Perform a cookie stealing attack

Assignment Help Computer Engineering
Reference no: EM132218529

This is an individual assignment, and it is expected students answer the questions themselves. Discussion of approaches to solving questions is allowed (and encouraged), however each student should develop and write-up their own answers. See CQUniversity resources on Referencing and Plagiarism. Guidelines for this assignment include:

• Do not exchange files (reports, captures, diagrams) with other students.

• Complete tasks with virtnet yourself - do not use results from another student.

• Draw your own diagrams. Do not use diagrams from other sources (Internet, textbooks) or from other students.

• Write your own explanations. In some cases, students may arrive at the same numerical answer, however their explanation of the answer should always be their own.

• Do not copy text from websites or textbooks. During research you should read and understand what others have written, and then write in your own words.

• Perform the tasks using the correct values listed in the question and using the correct file names.

File Names and Parameters

Where you see [StudentID] in the text, replace it with your actual student ID. If your student ID contains a letter (e.g. "s1234567"), make sure the letter is in lowercase.

Where you see [FirstName] in the text, replace it with your actual first name. If you do not have a first name, then use your last name. Do NOT include any spaces or other non-alphabetical characters (e.g. "-").

Marking Scheme

A separate spreadsheet lists the detailed marking criteria.

Assignment : Advanced Network Security

Question 1. Cookie Stealing Attack

For this question you must use virtnet (as used in the workshops) to perform a cookie stealing attack. This assumes you have already setup and are familiar with virtnet. See Moodle and workshop instructions for information on setting up and using virtnet, deploying the website, and performing the attack. The tasks and sub-questions are grouped into multiple phases. You must complete all phases, in order.

Phase 1: Setup

1. Create topology 7 in virtnet.

2. Add a new normal student user to the MyUni grading system. The user must have:

a. Username: [StudentID]

b. Password: [FirstName]

3. Add a new malicious student user to the MyUni grading system. The user must have:

a. Username: 12345678

b. Password: [StudentID]

4. Add a grade for the normal student user for unit/course ‘coit20262' with a grade of what you expect to receive this term, e.g. HD, D, C, P or F.

5. Change the title of the MyUni website by editing header_footer.php and changing the Grades line to:

Grades:[StudentID]

6. Change the domain of the MyUni website to www.[StudentID].edu by editing the /etc/hosts files.

7. Test that the existing users and new student can access the grading website.

The roles of nodes in topology 7 are:

• node1: Web browser (lynx) of normal student user.

• node2: Web browser (lynx) of malicious student user.

• node3: Capture of packets with tcpdump.

• node4: MyUni grading website.

• node5: not used in this question.

Phase 2: Capture Cookies

8. Start capturing on node3 using tcpdump.

9. The normal student user must do the following on node1:

a. Visit the MyUni grading website, e.g. as below or with any options: lynx

b. Follow the "Login" link and login

c. Follow the "View grades" link and enter their username and ‘coit20262' to view the course/unit grade, and submit.

d. Follow the "Logout" link.

e. Exit lynx by pressing q for quit.

Reference no: EM132218529

Questions Cloud

Create an erd that represents the entities and attributes : Create an ERD that represents the entities, attributes, the relationships between entities, and the cardinality and optionality.
Describe the role arp cache plays in establishing address : Describe the role ARP Cache plays in establishing Address Resolution Protocol (ARP)?
Connect and activate the devices with username and password : Connect and activate the devices with username and password (use your for both Student ID). This is to ensure a unique login to the smart network.
Briefly describe the osi reference model : Briefly describe the OSI reference model and the TCP/IP networking model, use diagrams to show the relation between both these models.
Perform a cookie stealing attack : COIT20262 : For this question you must use virtnet (as used in the workshops) to perform a cookie stealing attack.
Design a basic test plan and then write the expected : Check your parameters and any functions you declared, insert const wherever appropriate to protect your code from future abuse.
Write a function matched that takes as input a string s : Write a function matched(s) that takes as input a string s and checks if the brackets "(" and ")" in s are matched.
Prepare a report for your ceo explaining your justification : ACC00724 - Accounting for Managers - How has your earlier educational background influenced your understanding of this subject so far
Write a complete java program that count a total number : Write a complete java program that count a total number of duplicate elements in an array

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a function that given such an array

Write a function that given such an array as its parameter, calculates and prints the average of all the data items in the array

  What implications does it have for the future

What is the issue? Who does it concern? What is it's historical context? Why it is important?What implications does it have for the future?

  What is going on during sampling and what is sampling method

What was going on during sampling? What was your sampling method? What are your results? What the 95th percentile exposure level would be?

  Write down a sub query by using the books and publisher

write a sub query using the books and publisher table to list the isbn book title and the retail price for every book

  Display a message indicating whether the person

If the BMI valu is greater than 25,the person is considered to be overweight. I got the solution for the pseudocode but the flowchart is a little bit confusing.

  Write a marie assembly language program marie

Write a Marie Assembly Language program MARIE that would input, transform and the output a set of given characters.

  Discuss three different concepts presented in articles

Discuss at least 3 different concepts presented in the articles. As an IT professional, how would you apply the three concepts you identified.

  Explains the importance of training and support

Write a 3-pages paper that explains the importance of training and support after software is implemented. Format your paper according to APA guidelines.

  Question 1interpret the case study underneath and answer to

question 1interpret the case study underneath and answer to the questions that followunited parcel service throughout

  Write an expression that executes the loop body

Write an expression that executes the loop body as long as the user enters a non-negative number.

  What fields you believe would be primary keys

Be sure to include the field type and size. Please do not jump ahead and try to create tables. now I'm just looking for a list of fields. This is somewhat vague on purpose. I want you to decide what is required in the database.

  Discuss how developers should apply the countermeasures

Discuss how developers should apply the countermeasures to improve the security - what a buffer overflow error is and what the possible results

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd