Perform a cookie stealing attack

Assignment Help Computer Engineering
Reference no: EM132218529

This is an individual assignment, and it is expected students answer the questions themselves. Discussion of approaches to solving questions is allowed (and encouraged), however each student should develop and write-up their own answers. See CQUniversity resources on Referencing and Plagiarism. Guidelines for this assignment include:

• Do not exchange files (reports, captures, diagrams) with other students.

• Complete tasks with virtnet yourself - do not use results from another student.

• Draw your own diagrams. Do not use diagrams from other sources (Internet, textbooks) or from other students.

• Write your own explanations. In some cases, students may arrive at the same numerical answer, however their explanation of the answer should always be their own.

• Do not copy text from websites or textbooks. During research you should read and understand what others have written, and then write in your own words.

• Perform the tasks using the correct values listed in the question and using the correct file names.

File Names and Parameters

Where you see [StudentID] in the text, replace it with your actual student ID. If your student ID contains a letter (e.g. "s1234567"), make sure the letter is in lowercase.

Where you see [FirstName] in the text, replace it with your actual first name. If you do not have a first name, then use your last name. Do NOT include any spaces or other non-alphabetical characters (e.g. "-").

Marking Scheme

A separate spreadsheet lists the detailed marking criteria.

Assignment : Advanced Network Security

Question 1. Cookie Stealing Attack

For this question you must use virtnet (as used in the workshops) to perform a cookie stealing attack. This assumes you have already setup and are familiar with virtnet. See Moodle and workshop instructions for information on setting up and using virtnet, deploying the website, and performing the attack. The tasks and sub-questions are grouped into multiple phases. You must complete all phases, in order.

Phase 1: Setup

1. Create topology 7 in virtnet.

2. Add a new normal student user to the MyUni grading system. The user must have:

a. Username: [StudentID]

b. Password: [FirstName]

3. Add a new malicious student user to the MyUni grading system. The user must have:

a. Username: 12345678

b. Password: [StudentID]

4. Add a grade for the normal student user for unit/course ‘coit20262' with a grade of what you expect to receive this term, e.g. HD, D, C, P or F.

5. Change the title of the MyUni website by editing header_footer.php and changing the Grades line to:

Grades:[StudentID]

6. Change the domain of the MyUni website to www.[StudentID].edu by editing the /etc/hosts files.

7. Test that the existing users and new student can access the grading website.

The roles of nodes in topology 7 are:

• node1: Web browser (lynx) of normal student user.

• node2: Web browser (lynx) of malicious student user.

• node3: Capture of packets with tcpdump.

• node4: MyUni grading website.

• node5: not used in this question.

Phase 2: Capture Cookies

8. Start capturing on node3 using tcpdump.

9. The normal student user must do the following on node1:

a. Visit the MyUni grading website, e.g. as below or with any options: lynx

b. Follow the "Login" link and login

c. Follow the "View grades" link and enter their username and ‘coit20262' to view the course/unit grade, and submit.

d. Follow the "Logout" link.

e. Exit lynx by pressing q for quit.

Reference no: EM132218529

Questions Cloud

Create an erd that represents the entities and attributes : Create an ERD that represents the entities, attributes, the relationships between entities, and the cardinality and optionality.
Describe the role arp cache plays in establishing address : Describe the role ARP Cache plays in establishing Address Resolution Protocol (ARP)?
Connect and activate the devices with username and password : Connect and activate the devices with username and password (use your for both Student ID). This is to ensure a unique login to the smart network.
Briefly describe the osi reference model : Briefly describe the OSI reference model and the TCP/IP networking model, use diagrams to show the relation between both these models.
Perform a cookie stealing attack : COIT20262 : For this question you must use virtnet (as used in the workshops) to perform a cookie stealing attack.
Design a basic test plan and then write the expected : Check your parameters and any functions you declared, insert const wherever appropriate to protect your code from future abuse.
Write a function matched that takes as input a string s : Write a function matched(s) that takes as input a string s and checks if the brackets "(" and ")" in s are matched.
Prepare a report for your ceo explaining your justification : ACC00724 - Accounting for Managers - How has your earlier educational background influenced your understanding of this subject so far
Write a complete java program that count a total number : Write a complete java program that count a total number of duplicate elements in an array

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd