DAKOTA STATE UNIVERSITY Mobile Security Lab
Introduction Dakota State University Computer Network Security Who we are? Wireshark There are federal, state, and local laws on how this utility can be used. This tool is easy to detect Use of it outside of this controlled environment is against the law. White Hat Agreement
Goals Introduce you to Networking Network Services Security
Locate ID Number on Bottom of Computer
IP Address Start Run cmd ipconfig Start Control Panel Network Connections Right Click on Local Area Connection Click on Internet Protocol (TCP/IP) Properties
Ping Your Neighbor What is a ping? cmd prompt ping XX ping ping
WireShark FAQ Can see the pings leaving Network utility that shows all the traffic on the network Let’s take a look at it!
Using WireShark Click the WireShark icon You have two different types of connections to choose from. Start the capture Let’s do those pings again. ping XX ping ping
What is an FTP Server? File Transfer Protocol Usually used for large files Can be accessed through command prompt, a program on the client machine, or internet browser Can have account login Can have anonymous login
Login using an account Open up your cmd prompt ftp username: pat password: pat (will not display) It didn’t work. Type in exit then repeat top portion Look in WireShark for logins with pat pat (pause capture)
Login Using Your Given Account Keep WireShark running Log in using the credentials on the piece of paper you were given Find someone else’s credentials. When you find someone else Ask who is Ask if their password is
What did we do?
2 Day Summer Security Boot Camp Hands on experience using DSU’s state of the art security lab. No Security Experience (or expertise) required Lean about and implement cutting edge security concepts 2 days (stay over night) on DSU Campus Food Prizes Game Tournaments at Night
- Please fill out the information.