CS197U: A Hands on Introduction to Unix



Similar documents
CS197U: A Hands on Introduction to Unix

Introduction to Passive Network Traffic Monitoring

Packet Sniffing with Wireshark and Tcpdump

Introduction to Network Security Lab 1 - Wireshark

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,...

BASIC ANALYSIS OF TCP/IP NETWORKS

Modern snoop lab lite version

Introduction to Analyzer and the ARP protocol

Lab VI Capturing and monitoring the network traffic

Introduction on Low level Network tools

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Network Packet Analysis and Scapy Introduction

Unix System Administration

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Internet Control Protocols Reading: Chapter 3

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

EKT 332/4 COMPUTER NETWORK

Homework 3 TCP/IP Network Monitoring and Management

Firewall Firewall August, 2003

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Practical Network Forensics

Network Traffic Evolution. Prof. Anja Feldmann, Ph.D. Dr. Steve Uhlig

How to protect your home/office network?

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

MITM Man in the Middle

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

+ iptables. packet filtering && firewall

Tutorial. Reference for more thorough Mininet walkthrough if desired

Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1

Lab 1: Packet Sniffing and Wireshark

Intrusion Detection, Packet Sniffing

Network Connect Performance Logs on MAC OS

QualNet 4.5 Network Emulation Interface Model Library

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

File Transfer Examples. Running commands on other computers and transferring files between computers

A Research Study on Packet Sniffing Tool TCPDUMP

Packet filtering with Linux

UPPER LAYER SWITCHING

Enterprise Network Management. March 4, 2009

CTS2134 Introduction to Networking. Module Network Security

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

Pen Test Tips 2. Shell vs. Terminal

tcpdump: network traffic capture

Wireshark Tutorial INTRODUCTION

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Test Code: 8148 / Version 1

Snoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points

Protecting and controlling Virtual LANs by Linux router-firewall

Hands On Activities: TCP/IP Network Monitoring and Management

IP Filter/Firewall Setup

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu (Amd66) On Ubuntu 4.5 On A Windows Box

Network Monitoring Tool with LAMP Architecture

Defeating Firewalls : Sneaking Into Office Computers From Home

Red Hat Linux Networking

darkstat - a network traffic analyzer Introduction Installation LinuxFocus article number by Mario M.

Computer Networks/DV2 Lab

Protocols. Packets. What's in an IP packet

Introduction To Computer Networking

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Network Traffic Analysis

Wireshark Tutorial. Figure 1: Packet sniffer structure

LOHU 4951L Outdoor Wireless Access Point / Bridge

Technical Support Information Belkin internal use only

Packet Sniffing and Spoofing Lab

LAB THREE STATIC ROUTING

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Linux Networking: IP Packet Filter Firewalling

CS Computer and Network Security: Firewalls

Kick starting science...

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Solution of Exercise Sheet 5

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

Lab Objectives & Turn In

EXPLORER. TFT Filter CONFIGURATION

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Network Security TCP/IP Refresher

Lab Organizing CCENT Objectives by OSI Layer

Firewalls. Chien-Chung Shen

TECHNICAL NOTE. Technical Note P/N REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) /24

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

CS Computer and Network Security: Firewalls

How To Gather Log Files On A Pulse Secure Server On A Pc Or Ipad (For A Free Download) On A Network Or Ipa (For Free) On An Ipa Or Ipv (For An Ubuntu) On Your Pc

axsguard Gatekeeper Command Line Interface How To v1.6

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

Network Monitoring and Traffic Analysis

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Chapter 8 Security Pt 2

Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005

Exam Questions SY0-401

Lab 1: Network Devices and Technologies - Capturing Network Traffic

TCP/IP Security Problems. History that still teaches

Information Security Training. Assignment 1 Networking

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

Troubleshooting This document outlines some of the potential issues which you may encouter while administering an atech Telecoms installation.

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Project 2: Firewall Design (Phase I)

ReadyNAS Remote Troubleshooting Guide NETGEAR

Transcription:

CS197U: A Hands on Introduction to Unix Lecture 10: Security Issues and Traffic Monitoring Tian Guo University of Massachusetts Amherst CICS 1

Reminders Assignment 5 is due Thursday (Oct. 22) Part 1 (tracking webpage update): Hints cronbab -e for editing cron table, default editor is emacs make sure there is one new empty line at the bottom of cron table Crtl+X then S to save, Ctrl+X then C to quit In the script, save command output string to a variable update=`command` Check the inequality of two strings: $update and (no changes) You get full points when you and I (the $CC email) receive 10 emails from edlab server at the exact time. Assignment 6 is posted. Due next Thursday (Oct. 29) You will need A LOT of piping and awk in a line (mostly the same format) <COMMAND> grep <KEYWORD> awk F : {print $n } prints out your target answer/string field separator is : (default is space) 2

Last time Your network configurations : your own machine ifconfig, iwconfig, iwlist, dhclient Can not connect to a remote site? ping, host The site seems to be alive, but the connection is slow traceroute

ARP: Address Resolution Protocol Question: how to determine MAC address of B from IP address? 137.196.7.23 71-65-F7-2B-08-53 LAN 137.196.7.78 1A-2F-BB-76-09-AD 137.196.7.14 58-23-D7-FA-20-B0 Each IP node (host, router) on LAN has ARP table ARP table: IP/MAC address mappings for some LAN nodes < IP address; MAC address; TTL> TTL (Time To Live): time after which address mapping will be forgotten (typically 20 min) 137.196.7.88 0C-C4-11-6F-E3-98

Demo arp address resolution protocol Broadcast your own address when first joining the network/lan arp n : list the table of all IP addresses ß à hardware MAC mapping arp d <hostname> : delete a host s hardware address from ARP table arp s <hostname> <HW> : add an mapping of an IP/MAC Wireshark Sniffing all the packets passing through the shared media Ethernet LANs or wireless LANs Various of TCP and UDP connections Packet headers and the contents

Security Issues LAN is based on a broadcast system Know who your neighbors are Know their MAC/IP addresses mapping When a packet arrives your LAN Look at the destination IP address of the packet header If not your packets, dump them Otherwise, receive and respond to the packet Can I take a look at someone else s packet in my LAN? Their emails, their passwords, and their conversations

Traffic Monitoring: ifstat ifstat: real-time throughput of each interface ifstat t : with timestamps with 1 second interval Example 1: Display every 5 second ifstat -t 5 Example 2: Display loopback device ifstat -i lo Example 3: Display eth0 every 10 seconds ifstat -t 5 -i eth0

Traffic Monitoring: iftop iftop: detailed bandwidth information Example 1: sudo iftop: 2, 10 and 40 second intervals; Example 2: sudo iftop -P: display by port number Example 3: sudo iftop -c configfile (or specify in ~/.iftoprc)

Bad guys can sniff packets packet sniffing : broadcast media (shared ethernet, wireless) promiscuous network interface reads/records all packets (e.g., including passwords!) passing by A C src:b dest:a payload B

Wireshark Packet Sniffer Capture packets being sent/received from/to your computer Install Wireshark on your Virtual Machine: sudo get-apt install wireshark

Running Wireshark with sudo sudo wireshark

Running Wireshark as non-root wirehark

Running wireshark securely Step 1: sudo dpkg-reconfigure wireshark-common Step 2: Select yes to enable non-superusers capture Step 3: Add candidate user to the wireshark group sudo usermod -a -G wireshark tian Step 4: Log out and log back in to run wireshark as non-root user

Wireshark

tshark: terminal based wireshark Install by: sudo apt-get install tshark After configuring wireshark to run as non-superuser, you should be able to do: tshark Benefit: Allows you to script the network analysis

tshark examples Capture traffic from host 1.2.3.4 tshark -f src host 1.2.3.4 capture traffic to host 1.2.3.4 tshark -f dst host 1.2.3.4 Capture traffic between host 1.2.3.4 tshark -f "dst host 1.2.3.4 and src host 1.2.3.4??? tshark -f "dst host 1.2.3.4 or src host 1.2.3.4 AND tshark -f host 1.2.3.4

tshark examples Only capture HTTP traffic in verbose tshark -f tcp port 80 -V Ignore SSH traffics in traditional way tshark -f not port 22

Unsecure vs. Secure Network Connections ssh vs. telnet Secure Shell (SSH) for secure remote login vs. plain text interaction scp vs. ftp Secure CoPy based on SSH vs. File Transfer Protocol https:// vs. http:// Secure HyperText Transfer Protocol wget: a short for World wide web and Get Supports HTTP, FTP, and HTTPS

Summary Command Description arp Address resolution protocol (IP vs. MAC) ifstat Real time bandwidth monitoring on all interfaces iftop Monitoring details of specific interface ftp/scp (Un)secure file transport wireshark Packet sniffing