Code Monkey home page Code Monkey logo

network-security's Introduction

  1. Set up your lab account
  1. Network reconnaissance
  • Answer the questions in the "Exercise" section.
  1. Redirect traffic to a wrong or fake site with DNS spoofing on a LAN .
  • Answer the questions in the "Exercise" section.
  • Also answer the following questions:
    • (1) If we hadn't put that big "FAKE" notice over the logo, would you be able to detect the DNS spoofing attack on loading the bank's web page in your browser? Explain.
    • (2) The Diamond Banking website lets users input their username and password on a form on a web page that is loaded over HTTP. But when the user presses "Login", the form sends the username and password to a page that is loaded over HTTPS, i.e. the username and password are sent over an encrypted connection. Explain why this is not sufficient to protect the users' login information. What kind of attack are users left vulnerable to? How would using HTTPS for the entire site protect users against this kind of attack?
    • (3) Would DNSSEC protect against this kind of attack? Explain your answer.
  1. Attacks on WiFi confidentiality: Passive sniffing and MITM attack.
  • Answer the questions in the "Exercise" sections.
  • Also answer the following question: In the passive sniffing attack, Mallory needs to capture the 4-way handshake in order to read user data on a WPA network. But in the MITM attack on WPA, Mallory did not capture the 4-way handshake, but was still able to read sensitive user data. How did Mallory bypass WPA confidentiality in this attack?
  1. Layer 7 DoS attack with slowloris. Answer the following questions:
  • Show the plot of connections vs. time in your experiment for three scenarios: no mitigation, mitigation using firewall, and using the Apache web server.
  • In the plot of connections vs. time in the firewall scenario: how do we see the effect of the firewall?
  • With the firewall in place, the slowhttptest plot still shows that service is not available - does this mean that the attack was effective and legitimate users cannot connect to the web server?
  • Firewalls can be problematic when they interfere with legitimate application use. Sometimes, many hosts might share the same IP address (such as with NAT). How would the firewall strategy used in the lab to prevent the slowloris attack affect legitimate users in this scenario?
  1. Anonymous Routing of Network Traffic Using Tor

network-security's People

Contributors

ffund avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.