What encryption mechanism is used in the cquroam

Assignment Help Computer Network Security
Reference no: EM13291296

Snort Rules Case Study    

Scenario

A small company has a network set up behind a NAT router. The router is connected to the Internet via a single ISP provided dynamic IP address. The ISP provided access address may change over short periods of time.

The internal network is RFC 1918Category 2 compliant, and uses the private address space 192.168.3.0/24. The gateway router is configured to use DHCP allocated IP addresses to internal hosts as they connect. However, a record is kept within the router of what IP addresses have previously been allocated to specific MAC addresses. Whenever those MAC addressed hosts disconnect from and later reconnect to the network they are reallocated the same IP address. It is only if the router has a power off episode, or is manually reset, that allocation of different IP addresses may occur (and even then, the same addresses may be allocated as before).

The company operates an approved internal web server at 192.168.3.21:80, to facilitate in-house development of web pages and web sites that will later be deployed to an external server for public access. It is a company policy that only one approved internal web server is to be in operation on the network.

You are the company IT Manager.

It has come to your notice that a company employee has set up a rogue web server on the internal network, using a personal laptop. The employee is using that web site to provide undesirable material to a small clique of employees, to whom the web server address has been provided secretly.

The company CEO has requested you to:

  1. Obtain hard evidence that an employee is in fact using a personal laptop to set up a rogue web server.
  2. Find out what other employees are accessing the rogue web site.

Considerations

  • The rogue web server may be on any internal IP address, and will be using any of the ephemeral ports. It will not be using a well-known port.
  • The clients accessing the rogue web server may come from any internal IP address using any ephemeral port.
  • The MAC addresses of all company host devices are on record.
  • The MAC address of the device being used to host the rogue web server, and the MAC addresses of all devices that connect to the rogue server, need to be obtained for later use as evidence.

Technical Approach to the Solution

To carry out the CEO's request you have decided to:

A) Use Wireshark to capture packet data on the internal network.

B) Use snort to monitor for any internal network HTTP traffic destined for any internal host on any port address other than the authorised company internal web server and produce an alert message.

The snort monitoring will identify when breaches have occurred. The Wireshark pcap file containing the captured packets can be time correlated with the logged snort alerts to obtain MAC addresses for source and target.

Your Task

You are to write a .conf file containing the snort rule(s) that will accomplish the technical approach to a solution.

Hint

For this question, make sure you do the Snort Project - Week 8 (Intrusion Detection Concepts), located in the course Moodle Site.

If your rules are correct the alert.ids file should contain entries like the following:

[**] [1:1000010:1] Unauthorised HTTP traffic [**]

[Classification: <DELETED>] [Priority: 1]

09/12-19:10:29.439844 192.168.3.5:49496 -> 192.168.3.2:6400

TCP TTL:64 TOS:0x0 ID:18940 IpLen:20 DgmLen:408 DF

***AP*** Seq: 0xE8349C5  Ack: 0xBCB171EE  Win: 0xFFFF  TcpLen: 32

TCP Options (3) => NOP NOP TS: 1210791384 0

 

[**] [1:1000010:1] Unauthorised HTTP traffic [**]

[Classification: <DELETED>] [Priority: 1]

09/12-19:10:29.440554 192.168.3.2:6400 -> 192.168.3.5:49496

TCP TTL:128 TOS:0x0 ID:1065 IpLen:20 DgmLen:1300 DF

***A**** Seq: 0xBCB171EE  Ack: 0xE834B29  Win: 0xFE9B  TcpLen: 32

TCP Options (3) => NOP NOP TS: 195453 1210791384

 

[**] [1:1000010:1] Unauthorised HTTP traffic [**]

[Classification: <DELETED>] [Priority: 1]

09/12-19:10:29.449929 192.168.3.5:49496 -> 192.168.3.2:6400

TCP TTL:64 TOS:0x0 ID:18942 IpLen:20 DgmLen:367 DF

***AP*** Seq: 0xE834B29  Ack: 0xBCB1799C  Win: 0xFFFF  TcpLen: 32

TCP Options (3) => NOP NOP TS: 1210791384 195453

 

[**] [1:1000010:1] Unauthorised HTTP traffic [**]

[Classification: <DELETED>] [Priority: 1]

09/12-19:10:29.450478 192.168.3.2:6400 -> 192.168.3.5:49496

TCP TTL:128 TOS:0x0 ID:1067 IpLen:20 DgmLen:485 DF

***AP*** Seq: 0xBCB1799C  Ack: 0xE834C64  Win: 0xFD60  TcpLen: 32

TCP Options (3) => NOP NOP TS: 195453 1210791384

 

[**] [1:1000010:1] Unauthorised HTTP traffic [**]

[Classification: <DELETED>] [Priority: 1]

09/12-19:10:43.904673 192.168.3.5:49496 -> 192.168.3.2:6400

TCP TTL:64 TOS:0x0 ID:18947 IpLen:20 DgmLen:451 DF

***AP*** Seq: 0xE834C64  Ack: 0xBCB17B4E  Win: 0xFFFF  TcpLen: 32

TCP Options (3) => NOP NOP TS: 1210791413 195509

 

[**] [1:1000010:1] Unauthorised HTTP traffic [**]

[Classification: <DELETED>] [Priority: 1]

09/12-19:10:43.913290 192.168.3.5:49497 -> 192.168.3.2:6400

TCP TTL:64 TOS:0x0 ID:18950 IpLen:20 DgmLen:451 DF

***AP*** Seq: 0xBF45540D  Ack: 0xBEFA2FE2  Win: 0xFFFF  TcpLen: 32

TCP Options (3) => NOP NOP TS: 1210791413 0

 

[**] [1:1000010:1] Unauthorised HTTP traffic [**]

[Classification: <DELETED>] [Priority: 1]

09/12-19:10:43.913886 192.168.3.2:6400 -> 192.168.3.5:49497

TCP TTL:128 TOS:0x0 ID:1071 IpLen:20 DgmLen:571 DF

***AP*** Seq: 0xBEFA2FE2  Ack: 0xBF45559C  Win: 0xFE70  TcpLen: 32

TCP Options (3) => NOP NOP TS: 195597 1210791413

 

[**] [1:1000010:1] Unauthorised HTTP traffic [**]

[Classification: <DELETED>] [Priority: 1]

09/12-19:10:43.919054 192.168.3.5:49498 -> 192.168.3.2:6400

TCP TTL:64 TOS:0x0 ID:18956 IpLen:20 DgmLen:365 DF

***AP*** Seq: 0x18030D8E  Ack: 0xCFE60A18  Win: 0xFFFF  TcpLen: 32

TCP Options (3) => NOP NOP TS: 1210791413 0

 

[**] [1:1000010:1] Unauthorised HTTP traffic [**]

[Classification: <DELETED>] [Priority: 1]

09/12-19:10:43.946959 192.168.3.2:6400 -> 192.168.3.5:49498

TCP TTL:128 TOS:0x0 ID:1075 IpLen:20 DgmLen:660 DF

***AP*** Seq: 0xCFE60A18  Ack: 0x18030EC7  Win: 0xFEC6  TcpLen: 32

TCP Options (3) => NOP NOP TS: 195598 1210791413

 

[**] [1:1000010:1] Unauthorised HTTP traffic [**]

[Classification: <DELETED>] [Priority: 1]

09/12-19:11:11.614057 192.168.3.3:1923 -> 192.168.3.2:6400

TCP TTL:128 TOS:0x0 ID:44619 IpLen:20 DgmLen:496 DF

***AP*** Seq: 0xC9090643  Ack: 0x550D4778  Win: 0xFFFF  TcpLen: 20

 

[**] [1:1000010:1] Unauthorised HTTP traffic [**]

[Classification: <DELETED>] [Priority: 1]

09/12-19:11:11.656165 192.168.3.2:6400 -> 192.168.3.3:1923

TCP TTL:128 TOS:0x0 ID:1079 IpLen:20 DgmLen:230 DF

***AP*** Seq: 0x550D4778  Ack: 0xC909080B  Win: 0xFE37  TcpLen: 20

 

[**] [1:1000010:1] Unauthorised HTTP traffic [**]

[Classification: <DELETED>] [Priority: 1]

09/12-19:11:19.504867 192.168.3.3:1926 ->192.168.3.2:6400

TCP TTL:128 TOS:0x0 ID:44648 IpLen:20 DgmLen:450 DF

***AP*** Seq: 0xEC018654  Ack: 0x5E762A07  Win: 0xFFFF  TcpLen: 20

 

[**] [1:1000010:1] Unauthorised HTTP traffic [**]

[Classification: <DELETED>] [Priority: 1]

09/12-19:11:19.540195 192.168.3.2:6400 -> 192.168.3.3:1926

TCP TTL:128 TOS:0x0 ID:1082 IpLen:20 DgmLen:555 DF

***AP*** Seq: 0x5E762A07  Ack: 0xEC0187EE  Win: 0xFE65  TcpLen: 20

 

[**] [1:1000010:1] Unauthorised HTTP traffic [**]

[Classification: <DELETED>] [Priority: 1]

09/12-19:11:19.550534 192.168.3.3:1926 -> 192.168.3.2:6400

TCP TTL:128 TOS:0x0 ID:44650 IpLen:20 DgmLen:451 DF

***AP*** Seq: 0xEC0187EE  Ack: 0x5E762C0A  Win: 0xFDFC  TcpLen: 20

 

[**] [1:1000010:1] Unauthorised HTTP traffic [**]

[Classification: <DELETED>] [Priority: 1]

09/12-19:11:19.590606 192.168.3.2:6400 -> 192.168.3.3:1926

TCP TTL:128 TOS:0x0 ID:1083 IpLen:20 DgmLen:792 DF

***AP*** Seq: 0x5E762C0A  Ack: 0xEC018989  Win: 0xFCCA  TcpLen: 20

 Note: The classification identifier has been deleted.

 Tips:

  • Search for the HTTP RFC document "RFC2616" via Google. In particular, you will need to familiarise yourself with the HTTP header contents. You need to identify some text pattern in the HTTP header that will unambiguously indicate whether a client is accessing a web server, or vice versa. (remember, the rogue web server is operating on a non-standard ephemeral port.)
  • Certain characters are "special" in SNORT rules. These characters must be escaped to tell SNORT to treat them literally, rather than interpret their special meaning. To escape a special character, you simply precede it with a back-slash "\". For example, if you wish to continue your rule on a new line in the configuration file, then you end the line with a "\" character to escape the special meaning of the ENTER character at the end of the line. SNORT treats the ENTER character as special. It means it is the end of the current rule. With a "\" at the end of the line, it tells SNORT to treat it as a literal ENTER which will be interpreted as just spacing for your rule and allows it to continue on the next line. If you receive the following error when you attempt to run your rule through SNORT: "ParsePattern Got Null enclosed in quotation marks (")!", then you have a special character in your rule content that needs to be escaped. Refer to the SNORT documentation website for details on which characters have special meanings.
  • Make sure you include the standard Snort classtypes in your rule. Refer to the SNORT documentation to determine which classtype is appropriate for this exploit as described above. You will probably have to make use of the classification.config file (located in the Snort\etc\ directory) - research how to make reference to this file from your rules file.
  • Failure to use the correct syntax in your rule will mean the rule is ineffective. This means you will lose marks on this question.
  • Refer to the Snort manual for assistance in writing the rules - a link to the manual is availed from the Software Resources section of the course web site.

Note: Duplicating the contents from the text, lecture slides, weekly notes or the Internet is not acceptable (even if it is referenced) and will not attract any marks.  Your solutions must be written in your own words. If you cannot write your answer in your own words, then you have not yet mastered the topic and require further reading or advice from your tutor. Any information taken from an external source (either from the textbook or any other source) must be referenced appropriately.  Failure to do so constitutes plagiarism.

1.1.      Identification of Addresses

By inspecting the sample alert.idsentries given above you should be able to identify:

1. The IP address, and port number of the device hosting the rogue web server.

2. The IP addresses of all devices that access the rogue web server.

You are to enter this information into a table (see following), and submit it with your assignment submission document.

Description

IP Address

Port Number

Rogue Web Server

 

 

Accessing Client #1

 

 

Accessing Client #2

 

 

Explain in your own words how the MAC addresses of these devices can be discovered from the pcap file.

2.    Question 2: Steganography Exercise

This exercise requires you to use Steganography to embed secret text into a graphic file and also to embed a secret watermark into a second graphic file. To accomplish these tasks you are to download a copy of OpenStego from the internet.You will also need to download the two graphic files cqu_logo.png  and Bundaberg.jpg from the Moodle site.

2.1. Data Hiding in a graphic file

You are to create a "message.txt"file containing the text "This is my hidden text file" to use as your Message File in OpenStego.

You are to use "cqu_logo.png" as your Cover File in OpenStego  and "extra_logo.png" as your Output Stego File.

Note: You MUST use your student number (sxxxxxxx) as the password .

You are to include both your message.txt and extra_logo.png  files in your assignment submission.

2.2.  Watermarking a second graphic file

You are to generate a signature file ("COIS23001Ass2.sig") using "Copyright 2014,COIS23001" as the PassPhrase.

You can now embed your watermark in the "Bundaberg.jpg" graphic file to create your Output filecalled "ass2sig.jpg".

You are to submit a copy of your ass2sig.jpg with your assignment submission.

Question 3  CQURoam

Go to the CQURoam site and download the guide with information on how to connect to the CQU network wireless computers running Microsoft Windows Vista or Windows 7

Based on these instructions, during one of the face-to-face tutorials configure your wireless computer (Laptop or notebook to connect to the CQUniversity network) and answer the following questions:

a. What wireless security type does CQUniversity implement to enable roaming? Explain how this wireless security type work?

b. What encryption mechanism is used in the CQURoam?  Explain  how this mechanism works

c. What Authentication method is used in the CQURoam? Explain how this authentication method operates

d. Provide a screenshot as evidence of your configuration

e. What do you think of the CQUniversity's approach to roaming? Would you suggest something different? Why?

Reference no: EM13291296

Questions Cloud

Determine electromagnetic torque and shaft-output torque : A 40-hp, 500 V, 1200-rpm DC shunt motor has rotationallosses of 2000 W at rated speed. The armature resistance is 0.46Ω and the field resistance is300Ω. A) Calculate the armature current when the motor is delivering rated load at rated voltage and..
Compute the concentration of hy3- in a solution : Calculate the concentration of HY3- in a solution prepared by mixing 10.00mL of .010M VOSO4, 9.9mL of .010M EDTA and 10.00mL of buffer with a ph of 4.00
Compute the combined projected annual cash flow : Compute the combined projected operating gains/losses over the five-year horizon as the discounted present value of change in cash flows (using 14% as the discount rate), which is due to the pound appreciation and yen depreciation.
Determine the surface charge density on each plate : A parallel-plate air capacitor has a capacitance of 400pF and a charge of magnitude 0.250uC on each plate. The plates are 0.600mm apart. What is the surface charge density on each plate
What encryption mechanism is used in the cquroam : What wireless security type does CQUniversity implement to enable roaming? Explain how this wireless security type work and what encryption mechanism is used in the CQURoam?  Explain  how this mechanism works
Determine the ph and the concentration of the species : Find the pH and the concentration of each of the species of lysine in a solution of .010M lysine monohydrochloride (lysine-HCl)
Which one of the following is the best example of sunk cost : Which one of the following is the best example of a sunk cost?
How fast were the swimmers moving when they hit the water : On a hot summer day in the state of Washington while kayaking, I saw several swimmers jump from a railroad bridge into the Snohomish River below. How fast were the swimmers moving when they hit the water
Define how to use linearity to find a the actual value : How do you use linearity to find a the actual value of (vo) when you are not given the values of the current, with just the assumption value of (vo)

Reviews

Write a Review

Computer Network Security Questions & Answers

  Analyze security requirements and prepare a security policy

Analyze security requirements and prepare a security policy.

  Create an overloaded constructor

Create the statements to make an overloaded constructor for the class named Car. The constructors should support 0, 1, or 2 arguments. The 1st argument will denote engine size and contain an Integer.

  It project management

Assume your corporation is trying to decide whether it should buy special equipment to prepare some of its high-quality publications itself or lease the equipment from another corporation.

  What is the ciphertext generated by encryption of character

What is the ciphertext (in binary form) generated by the encryption of character D? How is plaintext for this encrypted D recovered?

  Write application-layer protocols use to move message

Explain how message gets from Alice's host to Bob's host. Make sure to list series of application-layer protocols which are used to move message between the two hosts.

  Explaining level of cyberphobia in workplace

After completing the Unit reading on the subject, give your sense of the level of cyberphobia in the workplace and your suggestions on dealing with it as an IT manager.

  Denial of service and distributed denial of service attacks

US cryptography export restrictions: past, present, and future and biometrics for authentication: security and privacy implications.

  Protocol stack for wap2

WAP protocol, cellular network infrastructure, SSL protect against eavesdropping, network datagrams (packets) be protected at the network layer, pin and fingerprint, Certificate Revocation, Public Key Infrastructure, modern symmetric algorithm bl..

  Explain prudent policy to protect datafrom corruption-theft

The opposing require to protect this data (from corruption and theft) which typically means controlling access to much/all of the data? What policy is prudent here?

  Discuss the role they play in computer crime

Discussing the role they play in computer crime. Be sure to research and document cases to support each law and your discussion

  Constructing the parameters of the rsa cryptosystem

The general method for constructing the parameters of the RSA cryptosystem

  Total cost of ownership return on investment

Total Cost of Ownership Return on Investment. Explain each of these approaches, state your preference, and analyze the advantages and disadvantages of each with a focus on IT investments.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd