Академический Документы
Профессиональный Документы
Культура Документы
And
Attack Lab.
1
Experiment List
S. No.
Name of Experiments
1.
2.
3.
4.
Download, install and use nmap for open port scan, tcp port scan, udp port scan and ping
scan
5.
6.
7.
8.
9.
10.
Mini project
Network Security
What is Security
Dictionary.com says:
1. Freedom from risk or danger; safety.
2. Freedom from doubt, anxiety, or fear; confidence.
3. Something that gives or assures safety, as:
1. A group or department of private guards: Call building security
if a visitor acts suspicious.
2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
etc.
4
What is Security
Dictionary.com says:
1. Freedom from risk or danger; safety.
2. Freedom from doubt, anxiety, or fear; confidence.
3. Something that gives or assures safety, as:
1. A group or department of private guards: Call building security
if a visitor acts suspicious.
2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
etc.
5
What is Security
Dictionary.com says:
1. Freedom from risk or danger; safety.
2. Freedom from doubt, anxiety, or fear; confidence.
3. Something that gives or assures safety, as:
1. A group or department of private guards: Call building security
if a visitor acts suspicious.
2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
etc.
6
What is Security
Dictionary.com says:
1. Freedom from risk or danger; safety.
2. Freedom from doubt, anxiety, or fear; confidence.
3. Something that gives or assures safety, as:
1. A group or department of private guards: Call building security
if a visitor acts suspicious.
2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
etc.
7
Provide
Who is vulnerable?
Financial
Network Reconnaissance
Network
10
Vulnerability scanner
A vulnerability
scanner is a computer
program designed to assess computers,
computer systems, networks or applications
for weaknesses.
They
Types
Port
12
Denial of Service
Ingress filtering, IDS (snort)
TCP hijacking
IPSec
Packet sniffing
Secure
Shell
Social problems
Education
Secure
SocketLayer
13
Firewalls
Firewalls
Internet
Firewall
Firewall
Intranet
15
Denial of Service
Purpose:
16
TCP handshaking
17
Smurf
Smurf-Denial of Service
I C M P e c h o ( s p o o f e d s o u r c e a d d r e s s o f v ic t im )
S e n t to IP b ro a d c a s t a d d re s s
IC M P e c h o r e p ly
In te rn e t
P e rp e tra to r
V ic t im
20
Distributed DOS
TCP Attacks
If
TCP Attacks
Say
23
TCP Attacks
Alice
24
TCP Attacks
Mr.
25
TCP Attacks
First,
Packets
TheVoid
26
TCP Attacks
Initial
Sequenceno.
Then,
ISN,SRC=Alice
27
TCP Attacks
How
do we prevent this?
IPSec
Provides source authentication, so Mr. Big Ears
cannot pretend to be Alice
Encrypts data before transport, so Mr. Big Ears
cannot talk to Bob without knowing what the
session key is
28
Packet Sniffing
Recall
Packet Sniffing
This
30
Packet Sniffing
What
31