Exploring network security issues

Assignment Help Computer Network Security
Reference no: EM131120170

The primary purpose of this first Lab Assignment is for you to familiarize yourself with the environment that we will use this semester for exploring network security issues.

The tasks you should perform are

- Install VirtualBox on a machine that you own or have access to
- Import a Tiny Core Linux virtual machine (VM) that I provide to you
- In the VM, set up your terminal prompts with your name, and execute a few basic commands to make sure everything works
- Perform several simple "packet extractions" using tcpdump

To complete this assignment, you will upload (this is repeated at the bottom of the assignment)
- A snapshot graphic showing your Tiny Core Linux running with two terminals, one of them running tcpdump, and the other running a telnet client.
- The tcpdump files, port23.txt and port22.txt, that you will create.
- A written explanation of your understanding of the various flags and commands used to run tcpdump
- A written explanation of your attempts to telnet and/or ssh to the Tiny Core Linux guest OS from the host computer, or another computer on the same network.

Installation and initial familiarity with the software

I have prepared a document that provides an overview of the installation. It is available on the Blackboard assignment page, as VirtualBox Install and Familiarization.

This is not a comprehensive document, and not all details are covered, but you should use it as guidance in the installation and usage of the Tiny Core Linux VM. If you run into problems that you are unable to solve, please use the Blackboard Discussion forum to ask the questions publicly for the benefit of everybody. Likewise, please feel free to contribute any answers to questions that other students may ask.

You should install VirtualBox and the Tiny Core Linux VM ­ as outlined in the VirtualBox Install and Familiarization document mentioned above ­ before proceeding to the next step.

Be sure that you set up (as described in the setup instructions) the terminal command line prompt so that it has your name in it. It is important that your name is visible in at least some of your screen shots ­ your goal should be to show me that this is YOUR work, and not copied from somebody else.

Initial familiarity with tcpdump

Your primary goals, in terms of assignment submission, are
- to provide me with a graphic that shows you using tcpdump in one window and telnet in another, as well as the text files you created from running tcpdump
- to explain your understanding of the tcpdump utility and the command line flags that I have asked you to use.
- to explain to me whether you are able to telnet and/or ssh into your guest Tiny Core Linux OS from the host computer, or from another computer on the same network. If you have problems doing this, please explain in detail why you are not able to. You will not lose points if you are unable to telnet and/or ssh into the guest Tiny Core Linux OS from outside, but you are required to explain what you tried, and why it didn't work.

These are the basic actions you should take to start running and testing tcpdump. You don't have to do it exactly as I specify ­ these are just provided as guidance.

In your Tiny Core Linux guest virtual machine (VM)

- Open a terminal

- Using nano or vi, create a simple text file with 2­3 lines of text in it (something that you will recognize later). In this text, you should include your name, for identification purposes.
- Save it, and make sure you can "cat" it (e.g. cat myfile.txt)
- Run tcpdump so that it captures telnet packets on the lo interface (this is the "loopback" interface, and whenever you connect to localhost, the traffic passes through this interface, locally, rather than one of the ethernet interfaces). Note that the telnet server listens for traffic on Port 23.

- Run tcpdump as follows, and leave it running

sudo tcpdump -l -i lo -A port 23 | tee port23.txt

353_Figure.png

- As part of the assignment, you should do a little research on tcpdump, and anything else you don't understand in the above command, and fully explain what this command does. In other words, explain sudo, tcpdump, and what all of the command line flags mean

- Open another terminal

- In the new terminal, telnet to the localhost (the userid is tc, and there is no password). Watch what happens in your tcpdump window as you do so. The output can be confusing, but see if you can spot your keystrokes in those packets. Keep in mind that telnet sends one packet per keystroke, then echoes it back to the client for display

In the following example, you can see my output from the tcpdump command ­ I had to scroll back up the window, but you can see the login prompt at the top, and if you look close, you can see the ......t and the .......c that I typed in.

1115_Figure1.jpg

- When logged in, do a directory listing (ls) and, again, see if you can spot your keystrokes, plus the response to your ls command in the window that displays the tcpdump packets.
- cat the file that you created earlier. Verify that you can see your keystrokes in there, plus the expected output from the cat command.
- exit from telnet (just type exit in that terminal)
- telnet localhost again, using a nonexistent userid (e.g. mcis), then enter a long password with a pattern that you'll be able to recognize in the tcpdump packet output(e.g. abcdefghijklmonp....). Verify that you can see the individual characters somewhere in the packets ­ in other words, you can sniff passwords. While you are doing this, take a snapshot of the Tiny Core Linux screen and save the PNG file for upload to Blackboard.
- exit from telnet again and stop tcpdump (CTRL­C). The tcpdump output should be present in the file port23.txt, and you may use this to review your session.

- Now repeat the same steps with ssh (you will need to modify the command, because ssh listens on Port 22)
• Start tcpdump to listen for ssh messages
• ssh to localhost (simply, ssh localhost)
• perform the ls and cat operations on the test file, and this time you should note that everything is encrypted. You should not see any evidence of what you are doing.
• Exit from ssh, and then try to login with a bad userid (e.g. ssh mcis@localhost) and verify that you can't see any login/password data in tcpdump ­ it should all be encrypted.
• Exit ssh and tcpdump, and note that your session output has been saved in the file that you specified.

To complete this assignment, you should turn in a single PDF or Word (or OpenOffice) document which contains the following Please, no ZIP files, no tar files, just a single PDF or Word/OpenOffice file.

- An explanation of your experiences in the set up for VirtualBox and TinyCore Linux. Was it easy or hard• Did you have any problems• If so, describe them.

- A snapshot graphic showing your Tiny Core Linux running with two terminals, one of them running tcpdump, and the other running a telnet client. Be sure that your name is clearly visible in the prompt. Here is an example from my own session:

979_Figure2.jpg

- A written explanation of your understanding of the various flags and commands used to run tcpdump.

Reference no: EM131120170

Questions Cloud

The fair value of the equipment on that date : Prepare the journal entry (if any) necessary to record this increase in fair value. It is expected that the cost of disposal is still $20,000.
Which entities may select any tax period : Which of the following entities may select any tax period (calendar or fiscal)? Which entities must have tax years that conform with the tax years of their owners?
Identify the nutritional needs for a developing embryo : Create a public service PowerPoint presentation, with appropriate images, to be shown to a group of couples at a local hospital that are expecting their first child. Include the following points:
Discuss the rationale behind taxonomists placing sharks : Discuss the rationale behind taxonomists placing sharks and dolphins in different taxonomic groups, even though they are both aquatic, have very similar body forms, and share other traits as well.
Exploring network security issues : The primary purpose of this first Lab Assignment is for you to familiarize yourself with the environment that we will use this semester for exploring network security issues.
Which working capital policy is riskier : Determine the expected rate of return on equity capital under each of the working capital policies. Which working capital policy is riskier?Explain.
What effect does water vapor have on atmospheric stability : Many people confuse the large void in the ozone layer with global warming. Can you distinguish between the two phenomena? Discuss the causes of each. Explain how each process may harm living things. (Refer to the additional reading for this Unit)...
Assume that pujols will continue to use this asset : The fair value of the equipment at December 31, 2011, is $5,100,000. Prepare the journal entry (if any) necessary to record this increase in fair value.
Prepare closing entries for kirby company on december : (Closing Entries for a Corporation) Presented below are selected account balances for Kirby Co. as of December 31, 2014. Prepare closing entries for Kirby Co. on December 31, 2014.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Determine the greatest security challenge

Determine the greatest security challenge that a network administrator might encounter when troubleshooting issues in secured networks

  Based on your understanding of networking concepts make a

based on your understanding of networking concepts create a 2- to 3-page report in a microsoft word document with

  Case study on network infrastructure

You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO asks you to explain why you believe it is important to secure the Windows and Unix/Linux servers from known shortcomings and vulnerabilities.

  Eu data privacy regulations for protection of employee data

How does EU directive on protection of personal data impose requirements on organizations in non-EU countries? How does Kraft comply with EU data privacy regulations governing protection of employee data?

  Describe the purpose of a risk assessment

Describe the purpose of a risk assessment , risk scope and identify critical areas for an assessment.

  Explain about cnss model

The CNSS model, examine each of the cells and write a brief statement on how you would address the three components occupying that cell.

  Overview on computer forensic

Computer Forensic Overview.Suppose you were recently hired for a new position as the computer forensics specialist at a medium- sized communications company.

  What would be a successful cybersecurity policy

Write an essay on the topic, "Building and implementing a successful cybersecurity policy". The following questions should be covered in the essay: What would be a successful cybersecurity policy

  Prepare analysis of the interconnectedness of cybersecurity

Prepare a paper highlighting the threat that China poses to the United States as regards Cyberwar and theft of Intellectual Property (IP). The student should identify the key issues and recommend an effective strategy for US policy makers.

  Overview of cybersecurity framework

Look at the overviews of CobIT, ISO 27001, and the NIST cybersecurity framework How are they similar - How are they different? Which would you feel is more effective if you were selecting which one to use in an organization?

  Describe situations where end-to-end encryption combined

Give some examples where traffic analysis could jeopardize security. Describe situations where end-to-end encryption combined with link encryption would still allow enough traffic analysis to be dangerous. about 150 words with references

  Privacy and security of information

Privacy and security of information- Pat, a billing associate at a local hospital, was issued a laptop for work purposes. Her friend, however, has asked to borrow it for school to complete an online assignment

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd