Network Security EDA /2012. Laboratory assignment 4. Revision A/576, :13:02Z

Size: px
Start display at page:

Download "Network Security EDA491 2011/2012. Laboratory assignment 4. Revision A/576, 2012-05-04 06:13:02Z"

Transcription

1 Network Security EDA /2012 Laboratory assignment 4 Revision A/576, :13:02Z

2

3 Lab 4 - Network Intrusion Detection using Snort 1 Purpose In this assignment you will be introduced to network intrusion detection by analysing suspicious network packets and configuring snort to detect and raise alerts for these packets. 2 Reporting To pass this assignment you need to demonstrate that your snort configuration successfully alerts on all suspicious packets, while not raising alerts on legitimate traffic. Also, there are questions throughout the lab PM that should be answered and discussed when the practical part of the lab is done. 3 Preparations at home Look at the reference documents as specified below before you continue reading the lab PM. It is important that you are well prepared and finish the assignment within the allocated time.! IMPORTANT! As this assignment is more open than previous laboratory assignments, it is very important that you read and understand the entire laboratory assignment before you start! A guideline on how to proceed with the assignment is provided at the end of this lab PM in Section Reference documents The Snort Manual, Important chapters (should be read): , and Layout of this assignment In the next section, Section 4, you will be introduced to the laboratory environment. Then, the netcat utility will be introduced in Section 5. First in Section 6, the exercises to be performed are presented. In the first part of those exercises (in 6.1), you will perform some tasks to become familiar with snort. In the second part (in 6.2), you will be analysing malicious traffic and write rules for snort to detect this traffic. Here, important guidelines on how to progress with the analysis for writing your snort-rules will be given. 3

4 4 Lab setup and intrusion detection with snort This lab is conducted in the Computer Engineering lab, room 4220/4225(EDIT building, south wing, floor 4). You can login as usual with your Chalmers account name and password (CID). 4.1 System overview You will use the network server theoden.ce.chalmers.se to generate malicious traffic and direct it against your host. You will use your host to capture and analyze the traffic and to create rules for Snort. You will then use Snort to detect and alert upon successive malicious packets. You log on to theoden from an X window in your lab computer with the command ssh theoden using your normal Chalmers login (CID). 4.2 Snort Snort is a signature based intrusion detection system which maintains a database of detection signatures, or detection rules. For each network packet that is captured, a comparison is made between the content of the packet and the available signatures in the database. Whenever a match is found, Snort raises an alert to notify, e.g., the systems administrator that malicious traffic is directed towards the monitored system. Figure 1 illustrates the detection concept. Figure 1: Boromir sends an attack against ce-pc15, which has snort installed The Snort configuration file snort.conf provides Snort with runtime configuration data, e.g., network variables and rule file locations. On the lab system, the configuration file is located at /chalmers/groups/eda491/lib/lab4/snort.conf. Copy this file to your home directory. The snort.conf file used in this lab contains two network variables, HOME NET and the EXTERNAL NET. If you wish to use any of these in your rules, you should uncomment and set them accordingly. Otherwise you can simply ignore them. Below the variables there is the row # Your rules start here. Below this row you are supposed to insert your own rules according to the instructions provided in the 4

5 following subsections. 5 Lab tools During this assignment you will encounter and become familiar with various network related tools, such as wireshark, Netcat and Snort. Whenever you are uncertain of how you should formulate a specific command line or how a specific feature works, you should refer to the man pages and the manual. Below follows a brief introduction to the Netcat utility, you can skip this paragraph if you are already familiar with Netcat. 5.1 The Netcat utility Netcat, or nc, is the swiss army knife for networks. It can be used for connecting two peers, either by taking the role of the server and listening on incoming connections, or as the client, initiating connections. By using some handy command line tricks you can even get it to transfer commands or files for you. Check out the manual for Netcat. On the lab system it is referred to as nc. Make sure that you figure out enough information to convince yourself that you know the basics. Then use it to retrieve something, e.g., with GET, from the local web server. A clever trick for transmitting strings is to echo the string and then pipe it to nc. Like this: echo STRING nc... Make sure that you get it, since you will be using nc later. 6 Exercises The following exercises are to be done in the lab. As you progress you encounter questions (starting with Q and written in bold font). Discuss and write down the answer to these questions, and be prepared to discuss your answers with the assistants when you have finished the lab. 6.1 Snort in sniffer and packet logger modes Snort is available on each computer in the lab and is invoked by typing sudo snort -i eth0 at the command line. Snort can be invoked in a number of ways and right now we will look at how to start Snort in the sniffer and packet logger modes. Note that the option -i eth0 is always needed when using snort at the lab machines otherwise it will choose an incorrect network interface and hang. Unfortunately snort will not be able to store logs in your NFS4 mounted home directory so you will have to store the logs under /tmp instead. To do this, first create a log directory with the following commands: >> mkdir /tmp/<mylogin> >> mkdir /tmp/<mylogin>/log After this you can give the argument -l /tmp/mylogin/log to snort, to make it use 5

6 this directory for logging. Note: The network card can differ between different hosts. To find the network card in use, issue the command /sbin/ip addr list. A list of network cards and IP-numbers will be presented. The network card with an IP-address in the range of /23 is the one to use. Note: In parallel with your packet capturing session you will have at least one SSH session running. The SSH-traffic is not relevant to the lab, and one way to remove this informationwhenusingwiresharkistosetupafilterthateliminatespacketsforport22. Note: When starting Snort, always start it in foreground mode, i.e., without the &: If there are errors in your rules, Snort will refuse to start and you will be able to see this on the terminal window. If you start Snort as a daemon, it will die silently, and you will probably be confused as of why no alerts are produced. Also, if Snort is running and it does not die when hitting Ctrl-C, you will need to use the kill command instead. Read the manual to figure out how to start Snort in sniffer mode, be sure to test the different options for capturing link, network and transport headers, and payload. To generate some traffic for you to check, you should log into theoden and transmit a the message "TESTMESSAGE SNORTLAB EDA491" between theoden and your computer. Use the hints in Section 5.1. Also be sure that Snort is running before you transmit the string. Q1: To see the string, you had to add the payload option, but when the payload is captured, the log item increased in size. Elaborate briefly on whether payload data should be captured or not with respect to log sizes, attack coverage and amount of traffic passing the detection system. The sniffer mode is seldom useful unless you are looking for a very specific string and use heavy filtering to discard all other traffic. A more useful mode is therefore the packet logger mode, where the packets are captured to file and can thus be inspected after the fact. Note: When running in packet logger or detection mode, you need to use specific options for snort. Add to the command line the options -i eth0, -u username, and -k none. -u sets the permissions on the log- and alert files to yourself so that you can read them, and -k disregards checksum issues, which otherwise will be a problem for you. In addition, use the -l option to denote a directory where you want to store your logs. Example: snort -i eth1 -l <log dir> -u <username> -k none -K <log format>, where log dir is a directory you should create with the mkdir command. Try out snort s packet logger mode and be sure to store packets as both ASCII text and in pcap format (in separate runs). Then, inspect both the ASCII and the pcap files. Only one kind of logging is supported at the same time. 6

7 Q2: Elaborate briefly on storing log files in ASCII and pcap format. When would it be more suitable to store the files in ASCII, and when would it be more suitable to store the files in pcap format. What differences do you find regarding the creation and naming of files. So far we have looked at the sniffer and packet logger modes. The real power of Snort, however, lies in its ability to use a set of rules denoting known malicious network traffic and to raise alerts whenever a rule is matched by a packet. To be able to detect attacks and raise alerts, Snort must be run in intrusion detection mode. 6.2 Snort in intrusion detection mode Before you begin working with this section, there are a few files that need to be present on your system. Therefore you should first retrieve the server1, server2, execute and snort.conf files from the directory /chalmers/groups/eda491/lib/lab4/ and put them in your home directory. Now, make sure you currently is located in your home directory in the lab machine and that the following three files are there server1, server2, and snort.conf. Also make sure that you have the file execute in your home directory on theoden. This section is all about writing Snort rules. Remember that in order for your rules to be effective, you need to restart Snort and provide the path to the configuration file as an option. Note: This part of the lab is quite open and you may solve it in the way you find best. To aid you, an action list is provided in Section The following scenario defines this part of the lab On theoden there are five attacks denoted suspect1...suspect5. Each attack will launch one or more packets towards your system. Each execution of an attack contains exactly one attack, regardless of the number of packets sent by the attack. In our lab, Snort has no memory of previous packets so you need to find common denominators betweenthepacketsandthencreateyourrulesothatonealertisissuedforeachpacket. To launch the attacks, you use the execute program, that you recently downloaded. The syntax for using execute is as follows:./execute <attack name> <IP-address>, where IP-address is the address of your computer. You can check your IP-address with the command /sbin/ifconfig or /sbin/ip addr list. Some of the attacks need a listening service to perform a connection before transmitting its data. Therefore, before you begin, you should start the server1 and server2 programs as follows: >>./server & >>./server & 7

8 >>./server & You should leave these services running since they are needed by the attack scripts to work properly Lab flow You begin with an empty rule set which incrementally should be expanded to contain the rules that you find necessary to prevent the attack packets from entering your system unnoticed. To your help, you have the previously discussed tools (i.e. Snort and Wireshark) to capture what is sent over the network when the attack scripts are run. When the attack data has been captured, you should perform an analysis of the contents in the log and try to identify what parts of the packets that should be included in a rule that will reveal the presence of the packet(s). Try to be as specific as possible, since false alerts will be issued otherwise. Rules should be named according to the attack script that they will match, and they should also include your group number, i.e., when writing a rule for attack script 1, the msg: clause of the rule must have the text "ATTACK 1 nsecnyyy" (where YYY is your lab group number). To assess your rules you can manually inspect (or tail -F) the snort alert file to see if an alert is registered when the packets generated by the script have been received by your host. If nothing is registered in the alert file, you need to tune your script. When you have written rules that will alert on all the attacks, you should validate your rules by running./execute mixed <IP-address>. Using mixed as argument will launch a traffic mix of attacks and legitimate traffic against your system. A script that will inspect your alert file and let you know if you passed or not is located at theoden at /chalmers/groups/eda491/lib/lab4/checkalerts.pl. Copy this script to your home directory on your local machine and execute it. When you see an output that tells you to fetch the supervisor, you are finished, and should contact the supervisor for approval. If you see something else, it means that you missed some attacks, or that your rules are too general. Check your rules and then try again. Q3: In this assignment, you have written specific rules to discover attacks. This paradigm is known as signature based detection. Another detection paradigm is the anomaly detection paradigm, which detects abnormal behaviour. Elaborate on the advantages and disadvantages of the two paradigms. Remember: This is an open assignment, thus you may solve it in the way you find best. The alert file is located in the same directory as your logs, and appropriately called alert. 8

9 To aid you, an action list is provided in the next subsection. Note: Be really sure that you have read chapter three in the snort manual. Otherwise this might be quite difficult Lab progress action list This section will provide an action list for how to proceed when creating your rules. Effectively, this section is a summary of the previous section. 1. Unless already started, start server1 and server2. 2. Start a packet capturer. 3. Launch one attack from theoden against your host with the execute program. 4. Stop the packet capturer. 5. Inspect the produced log file or the content written to screen, and try to identify what constitutes the attack. 6. Input the corresponding rule to the snort.conf file and start/restart snort. 7. Re-launch the attack and inspect the alert file, if there is an alert for the attack, you can move on to the next attack. When all attacks have been executed and the corresponding rules have been created: 1. Create a new alert file. Then run the traffic mix while snort is running. 2. Check the alerts with the checkalerts.sh script. If you pass, contact the instructor, if you fail, rewrite one or more rules and try again. Finally, if you have answered all the questions, report the lab: 1. Make sure all students in the group have understood (and are able to answer to) all the questions. 2. Contact a lab supervisor to check your results. 9

IDS and Penetration Testing Lab III Snort Lab

IDS and Penetration Testing Lab III Snort Lab IDS and Penetration Testing Lab III Snort Lab Purpose: In this lab, we will explore a common free Intrusion Detection System called Snort. Snort was written initially for Linux/Unix, but most functionality

More information

Network Security, ISA 656, Angelos Stavrou. Snort Lab

Network Security, ISA 656, Angelos Stavrou. Snort Lab Snort Lab Purpose: In this lab, we will explore a common free Intrusion Detection System called Snort. Snort was written initially for Linux/Unix, but most functionality is now available in Windows. In

More information

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons

More information

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3

More information

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder. CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files

More information

Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy

Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy Lab 7 - Exploitation 1 NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy Lab 7 - Exploitation 2 Item I. (What were you asked to do?) Metasploit Server Side Exploits Perform the exercises

More information

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013 SOUTHERN POLYTECHNIC STATE UNIVERSITY Snort and Wireshark IT-6873 Lab Manual Exercises Lucas Varner and Trevor Lewis Fall 2013 This document contains instruction manuals for using the tools Wireshark and

More information

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL PREPARATIONS STUDYING SIP PROTOCOL The aim of this exercise is to study the basic aspects of the SIP protocol. Before executing the exercise you should

More information

disect Systems Logging Snort alerts to Syslog and Splunk PRAVEEN DARSHANAM

disect Systems Logging Snort alerts to Syslog and Splunk PRAVEEN DARSHANAM disect Systems Logging Snort alerts to Syslog and Splunk PRAVEEN DARSHANAM INTRODUCTION Snort is an open source network Intrusion Detection and Prevention Systems (IDS/IPS) developed by Martin Roesch capable

More information

Using RADIUS Agent for Transparent User Identification

Using RADIUS Agent for Transparent User Identification Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your

More information

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

1 Recommended Readings. 2 Resources Required. 3 Compiling and Running on Linux

1 Recommended Readings. 2 Resources Required. 3 Compiling and Running on Linux CSC 482/582 Assignment #2 Securing SimpleWebServer Due: September 29, 2015 The goal of this assignment is to learn how to validate input securely. To this purpose, students will add a feature to upload

More information

Lab 1: Introduction to the network lab

Lab 1: Introduction to the network lab CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs,

More information

Firewalls and Software Updates

Firewalls and Software Updates Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General

More information

Project 2: Firewall Design (Phase I)

Project 2: Firewall Design (Phase I) Project 2: Firewall Design (Phase I) CS 161 - Joseph/Tygar November 12, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version

More information

Lab 1: Network Devices and Technologies - Capturing Network Traffic

Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Lab Series Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Domain 1 - Network Security Objective 1.1: Explain the security function and purpose of

More information

Advanced Web Security, Lab

Advanced Web Security, Lab Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,

More information

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of

More information

Intrusion Detections Systems

Intrusion Detections Systems Intrusion Detections Systems 2009-03-04 Secure Computer Systems Poia Samoudi Asli Davor Sutic Contents Intrusion Detections Systems... 1 Contents... 2 Abstract... 2 Introduction... 3 IDS importance...

More information

Network Connect Performance Logs on MAC OS

Network Connect Performance Logs on MAC OS Network Connect Performance Logs on MAC OS How-to Juniper Networks, Inc. 1 Table of Contents Introduction Part 1: Client Prerequisites... 3 Step 1.1: Packet Sniffer... 3 Step 1.2: Output IPs, Routes, Ping,

More information

Exercise 7 Network Forensics

Exercise 7 Network Forensics Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:

More information

Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1

Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1 SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,

More information

Penetration Testing LAB Setup Guide

Penetration Testing LAB Setup Guide Penetration Testing LAB Setup Guide (External Attacker - Intermediate) By: magikh0e - [email protected] Last Edit: July 06 2012 This guide assumes a few things... 1. You have read the basic guide of this

More information

Smoking and any food or drinks are not permitted in the Applications Lab!

Smoking and any food or drinks are not permitted in the Applications Lab! 220 Lab C Introduction to Cisco IP Telephony Pre-Lab Activities: None Purpose of the experiment: To explore the Cisco IP Telephony System configuration options, and its use. Smoking and any food or drinks

More information

Linux FTP Server Setup

Linux FTP Server Setup 17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started

More information

FileBench's Multi-Client feature

FileBench's Multi-Client feature FileBench's Multi-Client feature Filebench now includes facilities to synchronize workload execution on a set of clients, allowing higher offered loads to the server. While primarily intended for network

More information

Network Traffic Analysis

Network Traffic Analysis 2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing

More information

A Review on Network Intrusion Detection System Using Open Source Snort

A Review on Network Intrusion Detection System Using Open Source Snort , pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],

More information

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Passive Logging. Intrusion Detection System (IDS): Software that automates this process Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion

More information

for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later

for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research

More information

Computer Networking LAB 2 HTTP

Computer Networking LAB 2 HTTP Computer Networking LAB 2 HTTP 1 OBJECTIVES The basic GET/response interaction HTTP message formats Retrieving large HTML files Retrieving HTML files with embedded objects HTTP authentication and security

More information

Attacking the TCP Reassembly Plane of Network Forensics Tools

Attacking the TCP Reassembly Plane of Network Forensics Tools Attacking the TCP Reassembly Plane of Network Forensics Tools Gérard 12 Thomas Engel 1 1 University of Luxembourg - SECAN LAB 2 SES ASTRA Outline Introduction Definitions and terminology A PCAP file contains

More information

Installing IBM Websphere Application Server 7 and 8 on OS4 Enterprise Linux

Installing IBM Websphere Application Server 7 and 8 on OS4 Enterprise Linux Installing IBM Websphere Application Server 7 and 8 on OS4 Enterprise Linux By the OS4 Documentation Team Prepared by Roberto J Dohnert Copyright 2013, PC/OpenSystems LLC This whitepaper describes how

More information

Intrusion Detection System

Intrusion Detection System Intrusion Detection System Amir Hossein Payberah [email protected] 1 Contents Intrusion Detection Systems Tripwire Snort 2 IDS (Definition) Intrusion Detection is the process of monitoring the events

More information

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research

More information

STABLE & SECURE BANK lab writeup. Page 1 of 21

STABLE & SECURE BANK lab writeup. Page 1 of 21 STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth

More information

From Network Security To Content Filtering

From Network Security To Content Filtering Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals

More information

Packet Sniffing and Spoofing Lab

Packet Sniffing and Spoofing Lab SEED Labs Packet Sniffing and Spoofing Lab 1 Packet Sniffing and Spoofing Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following grants from

More information

Laboration 3 - Administration

Laboration 3 - Administration Laboration 3 - Administration During this laboration we will learn how to install, configure and test servers that will allow you to have access remote machines, copy files between computers and file sharing.

More information

Snort Installation - Ubuntu FEUP. SSI - ProDEI-2010. Paulo Neto and Rui Chilro. December 7, 2010

Snort Installation - Ubuntu FEUP. SSI - ProDEI-2010. Paulo Neto and Rui Chilro. December 7, 2010 December 7, 2010 Work Proposal The purpose of this work is: Explain a basic IDS Architecture and Topology Explain a more advanced IDS solution Install SNORT on the FEUP Ubuntu distribution and test some

More information

Modern snoop lab lite version

Modern snoop lab lite version Modern snoop lab lite version Lab assignment in Computer Networking OpenIPLab Department of Information Technology, Uppsala University Overview This is a lab constructed as part of the OpenIPLab project.

More information

NASA Workflow Tool. User Guide. September 29, 2010

NASA Workflow Tool. User Guide. September 29, 2010 NASA Workflow Tool User Guide September 29, 2010 NASA Workflow Tool User Guide 1. Overview 2. Getting Started Preparing the Environment 3. Using the NED Client Common Terminology Workflow Configuration

More information

CNT5106C Project Description

CNT5106C Project Description Last Updated: 1/30/2015 12:48 PM CNT5106C Project Description Project Overview In this project, you are asked to write a P2P file sharing software similar to BitTorrent. You can complete the project in

More information

SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC

SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC SoftNAS Application Guide: In-Flight Encryption Contents Introduction to In-Flight Data Encryption... 2 CIFS Encryption In-Flight...

More information

Cloud Backup Express

Cloud Backup Express Cloud Backup Express Table of Contents Installation and Configuration Workflow for RFCBx... 3 Cloud Management Console Installation Guide for Windows... 4 1: Run the Installer... 4 2: Choose Your Language...

More information

Network Monitoring and Forensics

Network Monitoring and Forensics Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

INTRUSION DETECTION SYSTEM

INTRUSION DETECTION SYSTEM INTRUSION DETECTION SYSTEM INTRUSION DETECTION AND PREVENTION using SAX 2.0 and WIRESHARK Cain & Abel 4.9.35 Supervisor Dr. Akshai Kumar Aggarwal Director School of Computer Sciences University of Windsor

More information

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab

More information

How to install PowerChute Network Shutdown on VMware ESXi 3.5, 4.0 and 4.1

How to install PowerChute Network Shutdown on VMware ESXi 3.5, 4.0 and 4.1 How to install PowerChute Network Shutdown on VMware ESXi 3.5, 4.0 and 4.1 Basic knowledge of Linux commands and Linux administration is needed before user should attempt the installation of the software.

More information

Penetration Testing Lab. Reconnaissance and Mapping Using Samurai-2.0

Penetration Testing Lab. Reconnaissance and Mapping Using Samurai-2.0 Penetration Testing Lab Reconnaissance and Mapping Using Samurai-2.0 Notes: 1. Be careful about running most of these tools against machines without permission. Even the poorest intrusion detection system

More information

Using Dedicated Servers from the game

Using Dedicated Servers from the game Quick and short instructions for running and using Project CARS dedicated servers on PC. Last updated 27.2.2015. Using Dedicated Servers from the game Creating multiplayer session hosted on a DS Joining

More information

$ftp = Net::FTP->new("some.host.name", Debug => 0) or die "Cannot connect to some.host.name: $@";

$ftp = Net::FTP->new(some.host.name, Debug => 0) or die Cannot connect to some.host.name: $@; NAME Net::FTP - FTP Client class SYNOPSIS use Net::FTP; $ftp = Net::FTP->new("some.host.name", Debug => 0) or die "Cannot connect to some.host.name: $@"; $ftp->login("anonymous",'-anonymous@') or die "Cannot

More information

Snoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points

Snoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points Snoopy Due Date: Nov 1 Points: 25 Points Objective: To gain experience intercepting/capturing HTTP/TCP traffic on a network. Equipment Needed Use the Ubuntu OS that you originally downloaded from the course

More information

Network Security: Workshop

Network Security: Workshop Network Security: Workshop Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,,

More information

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Firewall Design Principles Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations

More information

Setting Up Specify to use a Shared Workstation as a Database Server

Setting Up Specify to use a Shared Workstation as a Database Server Specify Software Project www.specifysoftware.org Setting Up Specify to use a Shared Workstation as a Database Server This installation documentation is intended for workstations that include an installation

More information

Tutorial. Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired

Tutorial. Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired Setup Tutorial Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired Necessary Downloads 1. Download VM at http://www.cs.princeton.edu/courses/archive/fall10/cos561/assignments/cos561tutorial.zip

More information

Integrity Checking and Monitoring of Files on the CASTOR Disk Servers

Integrity Checking and Monitoring of Files on the CASTOR Disk Servers Integrity Checking and Monitoring of Files on the CASTOR Disk Servers Author: Hallgeir Lien CERN openlab 17/8/2011 Contents CONTENTS 1 Introduction 4 1.1 Background...........................................

More information

INASP: Effective Network Management Workshops

INASP: Effective Network Management Workshops INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network

More information

Introducing the Adafruit Bluefruit LE Sniffer

Introducing the Adafruit Bluefruit LE Sniffer Introducing the Adafruit Bluefruit LE Sniffer Created by Kevin Townsend Last updated on 2015-06-25 08:40:07 AM EDT Guide Contents Guide Contents Introduction FTDI Driver Requirements Using the Sniffer

More information

PageR Enterprise Monitored Objects - AS/400-5

PageR Enterprise Monitored Objects - AS/400-5 PageR Enterprise Monitored Objects - AS/400-5 The AS/400 server is widely used by organizations around the world. It is well known for its stability and around the clock availability. PageR can help users

More information

IDS / IPS. James E. Thiel S.W.A.T.

IDS / IPS. James E. Thiel S.W.A.T. IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods

More information

Sonatype CLM Enforcement Points - Continuous Integration (CI) Sonatype CLM Enforcement Points - Continuous Integration (CI)

Sonatype CLM Enforcement Points - Continuous Integration (CI) Sonatype CLM Enforcement Points - Continuous Integration (CI) Sonatype CLM Enforcement Points - Continuous Integration (CI) i Sonatype CLM Enforcement Points - Continuous Integration (CI) Sonatype CLM Enforcement Points - Continuous Integration (CI) ii Contents 1

More information

LINUX SECURITY COOKBOOK. DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes

LINUX SECURITY COOKBOOK. DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes LINUX SECURITY COOKBOOK DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes ORELLY Beijing " Cambridge " Farnham " Koln " Paris " Sebastopol " Taipei - Tokyo Table of Contents Preface............,....................................................A

More information

Enterprise Reporting Server v3.5

Enterprise Reporting Server v3.5 Enterprise Reporting Server v3.5 Administrator s Guide January 2001 Edition 2001 WebTrends Corporation Disclaimer WebTrends Corporation makes no representations or warranties with respect to the contents

More information

SOA Software: Troubleshooting Guide for Agents

SOA Software: Troubleshooting Guide for Agents SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,

More information

Introduction to Operating Systems

Introduction to Operating Systems Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these

More information

Snort. A practical NIDS

Snort. A practical NIDS Snort A practical NIDS What is SNORT Snort is a packet logger/analyzer, which can be used to implement a NIDS. It can based be used in 4 modes: Sniffer mode Packet Logger mode Network Intrusion Detection

More information

NetSpective Logon Agent Guide for NetAuditor

NetSpective Logon Agent Guide for NetAuditor NetSpective Logon Agent Guide for NetAuditor The NetSpective Logon Agent The NetSpective Logon Agent is a simple application that runs on client machines on your network to inform NetSpective (and/or NetAuditor)

More information

Network Connect & Junos Pulse Performance Logs on Windows

Network Connect & Junos Pulse Performance Logs on Windows Network Connect & Junos Pulse Performance Logs on Windows How-to Juniper Networks, Inc. 1 Table of Contents Introduction Part 1: Client Prerequisites... 3 Step 1.1: Packet Sniffer... 3 Step 1.2: Output

More information

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against

More information

Security Event Management. February 7, 2007 (Revision 5)

Security Event Management. February 7, 2007 (Revision 5) Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST

More information

File Transfer Examples. Running commands on other computers and transferring files between computers

File Transfer Examples. Running commands on other computers and transferring files between computers Running commands on other computers and transferring files between computers 1 1 Remote Login Login to remote computer and run programs on that computer Once logged in to remote computer, everything you

More information

Configuring FTP Availability Monitoring With Sentry-go Quick & Plus! monitors

Configuring FTP Availability Monitoring With Sentry-go Quick & Plus! monitors Configuring FTP Availability Monitoring With Sentry-go Quick & Plus! monitors 3Ds (UK) Limited, November, 2013 http://www.sentry-go.com Be Proactive, Not Reactive! Many sites and external systems transfer

More information

Planning the Installation and Installing SQL Server

Planning the Installation and Installing SQL Server Chapter 2 Planning the Installation and Installing SQL Server In This Chapter c SQL Server Editions c Planning Phase c Installing SQL Server 22 Microsoft SQL Server 2012: A Beginner s Guide This chapter

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion

More information

IDS and Penetration Testing Lab ISA656 (Attacker)

IDS and Penetration Testing Lab ISA656 (Attacker) IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible

More information

Analyzing cluster log files using Logsurfer

Analyzing cluster log files using Logsurfer Analyzing cluster log files using Logsurfer James E. Prewett The Center for High Performance Computing at UNM (HPC@UNM) Abstract. Logsurfer is a log file analysis tool that simplifies cluster maintenance

More information

International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849

International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849 WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore

More information

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server

More information

128 CERT Exercises Toolset Document for students

128 CERT Exercises Toolset Document for students 128 CERT Exercises Toolset 14. Exercise: Proactive incident detection 14.1 What will you learn? In this exercise you will learn how to set up and work with AbuseHelper. AbuseHelper is an open source software

More information

How To Gather Log Files On A Pulse Secure Server On A Pc Or Ipad (For A Free Download) On A Network Or Ipa (For Free) On An Ipa Or Ipv (For An Ubuntu) On Your Pc

How To Gather Log Files On A Pulse Secure Server On A Pc Or Ipad (For A Free Download) On A Network Or Ipa (For Free) On An Ipa Or Ipv (For An Ubuntu) On Your Pc Network Connect & Pulse Performance Logs on Windows How-to Published Date July 2015 Contents Introduction 4 Part 1: Client Prerequisites 4 Step 1.1: Packet Sniffer 4 Step 1.2: Output of IPs, Routes, Ping,

More information

Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp

Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic

More information

Online Vulnerability Scanner Quick Start Guide

Online Vulnerability Scanner Quick Start Guide Online Vulnerability Scanner Quick Start Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted.

More information

Access Control and Audit Trail Software

Access Control and Audit Trail Software Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control

More information

User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1

User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1 The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)

More information

Configuring Snort as a Firewall on Windows 7 Environment

Configuring Snort as a Firewall on Windows 7 Environment Configuring Snort as a Firewall on Windo Environment Moath Hashim Alsafasfeh a, Abdel Ilah Noor Alshbatat b a National university of Malaysia UKM, Selengor, Malaysia. b Tafila Technical University, Electrical

More information

Analyze Traffic with Monitoring Interfaces and Packet Forwarding

Analyze Traffic with Monitoring Interfaces and Packet Forwarding Analyze Traffic with Monitoring Interfaces and Packet Forwarding Published: 2016-04-08 This guide explains how to configure an ExtraHop appliance to analyze network traffic using both monitoring interfaces

More information

File transfer clients manual File Delivery Services

File transfer clients manual File Delivery Services File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse

More information

Configuring Snort as a Firewall on Windows 7 Environment

Configuring Snort as a Firewall on Windows 7 Environment Journal of Ubiquitous Systems & Pervasive Networks Volume 3, No. 2 (2011) pp. 3- Configuring Snort as a Firewall on Windo Environment Moath Hashim Alsafasfeh a, Abdel Ilah Noor Alshbatat b a National University

More information

Figure 1. Wireshark Menu Bar

Figure 1. Wireshark Menu Bar Packet Capture In this article, we shall cover the basic working of a sniffer, to capture packets for analyzing the traffic. If an analyst does not have working skills of a packet sniffer to a certain

More information

Command Line Interface User Guide for Intel Server Management Software

Command Line Interface User Guide for Intel Server Management Software Command Line Interface User Guide for Intel Server Management Software Legal Information Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information