Firewall
How Stuff Works
Wikipedia
Zonealarm
Comodo
Man-in-the-middle Attack
Wikipedia
ARP spoofing
DNS Poisoning
DNS Poisoning Video
Cookies
Wikipedia
Sidejacking
Gmail https
Gmail Activity
Tor
Wikipedia
Tor Website
Proxy
Wireless (Wifi)
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access
Airbase
Airsnort
Kismet
Ettercap
Top 100 Security Tools
Radio-frequency identification
Wikipedia
The Risk of ePassports and RFID
Elvis' RFID Passport
RFID reader
How To: Disable Your Passport's RFID Chip
How to Disable RFID tags
Sunday, October 26, 2008
Monday, October 20, 2008
Wireshark lab: 10/22
You will use the following three files for the labs:
rhino.log
rhino2.log
rhino3.log
Download each of these trace files to use with wireshark. For each of these network trace files do the following:
1) Look at the protocol column and write down each unique protocol that you see there.
2) Briefly describe 5 of the protocols from (1) - that is, what do they do/what are they used for? (We have covered a few protocols in class).
3) Use the search bar to see if you can find any image files. Image files often have file headers of JFIF, EXIF or GIF.
4) If you find any image files, write down the IP addresses that are involved in transmitting those files.
rhino.log
rhino2.log
rhino3.log
Download each of these trace files to use with wireshark. For each of these network trace files do the following:
1) Look at the protocol column and write down each unique protocol that you see there.
2) Briefly describe 5 of the protocols from (1) - that is, what do they do/what are they used for? (We have covered a few protocols in class).
3) Use the search bar to see if you can find any image files. Image files often have file headers of JFIF, EXIF or GIF.
4) If you find any image files, write down the IP addresses that are involved in transmitting those files.
Saturday, October 11, 2008
Wireshark lab: 10/15
As I wrote earlier, you will have labs on Wed 10/15 and Wed 10/22 in lab 4206N.
You will use the following trace files since you cannot do live capture in the lab.
After you have downloaded the above zip file, extract the contents onto the desktop.
You will do a lab on HTTP. The lab says ``Ethereal'' which is the old name for Wireshark, but the lab is still valid.
Start up Wireshark and open the file called http-ethereal-trace-1 that you extracted onto the desktop by choosing File->Open and then choosing the above file. You will use this file for all of part 1 in the HTTP lab. Each section uses a different trace file read carefully which trace file you need to use (each of the http-ethereal-trace files will be used).
Try to answer as many questions as you can. These will be figured into your grade as extra credit.
You will use the following trace files since you cannot do live capture in the lab.
After you have downloaded the above zip file, extract the contents onto the desktop.
You will do a lab on HTTP. The lab says ``Ethereal'' which is the old name for Wireshark, but the lab is still valid.
Start up Wireshark and open the file called http-ethereal-trace-1 that you extracted onto the desktop by choosing File->Open and then choosing the above file. You will use this file for all of part 1 in the HTTP lab. Each section uses a different trace file read carefully which trace file you need to use (each of the http-ethereal-trace files will be used).
Try to answer as many questions as you can. These will be figured into your grade as extra credit.
Monday, October 6, 2008
Network Tools
Just to recap, here is a list of tools that we have been using for network forensics:
Chaosreader
Chaosreader can extract images from the network log files (though not all as we saw) and will print out a nice html report of all the flows.
Here is Chaosreader in action:
Chaosreader
Chaosreader can extract images from the network log files (though not all as we saw) and will print out a nice html report of all the flows.
Here is Chaosreader in action:
Friday, October 3, 2008
EC Homework
1) Download and install Wireshark.
2) Collect about 3-5 minutes worth of traffic on your computer. Surf as you would normally on your computer.
3) Stop collecting and save the file as ``network_home.pcap''
4) Look at the protocol column and write down each unique protocol that you see there.
5) Briefly describe 5 of the protocols from (4) - that is, what do they do/what are they used for? (We have covered a few protocols in class).
6) What is your IP address?
7) If you click on the Protocol column you can sort the packets by protocol. You can also search for a particular protocol by typing it in the ``Filter'' area. Filter for the HTTP protocol. Right click on one of the green HTTP lines and choose ``Follow TCP Stream.'' What does the first line of the pink text say? What does it mean? What does the first line of the blue text say and what is it mean?
Extras
2) Collect about 3-5 minutes worth of traffic on your computer. Surf as you would normally on your computer.
3) Stop collecting and save the file as ``network_home.pcap''
4) Look at the protocol column and write down each unique protocol that you see there.
5) Briefly describe 5 of the protocols from (4) - that is, what do they do/what are they used for? (We have covered a few protocols in class).
6) What is your IP address?
7) If you click on the Protocol column you can sort the packets by protocol. You can also search for a particular protocol by typing it in the ``Filter'' area. Filter for the HTTP protocol. Right click on one of the green HTTP lines and choose ``Follow TCP Stream.'' What does the first line of the pink text say? What does it mean? What does the first line of the blue text say and what is it mean?
Extras
Subscribe to:
Posts (Atom)