performed for all projects, successfully completed or shut off by management.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
Infrastructure Deployment Services Dell Networking Deployment Services.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Cisco Implementing Cisco IP Switched Networks.
Instructor Materials Chapter 8: Subnetting IP Networks
ITEC 275 Computer Networks – Switching, Routing, and WANs
Effective Group Projects
Microsoft® System Center Virtual Machine Manager 2008
Introduction An introduction to the software and organization of the Internet Lab.
“Introduction to Azure Security Center”
SP-Portal2016 Developed by KRN-2016 Kevin Titong Ricardo Sandrea
By CES Tech Connor Plouffe, Eric Gavlin, and Stephen Costa
Guide For List Management
Training Methods Ice breaker. Your middle name! Introduction
Introduction to the Federal Defense Acquisition Regulation
Top-Down Network Design Chapter Fourteen Documenting Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Dell Technical Support Number Visit this website link to get instant technical support and information on dell …. Dell laptop customer.
* First of all, you need to click “Start”, “Control Panel” and then System and Security. After this, you need to click on the link ‘Back up Your Computer’
Presented by: First Last
Ti ps to Disable Firewall with Norton 360. Norton 360 comes with a lot of beneficial features in which one of the best features is Smart Firewall feature,
D-link Router Support Website: support/index.htmlhttp://callpcexperts.com/d-link-router- support/index.html Contact.
Welcome To : Group 1 VC Presentation
NTC 320 Competitive Success-- snaptutorial.com
BIS 320 NERD Lessons in Excellence-- bis320nerd.com.
NTC 320 Education for Service-- snaptutorial.com
NTC 320 Teaching Effectively-- snaptutorial.com
Your Potential as an Entrepreneur Entrepreneurship: Building a Business Why Be an Entrepreneur? What Does It Take to Be an Entrepreneur? 2.1 Section 2.2.
Public Employees Retirement Association Infrastructure Upgrade
Teaching with Instructional Software
TLC Scope and Sequence Mrs. Merrill 11/19/2018.
Using An Isolated Network to Teach Advanced Networks and Security
An Introduction to the Problem Solving Process
An Introduction to the Problem Solving Process
Using networks to be more effective
OPS235 Configuring a Network Using Virtual Machines – Part I
Student Names School Name Teacher’s Name Date
Mary Kay Jewelry Stores
Automated Infrastructure as a Service
Student Names School Name Teacher’s Name Date
Your Potential as an Entrepreneur
Nicholas Novello, Shayne Gradwell, Nikolas Todd
Restaurant IT Solutions
Do You Have Multiple Amazon Seller Accounts? Amazon Knows it! By EsellersCare Contact : +1 (855)
Introduction to Networking Security
Presentation transcript:

TitaNet Security Flaw Identification Justin Sorsdahl, Matthew Yackel

Agenda Introduction Costs Scope Lessons learned Details Accomplishments Challenges Costs Lessons learned Recommendations Conclusion Acknowledgements

Introduction What is project Security Flaw Identification? Why did we choose this topic? What problem does it address?

TOPOLOGY SHIT

Scope Analyze a system for possible security vulnerabilities Report of what happened and what was found Suggestions of how to address the flaws Out of scope: Provide only the identification of flaws, not address them.

Project Details Building the testing environment Configuring the systems: - Server System - Monitor System - Attacking System Routing workaround – man in the middle Running the security test programs Analyze results

Accomplishments Assemble a functional isolated testing environment Successfully execute and take advantage of vulnerabilities Identify and analyze how it was done and how to prevent it

Opportunities Firewall Implementation Routing – no network connectivity allowed Time constraints and responsibilities Unexpected complications

Costs Equipment Costs Operating Costs Item Producer Model Name Price Switch D-Link DGS-1008D $24.99 Server System Dell Vostro 220 $635.00 Monitor System Various Custom Built $590.00 Attacking System $630.00 Subtotal $1879.99 CAD+Tax Operating Costs Members Hours Rate/Hour Price Justin Sorsdahl 110 $80.95 $8904.50 Matthew Yackel Efren Joseph Reyes

Lessons Learned and Recommendations Don’t procrastinate Take the time to create an accurate and detailed plan Don’t make new decisions as you go – stick to your plan

Conclusion Learned a lot about system security Apply technical skills we learned to real situations Time management and self motivation Problem analysis and problem solving

Acknowledgements Jason Fisher – advice and guidance Lab environment to work in SAIT equipment and budget to build computer Classmates for advice

Or feel free to visit our booth with any other questions! (Booth #12)

References https://www.offensive-security.com/wp- content/uploads/2015/03/Armitage_5_shells.png https://www.offensive-security.com/metasploit-unleashed/