Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lab #2 NET332 By Asma AlOsaimi.

Similar presentations


Presentation on theme: "Lab #2 NET332 By Asma AlOsaimi."— Presentation transcript:

1 Lab #2 NET332 By Asma AlOsaimi

2 "Security has been a major concern in today’s computer networks
"Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies, many of the attacks cost companies their reputation and cost them millions of pounds. Many attacks are implemented using inside knowledge from previous and even current employees."

3 Part#1: Network Fundamentals

4 Outline LANs LAN Routers / Gateways Wireless Connection Firewalls NAT
Network Protocols Protocol Analysis cs490ns - cotter

5 Single Machine Security Risk: Physical Security
Access to Machine (loss of equipment) Hack Machine (loss of information) cs490ns - cotter

6 Local Area Networks Security Risk: Physical Security Hub / Switch
Access to Machine (loss of equipment) Access to Hub / Switch (loss/ leak of information) Hack Machine (loss/ leak of information) Hub / Switch cs490ns - cotter

7 Local Area Networks (Routers / Gateways)
11/27/2017 Local Area Networks (Routers / Gateways) Internet Router / Gateway cs490ns - cotter cs490ns - cotter

8 Local Area Networks (Access Technologies)
56 Kbps Modem Establish a point-to-point connection to ISP Use PPTP (etc.) to establish an internet connection Private link DSL Full Time, Broadband connection Uses existing telecom facilities Cable Modem Shares existing cable TV facility with others cs490ns - cotter

9 Wireless Connection WAP + Internet Router cs490ns - cotter 11/27/2017

10 Firewalls Provides a mechanism to control / monitor access to the LAN
Internet cs490ns - cotter

11 Network Address Translation
Many networks configured with private IP addresses ( , , ) Addresses are not routed. Must convert to public address for Internet access. To addresses that are routed. May also have many hosts sharing limited network addresses. If only 1 network address, then service is called Port Address Translation - PAT NAT provides the translation services cs490ns - cotter

12 Network Address Translation
cs490ns - cotter

13 Network Protocols cs490ns - cotter

14 LAN Physical Layer Protocols
Ethernet 10base5 10base2 10baseT, 100baseT, 1000baseT Wireless Networks 802.11a 802.11b 802.11g Token Ring etc. cs490ns - cotter

15 WAN Physical Layer Protocols
Telecommunications DS0, DS1, DS3 SONET ISDN etc. Metro Area Protocols Cellular Telephone FDDI WiMAX cs490ns - cotter

16 Network Layer Protocols
Internet Protocol (IP) Routes packets across the network Manages packet fragmentation across network Internet Control Message Protocol (ICMP) Provides support for IP and TCP Address Resolution Protocol (ARP) Provides address resolution between network layer and data link layer addresses. cs490ns - cotter

17 Transport Layer Protocols
Transmission Control Protocol (TCP) Provides reliable end-to-end packet transport Provides packet flow control User Datagram Protocol (UDP) Provides simplified end-to-end packet transport No control overhead No packet fragmentation cs490ns - cotter

18 Application Layer Protocols
Support specific network applications FTP HTTP( www) SMTP, POP3,IMAP ( ) cs490ns - cotter

19 Protocol Analysis Packet Sniffers WireShark (Ethereal) Etherpeek
EtherDetect Zx Sniffer AnalogX PacketMon Colasoft Capsa AirMagnet Enterprise (Wireless monitoring) etc. cs490ns - cotter

20 Summary LANs LAN Routers / Gateways Wireless Connection Firewalls NAT
11/27/2017 Summary LANs LAN Routers / Gateways Wireless Connection Firewalls NAT Network Protocols Protocol Analysis cs490ns - cotter cs490ns - cotter

21 Part#2:Introduction to security

22 Who is vulnerable? Financial institutions and banks
Internet service providers Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK Networks Fall 2002

23 Common security attacks and their countermeasures
Finding a way into the network Firewalls Exploiting software bugs, buffer overflows Intrusion Detection Systems Denial of Service IDS TCP hijacking IPSec Packet sniffing Encryption (SSH, SSL, HTTPS) Social problems Education Networks Fall 2002

24 Common security attacks

25 What is a vulnerable system?
A vulnerability is a weakness in software, hardware that enables the attacker to compromise the confidentiality, integrity or availability of that system. An attacker can use a vulnerability to compromise a system. For example a weakness in a protocol allows the attacker to run arbitrary code. If you understand the vulnerability, it will help you to implement the appropriate security control

26 Part#3: CT1406 LAB

27 CT1406 Lab Setup Back Track 5 10.170.25.202 Metasploitable (Ubuntu)
Windows Server 2008 Windows PC

28 Pentest ? A pentest is a method of evaluating and testing the security of a system, network, or application by performing actions that are meant to simulate the actions of a malicious attacker.

29 Metasploit Metasploit framework provides you with information on security vulnerabilities which can be used to exploit a system. Penetration testers can also use this tool to launch manual or automated scans.


Download ppt "Lab #2 NET332 By Asma AlOsaimi."

Similar presentations


Ads by Google