Network Surveillance Apparatus Team WiFiSpi Aaron Collier, Scott Matheson, Steven Tran-Giang.

Slides:



Advertisements
Similar presentations
Point of Sale (POS) Client & Back Office Server. Operational Concept What is our Objective? What is our Objective? What are our Goals? What are our Goals?
Advertisements

MD025 Clonezilla Server Andrew Fang. School of Information Technology Computer Systems Major.
Fraunhofer FOKUS Context Management in Dynamic Environments IWCMC 2009, June 2009 Jens Tiemann Humberto Astudillo Evgenij Belikov Fraunhofer Institute.
Consideration of a Temporary Skate Board Park Carpinteria City Council Meeting Agenda Item # 9.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Introduction Characteristics of USB System Model What needs to be done Platform Issues Conceptual Issues Timeline USB Monitoring Final Presentation 10.
Our Group Andrew McGillivray David Collins Tyler Todd.
1 Host Based Intrusion Detection: Analyzing System Logs Bob Winding, Vikram Ahmed University of Notre Dame 12/13/2006.
Lesson 4-Installing Network Operating Systems. Overview Installing and configuring Novell NetWare 6.0. Installing and configuring Windows 2000 Server.
Project Management Methodology (PMM)
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
SP2 Mikael Nystrom. Agenda Översikt Installation.
Sixtyf ps project ADCaRS Justin Sam, Alan Ly, Laszlo Anda.
The What Why and How.  MCTS  These certifications provide the foundation for Microsoft Certification  MCITP  These certifications build on the technical.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
ZACK FESTA, ADAM HOOD AND NATHAN DARLING Refrigerator Scanning System.
SPEEPLER Spencer Handberg and Tyler Kellond. AGENDA Introductions Project Background How it works Accomplishments Challenges How We Overcame Them Lessons.
COEN 252 Computer Forensics
Solids Modeling System Migration Presented By 3Tech: Ryan Scott, Jimmy Vuong, Samson Tran.
Using the WDK for Windows Logo and Signature Testing Craig Rowland Program Manager Windows Driver Kits Microsoft Corporation.
Software Testing Life Cycle
What is FORENSICS? Why do we need Network Forensics?
Monitoring Architecture for Lawful Interception in VoIP Networks Second International Conference on Internet Monitoring and Protection (ICIMP 2007), IEEE.
DNS POISONING + CENSORSHIP LAB DUSTIN VANDENBERG, VIPUL AGARWAL, LIANG ZHAO 1.
SQL Server for Green Building By HCH Servers Ltd..
State of Technology Sultan School District Thank You Thank you to the Board of Directors and the Superintendent for always supporting the need for.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Access Control Personal.
Print Services. 2 Objectives Understand Print Server terms and concepts Understand how printing works Print Server Considerations Printer Hardware Considerations.
Certain security vulnerabilities exist in every mode of wireless communications.
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
Tyler Hellard, Taylor Kraft and Zachary Preece.  Project Background  Project Accomplishments  Budget  Conclusion  Acknowledgements  Question and.
On Demand Internet By The Cool Beans Initiative  Hugh Becking  Gary Chung.
By Colin Phan, Ken Lee Marquez, Gyu Beom Choi. Agenda  Introductions  Project Information  Challenges  Successes  Lessons Learned  Budget  The.
Movies Music Outlet Jimmy Le, Ryan Quinagoran, Eric Mu JRE Media.
Agenda Introductions Project Background AccomplishmentsChallenges Lessons Learned Budget The Journey Final Product Recommendations.
Josh Garay Jake Chipperfield Connor Huskins
Packet Capture and Analysis: An Introduction to Wireshark 1.
IT320 OPERATING SYSTEM CONCEPTS Unit 3: Welcome to Linux June 2011 Kaplan University 1.
DEA IT CONSULTING THE TEAM: DAVID CLARKE EMMANUEL CAUBALEJO ADAM WHEATON CIITS Server Infrastructure Optimization.
IT320 OPERATING SYSTEM CONCEPTS Unit 3: Welcome to Linux September 2012 Kaplan University 1.
Network Sniffer Anuj Shah Advisor: Dr. Chung-E Wang Department of Computer Science.
Test automation analysis in System Testing for the Intelligent Packet Core Author: Mona Saxena Supervisor: Professor Jörg Ott Nokia Networks, Helsinki.
FWaaS German EichbergerSridar KandaswamyVishwanath Jayaraman.
Timothy Kritzler and Joseph Mintun Sponsor: Martin Engineering, Illinois Advisors: Dr. Malinowski and Dr. Ahn Bradley University Electrical and Computer.
Wireless Intrusion Detection & Response ECE 4006 Group 2: Seng Ooh Toh Varun Kanotra Nitin Namjoshi Yu-Xi Lim.
Operating System Imaging and Deployment Cody Burns Anthony Luu Joel Groeneveld.
Automating Installations by Using the Microsoft Windows 2000 Setup Manager Create setup scripts simply and easily. Create and modify answer files and UDFs.
Project May07-14: Restaurant Automation April 24, 2007.
Technical Changes and Preparation SLA3 Pilot 2 Fall 2015.
 systemD  FirewallD  Network manager (NMCLI)  Target CLI (iscsi targets)  GRUB 2 (Booting process)  Network teamnig & bridging.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
Timothy Kritzler and Joseph Mintun Sponsor: Martin Engineering, Illinois Advisors: Dr. Malinowski and Dr. Ahn Bradley University Electrical and Computer.
Timothy Kritzler and Joseph Mintun Sponsor: Martin Engineering, Illinois Advisors: Dr. Malinowski and Dr. Ahn Bradley University Electrical and Computer.
IT320 Operating System Concepts
High Speed Optical Interconnect Project May08-06
Centralized Management for Barracuda Networks products
SRA Memory Grabber Product Description.
SP-Portal2016 Developed by KRN-2016 Kevin Titong Ricardo Sandrea
By CES Tech Connor Plouffe, Eric Gavlin, and Stephen Costa
Transparent Wireless Authentication For New Wireless Network
IS4680 Security Auditing for Compliance
TitaNet Security Flaw Identification
Nicholas Novello, Shayne Gradwell, Nikolas Todd
Restaurant IT Solutions
HP PRINTER CUSTOMER SUPPORT The printer has grown into an important peripheral device that helps users to convert a digital document into print versions.
Presentation transcript:

Network Surveillance Apparatus Team WiFiSpi Aaron Collier, Scott Matheson, Steven Tran-Giang

Agenda  Background  Motivation  Accomplishments  Challenges  Recommendations  Proposed Budget  Actual Budget  Acknowledgements  Conclusion  References  Q/A

Background  A cheap and easy way to monitor a suspicious network  Minimal Footprint  The network will be monitored with a microcomputer  Increase in Wireless throughout the city

Motivation  Initial idea for the NSA was formed by Scott Matheson  Wanted to create a way to be able to monitor traffic without being hardwired  Originally more of a black hat idea  Pushed towards white hat by Aaron Collier

Accomplishments  A working Network Surveillance Apparatus that is capable executing a successful man in the middle attack with the ability to intercept and log packets.  An FTP/Snort Server capable of pulling and deleting captures from the NSA, and then filtering out packets based on rulesets.  A better understanding of how easy it is to intercept packets wirelessly

Challenges  The Hummingboard was incompatible with PwnPie and Kali  The USB wireless had new chipset drivers released with many issues and with the kernel support for the board was unable to use older versions of the driver  Under our suspicion either SAIT’s network policy or a rogue DNS server caused issues with our DNS configuration  Simplistic network bridging tools had been depreciated causing us to find alternative means to bridge and NAT the device’s network

Technical Recommendations  Use a microcomputer that you know is compatible with the OS you wish to use  Make sure the chipsets of all tools are compatible and fully supported  Know the security policies of the network you are on  Verify hardware driver support

Team Recommendations  Start project ASAP, or you will fall behind very quickly  Account for last minute changes and emergencies in your Gantt chart.  Document, document, document  If you come up with your own project be prepared for a lot of self- guidance.  Know that anything the can go wrong will go wrong

Proposed Budget Item Cost HummingBoard-i2ex $110.00USD HP ProLiant DL360P G8 $2,104.83CDN Computer(Hash Calculation System) ~$1,000CDN Wireless Network Interface Card ~$60CDN Contingency Funds $500CDN TOTAL~$3, Hardware Costs

Proposed Budget Cont. ItemHoursRateCost Aaron500$90/hr$45,000 Steven500$90/hr$45,000 Scott500$90/hr$45,000 TOTAL1500$135,000 Operating Costs

Actual Budget Item Cost HummingBoard-i2ex $110.00USD HP ProLiant DL360P G8 $2,104.83CDN Alfa Wireless USB Card $42.99 Wireless Network Interface Card ~$60CDN Contingency Funds $500CDN TOTAL~$2, Hardware Costs

Actual Budget Cont. ItemHoursRateCost Aaron104$90/hr$7,110 Steven104$90/hr$5,220 Scott104$90/hr$8,550 TOTAL312$90/hr$20,880 Operating Costs

Grand Total $23,697.82

Acknowledgements  Team WiFiSpi wishes to thank the individuals who provided invaluable knowledge and the assistance of our project:  Colin Chamberlain – Project sponsor, provided us with server hardware, monitors, keyboards, mice. As well as keeping us on track with the project over the last thirteen weeks.  Tim Williams – Help with TCP dumps and Snort  Dylan Saunders – Tunneling two connections  Jason Fisher – Miscellaneous hardware and access to soldering iron.

Acknowledgements  Arch Linux Community  Solid-Run Community  Aircrack-ng Community  William Parker – CentOS Snort Setup Guide  Linux Man Pages

Conclusion  Team WiFiSpi successfully created a prototype (NSA) that allows for the interception of packets wirelessly  Proof of concept for the filtering of packets through Snort  All of us have grown as IT Professionals

References  Photos taken by Steven Tran-Giang and Scott Matheson

QUESTIONS?