Intro to InfoSec Communication Protocols Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)

Slides:



Advertisements
Similar presentations
Ethical Hacking Module VII Sniffers.
Advertisements

Password Cracking, Network Sniffing, Man-in-the-Middle attacks, and Virtual Private Networks Lab 2 – Class Discussion Group 3 Ruhull Alam Bhuiyan Keon.
Man in the Middle Attack
Hands-On Ethical Hacking and Network Defense Lecture 15 Man in the Middle Attack to get Passwords from HTTPS Sessions.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 5 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Network Attacks Mark Shtern.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Security Awareness Chapter 5 Wireless Network Security.
Introduction to Security Computer Networks Computer Networks Term B10.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
Networking Components
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
CECS 474 Computer Network Interoperability Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science Cal ifornia State University, Long Beach.
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Networking Components Chad Benedict – LTEC
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
COEN 252 Computer Forensics
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.
Network Components: Assignment Three
Common Devices Used In Computer Networks
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Communication Protocols.  A network is just a bunch of devices communication.  There are all sorts of protocols out there today being used: 3GPP/GSM/SS7,
COEN 252 Computer Forensics Collecting Network-based Evidence.
Introduction to InfoSec – Recitation 11 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
N ETWORKING C OMPONENTS A-3 LTEC 4550 by Joe Garcia.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
CS 3830 Day 5 Introduction 1-1. Announcements  Program 1 due today at 3pm  Program 2 posted by tonight (due next Friday at 3pm)  Quiz 1 at the end.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
1 實驗九:建置網路安全閘道器 教師: 助教:. 2 Outline  Background  Proxy – Squid  Firewall – IPTables  VPN – OpenVPN  Experiment  Internet gateway  Firewall  VPN.
CHAPTER 9 Sniffing.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Communication Networks - Overview CSE 3213 – Fall November 2015.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Lesson 7: Network Security and Attacks. Computer Security Operational Model Protection = Prevention+ (Detection + Response) Access Controls Encryption.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
TCP Security Vulnerabilities Phil Cayton CSE
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
Digital Planet: Tomorrow’s Technology and You Chapter 8 Networking and Digital Communication Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Computer Network Security Dr. X. OSI stack… again.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Sniffing cable modems Guy Martin HackCon 4 - Feb 2009 – Oslo.
LAN Vulnerabilities.
Outline Basics of network security Definitions Sample attacks
Network Security: IP Spoofing and Firewall
Firewalls Routers, Switches, Hubs VPNs
Outline Basics of network security Definitions Sample attacks
Network Analyzer :- Introduction to Wireshark
Network Analyzer :- Introduction to Wireshark
OSI Reference Model Kashif Ishaq.
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

Intro to InfoSec Communication Protocols Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)

Today Into to new subject – communication protocols Common terminology Most useful protocols Tools of the trade.

Communication Protocols A network is just a bunch of devices communicating. There are all sorts of protocols out there today being used: 3GPP/GSM/SS7, TCP/IP, Ethernet, W/LAN, Bluetooth, ATM, HDMI, USB, etc. All protocols have been designed to serve different purposes, their purpose usually demands their structure and services they provide. Of course the most important of all is the Internet Protocol (IP).

Secured Communication Securing Transfer of Information is a problem of centuries. In the middle ages pigeons with notes were captured in order to intercept communication. Our computer systems are valuable because they can communicate. Can you find a computer disconnected from the internet ? Communications are an essential part of the security trust-base.

Communication compromise types

Communication denial types

Communication compromise types Eavesdropping - information leaves a device it can be intercepted. Man in the middle– communication is routed through a 3 rd party. Man on the side– eavesdropping information is used to for impersonation. Denial of Service (DoS). Distributed Denial of Service (DDoS). In other words, a hackers goals by priority is: o Divert traffic for man in the middle. o Eavesdrop on traffic.

Popular Communication Defenses Firewalls - used to protect against unwanted packets, limiting in advance to a set of rules of acceptable traffic only. VLAN – separate the network into different Virtual LAN, every virtual LAN is a different trust base segment. Needs to be carefully designed. End-to-End encryption, who cares what happens in between its all encrypted and most importantly authenticated/signed, eg. SSH, SSL. Intrusion Detection/Prevention Systems (IDS/IPS) – passively monitors data and looks for signs of “bad” behavior, and can then deny traffic.

Ethernet Destination (Media Acess Control ) MAC Address denotes the target device in the local network. If the MAC Address is FF:FF:FF:FF:FF:FF the message is broadcast to all devices in the local network.

IP

Typical IP Routing Scheme

TCP

Typical TCP Connection A is connecting to B using the 3-way hand-shake A sends a TCP-SYN from a random source port to a specific destination port (eg. Port 80 for HTTP) B replies with TCP-SYN+ACK from the source port 80 to the random destination port. A replies with an ACK. DATA is exchanged. A or B initiate a TCP-FIN to end the connection.

Our tools Wireshark – a spin-off from ethereal which started as a GUI interface for tcpdump. o Wireshark sniffs communications and records them in capture files.cap or.pcap o Has many modules supporting enormous amount of protocol types. o Straight-forward interface. Scapy – Another useful python module. o Also available for perl, don’t tell Itamar. ( o But we’ll use python anyhow.

Demos [Demo sniffing a cookie with wireshark. [Demo using scapy].

Wireshark – setup capture filter

Wireshark – capture filter Capture filter are very fast and tell wireshark which data to record.

Recording data Alternatively you can also record.pcap files with tcpdump. eg.: tcpdump –ni any –s 0 –w out.pcap Reading files is also possible with scapy: o from scapy.all import * o all_packets = rdpcap(“data01.pcap”)