Presentation is loading. Please wait.

Presentation is loading. Please wait.

1. ---------------------- Integrity Check ---------------------- As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.

Similar presentations


Presentation on theme: "1. ---------------------- Integrity Check ---------------------- As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any."— Presentation transcript:

1 1

2 ---------------------- Integrity Check ---------------------- As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any Of Your Labs. 2

3

4 4

5 Use Visual Studio To Create A File, Called  DataTransfer.txt The File Is To Contain Approximately 75 MB Of Letters A-Z In The Following Format: Replace The Screen Capture Below With Yours! 5

6 Use Visual Studio To Create A File, Called  DataTransfer.Txt Display The File Size. Replace The Screen Capture Below With Yours! 6 This Is Close Enough!

7 7

8 DataTransfer.txt

9 9

10 Configure Your D-Link N Access Point To The Proper Static IP CS-1 to CS-4 10 CS-1  Static DNS = CS-1.cs.trinity.edu  Static IP = 131.194.71.119  Router DNS = CS-8.cs.trinity.edu  Router IP = 131.194.71.141  Router Gateway = 192.168.1.1  Wireless Adapter IP = 192.168.1.20 CS-2  Static DNS = CS-2.cs.trinity.edu  Static IP = 131.194.71.120  Router DNS = CS-9.cs.trinity.edu  Router IP = 131.194.71.142  Router Gateway = 192.168.1.1  Wireless Adapter IP = 192.168.1.21 CS-3  Static DNS = CS-3.cs.trinity.edu  Static IP = 131.194.71.121  Router DNS = CS-10.cs.trinity.edu  Router IP = 131.194.71.143  Router Gateway = 192.168.1.1  Wireless Adapter IP = 192.168.1.22 CS-4  Static DNS = CS-4.cs.trinity.edu  Static IP = 131.194.71.179  Router DNS = CS-11.cs.trinity.edu  Router IP = 131.194.71.146  Router Gateway = 192.168.1.1  Wireless Adapter IP = 192.168.1.23

11 Configure Your D-Link N Access Point To The Proper Static IP CS-5 to CS-7 11 CS-5  Static DNS = CS-5.cs.trinity.edu  Static IP = 131.194.71.52  Router DNS = CS-12.cs.trinity.edu  Router IP = 131.194.71.147  Router Gateway = 192.168.1.1  Wireless Adapter IP = 192.168.1.24 CS-6  Static DNS = CS-6.cs.trinity.edu  Static IP = 131.194.71.167  Router DNS = CS-13.cs.trinity.edu  Router IP = 131.194.71.148  Router Gateway = 192.168.1.1  Wireless Adapter IP = 192.168.1.25 CS-7  Static DNS = CS-7.cs.trinity.edu  Static IP = 131.194.71.140  Router DNS = CS-14.cs.trinity.edu  Router IP = 131.194.71.149  Router Gateway = 192.168.1.1  Wireless Adapter IP = 192.168.1.25

12 Your System Wireless Access Point You May Use Any Device You Like Identify & Add Photo Connect It To Your Router! Replace The Screen Capture Below With Yours! 12 Access Point : ______________________________________ Access Point = _?_ (D-Link USB DWA-130/ Belkin USB Wireless G F5D7050 / Netgear Wireless G PCI Card WG311NA / D-Link USB DWL-G132 / etc.) Made By : __________________________________________ (D-Link, Belkin, Netgear, Linksys, etc.) Attach A Photo Of The Device : (Do Internet Search!)

13 System 1 Wireless Access Point You May Use Any Device You Like Identify & Add Photo Connect It To Your Router! Replace The Screen Capture Below With Yours! 13 Access Point : ______________________________________ Access Point = _?_ (D-Link USB DWA-130/ Belkin USB Wireless G F5D7050 / Netgear Wireless G PCI Card WG311NA / D-Link USB DWL-G132 / etc.) Made By : __________________________________________ (D-Link, Belkin, Netgear, Linksys, etc.) Attach A Photo Of The Device : (Do Internet Search!)

14 System 2 Wireless Access Point You May Use Any Device You Like Identify & Add Photo Connect It To Your Router! Replace The Screen Capture Below With Yours! 14 Access Point : ______________________________________ Access Point = _?_ (D-Link USB DWA-130/ Belkin USB Wireless G F5D7050 / Netgear Wireless G PCI Card WG311NA / D-Link USB DWL-G132 / etc.) Made By : __________________________________________ (D-Link, Belkin, Netgear, Linksys, etc.) Attach A Photo Of The Device : (Do Internet Search!)

15 15

16 Configure Your D-Link N Access Point To The Proper Static IP CS-1 to CS-4 16 CS-1  Static DNS = CS-1.cs.trinity.edu  Static IP = 131.194.71.119  Router DNS = CS-8.cs.trinity.edu  Router IP = 131.194.71.141  Router Gateway = 192.168.1.1  Wireless Adapter IP = 192.168.1.20 CS-2  Static DNS = CS-2.cs.trinity.edu  Static IP = 131.194.71.120  Router DNS = CS-9.cs.trinity.edu  Router IP = 131.194.71.142  Router Gateway = 192.168.1.1  Wireless Adapter IP = 192.168.1.21 CS-3  Static DNS = CS-3.cs.trinity.edu  Static IP = 131.194.71.121  Router DNS = CS-10.cs.trinity.edu  Router IP = 131.194.71.143  Router Gateway = 192.168.1.1  Wireless Adapter IP = 192.168.1.22 CS-4  Static DNS = CS-4.cs.trinity.edu  Static IP = 131.194.71.179  Router DNS = CS-11.cs.trinity.edu  Router IP = 131.194.71.146  Router Gateway = 192.168.1.1  Wireless Adapter IP = 192.168.1.23

17 Configure Your D-Link N Access Point To The Proper Static IP CS-5 to CS-7 17 CS-5  Static DNS = CS-5.cs.trinity.edu  Static IP = 131.194.71.52  Router DNS = CS-12.cs.trinity.edu  Router IP = 131.194.71.147  Router Gateway = 192.168.1.1  Wireless Adapter IP = 192.168.1.24 CS-6  Static DNS = CS-6.cs.trinity.edu  Static IP = 131.194.71.167  Router DNS = CS-13.cs.trinity.edu  Router IP = 131.194.71.148  Router Gateway = 192.168.1.1  Wireless Adapter IP = 192.168.1.25 CS-7  Static DNS = CS-7.cs.trinity.edu  Static IP = 131.194.71.140  Router DNS = CS-14.cs.trinity.edu  Router IP = 131.194.71.149  Router Gateway = 192.168.1.1  Wireless Adapter IP = 192.168.1.25

18 Co 18

19 Disable All Access Points Except The Wireless On Your System! Replace The Screen Capture Below With Yours! 19

20 Disable All Access Points Except The Wireless System 1! Replace The Screen Capture Below With Yours! 20

21 Disable All Access Points Except The Wireless On System 2! Replace The Screen Capture Below With Yours! 21

22 Co 22

23 Remote Into Your System Replace The Screen Capture Below With Yours 23

24 Co 24

25 Put a Copy Of DataTransfer.txt In The Share Folder On System 1. Start WireShark. Copy DataTransfer.txt From The Share Folder Of System 1 To Your Desktop Capture Using The Wireless Adapter 25

26 Stop The Ethernet Card Capture. Sort By Source. Show Some Of The DataTransfer.txt File Replace The Capture Below With Yours. 26

27 Co 27

28 Open The Share Folder Of System 2. Start WireShark. Copy DataTransfer.txt From Your Desktop To The Share Folder Of System 2 Capture Using The Wireless Adapter 28

29 Stop The Ethernet Card Capture. Sort By Source. Can You See Data Being Transferred Out? If So, Add A Capture Below; If Not, Explain Below! 29

30 Co 30

31 Go To System 1. Open The Share Folder Of System 2. Start WireShark On Your System (No Longer Involved In the Transfer). Copy DataTransfer.txt From System 2 To Desktop System 1 Capture Using The Wireless Adapter 31

32 Stop The Ethernet Card Capture. Sort By Source. Can You See Data Being Transferred By Other Systems? If So, Add A Capture Below; If Not, Explain Below! 32

33 Co 33

34 Re-Enable The Cat-5 Adapter On Your System Remove The Wireless Adapter. Replace The Screen Capture Below With Yours! 34

35 Re-Enable The Cat-5 Adapter On System 1 Remove The Wireless Adapter. Replace The Screen Capture Below With Yours! 35

36 Re-Enable The Cat-5 Adapter On System 2 Remove The Wireless Adapter. Replace The Screen Capture Below With Yours! 36

37 Co 37

38 Start A Capture On Your System. Start A Browser On Your System. Navigate To Carme.cs.trinity.edu Show The HTTP Traffic To Carme. Replace The Screen Capture Below With Yours. 38

39 Plug Your System & System 1 Into The Same Switch. Start Wireshark On Your System. Take The Browser On System 1 To Carme. Do You See Carme Browser Request From Other Systems? If So, Add A Capture Below; If Not, Explain Below! 39

40 Co 40

41 Promiscuous Monitoring Of Wireless Networks #1 41

42 Promiscuous Monitoring Of Wireless Networks #2 42

43 Questions #1 43 Explain : What Is The Difference Between Promiscuous And Non-Promiscuous Wireless Capture? ________________________________________________ ____ {T/F} Any Ethernet adapter can be used for promiscuous mode monitoring in a wired Ethernet network ____ {T/F} Any Wireless Ethernet adapter is equally good for strength, and other important statistics and indicators.

44 Questions #2 44 ____ {T/F} Standard drivers for wireless NICs support promiscuous mode ("RF Monitoring") While the adapter can receive radio signals on a given frequency regardless of the destination MAC address in the packet, the packets that are not addressed to this adapter are _?_ by the driver, and there is no way to make the standard driver pass them to the network monitoring software. _____ {T/F} A number of network monitoring software vendors make special RF monitoring drivers for all wireless adapters.

45 Questions #3 45 In order to do promiscuous packet gathering, the user must  obtained a supported wireless _?_,  install the wireless monitoring program,  replace the original driver by the special RF monitoring driver List the Make, Model, and Vendor Of All Wireless Adapters Made Available To You By Dr. Hicks. ______________________________________________

46 Questions #4 46 The Real Question : [ "Is there a RF monitoring driver for my Wi-Fi card and operating system?"] Do An Internet Search For Each Of The Adapters Listed On The Previous Slide. Adapter RF Monitoring Driver _________________________________ _______ {Y/N}

47 Questions #5 47 Software to do promiscuous packet gathering is called a W_?_ A_?_ Aside from the problems related to NIC drivers, wireless traffic is sometimes encrypted using WEP (an older standard) or WPA. A good WLAN Analyzer must be capable of _?_ encrypted network traffic on the fly utilizing a user-provided WEP or WPA-PSK key. A WLAN analyzer may not be required if all you need to monitor is the traffic between the wireless stations and the Internet. Using a standard, non-wireless monitor on a M_?_ port would make it possible to capture the packets being sent and received through the access point. A network layout illustrating this method is shown below.

48 Questions #6 48 Software to do promiscuous packet gathering is called a W_?_ A_?_ Aside from the problems related to NIC drivers, wireless traffic is sometimes encrypted using WEP (an older standard) or WPA. A good WLAN Analyzer must be capable of _?_ encrypted network traffic on the fly utilizing a user-provided WEP or WPA-PSK key. A WLAN analyzer may not be required if all you need to monitor is the traffic between the wireless stations and the Internet. Using a standard, non-wireless monitor on a M_?_ port would make it possible to capture the packets being sent and received through the access point. A network layout illustrating this method is shown below.

49 Co 49

50 Mirror Port Software 50

51 Questions #7 51 "How can I see all of the subnet traffic using Network Monitor?". The most efficient way to do this is to attach your computer's ethernet connection directly to the "_?_" port on your switch. On Cisco switches the mirroring port is called the _?_port and use a software program called a "Switched Port Analyzer". ____ {T/F} Almost all switches today come with one of these ports to allow system administrators to analyze network traffic using a packet sniffing product like Distinct Network Monitor.

52 Questions #7 52 Why do you need to attach to the mirror port? Well, technically when a NIC driver is in promiscuous mode, it is able to see all of the traffic that is travelling on the wire it is attached to. However, that traffic may be in fact limited to its _?_ traffic and _?_ broadcast traffic in the case of a switched network. As an administrator, the most efficient way for you to analyze traffic that is not visible from your computer is to capture it using the mirror or _?_port on your switch. When this is not possible Distinct Network Monitor does offer one more option through its Agents. Using Agents you will be able to analyze traffic that is not visible from your computer.

53 Co 53

54 Questions #8 54 Do an Internet Search - List at least half a dozen software products which enable packet monitoring on Windows systems. Include the Software Name and Price. Software _____________________________ $_________ URL____________________________________________

55 Questions #9 55 Do an Internet Search - (cont) Software _____________________________ $_________ URL____________________________________________

56 Questions #10 56 What Is Port Mirroring: _______________________________________________

57 Port Mirroring On Inexpensive Linksys Switch? 57

58 Co 58

59 Co 59

60 Extra Credit Transfer DataTransfer.txt From One Computer To Another Wirelessly. Use A Third Computer To Capture Packets In Promiscuous Mode. Include Sufficient Screen Captures & Explanation To Duplicate Your Efforts (i.e. What Card, What Software, Where Download, How Do, etc.. 60


Download ppt "1. ---------------------- Integrity Check ---------------------- As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any."

Similar presentations


Ads by Google