Network Traffic Analysis
|
|
|
- Sharyl Fletcher
- 10 years ago
- Views:
Transcription
1 2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013
2 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing Wireshark... 7 Lab 4 - Working with Wireshark... 7 More With Wireshark... 9 Normal Traffic (normal.pcapng)... 9 Suspicious Traffic (suspicious.pcap) Malicious Traffic (malicious.pcapng) Lab 5 - Packet Trace Exercise Appendix A Appendix B Appendix C Appendix D
3 Introduction The current document provides an overview of the tools tcpdump and Wireshark and how to use them for network traffic analysis. The document follows the format of several lab exercises, including how to set up virtual machines for testing purposes. During these lab exercises, the installation process and the general usage of the network traffic analysis tools will be discussed. Screenshots of the tools in use are provided in several appendices to this document. Lab 1 - Installing the Operating System (OS) A topology of our network and pictures that provide proof of completion of this lab can be found in appendix A. To properly perform network monitoring on our sandbox environment, a virtual machine running the FreeBSD OS version 9.1 was created. The VM runs on 2 processors with one core each and has 1GB of RAM available. It currently has one NIC because that is all that is needed for the moment, but since it s a VM more NICS can be quickly installed if necessary. The other devices in our sandbox environment are: - A VM running Windows 7 - A VM running Windows Server A VM running Kali Linux The Windows 7 and Windows Server 2008 VM s have 1 virtual CPU and 4GB of memory allocated to them. The Kali Linux VM has 1 virtual processor and 2GB of memory allocated to it. All VMs in the sandbox are on the same virtual switch (NTS 350 Team 1) and the IP addressing scheme is as follows: - FreeBSD: Windows Server 2008: Windows 7:
4 - Kali Linux The virtual switch has the setting promiscuous mode enabled so that it functions much like a hub; all traffic passing through the virtual switch is sent to all hosts. This allows our sensor to pick up on traffic that is not specifically addressed to its interface. Lab 2 Working with TCPDump A topology of our network and pictures that provide proof of completion of this lab can be found in appendix B. To capture network traffic in the sandbox environment, TCPdump was used on the sensor. Additionally, the network interface on the sensor was put in promiscuous mode so that it would capture all traffic, rather than traffic just addressed to the sensor. Since all VMs were placed on a separate network segment with no access to the Internet or other devices there were no security risks or legal and ethical concerns of capturing third party network traffic. 1. Running a simple tcpdump -I em0 command on the sensor showed that TCPdump was installed and functional on the sensor. 2. Next, a ping request was sent from the Windows 7 VM to the Windows Server 2008 VM. The sensor was able to pick up on this traffic. 3. Looking at the first captured echo request, the following information can be seen in the captured traffic: Data Type Value Timestamp 08:51: Source IP
5 Source port None (ICMP) Destination IP Destination port TCP flags None (ICMP) none TCP sequence number 29 TCP last sequence number none TCP packet length 40 ACK flag (next expected) Window size (host expects) none none 4. Tcpdump can also be used in combination with certain switches that customize its output. For instance: a. Tcpdump will only display header information by default. It won t display full packet content unless specified to write to an external file using the -w switch. However, tcpdump can also be told to display link level header information by using the -e switch. b. The output of tcpdump can be limited to a set amount of packets by specifying the -c switch following by a number. c. The output of tcpdump can be redirected to a text file using the > command, or the output redirector. This works the same as when using output redirector in any other Linux command and will write the output to a specified location (such as a text file) instead of STDOUT (usually the monitor). d. Using the -p switch in the tcpdump command will prevent placing the interface in promiscuous mode before starting the packet capture. 5
6 e. To capture all traffic for a specific port, the command tcpdump port can be given, followed by a number for the port. If port is preceded by either src or dst then tcpdump will only capture packets sent from or received by that port respectively. f. To capture all traffic for a certain IP address, the command tcpdump host can be given, followed by an IP address. Just like with port numbers, host can be preceded by either src or dst. g. To pipe output of tcpdump to a pcap file, the switch -w can be used, followed by the name of a file to write to. Tcpdump will now also write full packet content and not just headers. h. To play back a previously captured saved data collection, the switch -r can be used, followed by the name of the file to read from. 5. There is a wealth of information available on TCPDump. A great place to start is at Located there is version information, patches, bug reports, manual pages, and plenty of usage examples. Furtheremore, here are a few other websites that offer great reference material for TCPDump: The most important capability of tcpdump is its support of traffic filtering. Provide the syntax to capture just the data described in each of the following cases. Additionally document examples of each using data generated from your test network. a. IP traffic: Traffic can be limited to IP traffic by simply using the ip operator 6
7 b. UDP traffic: Similar to IP traffic, a filter for UDP traffic can be set by using the udp operator c. DNS traffic: Since DNS can work off TCP or UDP, this will be accomplished with help from the or[ ] operator. For example udp port 53 tcp port 53. d. Traffic to or from a specific computer: Traffic can be filters for a specific computer by using the host operator. For example host [ip address dns name] e. Traffic from but not to a specific computer: Use the host operator in conjunction with src. For example src host [ip address dns name] f. Traffic to or from a specific network: This is done with the net operator followed by the network and subnet. For example net /24 or net mask g. IP broadcast traffic: Simply use ip broadcast h. IP, ARP and RARP traffic, i.e., one filter that captures all at once: Simply use the and[&&] operator between each protocol. For example ip && arp && rarp Lab 3 - Installing Wireshark A topology of our network and pictures that provide proof of completion of this lab can be found in appendix C. To analyze network traffic captured from the FreeBSD sensor, Wireshark running on Kali Linux is used in our sandbox environment. The choice for Kali Linux was made to provide a convenient method of moving pcap files from our FreeBSD system to our analyzer, namely through SSH. Also, Kali Linux comes with Wireshark installed by default. Lab 4 - Working with Wireshark This week all virtual machines running on UAT s ESXi server cluster were unfortunately down, so no traffic from our test network could be captured. Instead, traffic from a virtual machine installed on a 7
8 different host was captured and examined. The VM OS was Backtrack Linux 5R3. Proof of completion of this lab can be found in appendix D. Requested traffic Ping ARP request TCP frame UDP frame DHCP IP address negotiation DNS request HTTP get Logging into an FTP site Logging into a web site Downloading a picture (Jpeg) Downloading a binary file Extracting the file from the capture Filter / procedure To view only ping traffic, icmp.type == 0 icmp.type == 8 was applied as a display filter. These ICMP types are ping replies and requests respectively To view only ARP requests, arp.opcode == 1 was applied as a display filter. Opcode 1 specifies ARP requests. To view only TCP frames, tcp was applied as a display filter To view only UDP frames, udp was applied as a display filter To view only DHCP traffic bootp was applied as a display filter To view only DNS traffic dns was applied as a display filter To view only HTTP GET requests http.request was applied as a display filter To view only FTP traffic, ftp was applied as a display filter. To view only website logins, http.authorization was applied as a display filter. These days there are very little website login pages that don t use SSL so there were no results for this filter. To view only downloaded JPEG files, image-jfif was applied as a display filter. To view only downloads of binary files (.exe in this case), http contains.exe was applied as a display filter. Wireshark has a feature that can be used to extract downloaded files. To use this, go to File - Export objects - HTTP and select the object that needs to be downloaded. However, the binary file that was downloaded during the packet capture was not listed among the HTTP objects, so another method of extraction was attempted. 1. The GET request for the file was located 2. Follow TCP stream was selected 3. Only the server side of the conversation was selected by filtering out the client side 4. The TCP stream was saved to a file (file.exe). 5. File.exe was opened with Bless hex editor 6. Since file.exe doesn t just contain the downloaded file but also some file headers, the start of the file code was located by searching the hex for a file signature (MZ / 4D 5A h). 7. Everything from the file header to the end of file was copied and pasted into a new file (file2.exe) 8. File2.exe should match the original file. However, the MD5 hashes were different. Inspection of the files showed that the original file was actually larger in size than the extracted file. This is surprising, since everything from the file header to the end of the file was extracted. Therefore, all the file code should have been included. 9. Replication of this procedure kept providing the same results. 8
9 A particular source IP address A particular destination IP address A particular MAC address HTTP authentication Research indicates that this procedure for file extraction should have worked, but unfortunately it did not. No suggestions as to why it did not work can be provided. 10. Replication of this procedure with a file extraction tool such as foremost also did not successfully reproduce the original file. To view only a specific source IP, ip.src == was applied as a display filter. This displays only communication from pendrivelinux.com. To view only a specific source IP, ip.dst == was applied as a display filter. This displays only communication to pendrivelinux.com. To view only a specific MAC address, eth.addr == 00:0c:29:33:96:9 was applied as a display filter. To view only HTTP authentication traffic, http.authbasic was applied as a display filter. Just as with http.authorization this yielded no results since no websites could be found that don t use SSL on their login page. More With Wireshark Normal Traffic (normal.pcapng) The traffic capture normal.pcapng appears to be normal network traffic. Analysis of the pcap file did not show any suspicious or malicious traffic. The following analysis was applied to the captured network frames: Protocol Hierarchy Looking at the protocol hierarchy of the captured network traffic showed nothing suspicious. There were no frames marked as data, which is what typically happens when data is sent to a known port but the data doesn t appear to correspond to the protocol for that port. The network traffic appeared to be primarily HTTP traffic. Visual Inspection: A visual inspection of the captured network traffic doesn t immediately show suspicious activity. Suspicious network traffic can sometimes be visually indentified by stripes in the consecutively captured frames, or by an unusually large amount of traffic coming from one host, possibly to different ports of another host. No such activity seemed apparent in this captured network traffic. Filters: 9
10 1. dns - this filter only displays DNS traffic. Inspection of the DNS traffic showed that no suspicious websites were requested. 2. ftp - this filter displays only FTP traffic. FTP traffic would have been suspicious, but no FTP traffic was found in this capture file. 3. frame contains.exe - This filter displays only frames in which the string.exe appears at some point. This would possibly reveal any transferred executables, which are not necessarily suspicious or malicious but they have a higher chance of being so. This captured network traffic did not display any frames containing.exe. 4. There are many other possible indicators of suspicious or malicious traffic and infinite filters that could be applied to reveal such traffic. Due to the constraint of finite time and the knowledge that this captured traffic in fact does not contain anything malicious or suspicious, no further filters were applied. Suspicious Traffic (suspicious.pcap) The traffic capture suspicious.pcapng appears to contain suspicious network traffic. One particular host tries to scan and connect to several ports and services on another host The following analysis was applied to the captured network frames: Protocol Hierarchy: The protocol hierarchy shows that the captured network traffic was primarily TCP traffic, although there was a considerable amount of SMB traffic as well. This in itself is not suspicious since SMB allows computers to connect to each other and share resources such as files and printers. However, because SMB allows this sharing of resources it is also often used as a gateway for remote exploitation. 10
11 Visual Inspection: A visual inspection of the captured network traffic shows that right from the start, host tries to connect to host over SMB several times, failing each time due to the user id being incorrect (CHADWICK\Administrator). After several unsuccessful attempts to connect, host then initiates a port scan of host Almost every attempt is responded to with a [RST, ACK] packet, indicating that the port is not open. This generates a striped pattern in the network traffic that usually indicates that something suspicious is going. Filters: 1. smb - this filter only displays SMB traffic. This made it easier to determine that no successful SMB connection attempts had been made. A successful connection attempt after so many failed ones could indicate a successful exploit. 2. smb.error.code==0x005b - this filter only displays frames in which a host replies with a bad userid error code to an SMB connection attempt. This filter revealed that 13 unsuccessful SMB connection attempts had been made. 3. tcp.flags == 0x this filter only displays [SYN, ACK] frames. This revealed that out of the scanned ports, had the following ports open: 135, 139, and 445. Malicious Traffic (malicious.pcapng) The traffic capture malicious.pcapng appears to contain malicious network traffic. One host tries multiple times to connect over FTP to host The following analysis was applied to the captured frames: Protocol Hierarchy: The protocol hierarchy revealed that the captured frames are 100% TCP frames, and out of those TCP frames 35.67% were FTP frames. No other protocols were detected. 11
12 Visual Inspection: A visual inspection of the captured traffic doesn t immediately show that something might be wrong because in the default Wireshark profile, all FTP traffic is colored in some shade of gray. There is no striped pattern that shows anything might be off. However, a closer inspection does show that there are many 530 Login Incorrect frames sent, indicating that a user is trying multiple times to log in with a wrong password. Applying a coloring rule to all incorrect login attempts did reveal more of a striped pattern to indicate that something might be wrong. Filters: 1. ftp - this filter only displays frames in which the FTP protocol is used. This gets rid of all the TCP frames in which a connection is established between the hosts. 2. ip.src== && ftp - this filter only displays frames using the FTP protocol and originating from the attacker. This revealed a list of frames in which every single frame represented a request to connect with a different username or password, clearly indicating a brute force attack. 3. ftp.response.arg == "Login incorrect." - this filter displays only the packets from the server back to the client saying login incorrect. At the bottom of the Wireshark window is indicated how many packets are displayed under the current display filter incorrect login attempts were made. 4. ip.src== && ftp - This filter only displays frames over the FTP protocol originating from the FTP server. Scrolling to the bottom of these frames revealed that the brute force attack was unsuccessful, or possibly that the end of the attack had not been captured. The last frame in the list under this filter was an incorrect login message to the attacker. 12
13 Lab 5 - Packet Trace Exercise The following is an analysis of the network traffic capture file FTP Bruteforce.pcap. Here a brute force is being attempted by on the FTP server The packet capture shows that the attacker is continuously connecting to the FTP server and requesting to become admin. The server responds by telling the attacker Password is required for admin. The attacker then sends a password attempt. Finally, the FTP server responds saying Login incorrect. This process is repeated over and over but the attacker never successfully logs in as administrator. This scenario is problematic because with the proper password dictionary the attacker would eventually successfully login as administrator. Once accomplished, they may be able to gain access to sensitive information and/or gain access to other devices on the network. To mitigate this, a login policy should be implemented to lock the account for a short period, perhaps 20 minutes, after a given number of attempts, perhaps 10. Using this policy would severely inhibit the attacker s ability to brute force the server, and a lockout policy of 10 attempts would give legitimate users enough attempts to login without heavily increasing administrator overhead. Lastly, SFTP should be implemented instead of FTP if possible because it encrypts communications. This would thwart an ease dropper s ability to intercept communications. 13
14 Appendix A Figure 1. Sandbox logical topology Figure 2. Overview of FreeBSD VM 14
15 Figure 3. Overview of Windows Server 2008 VM Figure 4. Overview of Windows 7 VM 15
16 Figure 5. Overview of Kali Linux VM 16
17 Appendix B Figure 6. Captured ICMP traffic from Windows 7 to Windows Server 2008 Figure 7. Having tcpdump display link level headers Figure 8. Having tcpdump capture a specific number of packets 17
18 Figure 9. Having tcpdump output to a text file Figure 10. Putting an interface out of promiscuous mode. Here we see tcpdump only pick up on broadcast traffic (ARP) Figure 11. Having tcpdump only pick up traffic going to or coming from port 80 18
19 Figure 12. Having tcpdump only pick up traffic coming from or going to Figure 13. Having tcpdump write captured packets to a pcap file Figure 14. Having tcpdump read from a previously captured pcap file 19
20 Figure 15. Filtering for IP traffic Figure 16. Filtering for UDP traffic Figure 17. Filtering for traffic to or from Specific Host Figure 18. Filtering for traffic from Specific Host 20
21 Figure 19. Filtering for traffic to or from a Network Figure 20. Filtering for IP Broadcast Traffic Figure 21. Filtering for ARP, IP, and RARP 21
22 Appendix C Figure 22. Sandbox environment topology Figure 223. Specifications of Kali Linux VM 22
23 Appendix D Figure 24. Display filter and results to see just network ping traffic Figure 25. Display filter and results to see just ARP requests 23
24 Figure 26. Display filter and results to see just TCP frames Figure 237. Display filter and results to see just UDP frames 24
25 Figure 248. Display filter and results to see just DHCP traffic Figure 259. Display filter and results to see just DNS traffic 25
26 Figure 30. Display filter and results to see just HTTP GET requests Figure 31. Display filter and results to see just FTP traffic 26
27 Figure 32. Display filter and results to see just website logins Figure 263. Display filter and results to see just downloaded JPEG files 27
28 Figure 274. Display filter and results to see just downloaded binary (.exe) files Figure 285. Following TCP stream to see only frames relevant to the download 28
29 Figure 296. Start of file transfer, as identified by the file header (MZ) Figure 307. Comparison of MD5 hash values shows that files are not identical Figure 318. Opening extracted file in Bless hex editor shows that more than just the file is extracted. 29
30 Figure 329. Everything between file header and end of file was copied and pasted into a new file (file2.exe). File should now be identical to original Figure 40. Linux recognizes extracted file as a Windows executable. However, extracted file is still not identical to original. Original file is actually larger than extracted file. 30
31 Figure 41. Display filter and results to see only traffic from a particular source IP address Figure 42. Display filter and results to see only traffic from a particular destination IP address Figure 333. Display filter and results to see only traffic from a particular MAC address 31
32 Figure 344. Display filter and results to see only HTTP authentication traffic 32
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
1. LAB SNIFFING LAB ID: 10
H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB
Looking for Trouble: ICMP and IP Statistics to Watch
Looking for Trouble: ICMP and IP Statistics to Watch Laura Chappell, Senior Protocol Analyst Protocol Analysis Institute [[email protected]] www.packet-level.com www.podbooks.com HTCIA Member,
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Wireshark. Fakrul (Pappu) Alam [email protected]
Wireshark Fakrul (Pappu) Alam [email protected] What is Wireshark? Wireshark is a network packet/protocol analyzer. A network packet analyzer will try to capture network packets and tries to display
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Introduction to Analyzer and the ARP protocol
Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining
Lab 1: Network Devices and Technologies - Capturing Network Traffic
CompTIA Security+ Lab Series Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Domain 1 - Network Security Objective 1.1: Explain the security function and purpose of
Packet Sniffing with Wireshark and Tcpdump
Packet Sniffing with Wireshark and Tcpdump Capturing, or sniffing, network traffic is invaluable for network administrators troubleshooting network problems, security engineers investigating network security
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort
License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons
Lab Objectives & Turn In
Firewall Lab This lab will apply several theories discussed throughout the networking series. The routing, installing/configuring DHCP, and setting up the services is already done. All that is left for
Introduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
Project 2: Firewall Design (Phase I)
Project 2: Firewall Design (Phase I) CS 161 - Joseph/Tygar November 12, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL
EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL PREPARATIONS STUDYING SIP PROTOCOL The aim of this exercise is to study the basic aspects of the SIP protocol. Before executing the exercise you should
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Unix System Administration
Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
Packet Sniffing and Spoofing Lab
SEED Labs Packet Sniffing and Spoofing Lab 1 Packet Sniffing and Spoofing Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following grants from
Stateful Firewalls. Hank and Foo
Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation
Install Guide for JunosV Wireless LAN Controller
The next-generation Juniper Networks JunosV Wireless LAN Controller is a virtual controller using a cloud-based architecture with physical access points. The current functionality of a physical controller
1. Firewall Configuration
1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Figure 1. Wireshark Menu Bar
Packet Capture In this article, we shall cover the basic working of a sniffer, to capture packets for analyzing the traffic. If an analyst does not have working skills of a packet sniffer to a certain
Websense Web Security Gateway: What to do when a Web site does not load as expected
Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Network Security. Network Packet Analysis
Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS [email protected] 1 Network Packet Analysis Definition: Examining network packets to determine
USING WIRESHARK TO CAPTURE AND ANALYZE NETWORK DATA
USING WIRESHARK TO CAPTURE AND ANALYZE NETWORK DATA CPSC 441 TUTORIAL JANUARY 30, 2012 TA: RUITING ZHOU The content of these slides are taken from CPSC 526 TUTORIAL by Nashd Safa (Extended and partially
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Host Fingerprinting and Firewalking With hping
Host Fingerprinting and Firewalking With hping Naveed Afzal National University Of Computer and Emerging Sciences, Lahore, Pakistan Email: [email protected] Naveedafzal gmail.com Abstract: The purpose
CSCI 7000-001 Firewalls and Packet Filtering
CSCI 7000-001 Firewalls and Packet Filtering November 1, 2001 Firewalls are the wrong approach. They don t solve the general problem, and they make it very difficult or impossible to do many things. On
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Practical Network Forensics
BCS-ISSG Practical Network Forensics Day BCS, London Practical Network Forensics Alan Woodroffe [email protected] www.securesystemssupport.co.uk Copyright Secure Systems Support Limited.
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
Introduction to Network Security Lab 2 - NMap
Introduction to Network Security Lab 2 - NMap 1 Introduction: Nmap as an Offensive Network Security Tool Nmap, short for Network Mapper, is a very versatile security tool that should be included in every
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
Penetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (External Attacker - Intermediate) By: magikh0e - [email protected] Last Edit: July 06 2012 This guide assumes a few things... 1. You have read the basic guide of this
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
Computer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Lab exercise: Working with Wireshark and Snort for Intrusion Detection
CS 491S: Computer and Network Security Fall 2008 Lab exercise: Working with Wireshark and Snort for Intrusion Detection Abstract: This lab is intended to give you experience with two key tools used by
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
Introduction to Passive Network Traffic Monitoring
Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki [email protected] Active Monitoring Inject test packets into the network or send packets
Network Connect Performance Logs on MAC OS
Network Connect Performance Logs on MAC OS How-to Juniper Networks, Inc. 1 Table of Contents Introduction Part 1: Client Prerequisites... 3 Step 1.1: Packet Sniffer... 3 Step 1.2: Output IPs, Routes, Ping,
Snoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points
Snoopy Due Date: Nov 1 Points: 25 Points Objective: To gain experience intercepting/capturing HTTP/TCP traffic on a network. Equipment Needed Use the Ubuntu OS that you originally downloaded from the course
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Setting up pfsense as a Stateful Bridging Firewall.
Setting up pfsense as a Stateful Bridging Firewall. Contents Contents Setting up pfsense as a Stateful Bridging Firewall.... 1 What king of system these directions will try and help you create.... 1 Selecting
Computer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss13/netlab Equipment for each group: - 1 Server computer (OS: Windows Server 2008
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Firewall. IPTables and its use in a realistic scenario. José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 FEUP MIEIC SSIN
Firewall IPTables and its use in a realistic scenario FEUP MIEIC SSIN José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 Topics 1- Firewall 1.1 - How they work? 1.2 - Why use them? 1.3 - NAT
WiFi Security Assessments
WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Information Security Training. Assignment 1 Networking
Information Security Training Assignment 1 Networking By Justin C. Klein Keane September 28, 2012 Assignment 1 For this assignment you will utilize several networking utilities
VisuSniff: A Tool For The Visualization Of Network Traffic
VisuSniff: A Tool For The Visualization Of Network Traffic Rainer Oechsle University of Applied Sciences, Trier Postbox 1826 D-54208 Trier +49/651/8103-508 [email protected] Oliver Gronz University
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Firewall Examples. Using a firewall to control traffic in networks
Using a firewall to control traffic in networks 1 1 Example Network 1 2 1.0/24 1.2.0/24.4 1.0.0/16 Rc 5.6 4.0/24 2 Consider this example internet which has: 6 subnets (blue ovals), each with unique network
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Vulnerability Analysis 1 Roadmap Why vulnerability analysis? Example: TCP/IP related vulnerabilities
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
VELOCITY. Quick Start Guide. Citrix XenServer Hypervisor. Server Mode (Single-Interface Deployment) Before You Begin SUMMARY OF TASKS
If you re not using Citrix XenCenter 6.0, your screens may vary. VELOCITY REPLICATION ACCELERATOR Citrix XenServer Hypervisor Server Mode (Single-Interface Deployment) 2013 Silver Peak Systems, Inc. This
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
EXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
NETWORK SECURITY WITH OPENSOURCE FIREWALL
NETWORK SECURITY WITH OPENSOURCE FIREWALL Vivek Kathayat,Dr Laxmi Ahuja AIIT Amity University,Noida [email protected] [email protected] ATTACKER SYSTEM: Backtrack 5r3( 192.168.75.10 ) HOST: Backtrack
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump www.enisa.europa.eu Agenda Intro to netflow Metrics Toolbox (Nfsen + Nfdump) Demo www.enisa.europa.eu 2 What is Netflow Netflow = Netflow
TFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES
TFTP - Trivial File TFTP Transfer Protocol TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES Peter R. Egli INDIGOO.COM 1/10 Contents
Troubleshooting the Firewall Services Module
25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
A1.1.1.11.1.1.2 1.1.1.3S B
CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security
Network Security: Workshop
Network Security: Workshop Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,,
A Research Study on Packet Sniffing Tool TCPDUMP
A Research Study on Packet Sniffing Tool TCPDUMP ANSHUL GUPTA SURESH GYAN VIHAR UNIVERSITY, INDIA ABSTRACT Packet sniffer is a technique of monitoring every packet that crosses the network. By using this
Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Network Forensics Network Traffic Analysis
Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab
CET442L Lab #2 IP Configuration and Network Traffic Analysis Lab Goals: In this lab you will plan and implement the IP configuration for the Windows server computers on your group s network. You will use
Network Monitoring Tool to Identify Malware Infected Computers
Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
ISERink Installation Guide
ISERink Installation Guide Version 1.1 January 27, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
FIREWALL AND NAT Lecture 7a
FIREWALL AND NAT Lecture 7a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 3, 2015 Source of most of slides: University of Twente FIREWALL An integrated collection of security
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
