Network Security EDA /2012. Laboratory assignment 4. Revision A/576, :13:02Z
|
|
|
- Griselda Rogers
- 10 years ago
- Views:
Transcription
1 Network Security EDA /2012 Laboratory assignment 4 Revision A/576, :13:02Z
2
3 Lab 4 - Network Intrusion Detection using Snort 1 Purpose In this assignment you will be introduced to network intrusion detection by analysing suspicious network packets and configuring snort to detect and raise alerts for these packets. 2 Reporting To pass this assignment you need to demonstrate that your snort configuration successfully alerts on all suspicious packets, while not raising alerts on legitimate traffic. Also, there are questions throughout the lab PM that should be answered and discussed when the practical part of the lab is done. 3 Preparations at home Look at the reference documents as specified below before you continue reading the lab PM. It is important that you are well prepared and finish the assignment within the allocated time.! IMPORTANT! As this assignment is more open than previous laboratory assignments, it is very important that you read and understand the entire laboratory assignment before you start! A guideline on how to proceed with the assignment is provided at the end of this lab PM in Section Reference documents The Snort Manual, Important chapters (should be read): , and Layout of this assignment In the next section, Section 4, you will be introduced to the laboratory environment. Then, the netcat utility will be introduced in Section 5. First in Section 6, the exercises to be performed are presented. In the first part of those exercises (in 6.1), you will perform some tasks to become familiar with snort. In the second part (in 6.2), you will be analysing malicious traffic and write rules for snort to detect this traffic. Here, important guidelines on how to progress with the analysis for writing your snort-rules will be given. 3
4 4 Lab setup and intrusion detection with snort This lab is conducted in the Computer Engineering lab, room 4220/4225(EDIT building, south wing, floor 4). You can login as usual with your Chalmers account name and password (CID). 4.1 System overview You will use the network server theoden.ce.chalmers.se to generate malicious traffic and direct it against your host. You will use your host to capture and analyze the traffic and to create rules for Snort. You will then use Snort to detect and alert upon successive malicious packets. You log on to theoden from an X window in your lab computer with the command ssh theoden using your normal Chalmers login (CID). 4.2 Snort Snort is a signature based intrusion detection system which maintains a database of detection signatures, or detection rules. For each network packet that is captured, a comparison is made between the content of the packet and the available signatures in the database. Whenever a match is found, Snort raises an alert to notify, e.g., the systems administrator that malicious traffic is directed towards the monitored system. Figure 1 illustrates the detection concept. Figure 1: Boromir sends an attack against ce-pc15, which has snort installed The Snort configuration file snort.conf provides Snort with runtime configuration data, e.g., network variables and rule file locations. On the lab system, the configuration file is located at /chalmers/groups/eda491/lib/lab4/snort.conf. Copy this file to your home directory. The snort.conf file used in this lab contains two network variables, HOME NET and the EXTERNAL NET. If you wish to use any of these in your rules, you should uncomment and set them accordingly. Otherwise you can simply ignore them. Below the variables there is the row # Your rules start here. Below this row you are supposed to insert your own rules according to the instructions provided in the 4
5 following subsections. 5 Lab tools During this assignment you will encounter and become familiar with various network related tools, such as wireshark, Netcat and Snort. Whenever you are uncertain of how you should formulate a specific command line or how a specific feature works, you should refer to the man pages and the manual. Below follows a brief introduction to the Netcat utility, you can skip this paragraph if you are already familiar with Netcat. 5.1 The Netcat utility Netcat, or nc, is the swiss army knife for networks. It can be used for connecting two peers, either by taking the role of the server and listening on incoming connections, or as the client, initiating connections. By using some handy command line tricks you can even get it to transfer commands or files for you. Check out the manual for Netcat. On the lab system it is referred to as nc. Make sure that you figure out enough information to convince yourself that you know the basics. Then use it to retrieve something, e.g., with GET, from the local web server. A clever trick for transmitting strings is to echo the string and then pipe it to nc. Like this: echo STRING nc... Make sure that you get it, since you will be using nc later. 6 Exercises The following exercises are to be done in the lab. As you progress you encounter questions (starting with Q and written in bold font). Discuss and write down the answer to these questions, and be prepared to discuss your answers with the assistants when you have finished the lab. 6.1 Snort in sniffer and packet logger modes Snort is available on each computer in the lab and is invoked by typing sudo snort -i eth0 at the command line. Snort can be invoked in a number of ways and right now we will look at how to start Snort in the sniffer and packet logger modes. Note that the option -i eth0 is always needed when using snort at the lab machines otherwise it will choose an incorrect network interface and hang. Unfortunately snort will not be able to store logs in your NFS4 mounted home directory so you will have to store the logs under /tmp instead. To do this, first create a log directory with the following commands: >> mkdir /tmp/<mylogin> >> mkdir /tmp/<mylogin>/log After this you can give the argument -l /tmp/mylogin/log to snort, to make it use 5
6 this directory for logging. Note: The network card can differ between different hosts. To find the network card in use, issue the command /sbin/ip addr list. A list of network cards and IP-numbers will be presented. The network card with an IP-address in the range of /23 is the one to use. Note: In parallel with your packet capturing session you will have at least one SSH session running. The SSH-traffic is not relevant to the lab, and one way to remove this informationwhenusingwiresharkistosetupafilterthateliminatespacketsforport22. Note: When starting Snort, always start it in foreground mode, i.e., without the &: If there are errors in your rules, Snort will refuse to start and you will be able to see this on the terminal window. If you start Snort as a daemon, it will die silently, and you will probably be confused as of why no alerts are produced. Also, if Snort is running and it does not die when hitting Ctrl-C, you will need to use the kill command instead. Read the manual to figure out how to start Snort in sniffer mode, be sure to test the different options for capturing link, network and transport headers, and payload. To generate some traffic for you to check, you should log into theoden and transmit a the message "TESTMESSAGE SNORTLAB EDA491" between theoden and your computer. Use the hints in Section 5.1. Also be sure that Snort is running before you transmit the string. Q1: To see the string, you had to add the payload option, but when the payload is captured, the log item increased in size. Elaborate briefly on whether payload data should be captured or not with respect to log sizes, attack coverage and amount of traffic passing the detection system. The sniffer mode is seldom useful unless you are looking for a very specific string and use heavy filtering to discard all other traffic. A more useful mode is therefore the packet logger mode, where the packets are captured to file and can thus be inspected after the fact. Note: When running in packet logger or detection mode, you need to use specific options for snort. Add to the command line the options -i eth0, -u username, and -k none. -u sets the permissions on the log- and alert files to yourself so that you can read them, and -k disregards checksum issues, which otherwise will be a problem for you. In addition, use the -l option to denote a directory where you want to store your logs. Example: snort -i eth1 -l <log dir> -u <username> -k none -K <log format>, where log dir is a directory you should create with the mkdir command. Try out snort s packet logger mode and be sure to store packets as both ASCII text and in pcap format (in separate runs). Then, inspect both the ASCII and the pcap files. Only one kind of logging is supported at the same time. 6
7 Q2: Elaborate briefly on storing log files in ASCII and pcap format. When would it be more suitable to store the files in ASCII, and when would it be more suitable to store the files in pcap format. What differences do you find regarding the creation and naming of files. So far we have looked at the sniffer and packet logger modes. The real power of Snort, however, lies in its ability to use a set of rules denoting known malicious network traffic and to raise alerts whenever a rule is matched by a packet. To be able to detect attacks and raise alerts, Snort must be run in intrusion detection mode. 6.2 Snort in intrusion detection mode Before you begin working with this section, there are a few files that need to be present on your system. Therefore you should first retrieve the server1, server2, execute and snort.conf files from the directory /chalmers/groups/eda491/lib/lab4/ and put them in your home directory. Now, make sure you currently is located in your home directory in the lab machine and that the following three files are there server1, server2, and snort.conf. Also make sure that you have the file execute in your home directory on theoden. This section is all about writing Snort rules. Remember that in order for your rules to be effective, you need to restart Snort and provide the path to the configuration file as an option. Note: This part of the lab is quite open and you may solve it in the way you find best. To aid you, an action list is provided in Section The following scenario defines this part of the lab On theoden there are five attacks denoted suspect1...suspect5. Each attack will launch one or more packets towards your system. Each execution of an attack contains exactly one attack, regardless of the number of packets sent by the attack. In our lab, Snort has no memory of previous packets so you need to find common denominators betweenthepacketsandthencreateyourrulesothatonealertisissuedforeachpacket. To launch the attacks, you use the execute program, that you recently downloaded. The syntax for using execute is as follows:./execute <attack name> <IP-address>, where IP-address is the address of your computer. You can check your IP-address with the command /sbin/ifconfig or /sbin/ip addr list. Some of the attacks need a listening service to perform a connection before transmitting its data. Therefore, before you begin, you should start the server1 and server2 programs as follows: >>./server & >>./server & 7
8 >>./server & You should leave these services running since they are needed by the attack scripts to work properly Lab flow You begin with an empty rule set which incrementally should be expanded to contain the rules that you find necessary to prevent the attack packets from entering your system unnoticed. To your help, you have the previously discussed tools (i.e. Snort and Wireshark) to capture what is sent over the network when the attack scripts are run. When the attack data has been captured, you should perform an analysis of the contents in the log and try to identify what parts of the packets that should be included in a rule that will reveal the presence of the packet(s). Try to be as specific as possible, since false alerts will be issued otherwise. Rules should be named according to the attack script that they will match, and they should also include your group number, i.e., when writing a rule for attack script 1, the msg: clause of the rule must have the text "ATTACK 1 nsecnyyy" (where YYY is your lab group number). To assess your rules you can manually inspect (or tail -F) the snort alert file to see if an alert is registered when the packets generated by the script have been received by your host. If nothing is registered in the alert file, you need to tune your script. When you have written rules that will alert on all the attacks, you should validate your rules by running./execute mixed <IP-address>. Using mixed as argument will launch a traffic mix of attacks and legitimate traffic against your system. A script that will inspect your alert file and let you know if you passed or not is located at theoden at /chalmers/groups/eda491/lib/lab4/checkalerts.pl. Copy this script to your home directory on your local machine and execute it. When you see an output that tells you to fetch the supervisor, you are finished, and should contact the supervisor for approval. If you see something else, it means that you missed some attacks, or that your rules are too general. Check your rules and then try again. Q3: In this assignment, you have written specific rules to discover attacks. This paradigm is known as signature based detection. Another detection paradigm is the anomaly detection paradigm, which detects abnormal behaviour. Elaborate on the advantages and disadvantages of the two paradigms. Remember: This is an open assignment, thus you may solve it in the way you find best. The alert file is located in the same directory as your logs, and appropriately called alert. 8
9 To aid you, an action list is provided in the next subsection. Note: Be really sure that you have read chapter three in the snort manual. Otherwise this might be quite difficult Lab progress action list This section will provide an action list for how to proceed when creating your rules. Effectively, this section is a summary of the previous section. 1. Unless already started, start server1 and server2. 2. Start a packet capturer. 3. Launch one attack from theoden against your host with the execute program. 4. Stop the packet capturer. 5. Inspect the produced log file or the content written to screen, and try to identify what constitutes the attack. 6. Input the corresponding rule to the snort.conf file and start/restart snort. 7. Re-launch the attack and inspect the alert file, if there is an alert for the attack, you can move on to the next attack. When all attacks have been executed and the corresponding rules have been created: 1. Create a new alert file. Then run the traffic mix while snort is running. 2. Check the alerts with the checkalerts.sh script. If you pass, contact the instructor, if you fail, rewrite one or more rules and try again. Finally, if you have answered all the questions, report the lab: 1. Make sure all students in the group have understood (and are able to answer to) all the questions. 2. Contact a lab supervisor to check your results. 9
IDS and Penetration Testing Lab III Snort Lab
IDS and Penetration Testing Lab III Snort Lab Purpose: In this lab, we will explore a common free Intrusion Detection System called Snort. Snort was written initially for Linux/Unix, but most functionality
Network Security, ISA 656, Angelos Stavrou. Snort Lab
Snort Lab Purpose: In this lab, we will explore a common free Intrusion Detection System called Snort. Snort was written initially for Linux/Unix, but most functionality is now available in Windows. In
Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort
License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons
How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box
CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy
Lab 7 - Exploitation 1 NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy Lab 7 - Exploitation 2 Item I. (What were you asked to do?) Metasploit Server Side Exploits Perform the exercises
SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013
SOUTHERN POLYTECHNIC STATE UNIVERSITY Snort and Wireshark IT-6873 Lab Manual Exercises Lucas Varner and Trevor Lewis Fall 2013 This document contains instruction manuals for using the tools Wireshark and
EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL
EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL PREPARATIONS STUDYING SIP PROTOCOL The aim of this exercise is to study the basic aspects of the SIP protocol. Before executing the exercise you should
disect Systems Logging Snort alerts to Syslog and Splunk PRAVEEN DARSHANAM
disect Systems Logging Snort alerts to Syslog and Splunk PRAVEEN DARSHANAM INTRODUCTION Snort is an open source network Intrusion Detection and Prevention Systems (IDS/IPS) developed by Martin Roesch capable
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
1 Recommended Readings. 2 Resources Required. 3 Compiling and Running on Linux
CSC 482/582 Assignment #2 Securing SimpleWebServer Due: September 29, 2015 The goal of this assignment is to learn how to validate input securely. To this purpose, students will add a feature to upload
Lab 1: Introduction to the network lab
CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs,
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Project 2: Firewall Design (Phase I)
Project 2: Firewall Design (Phase I) CS 161 - Joseph/Tygar November 12, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
Lab 1: Network Devices and Technologies - Capturing Network Traffic
CompTIA Security+ Lab Series Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Domain 1 - Network Security Objective 1.1: Explain the security function and purpose of
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Intrusion Detections Systems
Intrusion Detections Systems 2009-03-04 Secure Computer Systems Poia Samoudi Asli Davor Sutic Contents Intrusion Detections Systems... 1 Contents... 2 Abstract... 2 Introduction... 3 IDS importance...
Network Connect Performance Logs on MAC OS
Network Connect Performance Logs on MAC OS How-to Juniper Networks, Inc. 1 Table of Contents Introduction Part 1: Client Prerequisites... 3 Step 1.1: Packet Sniffer... 3 Step 1.2: Output IPs, Routes, Ping,
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
Penetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (External Attacker - Intermediate) By: magikh0e - [email protected] Last Edit: July 06 2012 This guide assumes a few things... 1. You have read the basic guide of this
Smoking and any food or drinks are not permitted in the Applications Lab!
220 Lab C Introduction to Cisco IP Telephony Pre-Lab Activities: None Purpose of the experiment: To explore the Cisco IP Telephony System configuration options, and its use. Smoking and any food or drinks
Linux FTP Server Setup
17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started
FileBench's Multi-Client feature
FileBench's Multi-Client feature Filebench now includes facilities to synchronize workload execution on a set of clients, allowing higher offered loads to the server. While primarily intended for network
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Passive Logging. Intrusion Detection System (IDS): Software that automates this process
Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
Computer Networking LAB 2 HTTP
Computer Networking LAB 2 HTTP 1 OBJECTIVES The basic GET/response interaction HTTP message formats Retrieving large HTML files Retrieving HTML files with embedded objects HTTP authentication and security
Attacking the TCP Reassembly Plane of Network Forensics Tools
Attacking the TCP Reassembly Plane of Network Forensics Tools Gérard 12 Thomas Engel 1 1 University of Luxembourg - SECAN LAB 2 SES ASTRA Outline Introduction Definitions and terminology A PCAP file contains
Installing IBM Websphere Application Server 7 and 8 on OS4 Enterprise Linux
Installing IBM Websphere Application Server 7 and 8 on OS4 Enterprise Linux By the OS4 Documentation Team Prepared by Roberto J Dohnert Copyright 2013, PC/OpenSystems LLC This whitepaper describes how
Intrusion Detection System
Intrusion Detection System Amir Hossein Payberah [email protected] 1 Contents Intrusion Detection Systems Tripwire Snort 2 IDS (Definition) Intrusion Detection is the process of monitoring the events
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
From Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
Packet Sniffing and Spoofing Lab
SEED Labs Packet Sniffing and Spoofing Lab 1 Packet Sniffing and Spoofing Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following grants from
Laboration 3 - Administration
Laboration 3 - Administration During this laboration we will learn how to install, configure and test servers that will allow you to have access remote machines, copy files between computers and file sharing.
Snort Installation - Ubuntu FEUP. SSI - ProDEI-2010. Paulo Neto and Rui Chilro. December 7, 2010
December 7, 2010 Work Proposal The purpose of this work is: Explain a basic IDS Architecture and Topology Explain a more advanced IDS solution Install SNORT on the FEUP Ubuntu distribution and test some
Modern snoop lab lite version
Modern snoop lab lite version Lab assignment in Computer Networking OpenIPLab Department of Information Technology, Uppsala University Overview This is a lab constructed as part of the OpenIPLab project.
NASA Workflow Tool. User Guide. September 29, 2010
NASA Workflow Tool User Guide September 29, 2010 NASA Workflow Tool User Guide 1. Overview 2. Getting Started Preparing the Environment 3. Using the NED Client Common Terminology Workflow Configuration
CNT5106C Project Description
Last Updated: 1/30/2015 12:48 PM CNT5106C Project Description Project Overview In this project, you are asked to write a P2P file sharing software similar to BitTorrent. You can complete the project in
SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC
SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC SoftNAS Application Guide: In-Flight Encryption Contents Introduction to In-Flight Data Encryption... 2 CIFS Encryption In-Flight...
Cloud Backup Express
Cloud Backup Express Table of Contents Installation and Configuration Workflow for RFCBx... 3 Cloud Management Console Installation Guide for Windows... 4 1: Run the Installer... 4 2: Choose Your Language...
Network Monitoring and Forensics
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM INTRUSION DETECTION AND PREVENTION using SAX 2.0 and WIRESHARK Cain & Abel 4.9.35 Supervisor Dr. Akshai Kumar Aggarwal Director School of Computer Sciences University of Windsor
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
How to install PowerChute Network Shutdown on VMware ESXi 3.5, 4.0 and 4.1
How to install PowerChute Network Shutdown on VMware ESXi 3.5, 4.0 and 4.1 Basic knowledge of Linux commands and Linux administration is needed before user should attempt the installation of the software.
Penetration Testing Lab. Reconnaissance and Mapping Using Samurai-2.0
Penetration Testing Lab Reconnaissance and Mapping Using Samurai-2.0 Notes: 1. Be careful about running most of these tools against machines without permission. Even the poorest intrusion detection system
Using Dedicated Servers from the game
Quick and short instructions for running and using Project CARS dedicated servers on PC. Last updated 27.2.2015. Using Dedicated Servers from the game Creating multiplayer session hosted on a DS Joining
$ftp = Net::FTP->new("some.host.name", Debug => 0) or die "Cannot connect to some.host.name: $@";
NAME Net::FTP - FTP Client class SYNOPSIS use Net::FTP; $ftp = Net::FTP->new("some.host.name", Debug => 0) or die "Cannot connect to some.host.name: $@"; $ftp->login("anonymous",'-anonymous@') or die "Cannot
Snoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points
Snoopy Due Date: Nov 1 Points: 25 Points Objective: To gain experience intercepting/capturing HTTP/TCP traffic on a network. Equipment Needed Use the Ubuntu OS that you originally downloaded from the course
Network Security: Workshop
Network Security: Workshop Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,,
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
Setting Up Specify to use a Shared Workstation as a Database Server
Specify Software Project www.specifysoftware.org Setting Up Specify to use a Shared Workstation as a Database Server This installation documentation is intended for workstations that include an installation
Tutorial. Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired
Setup Tutorial Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired Necessary Downloads 1. Download VM at http://www.cs.princeton.edu/courses/archive/fall10/cos561/assignments/cos561tutorial.zip
Integrity Checking and Monitoring of Files on the CASTOR Disk Servers
Integrity Checking and Monitoring of Files on the CASTOR Disk Servers Author: Hallgeir Lien CERN openlab 17/8/2011 Contents CONTENTS 1 Introduction 4 1.1 Background...........................................
INASP: Effective Network Management Workshops
INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network
Introducing the Adafruit Bluefruit LE Sniffer
Introducing the Adafruit Bluefruit LE Sniffer Created by Kevin Townsend Last updated on 2015-06-25 08:40:07 AM EDT Guide Contents Guide Contents Introduction FTDI Driver Requirements Using the Sniffer
PageR Enterprise Monitored Objects - AS/400-5
PageR Enterprise Monitored Objects - AS/400-5 The AS/400 server is widely used by organizations around the world. It is well known for its stability and around the clock availability. PageR can help users
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Sonatype CLM Enforcement Points - Continuous Integration (CI) Sonatype CLM Enforcement Points - Continuous Integration (CI)
Sonatype CLM Enforcement Points - Continuous Integration (CI) i Sonatype CLM Enforcement Points - Continuous Integration (CI) Sonatype CLM Enforcement Points - Continuous Integration (CI) ii Contents 1
LINUX SECURITY COOKBOOK. DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes
LINUX SECURITY COOKBOOK DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes ORELLY Beijing " Cambridge " Farnham " Koln " Paris " Sebastopol " Taipei - Tokyo Table of Contents Preface............,....................................................A
Enterprise Reporting Server v3.5
Enterprise Reporting Server v3.5 Administrator s Guide January 2001 Edition 2001 WebTrends Corporation Disclaimer WebTrends Corporation makes no representations or warranties with respect to the contents
SOA Software: Troubleshooting Guide for Agents
SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Snort. A practical NIDS
Snort A practical NIDS What is SNORT Snort is a packet logger/analyzer, which can be used to implement a NIDS. It can based be used in 4 modes: Sniffer mode Packet Logger mode Network Intrusion Detection
NetSpective Logon Agent Guide for NetAuditor
NetSpective Logon Agent Guide for NetAuditor The NetSpective Logon Agent The NetSpective Logon Agent is a simple application that runs on client machines on your network to inform NetSpective (and/or NetAuditor)
Network Connect & Junos Pulse Performance Logs on Windows
Network Connect & Junos Pulse Performance Logs on Windows How-to Juniper Networks, Inc. 1 Table of Contents Introduction Part 1: Client Prerequisites... 3 Step 1.1: Packet Sniffer... 3 Step 1.2: Output
CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM
59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
File Transfer Examples. Running commands on other computers and transferring files between computers
Running commands on other computers and transferring files between computers 1 1 Remote Login Login to remote computer and run programs on that computer Once logged in to remote computer, everything you
Configuring FTP Availability Monitoring With Sentry-go Quick & Plus! monitors
Configuring FTP Availability Monitoring With Sentry-go Quick & Plus! monitors 3Ds (UK) Limited, November, 2013 http://www.sentry-go.com Be Proactive, Not Reactive! Many sites and external systems transfer
Planning the Installation and Installing SQL Server
Chapter 2 Planning the Installation and Installing SQL Server In This Chapter c SQL Server Editions c Planning Phase c Installing SQL Server 22 Microsoft SQL Server 2012: A Beginner s Guide This chapter
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion
IDS and Penetration Testing Lab ISA656 (Attacker)
IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible
Analyzing cluster log files using Logsurfer
Analyzing cluster log files using Logsurfer James E. Prewett The Center for High Performance Computing at UNM (HPC@UNM) Abstract. Logsurfer is a log file analysis tool that simplifies cluster maintenance
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server
128 CERT Exercises Toolset Document for students
128 CERT Exercises Toolset 14. Exercise: Proactive incident detection 14.1 What will you learn? In this exercise you will learn how to set up and work with AbuseHelper. AbuseHelper is an open source software
How To Gather Log Files On A Pulse Secure Server On A Pc Or Ipad (For A Free Download) On A Network Or Ipa (For Free) On An Ipa Or Ipv (For An Ubuntu) On Your Pc
Network Connect & Pulse Performance Logs on Windows How-to Published Date July 2015 Contents Introduction 4 Part 1: Client Prerequisites 4 Step 1.1: Packet Sniffer 4 Step 1.2: Output of IPs, Routes, Ping,
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
Online Vulnerability Scanner Quick Start Guide
Online Vulnerability Scanner Quick Start Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted.
Access Control and Audit Trail Software
Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control
User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1
The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)
Configuring Snort as a Firewall on Windows 7 Environment
Configuring Snort as a Firewall on Windo Environment Moath Hashim Alsafasfeh a, Abdel Ilah Noor Alshbatat b a National university of Malaysia UKM, Selengor, Malaysia. b Tafila Technical University, Electrical
Analyze Traffic with Monitoring Interfaces and Packet Forwarding
Analyze Traffic with Monitoring Interfaces and Packet Forwarding Published: 2016-04-08 This guide explains how to configure an ExtraHop appliance to analyze network traffic using both monitoring interfaces
File transfer clients manual File Delivery Services
File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse
Configuring Snort as a Firewall on Windows 7 Environment
Journal of Ubiquitous Systems & Pervasive Networks Volume 3, No. 2 (2011) pp. 3- Configuring Snort as a Firewall on Windo Environment Moath Hashim Alsafasfeh a, Abdel Ilah Noor Alshbatat b a National University
Figure 1. Wireshark Menu Bar
Packet Capture In this article, we shall cover the basic working of a sniffer, to capture packets for analyzing the traffic. If an analyst does not have working skills of a packet sniffer to a certain
Command Line Interface User Guide for Intel Server Management Software
Command Line Interface User Guide for Intel Server Management Software Legal Information Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
