Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

The primary purpose of this first Lab Assignment is for you to familiarize yourself with the environment that we will use this semester for exploring network security issues.

The tasks you should perform are

- Install VirtualBox on a machine that you own or have access to
- Import a Tiny Core Linux virtual machine (VM) that I provide to you
- In the VM, set up your terminal prompts with your name, and execute a few basic commands to make sure everything works
- Perform several simple "packet extractions" using tcpdump

To complete this assignment, you will upload (this is repeated at the bottom of the assignment)
- A snapshot graphic showing your Tiny Core Linux running with two terminals, one of them running tcpdump, and the other running a telnet client.
- The tcpdump files, port23.txt and port22.txt, that you will create.
- A written explanation of your understanding of the various flags and commands used to run tcpdump
- A written explanation of your attempts to telnet and/or ssh to the Tiny Core Linux guest OS from the host computer, or another computer on the same network.

Installation and initial familiarity with the software

I have prepared a document that provides an overview of the installation. It is available on the Blackboard assignment page, as VirtualBox Install and Familiarization.

This is not a comprehensive document, and not all details are covered, but you should use it as guidance in the installation and usage of the Tiny Core Linux VM. If you run into problems that you are unable to solve, please use the Blackboard Discussion forum to ask the questions publicly for the benefit of everybody. Likewise, please feel free to contribute any answers to questions that other students may ask.

You should install VirtualBox and the Tiny Core Linux VM ­ as outlined in the VirtualBox Install and Familiarization document mentioned above ­ before proceeding to the next step.

Be sure that you set up (as described in the setup instructions) the terminal command line prompt so that it has your name in it. It is important that your name is visible in at least some of your screen shots ­ your goal should be to show me that this is YOUR work, and not copied from somebody else.

Initial familiarity with tcpdump

Your primary goals, in terms of assignment submission, are
- to provide me with a graphic that shows you using tcpdump in one window and telnet in another, as well as the text files you created from running tcpdump
- to explain your understanding of the tcpdump utility and the command line flags that I have asked you to use.
- to explain to me whether you are able to telnet and/or ssh into your guest Tiny Core Linux OS from the host computer, or from another computer on the same network. If you have problems doing this, please explain in detail why you are not able to. You will not lose points if you are unable to telnet and/or ssh into the guest Tiny Core Linux OS from outside, but you are required to explain what you tried, and why it didn't work.

These are the basic actions you should take to start running and testing tcpdump. You don't have to do it exactly as I specify ­ these are just provided as guidance.

In your Tiny Core Linux guest virtual machine (VM)

- Open a terminal

- Using nano or vi, create a simple text file with 2­3 lines of text in it (something that you will recognize later). In this text, you should include your name, for identification purposes.
- Save it, and make sure you can "cat" it (e.g. cat myfile.txt)
- Run tcpdump so that it captures telnet packets on the lo interface (this is the "loopback" interface, and whenever you connect to localhost, the traffic passes through this interface, locally, rather than one of the ethernet interfaces). Note that the telnet server listens for traffic on Port 23.

- Run tcpdump as follows, and leave it running

sudo tcpdump -l -i lo -A port 23 | tee port23.txt

353_Figure.png

- As part of the assignment, you should do a little research on tcpdump, and anything else you don't understand in the above command, and fully explain what this command does. In other words, explain sudo, tcpdump, and what all of the command line flags mean

- Open another terminal

- In the new terminal, telnet to the localhost (the userid is tc, and there is no password). Watch what happens in your tcpdump window as you do so. The output can be confusing, but see if you can spot your keystrokes in those packets. Keep in mind that telnet sends one packet per keystroke, then echoes it back to the client for display

In the following example, you can see my output from the tcpdump command ­ I had to scroll back up the window, but you can see the login prompt at the top, and if you look close, you can see the ......t and the .......c that I typed in.

1115_Figure1.jpg

- When logged in, do a directory listing (ls) and, again, see if you can spot your keystrokes, plus the response to your ls command in the window that displays the tcpdump packets.
- cat the file that you created earlier. Verify that you can see your keystrokes in there, plus the expected output from the cat command.
- exit from telnet (just type exit in that terminal)
- telnet localhost again, using a nonexistent userid (e.g. mcis), then enter a long password with a pattern that you'll be able to recognize in the tcpdump packet output(e.g. abcdefghijklmonp....). Verify that you can see the individual characters somewhere in the packets ­ in other words, you can sniff passwords. While you are doing this, take a snapshot of the Tiny Core Linux screen and save the PNG file for upload to Blackboard.
- exit from telnet again and stop tcpdump (CTRL­C). The tcpdump output should be present in the file port23.txt, and you may use this to review your session.

- Now repeat the same steps with ssh (you will need to modify the command, because ssh listens on Port 22)
• Start tcpdump to listen for ssh messages
• ssh to localhost (simply, ssh localhost)
• perform the ls and cat operations on the test file, and this time you should note that everything is encrypted. You should not see any evidence of what you are doing.
• Exit from ssh, and then try to login with a bad userid (e.g. ssh mcis@localhost) and verify that you can't see any login/password data in tcpdump ­ it should all be encrypted.
• Exit ssh and tcpdump, and note that your session output has been saved in the file that you specified.

To complete this assignment, you should turn in a single PDF or Word (or OpenOffice) document which contains the following Please, no ZIP files, no tar files, just a single PDF or Word/OpenOffice file.

- An explanation of your experiences in the set up for VirtualBox and TinyCore Linux. Was it easy or hard• Did you have any problems• If so, describe them.

- A snapshot graphic showing your Tiny Core Linux running with two terminals, one of them running tcpdump, and the other running a telnet client. Be sure that your name is clearly visible in the prompt. Here is an example from my own session:

979_Figure2.jpg

- A written explanation of your understanding of the various flags and commands used to run tcpdump.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91877733
  • Price:- $40

Guranteed 36 Hours Delivery, In Price:- $40

Have any Question?


Related Questions in Computer Network & Security

Objectives-to learn about more advanced network security

Objectives -To learn about more advanced network security and vulnerability scanning tools Lab Outcome: · To complete the lab procedures & correctly answer the questions in the Blackboard quiz. Lab Deliverables · Answer ...

Describe 2 variables a government will look at to predict

Describe 2 variables a government will look at to predict where the economy will be in the next six months.

You just signed a 30-year lease agreement for a business

You just signed a 30-year lease agreement for a business property. The monthly rent for the first year is $1,000/month, with the ?rst month's rent due today. Starting from the second year onward, the monthly rent will be ...

Shadow register setsa describe the use of shadow register

Shadow Register Sets a. Describe the use of shadow register sets. b. How many shadow register sets are supported? c. What instructions are used to move data between them? Floating Point Numbers. We have heretofore focuse ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment - network implementationbackgroundwidgets and

Assignment - Network Implementation Background Widgets and Gadgets (WaG) have recently acquired a business, We Make Stuff (WMS), in another city. Before work can commence on integrating WMS's network into WaG's, WMS actu ...

Per capita income of winterfell is 15000 with a growth rate

Per capita income of Winterfell is $15,000 with a growth rate of 4%. Per capita income of King's Landing is $25,000 with a growth rate of 0%. How long until per capita income is the same in both locations?

A develop a caesar cipher-type encryption algorithm with a

a. Develop a Caesar cipher-type encryption algorithm with a little more complexity in it. For example, the algorithm could alternatively shift the cleartext letters positive and negative by the amount of the key value. V ...

Sip encodingwhy does the session initiation protocol sip

SIP, ENCODING Why does the session initiation protocol SIP allow the sender and receiver to choose two different multimedia encoding schemes? Describe a scenario where it makes sense to use different protocols for sender ...

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As