DAKOTA STATE UNIVERSITY Mobile Security Lab. Introduction  Dakota State University  Computer Network Security  Who we are?  Wireshark  There are.

Slides:



Advertisements
Similar presentations
File Transfer Protocol. FTP (File Transfer Protocol) is used to transfer programs or other information from one computer to another. This simple tool.
Advertisements

DSL-2730B, DSL-2740B, DSL-2750B.
Using FTP Prof. Wayne Pollock Hillsborough Community College Tampa, FL
METEOROLOGICAL TELECOMMUNICATION AND METCAP A GLANCE TO NETWORK BRIEFLY Ömer Hüdai ALBAYRAK 2010ALANYA.
Online Login Security Enhancement Creating an online username & password January, 2015.
Basic Network Concepts And Troubleshooting. A Simple Computer Network for File Sharing.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
The Internet Useful Definitions and Concepts About the Internet.
Using FileZilla to FTP CS10001 – Computer Literacy Kent State University.
NFN Configuration Tool
Internet Applications: File Transfer Protocol (FTP)
Activating Pilot Account ( first time users ) Web-based Activation Browse to 1. Click on the link on the lower right that says.
Web and Internet Part I ST: Introduction to Web Interface Design Prof. Angela Guercio Spring 2007.
CS 497C – Introduction to UNIX Lecture 35: - TCP/IP Networking Tools Chin-Chih Chang
Engineering H192 - Computer Programming The Ohio State University Gateway Engineering Education Coalition Lect 4P. 1Winter Quarter Introduction to UNIX.
EDUROAM Windows. Open Control Panel and go to wireless settings.
How to connect your laptop to the classroom wireless AP.
What are computers? Computers are machines that perform tasks or calculations according to a set of instructions, or programs. The first fully electronic.
Advanced Networking for DVRs
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Accessing the Internet with Anonymous FTP Transferring Files from Remote Computers.
1 Principles of Computer Organization Basics of Computer Network TCP/IP: How Messages Get Delivered Across the Internet Dr. Greg Butler Computer Science.
One to One instructions Installing and configuring samba on Ubuntu Linux to enable Linux to share files and documents with Windows XP.
Introduction to Window Understanding the Internet Using Lecture 2 Chapter 2.
N ETWORKED & D ISTRIBUTED COMPUTING S YSTEMS L AB Programming Assignments EE323 Computer Networks.
Lab How to Use WANem Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
Objectives Define IP Address To be able to assign an IP address with its Subnet Mask and Default Gateway to a PC that operates using Windows 7 or Fedora.
How the Internet Works: What happens when information is sent from your computer?
Dr. Thomas E. Hicks Trinity University Computer Science.
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
VsFTP in Linux. Introduction to FTP The File Transfer Protocol (FTP) is used as one of the most common means of copying files between servers over the.
File Recovery and Forensics
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
1 Install FTP for Curriculum Development Professional Development Training.
Setting Up DreamWeaver NOTE: Use your mouse OR page down key to advance each page.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
PC Maintenance: Preparing for A+ Certification Chapter 23: Using a Windows Network.
How to configure DNS for a Windows 2000 domain? 1.Start the Install/Remove Programs Control Panel Applet (Start - Settings - Control Panel - Add/Remove.
Managing Your Website C/IL 102. Managing Your Website  Where are things?  Building your website (on your PC)  You can see it  You can edit it  No.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
HotEx Radius Manager Installation. hotEx RADIUS Manager Network Diagram.
Proxy Installer for Windows Squid: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response.
How to make all IP address the same. 7 6.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Accessing Evitech network via FTP by Susan Jansson.
Chapter 5 Common Internet Tools. How Gophers Work? Internet Gopher: Client software, to find Internet files and other resources easily Organize information.
How to use WS_FTP A Step by Step Guide to File Transfer.
A guide to file sharing on Windows XP Peer to Peer File Sharing.
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
Getting Connected CPSC 1010 August 21, Connecting to the SOC Servers Why would we need to connect Work with files Transfer files from your local.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Online Login Security Enhancement Creating an online username & password November 2015.
These steps will guide you through installing the pcAnywhere Host software so that we can remote control your PC from NZ! Once installed, it will only.
File Transfer Protocol (FTP) CIS 130. File Transfer Protocol (FTP) Copy files from one internet host (server) to your account on another host –Need domain.
Doc.: IEEE /044r0 Submission January 2003 Al Petrick, IceFyre, Tim Godfrey, IntersilSlide 1 Electronic Attendance and Server Update Tim Godfrey.
Uploading Web Page  It would be meaningful to share your web page with the rest of the net user.  Thus, we have to upload the web page to the web server.
INTERNET APPLICATIONS CPIT405 Install a web server and analyze packets.
Remote Access Using a Netgear DG834 Router 1http://
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
COSC 432 Shi Li 12/8/2008. File Transfer Protocol (FTP) Used to transfer files and data between computers via internet Defined as RFC959 Developed in.
Enumeration.
TCP/IP Utilities Richard Goldman May 29, 2003.
Windows Networking Configuration
FTP - File Transfer Protocol
Intuit has launched QuickBooks File Doctor tool (QBFD) in QuickBooks File Doctor is a tool that has been designed to recover the damaged company.
File Transfer Protocol
Configuring Internet-related services
Installing the BDI2 Mobile Data Solution (MDS)
Dell Latitude Laptop Student setup.
Presentation transcript:

DAKOTA STATE UNIVERSITY Mobile Security Lab

Introduction  Dakota State University  Computer Network Security  Who we are?  Wireshark  There are federal, state, and local laws on how this utility can be used.  This tool is easy to detect  Use of it outside of this controlled environment is against the law.  White Hat Agreement

Goals  Introduce you to  Networking  Network Services  Security

Locate ID Number on Bottom of Computer

IP Address  Start  Run  cmd  ipconfig  Start  Control Panel  Network Connections  Right Click on Local Area Connection  Click on Internet Protocol (TCP/IP)  Properties

Ping Your Neighbor  What is a ping?  cmd prompt  ping XX  ping  ping

WireShark FAQ  Can see the pings leaving  Network utility that shows all the traffic on the network  Let’s take a look at it!

Using WireShark  Click the WireShark icon  You have two different types of connections to choose from.  Start the capture  Let’s do those pings again.  ping XX  ping  ping

What is an FTP Server?  File Transfer Protocol  Usually used for large files  Can be accessed through command prompt, a program on the client machine, or internet browser  Can have account login  Can have anonymous login

Login using an account  Open up your cmd prompt  ftp  username: pat  password: pat (will not display)  It didn’t work.  Type in exit then repeat top portion  Look in WireShark for logins with pat pat (pause capture)

Login Using Your Given Account  Keep WireShark running  Log in using the credentials on the piece of paper you were given  Find someone else’s credentials.  When you find someone else  Ask who is  Ask if their password is

What did we do?

2 Day Summer Security Boot Camp  Hands on experience using DSU’s state of the art security lab.  No Security Experience (or expertise) required  Lean about and implement cutting edge security concepts  2 days (stay over night) on DSU Campus  Food  Prizes  Game Tournaments at Night

 - Please fill out the information.