Download presentation
Presentation is loading. Please wait.
Published byGilbert Norris Modified over 9 years ago
1
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 1 Essential TCP/IP Network Protocols and Applications
2
Name: Williams Obinkyereh MSc. IT, Post Masters Software Engineering DSC (Doctor of Computer Science) Student. Contacts: Phone: 612-516-9712 Email: obinkytt@yahoo.co.ukobinkytt@yahoo.co.uk
3
Introduction Class introduction Introduction of Course Syllabus. –Course Summary –Lab Infrastructure (Mock) –Course Plan –Evaluation –Academic integrity Discussion and questions about syllabus.
4
© ITT Educational Services, Inc. All rights reserved.Page 4 IS3220 Information Technology Infrastructure Security Learning Objective Review essential Transmission Control Protocol/Internet Protocol (TCP/IP) behavior and applications used in IP networking
5
© ITT Educational Services, Inc. All rights reserved.Page 5 IS3220 Information Technology Infrastructure Security Key Concepts TCP/IP protocol analysis using NetWitness Investigator Differentiating clear-text from cipher-text Essential TCP/IP characteristics IP networking protocol behavior Network management tools
6
© ITT Educational Services, Inc. All rights reserved.Page 6 IS3220 Information Technology Infrastructure Security EXPLORE: CONCEPTS
7
© ITT Educational Services, Inc. All rights reserved.Page 7 IS3220 Information Technology Infrastructure Security TCP/IP Networking and OSI Reference Models 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data link 1. Physical Application Transport Internet Network Interface
8
© ITT Educational Services, Inc. All rights reserved.Page 8 IS3220 Information Technology Infrastructure Security TCP/IP Protocol Suite Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), Hypertext Transfer Protocol (HTTP), Tele-network (Telnet), File Transfer Protocol (FTP) Application Transmission Control Protocol (TCP), User Datagram Protocol (UDP) Transport Internet Protocol (IP), IPSec, Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP), and Internet Group Management Protocol IGMP Internet Serial Line Internet Protocol (SLIP), Purchasing Power Parity (PPP) Network Interface
9
© ITT Educational Services, Inc. All rights reserved.Page 9 IS3220 Information Technology Infrastructure Security The Structure of a Packet
10
© ITT Educational Services, Inc. All rights reserved.Page 10 IS3220 Information Technology Infrastructure Security A Packet Moves Through the Protocol Stack
11
© ITT Educational Services, Inc. All rights reserved.Page 11 IS3220 Information Technology Infrastructure Security Protocol Analysis Functions of a Protocol Analyzer Why analyze data packets? Detect network problems, such as bottlenecks Detect network intrusions Check for vulnerabilities Gather network statistics What does a protocol analyzer do? Captures and decodes data packets traveling on a network Allows you to read and analyze them
12
© ITT Educational Services, Inc. All rights reserved.Page 12 IS3220 Information Technology Infrastructure Security NetWitness Investigator Threat analysis software − Protocol Analyzer Captures raw packets from wired and wireless interfaces Analyzes real-time data throughout the seven layers
13
© ITT Educational Services, Inc. All rights reserved.Page 13 IS3220 Information Technology Infrastructure Security NetWitness Investigator (cont.) Filters by Media Access Control (MAC) address, IP address, user, and more Supports Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) Gets daily threat intelligence data from the SANS Internet Storm Center Freely available
14
© ITT Educational Services, Inc. All rights reserved.Page 14 IS3220 Information Technology Infrastructure Security Wireshark Network protocol analyzer Captures Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and other packets Analyzes real-time and saved data Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and others Supports IPv4 and IPv6 Allows Voice over IP (VoIP) analysis Freely available
15
© ITT Educational Services, Inc. All rights reserved.Page 15 IS3220 Information Technology Infrastructure Security EXPLORE: PROCESS
16
© ITT Educational Services, Inc. All rights reserved.Page 16 IS3220 Information Technology Infrastructure Security Packet Capture Using NetWitness Investigator Start the capture Verify capture configuration settings Network Adapter, Advanced Capture Settings, and Evidence Handling Define rules or capture Filters and alerts Select parsers to use with capture Geolocation IP (GeoIP), Search, FLEXPARSE
17
© ITT Educational Services, Inc. All rights reserved.Page 17 IS3220 Information Technology Infrastructure Security Trace Analysis Using NetWitness Investigator Navigation Search Select a collection. Click Navigation. Select a report. Select a group of sessions. Search for specific content. Open a collection. Click the Content Search icon. Search on keyword or regular expression.
18
© ITT Educational Services, Inc. All rights reserved.Page 18 IS3220 Information Technology Infrastructure Security TCP/IP Transaction Sessions Connection-oriented Sender -Breaks data into packets -Attaches packet numbers Receiver -Acknowledges receipt; lost packets are resent -Reassembles packets in correct order
19
© ITT Educational Services, Inc. All rights reserved.Page 19 IS3220 Information Technology Infrastructure Security TCP Three-Way Handshake Server Host 1 - SYN 2 - SYN/ACK 3 - ACK Synchronize (SYN) Acknowledge (ACK)
20
© ITT Educational Services, Inc. All rights reserved.Page 20 IS3220 Information Technology Infrastructure Security TCP Connection Termination Acknowledge (ACK) Finish (FIN) Server Host 1 – ACK/FIN 2 –ACK 4 - ACK 3 –ACK/FIN
21
© ITT Educational Services, Inc. All rights reserved.Page 21 IS3220 Information Technology Infrastructure Security TCP Connection Reset Server Host 1 - SYN 2 –SYN/ACK 3 - RST Synchronize (SYN) Acknowledge (ACK) Reset (RST)
22
© ITT Educational Services, Inc. All rights reserved.Page 22 IS3220 Information Technology Infrastructure Security EXPLORE: CONTEXT
23
© ITT Educational Services, Inc. All rights reserved.Page 23 IS3220 Information Technology Infrastructure Security IPv4 Addressing Assigned to computers for identification on a network 32-bit address space Internet routing uses numeric IP addresses Dotted decimal notation Example: 192.168.0.10 IP addresses in packet headers A packet makes many hops between source and destination
24
© ITT Educational Services, Inc. All rights reserved.Page 24 IS3220 Information Technology Infrastructure Security Network Protocol Examination Normal Packet Connecting to an FTP server Port 53 (dns) in UDP Three-way handshake completes Packet Showing Evidence of Port Scan Series of TCP packets, part of three-way handshake Arrange segments in sequential order by source port Destination ports also in sequential order Classic TCP port scan
25
© ITT Educational Services, Inc. All rights reserved.Page 25 IS3220 Information Technology Infrastructure Security Clear-Text Vs Encrypted Protocols Clear-text Protocols Are human readable FTP, Telnet, Simple Mail Transfer Protocol (SMTP), HTTP, Post Office Protocol 3 (POP3), Internet Message Access Protocol (IMAPv4), Network Basic Input/Output System (NetBIOS), Simple Network Management Protocol (SNMP) Encrypted Protocols Are not human readable Secure Shell (SSH), SSH File Transfer Protocol (SFTP), HTTP Secure (HTTPS)
26
© ITT Educational Services, Inc. All rights reserved.Page 26 IS3220 Information Technology Infrastructure Security Summary TCP/IP protocol analysis using NetWitness Investigator Differentiating clear-text from cipher-text Essential TCP/IP characteristics IP networking protocol behavior Network management tools
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.