Advanced Network Labs & Remote Network Agent

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Understanding Internet Protocol
IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Introduction An introduction to the software and organization of the Internet Lab.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Introduction An introduction to the equipment and organization of the Internet Lab.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
By: Colby Shifflett Dr. Grossman Computer Science /01/2009.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Support Protocols and Technologies. Topics Filling in the gaps we need to make for IP forwarding work in practice – Getting IP addresses (DHCP) – Mapping.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
A Brief Taxonomy of Firewalls
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
OSI Model Routing Connection-oriented/Connectionless Network Services.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
Linux Networking and Security Chapter 11 Network Security Fundamentals.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
GROUP INVOLVED IN A WEB APPLICATION DEVELOPMENT Continue.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
CIS 3360: Internet: Network Layer Introduction Cliff Zou Spring 2012.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
TCP/IP Protocols Contains Five Layers
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Introduction An introduction to the equipment and organization of the Internet Lab.
Firewall C. Edward Chow CS691 – Chapter 26.3 of Matt Bishop Linux Iptables Tutorial by Oskar Andreasson.
NETGEAR CONFIDENTIAL FVS338 ProSafe VPN Firewall 50.
INTRODUCTION Firewall is a concept which blocks unwanted traffic and passes desirable traffic to and from both sides of the network.
© ITT Educational Services, Inc. All rights reserved.Page 1 IS3220 Information Technology Infrastructure Security Class Agenda 1  Learning Objectives.
J. Liebeher (modified by M. Veeraraghavan) 1 Introduction Complexity of networking: An example Layered communications The TCP/IP protocol suite.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Securing Interconnect Networks By: Bryan Roberts.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Defining Network Infrastructure and Network Security Lesson 8.
Lab #2 NET332 By Asma AlOsaimi.
CompTIA Security+ Study Guide (SY0-401)
Chapter 13 Network Address Translation
Introduction An introduction to the software and organization of the Internet Lab.
OSI Protocol Stack Given the post man exemple.
Using MIS 2e Chapter 6 Appendix
© 2002, Cisco Systems, Inc. All rights reserved.
Network Architecture Introductory material
CompTIA Security+ Study Guide (SY0-401)
Introduction An introduction to the software and organization of the Internet Lab.
Digital Pacman: Firewall Edition
Review of Important Networking Concepts
The Stanford Clean Slate Program
* Essential Network Security Book Slides.
AT-AR256E 4 Port ADSL Router
Firewalls Routers, Switches, Hubs VPNs
OPS235: Configuring a Network Using Virtual Machines – Part 2
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
AbbottLink™ - IP Address Overview
CS4470 Computer Networking Protocols
Introduction to Network Security
Cengage Learning: Computer Networking from LANs to WANs
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
Review of Important Networking Concepts
Virtual Private Network
Presentation transcript:

Advanced Network Labs & Remote Network Agent Asaf Avisar Evyatar Shalev

Objective #1 Conducting labs with “ Mastering Networks “ manual, and adapt it to our network equipment. Local network security today relay on a Firewall connected at the entrance of a network which inspect every packet pass through it. Security in networks based on the assumption that once a computer is inside my personal network (“physically connected”) it is less dangerous to it. Therefore, most of private networks today are vulnerable from “inside”. We will use this vulnerability, by opening a “back door” to a network which will act like a host in the network while actually pass back and forward packets from another network. By doing so, We have straight access through an unauthorized gate to any computer in a private network.

Implementation- Labs The labs manual consists of 10 labs that deal with main network topics. Lab Topic 1 Introduction 2 Single segment IP networks 3 Static Routing 4 Dynamic Routing Protocols 5 Transport Layer Protocols 6 LAN Switching 7 NAT and DHCP 8 DNS 9 SNMP 10 IP Multicast

Implementation- Labs The manual was written in 2005, therefore, it is optimized to the software and hardware that were popular then. In order to run it on a modern setup, a lot of adaptations had to be made, especially with Linux commands, networking tools and more. All the adaptations are documented in a dedicated guide.

Objective #2 Remote Network Agent – sophisticated “ back door ” to a network. Basic assumptions : Local network security today relies on a Firewall. Most private networks today are vulnerable from the “inside”. Local network security today relay on a Firewall connected at the entrance of a network which inspect every packet pass through it. Security in networks based on the assumption that once a computer is inside my personal network (“physically connected”) it is less dangerous to it. Therefore, most of private networks today are vulnerable from “inside”. We will use this vulnerability, by opening a “back door” to a network which will act like a host in the network while actually pass back and forward packets from another network. By doing so, We have straight access through an unauthorized gate to any computer in a private network.

Remote Network Agent Intervening NAT normal operation in order to impersonate a host in a secured network from distant location. Implementation involves multiple protocols : NAT- Network Address Translation. Port forwarding. VPN- Virtual Private Network. NAT – Network Address Translation which changes IP & ports for expending availability of IP addresses. Port forwarding – Protocol in use in routing for moving packet to a pc according to the port assign to it. VPN - Virtual private network which connect a pc to a private network even if its not locally there.

Remote Network Agent Modifying external packet’s headers to act as internal ones. The logic of changing the header runs on a malicious host and managed with Data Base. An operator controls the Data Base with a friendly web/Python based GUI. Application Application Presentation Presentation Session Session Transport Transport Network Network Malicious header Data link Data link Physical Physical

Demonstration Basic attack Operator Blocked by Firewall Firewall DstIP: Agent p: 10000 SourcIP: Operator Blocked by Firewall Firewall Local network victim1

Demonstration Remote Network Agent attack Operator Firewall Agent DstIP: Agent p: 10000 SourcIP: Operator Firewall Agent Local network Eth0 Cell0 victim1

Demonstration Remote Network Agent attack Operator Agent DB Firewall outside Port Inside dest ip Inside dest port 10000 Victim1 80(http) 20000 21(ftp) 30000 Victim2 Firewall Agent Local network DstIP: Agent p: 10000 SourcIP: Operator Dst: VICTIM1 P: 80 Source: Agent Eth0 Cell0 victim1

Dst: 212.7.4.4:10000 Source: 213.6.4.3: 4231 10.0.0.3 212.7.4.4 10.0.0.1 213.6.4.3 Dst: 10.0.0.1: 21 Source: 10.0.03: 5123 APP Control links 10.0.0.0 10.0.0.2 10.0.0.3

Challenges Learning computer networks infrastructure. Conducting the labs with an old manual. Understanding Linux Kernel Networking. Manipulate sockets with code. Linux Kernel Networking – Linux, in its basic networking capabilities, allows user working with sessions only ( layer 4-7 OSI module). To modify layer 1-3, we need to deeply understand Linux networking kernel structure and alter it according to our project. Programming – Our code should work with a correspondence to Linux kernel. We have to implement a whole header and do not disturb to Linux kernel stack, while implementing GUI, Remote access and using DB.