1. ---------------------- Integrity Check ---------------------- As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.

Slides:



Advertisements
Similar presentations
Installing a Wireless Home Network
Advertisements

PC Support & Repair Chapter 15 Advanced Networks.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Introduction to Network Analysis and Sniffer Pro
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Wi-Fi Structures.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
Introduction to Computer Networking. Wireless Network.
Designing a Home Network By Tabby Booth. Network Components Motorola Cable Modem Wireless 4 port Linksys Router Compaq Desktop Computer – NIC card HP.
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
1 Configuring Linksys Wireless Router Prof. Valencia Community College.
Wireless Network Security Lab Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
hotEx RADIUS Manager Installation
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
SIR Area 2 Computers & Technology Dean Steichen March 2012.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
Networking Components Chad Benedict – LTEC
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
TAX-AIDE Network Router Setup Network Printer Setups July SMT/TCS Training - Dallas1.
Wireless Networking 102.
195Eg Ethernet Wired LAN 195Eg. Wireless Ethernet Setting IP Address Using Utility Programs Begin Programming Definition Selection Programming Modes of.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Ch. 5 – Access Points. Overview Access Point Connection.
Introduction to Healthcare Information Technology
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
NETWORKING COMPONENTS By Cleve Rosser. Hubs allow large numbers of computers to be connected on a single or multiple LAN. Each computer plugs into the.
1. 3 Your Current Configuration : Your Ethernet NIC Should Be Connected To The Trinity Network 4 TU Network.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
UNIVERSITI UTARA MALAYSIA BPMN 6053 MANAGEMENT INFORMATION SYSTEM SEMESTER MARCH 2011 ASSIGNMENT TITLE: A SOHO Network Administration PREPARED FOR: DR.
COEN 252 Computer Forensics
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
Steps To Set Up Your Home Wireless Network You can use a wireless network to share Internet access, files, printers, and more. Or you can use it to surf.
Ethernet and Wifi Chapter 7 & 8. Send and Receive Data network adapter or network interface NIC card the most common wired Ethernet network interfaces.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Networking Devices Hang Pham Jared Jelacich David Ramirez.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Networking Components Michelle Vega Network System Administrations LTEC /026 Mr. West.
1 CSCD 433 Network Programming Fall 2011 Lecture 5 VLAN's.
1350 TAC Training © 2000, Cisco Systems, Inc. Wireless Lab.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Networking Material taken mainly from HowStuffWorks.com.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
VLANs Last Update Copyright Kenneth M. Chipps Ph.D.
A+ Certification Guide Chapter 16 (Part B) Networking.
Networking Components
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Securing A Wireless Home Network. Simple home wired LAN.
Networking Components Assignment 3 Corbin Watkins.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Wireless Networking Devices. wireless LAN adapter cards wireless access Points wireless bridges wireless routers.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
Instructor Materials Chapter 6 Building a Home Network
Lab 2: Packet Capture & Traffic Analysis with Wireshark
Networking & Wireless Routers II Driver Installation
How To Set Up A Wireless Network
Presentation transcript:

1

Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any Of Your Labs. 2

4

Use Visual Studio To Create A File, Called  DataTransfer.txt The File Is To Contain Approximately 75 MB Of Letters A-Z In The Following Format: Replace The Screen Capture Below With Yours! 5

Use Visual Studio To Create A File, Called  DataTransfer.Txt Display The File Size. Replace The Screen Capture Below With Yours! 6 This Is Close Enough!

7

DataTransfer.txt

9

Configure Your D-Link N Access Point To The Proper Static IP CS-1 to CS-4 10 CS-1  Static DNS = CS-1.cs.trinity.edu  Static IP =  Router DNS = CS-8.cs.trinity.edu  Router IP =  Router Gateway =  Wireless Adapter IP = CS-2  Static DNS = CS-2.cs.trinity.edu  Static IP =  Router DNS = CS-9.cs.trinity.edu  Router IP =  Router Gateway =  Wireless Adapter IP = CS-3  Static DNS = CS-3.cs.trinity.edu  Static IP =  Router DNS = CS-10.cs.trinity.edu  Router IP =  Router Gateway =  Wireless Adapter IP = CS-4  Static DNS = CS-4.cs.trinity.edu  Static IP =  Router DNS = CS-11.cs.trinity.edu  Router IP =  Router Gateway =  Wireless Adapter IP =

Configure Your D-Link N Access Point To The Proper Static IP CS-5 to CS-7 11 CS-5  Static DNS = CS-5.cs.trinity.edu  Static IP =  Router DNS = CS-12.cs.trinity.edu  Router IP =  Router Gateway =  Wireless Adapter IP = CS-6  Static DNS = CS-6.cs.trinity.edu  Static IP =  Router DNS = CS-13.cs.trinity.edu  Router IP =  Router Gateway =  Wireless Adapter IP = CS-7  Static DNS = CS-7.cs.trinity.edu  Static IP =  Router DNS = CS-14.cs.trinity.edu  Router IP =  Router Gateway =  Wireless Adapter IP =

Your System Wireless Access Point You May Use Any Device You Like Identify & Add Photo Connect It To Your Router! Replace The Screen Capture Below With Yours! 12 Access Point : ______________________________________ Access Point = _?_ (D-Link USB DWA-130/ Belkin USB Wireless G F5D7050 / Netgear Wireless G PCI Card WG311NA / D-Link USB DWL-G132 / etc.) Made By : __________________________________________ (D-Link, Belkin, Netgear, Linksys, etc.) Attach A Photo Of The Device : (Do Internet Search!)

System 1 Wireless Access Point You May Use Any Device You Like Identify & Add Photo Connect It To Your Router! Replace The Screen Capture Below With Yours! 13 Access Point : ______________________________________ Access Point = _?_ (D-Link USB DWA-130/ Belkin USB Wireless G F5D7050 / Netgear Wireless G PCI Card WG311NA / D-Link USB DWL-G132 / etc.) Made By : __________________________________________ (D-Link, Belkin, Netgear, Linksys, etc.) Attach A Photo Of The Device : (Do Internet Search!)

System 2 Wireless Access Point You May Use Any Device You Like Identify & Add Photo Connect It To Your Router! Replace The Screen Capture Below With Yours! 14 Access Point : ______________________________________ Access Point = _?_ (D-Link USB DWA-130/ Belkin USB Wireless G F5D7050 / Netgear Wireless G PCI Card WG311NA / D-Link USB DWL-G132 / etc.) Made By : __________________________________________ (D-Link, Belkin, Netgear, Linksys, etc.) Attach A Photo Of The Device : (Do Internet Search!)

15

Configure Your D-Link N Access Point To The Proper Static IP CS-1 to CS-4 16 CS-1  Static DNS = CS-1.cs.trinity.edu  Static IP =  Router DNS = CS-8.cs.trinity.edu  Router IP =  Router Gateway =  Wireless Adapter IP = CS-2  Static DNS = CS-2.cs.trinity.edu  Static IP =  Router DNS = CS-9.cs.trinity.edu  Router IP =  Router Gateway =  Wireless Adapter IP = CS-3  Static DNS = CS-3.cs.trinity.edu  Static IP =  Router DNS = CS-10.cs.trinity.edu  Router IP =  Router Gateway =  Wireless Adapter IP = CS-4  Static DNS = CS-4.cs.trinity.edu  Static IP =  Router DNS = CS-11.cs.trinity.edu  Router IP =  Router Gateway =  Wireless Adapter IP =

Configure Your D-Link N Access Point To The Proper Static IP CS-5 to CS-7 17 CS-5  Static DNS = CS-5.cs.trinity.edu  Static IP =  Router DNS = CS-12.cs.trinity.edu  Router IP =  Router Gateway =  Wireless Adapter IP = CS-6  Static DNS = CS-6.cs.trinity.edu  Static IP =  Router DNS = CS-13.cs.trinity.edu  Router IP =  Router Gateway =  Wireless Adapter IP = CS-7  Static DNS = CS-7.cs.trinity.edu  Static IP =  Router DNS = CS-14.cs.trinity.edu  Router IP =  Router Gateway =  Wireless Adapter IP =

Co 18

Disable All Access Points Except The Wireless On Your System! Replace The Screen Capture Below With Yours! 19

Disable All Access Points Except The Wireless System 1! Replace The Screen Capture Below With Yours! 20

Disable All Access Points Except The Wireless On System 2! Replace The Screen Capture Below With Yours! 21

Co 22

Remote Into Your System Replace The Screen Capture Below With Yours 23

Co 24

Put a Copy Of DataTransfer.txt In The Share Folder On System 1. Start WireShark. Copy DataTransfer.txt From The Share Folder Of System 1 To Your Desktop Capture Using The Wireless Adapter 25

Stop The Ethernet Card Capture. Sort By Source. Show Some Of The DataTransfer.txt File Replace The Capture Below With Yours. 26

Co 27

Open The Share Folder Of System 2. Start WireShark. Copy DataTransfer.txt From Your Desktop To The Share Folder Of System 2 Capture Using The Wireless Adapter 28

Stop The Ethernet Card Capture. Sort By Source. Can You See Data Being Transferred Out? If So, Add A Capture Below; If Not, Explain Below! 29

Co 30

Go To System 1. Open The Share Folder Of System 2. Start WireShark On Your System (No Longer Involved In the Transfer). Copy DataTransfer.txt From System 2 To Desktop System 1 Capture Using The Wireless Adapter 31

Stop The Ethernet Card Capture. Sort By Source. Can You See Data Being Transferred By Other Systems? If So, Add A Capture Below; If Not, Explain Below! 32

Co 33

Re-Enable The Cat-5 Adapter On Your System Remove The Wireless Adapter. Replace The Screen Capture Below With Yours! 34

Re-Enable The Cat-5 Adapter On System 1 Remove The Wireless Adapter. Replace The Screen Capture Below With Yours! 35

Re-Enable The Cat-5 Adapter On System 2 Remove The Wireless Adapter. Replace The Screen Capture Below With Yours! 36

Co 37

Start A Capture On Your System. Start A Browser On Your System. Navigate To Carme.cs.trinity.edu Show The HTTP Traffic To Carme. Replace The Screen Capture Below With Yours. 38

Plug Your System & System 1 Into The Same Switch. Start Wireshark On Your System. Take The Browser On System 1 To Carme. Do You See Carme Browser Request From Other Systems? If So, Add A Capture Below; If Not, Explain Below! 39

Co 40

Promiscuous Monitoring Of Wireless Networks #1 41

Promiscuous Monitoring Of Wireless Networks #2 42

Questions #1 43 Explain : What Is The Difference Between Promiscuous And Non-Promiscuous Wireless Capture? ________________________________________________ ____ {T/F} Any Ethernet adapter can be used for promiscuous mode monitoring in a wired Ethernet network ____ {T/F} Any Wireless Ethernet adapter is equally good for strength, and other important statistics and indicators.

Questions #2 44 ____ {T/F} Standard drivers for wireless NICs support promiscuous mode ("RF Monitoring") While the adapter can receive radio signals on a given frequency regardless of the destination MAC address in the packet, the packets that are not addressed to this adapter are _?_ by the driver, and there is no way to make the standard driver pass them to the network monitoring software. _____ {T/F} A number of network monitoring software vendors make special RF monitoring drivers for all wireless adapters.

Questions #3 45 In order to do promiscuous packet gathering, the user must  obtained a supported wireless _?_,  install the wireless monitoring program,  replace the original driver by the special RF monitoring driver List the Make, Model, and Vendor Of All Wireless Adapters Made Available To You By Dr. Hicks. ______________________________________________

Questions #4 46 The Real Question : [ "Is there a RF monitoring driver for my Wi-Fi card and operating system?"] Do An Internet Search For Each Of The Adapters Listed On The Previous Slide. Adapter RF Monitoring Driver _________________________________ _______ {Y/N}

Questions #5 47 Software to do promiscuous packet gathering is called a W_?_ A_?_ Aside from the problems related to NIC drivers, wireless traffic is sometimes encrypted using WEP (an older standard) or WPA. A good WLAN Analyzer must be capable of _?_ encrypted network traffic on the fly utilizing a user-provided WEP or WPA-PSK key. A WLAN analyzer may not be required if all you need to monitor is the traffic between the wireless stations and the Internet. Using a standard, non-wireless monitor on a M_?_ port would make it possible to capture the packets being sent and received through the access point. A network layout illustrating this method is shown below.

Questions #6 48 Software to do promiscuous packet gathering is called a W_?_ A_?_ Aside from the problems related to NIC drivers, wireless traffic is sometimes encrypted using WEP (an older standard) or WPA. A good WLAN Analyzer must be capable of _?_ encrypted network traffic on the fly utilizing a user-provided WEP or WPA-PSK key. A WLAN analyzer may not be required if all you need to monitor is the traffic between the wireless stations and the Internet. Using a standard, non-wireless monitor on a M_?_ port would make it possible to capture the packets being sent and received through the access point. A network layout illustrating this method is shown below.

Co 49

Mirror Port Software 50

Questions #7 51 "How can I see all of the subnet traffic using Network Monitor?". The most efficient way to do this is to attach your computer's ethernet connection directly to the "_?_" port on your switch. On Cisco switches the mirroring port is called the _?_port and use a software program called a "Switched Port Analyzer". ____ {T/F} Almost all switches today come with one of these ports to allow system administrators to analyze network traffic using a packet sniffing product like Distinct Network Monitor.

Questions #7 52 Why do you need to attach to the mirror port? Well, technically when a NIC driver is in promiscuous mode, it is able to see all of the traffic that is travelling on the wire it is attached to. However, that traffic may be in fact limited to its _?_ traffic and _?_ broadcast traffic in the case of a switched network. As an administrator, the most efficient way for you to analyze traffic that is not visible from your computer is to capture it using the mirror or _?_port on your switch. When this is not possible Distinct Network Monitor does offer one more option through its Agents. Using Agents you will be able to analyze traffic that is not visible from your computer.

Co 53

Questions #8 54 Do an Internet Search - List at least half a dozen software products which enable packet monitoring on Windows systems. Include the Software Name and Price. Software _____________________________ $_________ URL____________________________________________

Questions #9 55 Do an Internet Search - (cont) Software _____________________________ $_________ URL____________________________________________

Questions #10 56 What Is Port Mirroring: _______________________________________________

Port Mirroring On Inexpensive Linksys Switch? 57

Co 58

Co 59

Extra Credit Transfer DataTransfer.txt From One Computer To Another Wirelessly. Use A Third Computer To Capture Packets In Promiscuous Mode. Include Sufficient Screen Captures & Explanation To Duplicate Your Efforts (i.e. What Card, What Software, Where Download, How Do, etc.. 60