Introduction to BoB 28 th Team What is PRISM? Packet & Stream Analyzer File Analyzer Mongo DB based on JSON PRISM Manager Scenario Future works BEST.

Slides:



Advertisements
Similar presentations
1 Reading Log Files. 2 Segment Format
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Network Services Networking for Home & Small Business.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
CCNA 1 v3.1 Module 11 Review.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Web Server Administration
Slide 1 Attacks on TCP/IP. slide 2 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are.
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
Communication Protocols III Tenth Meeting. Connections in TCP A wants to send to B. What is the packet next move? A travels through hub and bridge to.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Networking Solutions Chapter 2 – The OSI Model. The Layered Approach Similar to a company like ◦ Advantages ◦Divides the network into ◦Multiple vendors.
Chapter 2 Networking Overview. Figure 2.1 Generic protocol layers move data between systems.
VSP Video Station Protocol Presented by : Mittelman Dana Ben-Hamo Revital Ariel Tal Instructor : Sela Guy Presented by : Mittelman Dana Ben-Hamo Revital.
Lecture 8 Modeling & Simulation of Communication Networks.
Wireshark and TCP/IP Basics ACM SIG-Security Lance Pendergrass.
FTP. SMS based FTP Introduction Existing System Proposed Solution Block Diagram Hardware and Software Features Benefits Future Scope Conclusion.
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
1 Web Server Administration Chapter 9 Extending the Web Environment.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
BY SAGAR SINHA SAPTARSHI BAKSHI SARTHAK JAIN SHAILZA CHAUDHARY
CS134 Web Design & Development Introduction to the Internet Mehmud Abliz.
1 ELEN602 Lecture 2 Review of Last Lecture Layering.
Web application architecture
Trend Micro Confidential 9/23/2015 Threat Rules Sharing Advanced Threats Research.
Network Services Networking for Home & Small Business.
Rules of Packet Transmission
Othman Othman M.M., Koji Okamura Kyushu University 1.
CS 3830 Day 5 Introduction 1-1. Announcements  Program 1 due today at 3pm  Program 2 posted by tonight (due next Friday at 3pm)  Quiz 1 at the end.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 6 The Transport Layer.
Beginning Network Security Monitor and control flow into and out of the LAN Ingress Egress Only let in the good guys Only let out the corp. business.
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
Presented By Team Netgeeks SIP Session Initiation Protocol.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
Cisco 1 - Networking Basics Perrine. J Page 16/5/2016 Chapter 11 At which layer of the TCP/IP model does Telnet operate? 1.application 2.presentation 3.session.
1 Securing Network Services. 2 How TCP Works Set up connection between port on source host to port on destination host Each connection consists of sequence.
Networks Part 2: Infrastructure + Protocols NYU-Poly: HSWP Instructor: Mandy Galante.
(Electronic Mail) a message sent and received electronically via telecommunication links between computers.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Transport Protocols.
More TCP/IP Protocols Chapter 6. TCP Transmission Control Protocol Connection-oriented Provides flow control Sequencing (putting the segments back in.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
Midterm Exam Review Release questions via webcourse “assignment” around 12:00pm, Mon. Oct. 28 th, due via webcourse at 12:00pm next day Submit format:
Week-2 (Lecture-1) An electronic message sent from one computer to another. contains account i.e. How does.
An Introduction To ARP Spoofing & Other Attacks
Chapter 5 Network and Transport Layers
3.1 Types of Servers.
Slides taken from: Computer Networking by Kurose and Ross
Course Review 2015 Computer networks 赵振刚
Networking Concepts Module A Copyright Pearson Prentice Hall 2013.
Chapter 6 The Data Link layer
PPPoE Internet Point to Point Protocol over Ethernet
Web Design & Development
Wireshark CSC8510 David Sivieri.
دیواره ی آتش.
Protocols 2 Key Revision Points.
Protocol Application TCP/IP Layer Model
Process-to-Process Delivery: UDP, TCP
Network programming Lecture 1 Prepared by: Dr. Osama Mokhtar.
IS 4506 Configuring the FTP Service
Presentation transcript:

Introduction to BoB 28 th Team What is PRISM? Packet & Stream Analyzer File Analyzer Mongo DB based on JSON PRISM Manager Scenario Future works BEST OF THE BEST Network configruation with sniffing

Network configruation Internet Router Tap Switch Users Promiscuous Mode PCAP files Packet Analyzer PacketAnalyzer.py File Analyzer FileAnalyzer.py What kind of file is? Document files Suspicious files via socket Sniffing Server Tap Sniffing Server Switch Users Promiscuous Mode PCAP files Packet Analyzer PacketAnalyzer.py File Analyzer FileAnalyzer.py What kind of file is? Document files Suspicious files via socket

PEScanner.py VirusTotal.py CuckooSandbox What is file format? HWP PD F DOC, PPT, XLS Network configruation HWPScan2.exe PDFid.py Office MalScanner.exe PE files PEScanner.py Packet INFO Mongo DB PRISM Manager Security officer VirusTotal.py CuckooSandbox PEScanner VirusTotal CuckooSandbox Tap Sniffing Server Switch Users Promiscuous Mode PCAP files Packet Analyzer PacketAnalyzer.py File Analyzer FileAnalyzer.py What kind of file is? Document files Suspicious files via socket

Introduction to BoB 28 th Team What is PRISM? Network configruation with sniffing File Analyzer Mongo DB based on JSON PRISM Manager Scenario Future works BEST OF THE BEST Packet & Stream Analyzer

Packet Analyzer Packet & Stream Analyzer

ClientServer LISTEN SYN SENT SYN SYN- RECIEVED SYN+ACK ESTABLISHED ACK SYN+ACK SENT SYN+ACK RECIEVED ACK SENT FIN+ACK RECIEVED FIN+ACK SENT FIN+ACK ACK SENT ACK CLOSED SYNSYN+ACKSESSION FIN+ACK TCP Session Management

Introduction to BoB 28 th Team What is PRISM? Network configruation with sniffing Packet & Stream Analyzer Mongo DB based on JSON PRISM Manager Scenario Future works BEST OF THE BEST File Analyzer

PDFid

OfficeMalScanner

PEscanner PEScanner

VirusTotal API

Cuckoo Sandbox virus.exe

Introduction to BoB 28 th Team What is PRISM? Network configruation with sniffing Packet & Stream Analyzer File Analyzer PRISM Manager Scenario Future works BEST OF THE BEST Mongo DB based on JSON

Mongo DB

Introduction to BoB 28 th Team What is PRISM? Network configruation with sniffing Packet & Stream Analyzer File Analyzer Mongo DB based on JSON Scenario Future works BEST OF THE BEST PRISM Manager

PRISM Manager – Packet

PRISM Manager – Stream

Introduction to BoB 28 th Team What is PRISM? Network configruation with sniffing Packet & Stream Analyzer File Analyzer Mongo DB based on JSON PRISM Manager Future works BEST OF THE BEST Scenario

Phishing site detection

Searching query · Document Leaks

Send message from naverUpload the archive fileSuccessfully uploaded Searching query · Document Leaks

Send message from nate Upload archive file in zeroboard

Report Mail

Introduction to BoB 28 th Team What is PRISM? Network configruation with sniffing Packet & Stream Analyzer File Analyzer Mongo DB based on JSON PRISM Manager Scenario BEST OF THE BEST Future works

Visualization Like this?or this :P

Future works Archive extract archive in password Can you decompress this archive files? Brute forcing with dictionary file

Future works 1. HTTPS2. Social Network Analysis 3. SMTP4. FTP 5. SMART PHONE

Thank you f o r your patience !!!