Password Cracking, Network Sniffing, Man-in-the-Middle attacks, and Virtual Private Networks Lab 2 – Class Discussion Group 3 Ruhull Alam Bhuiyan Keon.

Slides:



Advertisements
Similar presentations
Ethical Hacking Module VII Sniffers.
Advertisements

Man in the Middle Attack
ARP Spoofing.
ARP Caching Christopher Avilla. What is ARP all about? Background Packet Structure Probe Announcement Inverse and Reverse Proxy Tools Poisoning MAC Flooding.
Hands-On Ethical Hacking and Network Defense Lecture 15 Man in the Middle Attack to get Passwords from HTTPS Sessions.
Sniffing, Spoofing, Hijacking This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Network Attacks Mark Shtern.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
Sniffing the sniffers - detecting passive protocol analysers John Baldock, Intel Corp Craig Duffy, Bristol UWE.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
ITIS 6167/8167: Network and Information Security Weichao Wang.
1 The Attack and Defense of Computers Dr. 許 富 皓. 2 Network Architecture:
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
COEN 252: Computer Forensics Router Investigation.
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
NetComm Wireless VPN Functionality Feature Spotlight.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Lab #2 CT1406 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
IIT Indore © Neminath Hubballi
Computer Security and Penetration Testing
VPN AND SECURITY FLAWS Rajesh Perumal Clemson University.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Address Resolution Protocol(ARP) By:Protogenius. Overview Introduction When ARP is used? Types of ARP message ARP Message Format Example use of ARP ARP.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
CIS 450 – Network Security Chapter 5 – Session Hijacking.
Layer 2 and Switching. How Computers Communicate  In a two node flat network data can be sent without addressing.
CHAPTER 9 Sniffing.
1 The Attack and Defense of Computers Dr. 許 富 皓. 2 Network Architecture:
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Backdoors and Rootkits.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
1 The Main Event Battle Of the Sniffers. ● The Champion – Ethereal: Network Analyzer ● The Challenger – Ettercap: Network Security Suite.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
0x440 Network Sniffing.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
MIS Week 9 Site:
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
TCP Sliding Windows For each TCP connection each hosts keep two Sliding Windows, send sliding window, and receive sliding window to make sure the correct.
Lab #2 NET332 By Asma AlOsaimi.
An Introduction To ARP Spoofing & Other Attacks
Introduction to Information Security
Password Cracking, Sniffing and Man-in-the Middle
Networks Fall 2009.
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
TECHNOLOGY GUIDE THREE
LAN Vulnerabilities.
Packet Sniffers Lecture 10 - NETW4006 NETW4006-Lecture09.
Chapter 2: Basic Switching Concepts and Configuration
CIT 480: Securing Computer Systems
Chapter 4 Core TCP/IP Protocols
Network Security: IP Spoofing and Firewall
Virtual Private Networks
Firewalls Routers, Switches, Hubs VPNs
Virtual Private Networks (VPNs)
Cloud Security AWS as an example.
Cloud Security AWS as an example.
Presentation transcript:

Password Cracking, Network Sniffing, Man-in-the-Middle attacks, and Virtual Private Networks Lab 2 – Class Discussion Group 3 Ruhull Alam Bhuiyan Keon Copeland Group 4 Scott McCans Peter Mehravari

Outline Password Cracking Network Sniffing Man-in-the-Middle Virtual Private Networks

Password Cracking Efficient against weak passwords, takes matter of seconds For strong passwords, large amounts of time and processing power needed Brute force only logical way to break passwords (and luck) Be aware of key loggers

Defense – Password Cracking Avoid short common dictionary words apple, sheep, window, etc. Avoid common passwords password, passwd, abc123 Should be long (at least 8 characters) and contain numbers, letters, and symbols

Sniffing HTTP and FTP easy to sniff, not a secure connection SSH uses a secure connection, sniffed packets unreadable Easy to sniff TCP sessions using Ethereal or similar applications

Defense – Sniffing Detecting Sniffers Check local host by running ifconfig, if RUNNING PROMISC machine is in promiscuous mode (which usually indicates a sniffer) Utilities such as ARPwatch, monitor ARP caches to look for duplicates Intrusion Detection Systems which monitor ARP spoofing on a network Sniffing is very hard to detect usually until too late Sumit Dhar, Sniffers Basics and Detection,

Defense – Sniffing Prevention Use encryption programs for all Internet traffic Secure Socket Layers Transport Layer Security Secure Shell (SSH) Tunnel Use switch networks instead of Hubs, packets not visible at every node of network Anti-sniffing tools: Anti Sniff, Neped, Snort

Man-in-the-Middle: How it Works Application (Ettercap) sends out ARP messages with wrong MAC address Causes traffic to go through third party host Sender/Receiver don't know about the third party

Man-in-the-Middle: Threats Acts as a sniffer Can drop traffic for specific ports Can hijack existing connections

Defense – Man in the Middle Detection Traceroute for extra hops most likely will not work Different ARP responses from one computer Increase in RTT of packets possible?

Defense – Man in the Middle Prevention Manually enter ARP entries Firewall to prevent initial setup of Man in the Middle

Virtual Private Networks (VPN) Uses key to create secure connection All traffic between VPN hosts is secure Allows secure use of insecure protocols Hosts appear to be on same subnet

Defense – VPN Use secure method to transfer keys Check for man-in-the-middle