MY NETWORK TAP Richard Elswick Easter Kentucky University.

Slides:



Advertisements
Similar presentations
INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Advertisements

ARDUINO-BASED ENVIRONMENTAL SENSOR Presented By: Joseph Walden.
Aaron Eastham Network Security & Electronics Program Dept. of Applied Engineering & Technology Eastern Kentucky University.
Presented by: Carl Skeene. OUTLINE Motivation Introduction Problem statement Assumption Proposed solution Results Conclusion Future work References Acknowledgements.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Packet Sniffing - By Aarti Dhone.
Computer Networks Computer Networks Term B10 Network Delay Network Delay Performance Problems.
Wireshark – Introduction Wire 1 Due date: Friday, October 30th.
Advanced Computer Networks 1 Sample Network Performance Problems.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
LECTURE16 NET 301. HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the key considerations are:
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
PI : TV A PI MEDIA CENTER Michael Hoskins Network Security & Electronics Program, Dept. of Applied Engineering & Technology, Eastern Kentucky University.
OUTLINE  Motivation  Introduction  Problem Statement  Assumptions  Proposed Solution  Results  Conclusions  Future Work  References  Acknowledgements.
DIY Engine management system: Take full control of your car
Stephen Riddle (EKU, Dept. of Technology, NET program) Presented by: Stephen Riddle.
Microcontroller Based Wireless Camera Security System John Saylor Computer Electronic Networking.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
MINI MEDIA CENTER Charles Hayden Network Security and Electronics Department of Applied Engineering and Technology Eastern Kentucky University.
COEN 252 Computer Forensics
RFID P ET F EEDER Sally Smith Eastern Kentucky University Department of Technology NET program.
SET UP A SOHO SERVER AND NETWORK: THE BASICS Tony Hancock (NET 2012 Capstone. EKU) Presented by: Tony Hancock.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
GROUP POLICIES AND SECURITY USING WINDOWS SERVER 2008 Raymond Ross EKU, Dept. of Technology, CEN.
THE WOK ANTENNA Charles C. Noe EKU_CEN_Capstone2009.ppt.
NETWORK FILE ACCESS SECURITY Daniel Mattingly EKU, Dept. of Technology, CEN/CET.
Active Home Timmy Henery Affiliation EKU, Dept. of Technology.
PHP MYWIKI Brian Casey Eastern Kentucky University.
Common Servers in a Workplace Environment Brandon Reynolds Computer Electronic Networking Dept. of Technology, Eastern Kentucky University.
ATTIC BOULDERING IN ACTION Brandon Powell EKU Technology department EET 499 CET/CEN Capstone project 2009.
CUSTOM EASY TO BUILD MEDIA CENTRE FOR YOUR HOME Presented by: Brentley New NET Program:499.
1 After completing this lesson, you will be able to: Transfer your files to the Internet. Choose a method for posting your Web pages. Use Microsoft’s My.
All About Me Finding and Editing Saved Student Work Part II.
SECURING YOUR HOME AND HOME NETWORK Ryan Lewis Eastern Kentucky University Network Security & Electronics Spring 2015 Capstone.
Windows Server 2003 with Active Directory and Group Policies Wendy Hurst Eastern Kentucky University Department of Technology CEN/CET.
Packet Capture and Analysis: An Introduction to Wireshark 1.
Quick starter Which of the emerging techs do you think have the most potential? To make money?
CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET.
Network Sniffer Anuj Shah Advisor: Dr. Chung-E Wang Department of Computer Science.
Master/Slave networking configuration Alan Maynard Computer Electronic Networking.
SOLARPACKING Mitch Vernon Eastern Kentucky University.
Networking Components Siby Abraham LTEC Purpose of the presentation  This presentation will cover how certain network components function, when.
By Mohammad Alsawwaf. To apply the theory part from my last presentation into the application part (The lab)
SunSatFriThursWedTuesMon January
Department of Computer Science & Engineering 5. Acknowledgments 4. Conclusions 3. Evaluation2. Contribution 1. Introduction REU 2008-Packet Sniffer Jose.
Home Security Cameras Emmanuel Payton EKU Dept of Technology CEN/CET.
Raspberry Pi Garage Door Mark Barron NET 499 Eastern Kentucky University.
TECHNOLOGY RESOURCE MANAGEMENT PORTAL Casey Spires Eastern Kentucky University.
ANDROID AS A SERVER PLATFORM ON CLOUD COMPUTING SONA COLLEGE OF TECHNOLOGY SUBMITTED BY: NAGADEVI PRIYA.G DIVYA PURNIMA.S.S
PARSLEY PIE BOX James (Kyle) Parsley Network Security & Electronics Program.
HIGH END DESKTOP WITHOUT HIGH END PRICE VIRGIL EDWARDS NET 499 SPRING 2016 EASTERN KENTUCKY UNIVERSITY 1.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NOR HANANI BINTI SAHARUDIN TSK 1.
LEARNBOT Matthew Williams Network Security and Electronics Program Dept. of Applied Engineering & Technology, Eastern Kentucky University.
Adam Turner Network Security & Electronics Program, Dept. of Applied Engineering & Technology, Eastern Kentucky University.
BUS 210 Week 8 CheckPoint Hardware and Software Components Appendix E ​ Check this A+ tutorial guideline at
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Mickey hand By: Marquise Piton Network Security & Electronics /Contact: (954)
Jordan Terry Eastern Kentucky University
Lab 2: Packet Capture & Traffic Analysis with Wireshark
INTRODUCTION TO COMPUTER NETWORKS
Cat Litter Box Ventilation System
Clinton A Jones Eastern Kentucky University Department of Technology
Making an Ethernet Cable
How will computers be in 10 years?
INTRODUCTION TO COMPUTER NETWORKS
Networking Theory and Protocol.
Sample Network Performance Problems
Sample Network Performance Problems
Presentation transcript:

MY NETWORK TAP Richard Elswick Easter Kentucky University

2 OUTLINE Motivation Introduction Problem Statement Assumptions Implementation Proposed Solution Results

MOTIVATION Networking Security Wanted to do something no one else had. Something I thought would be interesting. 3

4 INTRODUCTION A passive network tap is a type of network tap that can be implemented into a wired network. Some of the sources that I researched were to see some of the different types of network taps.

5 PROBLEM STATEMENT The main problem that I was trying to solve was how to view network traffic and be able to find usernames and passwords.

6 ASSUMPTIONS The way the tap is suppose to work is by plugging it into the network in between the host machine and the router then view the host machines packets from another pc. It does not retrieve every single bit of information.

IMPLEMENTATION 7

8 PROPOSED SOLUTION How I solved the problem Looked what I could use to perform this function. Found what I needed to construct the network tap. Looked at different types of packet capture software. Constructed the tap. Tested by performing this on my parents computer. Verified results.

9 RESULTS After building and testing the tap I was able to view usernames and passwords over the network.

RESULTS 10

11 CONCLUSIONS This project helped me learn how to properly plan for a project. The project also helped show me that not everything is going to go the way you plan.

12 FUTURE WORK One way to extend on this project is to implement my original idea of making a wireless network tap.

REFERENCES Karunaratne, Janitha. (2009). The Passive Splice Network Tap. Retrieved February 2, 2013, from Hak5Darren. (2011, June 6). Build a Lan Tap for Packet Sniffing, a lesson Soldering with Snubs [Video File]. Video posted to wGY wGY 13

REFERENCES revision3. (2009, June 27). Get the Most From Network Tap Analyzers - Best Of...[Video File]. Video posted to 3II 3II McGuire, Ryan. (2006, January 19). Building and Ethernet Tap. Retrieved March 4, 2013, from

ACKNOWLEDGEMENTS people.eku.edu/chandrav/NET/Capstone_201 3/capstoneProjects_2013.html.#richard people.eku.edu/chandrav/NET/Capstone_201 3/capstoneProjects_2013.html.#richard 15