Exploring network security issues

Assignment Help Computer Network Security
Reference no: EM131120170

The primary purpose of this first Lab Assignment is for you to familiarize yourself with the environment that we will use this semester for exploring network security issues.

The tasks you should perform are

- Install VirtualBox on a machine that you own or have access to
- Import a Tiny Core Linux virtual machine (VM) that I provide to you
- In the VM, set up your terminal prompts with your name, and execute a few basic commands to make sure everything works
- Perform several simple "packet extractions" using tcpdump

To complete this assignment, you will upload (this is repeated at the bottom of the assignment)
- A snapshot graphic showing your Tiny Core Linux running with two terminals, one of them running tcpdump, and the other running a telnet client.
- The tcpdump files, port23.txt and port22.txt, that you will create.
- A written explanation of your understanding of the various flags and commands used to run tcpdump
- A written explanation of your attempts to telnet and/or ssh to the Tiny Core Linux guest OS from the host computer, or another computer on the same network.

Installation and initial familiarity with the software

I have prepared a document that provides an overview of the installation. It is available on the Blackboard assignment page, as VirtualBox Install and Familiarization.

This is not a comprehensive document, and not all details are covered, but you should use it as guidance in the installation and usage of the Tiny Core Linux VM. If you run into problems that you are unable to solve, please use the Blackboard Discussion forum to ask the questions publicly for the benefit of everybody. Likewise, please feel free to contribute any answers to questions that other students may ask.

You should install VirtualBox and the Tiny Core Linux VM ­ as outlined in the VirtualBox Install and Familiarization document mentioned above ­ before proceeding to the next step.

Be sure that you set up (as described in the setup instructions) the terminal command line prompt so that it has your name in it. It is important that your name is visible in at least some of your screen shots ­ your goal should be to show me that this is YOUR work, and not copied from somebody else.

Initial familiarity with tcpdump

Your primary goals, in terms of assignment submission, are
- to provide me with a graphic that shows you using tcpdump in one window and telnet in another, as well as the text files you created from running tcpdump
- to explain your understanding of the tcpdump utility and the command line flags that I have asked you to use.
- to explain to me whether you are able to telnet and/or ssh into your guest Tiny Core Linux OS from the host computer, or from another computer on the same network. If you have problems doing this, please explain in detail why you are not able to. You will not lose points if you are unable to telnet and/or ssh into the guest Tiny Core Linux OS from outside, but you are required to explain what you tried, and why it didn't work.

These are the basic actions you should take to start running and testing tcpdump. You don't have to do it exactly as I specify ­ these are just provided as guidance.

In your Tiny Core Linux guest virtual machine (VM)

- Open a terminal

- Using nano or vi, create a simple text file with 2­3 lines of text in it (something that you will recognize later). In this text, you should include your name, for identification purposes.
- Save it, and make sure you can "cat" it (e.g. cat myfile.txt)
- Run tcpdump so that it captures telnet packets on the lo interface (this is the "loopback" interface, and whenever you connect to localhost, the traffic passes through this interface, locally, rather than one of the ethernet interfaces). Note that the telnet server listens for traffic on Port 23.

- Run tcpdump as follows, and leave it running

sudo tcpdump -l -i lo -A port 23 | tee port23.txt

353_Figure.png

- As part of the assignment, you should do a little research on tcpdump, and anything else you don't understand in the above command, and fully explain what this command does. In other words, explain sudo, tcpdump, and what all of the command line flags mean

- Open another terminal

- In the new terminal, telnet to the localhost (the userid is tc, and there is no password). Watch what happens in your tcpdump window as you do so. The output can be confusing, but see if you can spot your keystrokes in those packets. Keep in mind that telnet sends one packet per keystroke, then echoes it back to the client for display

In the following example, you can see my output from the tcpdump command ­ I had to scroll back up the window, but you can see the login prompt at the top, and if you look close, you can see the ......t and the .......c that I typed in.

1115_Figure1.jpg

- When logged in, do a directory listing (ls) and, again, see if you can spot your keystrokes, plus the response to your ls command in the window that displays the tcpdump packets.
- cat the file that you created earlier. Verify that you can see your keystrokes in there, plus the expected output from the cat command.
- exit from telnet (just type exit in that terminal)
- telnet localhost again, using a nonexistent userid (e.g. mcis), then enter a long password with a pattern that you'll be able to recognize in the tcpdump packet output(e.g. abcdefghijklmonp....). Verify that you can see the individual characters somewhere in the packets ­ in other words, you can sniff passwords. While you are doing this, take a snapshot of the Tiny Core Linux screen and save the PNG file for upload to Blackboard.
- exit from telnet again and stop tcpdump (CTRL­C). The tcpdump output should be present in the file port23.txt, and you may use this to review your session.

- Now repeat the same steps with ssh (you will need to modify the command, because ssh listens on Port 22)
• Start tcpdump to listen for ssh messages
• ssh to localhost (simply, ssh localhost)
• perform the ls and cat operations on the test file, and this time you should note that everything is encrypted. You should not see any evidence of what you are doing.
• Exit from ssh, and then try to login with a bad userid (e.g. ssh mcis@localhost) and verify that you can't see any login/password data in tcpdump ­ it should all be encrypted.
• Exit ssh and tcpdump, and note that your session output has been saved in the file that you specified.

To complete this assignment, you should turn in a single PDF or Word (or OpenOffice) document which contains the following Please, no ZIP files, no tar files, just a single PDF or Word/OpenOffice file.

- An explanation of your experiences in the set up for VirtualBox and TinyCore Linux. Was it easy or hard• Did you have any problems• If so, describe them.

- A snapshot graphic showing your Tiny Core Linux running with two terminals, one of them running tcpdump, and the other running a telnet client. Be sure that your name is clearly visible in the prompt. Here is an example from my own session:

979_Figure2.jpg

- A written explanation of your understanding of the various flags and commands used to run tcpdump.

Reference no: EM131120170

Questions Cloud

The fair value of the equipment on that date : Prepare the journal entry (if any) necessary to record this increase in fair value. It is expected that the cost of disposal is still $20,000.
Which entities may select any tax period : Which of the following entities may select any tax period (calendar or fiscal)? Which entities must have tax years that conform with the tax years of their owners?
Identify the nutritional needs for a developing embryo : Create a public service PowerPoint presentation, with appropriate images, to be shown to a group of couples at a local hospital that are expecting their first child. Include the following points:
Discuss the rationale behind taxonomists placing sharks : Discuss the rationale behind taxonomists placing sharks and dolphins in different taxonomic groups, even though they are both aquatic, have very similar body forms, and share other traits as well.
Exploring network security issues : The primary purpose of this first Lab Assignment is for you to familiarize yourself with the environment that we will use this semester for exploring network security issues.
Which working capital policy is riskier : Determine the expected rate of return on equity capital under each of the working capital policies. Which working capital policy is riskier?Explain.
What effect does water vapor have on atmospheric stability : Many people confuse the large void in the ozone layer with global warming. Can you distinguish between the two phenomena? Discuss the causes of each. Explain how each process may harm living things. (Refer to the additional reading for this Unit)...
Assume that pujols will continue to use this asset : The fair value of the equipment at December 31, 2011, is $5,100,000. Prepare the journal entry (if any) necessary to record this increase in fair value.
Prepare closing entries for kirby company on december : (Closing Entries for a Corporation) Presented below are selected account balances for Kirby Co. as of December 31, 2014. Prepare closing entries for Kirby Co. on December 31, 2014.

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Give the sql statement

Give the SQL statement that will find the best selling product(most frequently sold). Output the product name and number sold.

  Analysis to be presented in a 10- to 15-slide microsoft

analysis to be presented in a 10- to 15-slide microsoft powerpoint presentation and use detailed speaker notes for

  Write paper on cyber chatter

Write paper on cyber chatter

  Create a cyber-security policy describing the principle

Create a cyber-security policy describing the principle, the objective, and policy statement for the law firm's company network.

  Description of the kerberos authentication protocol

Give your general description of the Kerberos authentication protocol and explain the term: Authenticator used in the Kerberos authentication protocol.

  Implementing information systems security policies

Describe the roles and responsibilities of those implementing information systems security policies.

  Security weaknesses

In this phase you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. You will then identify potential security weaknesses

  Mitigate risk by using information security systems policies

Write a report identifying the risks associated with the current position your organization is in, and how your organization can mitigate risk by using information security systems policies

  Availability of the organizations information assets

Your plan must be in nontechnical terms to the user population that incorporates the confidentiality, integrity, and availability of the organization's information assets.

  Academic method to project management

Sunnyville Corporation is in the business of selling home appliances. Sunnyville Corporation  has over 50 sales agents across the country. The management at Sunnyville Corporation has decided to implement an online sales program.

  Project - cloud computing security policy

Project: Cloud Computing Security Policy. Create a transition strategy for moving from the "As-Is" enterprise architecture to cloud-based services. You should consider IaaS, PaaS, and SecaaS strategies

  Rsa with public - private key pair

RSA with three primes would also work: n = pqr, ?(n) = (p?1)(q?1)(r?1), gcd(e, ?(n)) = 1,

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd