This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Analysis of Protocols with Wireshark

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

8

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Name of the student: Avtar

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Assignment 1

 

Question 1. Analysis of Protocols with Wireshark

 

(a). Application, protocol, ports and IP addresses used are:

 

Application name or protocol

Transport Protocol

Client Port

Server Port

Client IP

Server IP

Time of use

wget

TCP

48158-84

80

192.168.1.11

192.168.3.32

0.001884-3.935059,

18.350688- 21

ping

ICMP

?

?

192.168.5.2

192.168.1.12

2.662197-2.664566, 7.661626, 12.662553, 17.665939,22, 27, 32, 47,

ping

ICMP

?

?

192.168.1.11

192.168.2.22

3.923463-3.928133, 7.925722, 16.348104,

19.943458,

wget

TCP

36976-37000

80

192.168.3.31

192.168.1.12

5.656903-10.141065, 22, 23, 25,

ping

ICMP

?

?

192.168.1.12

192.168.6.1

5.902673-5.903418, 11.905208, 23, 29, 41,

ping

ICMP

?

?

192.168.1.11

192.168.2.22

5.923233-5.924929, 9.928377, 11.931221, 15.938206, 21, 23, 29, 31, 33, 45

?

UDP

56946

5001

192.168.1.11

192.168.5.2

9.346241, 10.346672, 12.346429,13.346979, 15.346986,21, 23, 25, 26, 27, 28, 30, 32, 34, 35, 37, 39, 43, 48

wget

TCP

49258

80

192.168.2.21

192.168.1.12

12.021093, 27, 28, 29,

ping

ICMP

?

?

192.168.6.1

192.168.1.12

17.915177,

?

TCP

38168

18

192.168.1.12

192.168.3.31

20.234008, 28, 32, 33,

?

TCP

38330

10001

192.68.2.22

192.168.1.11

25, 43

 

 

 

 

 

 

 

 

 

(b). The MAC addresses found in the packet capture are:

 

 

Computer

Interface

MAC

IP

1

1

08:00:27:9f:c6:9f

192.168.1.11

2

1

08:00:27:fd:ab:da

192.168.1.12

3

1

08:00:27:cc:71:35

192.168.1.1

3

2

08:00:27:1c:6d:33

192.168.4.1

3

3

08:00:27:61:fc:c4

192.168.5.1

 

 

(c). The DNS for the computers involved are:

 

 

IP Address

DNS

Packet number

192.168.1.1

www.routerlogin.com

2

192.168.3.32

www.example.com

6

192.168.1.12

www.uni.edu.au

86

 

 

 

(d). Message Sequence Diagram for the first TCP connection:

 

 

 

(e). The TCP connection follows the three-way handshake to establish a connection before the data transfer initiation. The establishment and closing of the connection follow:

First, the client sends the TCP SYN packet to the server with the sequence number.

The server acknowledges the TCP SYN packet by sending the TCP SYN-ACK packet back to the client.

The client sends the acknowledgment back to the server for SYN-ACK, by sending the TCP SYN packet.

Once the connection between client and server has been established, the server may send the data to the client. The client acknowledges each data packet sent by the server.

The server waits for the further requests (like HTTP request in our case). If the client’s requests are fulfilled, then the client sends the TCP FIN-ACK packet to the server to initiate the connection closing.

The server responds to the TCP FIN-ACK packet by sending the same packet. Then the client sends the acknowledgment to the server, and hence the connection closing gets completed.

 

(f). We can get the list of files by looking at the HTTP requests and decide if it exists or not by looking at the corresponding response code in the response packet.

Computer

DNS

File exists

File does not exist

Packet Number

192.168.3.32

www.example.com

index.html

page1.html

page2.html

image.png

/subdir/page3.html

/subdir/style.css

 

 

 

 

 

 

 

page4.html

Req 6, Resp 8

Req 16, Resp 18

Req 26, Resp 28

Req 36, Resp 39

Req 48, Resp 50

Req 62, Resp 64

Req 73, Resp 75

192.168.1.12

www.uni.edu.au

index.html

/subdir/page3.html

/subdir/style.css

 

page1.html

image.png

page2.html

 

 

 

page4.html

 

 

 

Req 86, Resp 88

Req 100, Resp 102

Req 110, Resp 112

Req 124, Resp 126

Req 134, Resp 136

Req 145, Resp 148

Req 159, Resp 161

 

 

Question 2. Web Application Attacks

Objective: Understand how real web application attacks work, and methods for mitigating them

 

(a). Unvalidated Redirect attack: URL redirection is a technique which provides the flexibility to use multiple URLs for the same web page. Redirection can be used for several useful purposes, like URL shortening and the same website with multiple domains owned by the same owner. Some applications of this technique can be used by the malicious attackers. The attacker may use the redirection to the malicious website for phishing. The steps, to perform unvalidated redirect attack using topology 7, followed are as follows:

 

Deployed the MyUni application on node 4. The URL for this application is “http://www.myuni.edu/grades/login.php”.

Deployed the fake MyUni application on node 5. The URL for this fake application is “http://www.myuni.edu.gr/ades/login.php”

Created a user on node 4’s mysql.

Visited the URL “http://www.myuni.edu/grades/redirect.php?url=http://www.myuni.edu.gr/ades/login.php”. There is a file kept on Node 4, called “redirect.php”. It takes an URL as a parameter and redirects to it.

After reaching the redirected URL, the user enters the username and password on the login page provided. On node 5, the stolen username and password can be seen, by simply reading the file “/tmp/stolenlogins.txt”.

Login page on the node five application is a phishing page, which contains the logic of reading the username and password, and then writing them into a file.

 

 

(b). Assuming a website must use redirects, the technique that can be used to

minimize the impact of unvalidated redirect attacks is that rather than sending the URL or portion of it in the destination parameters, one should use value mappings. This is because the server side code may be used to translate these mappings into the target URL.

 

(c). Apart from the unvalidated redirect attack, the attacker could have used the DNS poisoning. In such technique, the attacker changes the DNS entries and force the users to be redirected to its one of the servers. Those servers will be containing the stolen usernames and passwords. The benefit of such attacks to the attacker is that the attacker can gain access to important online accounts for different services like email, etc. Once the attacker gains access to the email accounts, s/he may escalate attack to other online services account, which is connected to that email account. So, the loss may be huge and impacts the user badly. Apart from it, these accounts are sold on the internet, which provides direct money.

 

(d). The screenshot of the stolen username and password, during the attack.

 

 

 

 

 

 

 

Question 3. Cryptographic Operations with OpenSSL

No separate documentation is required for this project. Required files (ciphertext.bin, keypair.pem, pubkey.pem, signature.bin, commands.bash, key.txt, secretkey.bin) are uploaded in the Moodle. To run the bash file, it is required to store Steven-Gordon-pubkey.pem in the same path as in step g, key.txt is encrypt using RSA by steven-gordon-pubkey.pem so that only Unit Coordinator can only decrypt the file.

 

 

Question 4. Malware Research:

Introduction: Ransomware is a malware-based attack, and it is increasingly get popularized in recent days. Generally, it gets installed in the victims computing device unwarily. After getting infected by such malware, user’s system fails to enter in the system legitimately. These kinds of malware encrypt all user data with a large key and make them unreadable for the user and in the other hand, it threats the victim to publish the critical data in public domain. Actual motive behind this kind of attack to obtained ransom payment from the victim, so it displays message in victim’s device and demand money to withdraw the attack from the system. Sometime many organizations pay the ransom and suppress the news to protect their image to its customer.

Background: File encryption based Ransomware was invented by two computer scientist Young and Yung[1] at Columbia University, and they have present this cryptoviral extortion mechanism by a 3-round protocol. Practically this kind of attack was mainly popular in Russia during 2013, and after that, it gets spread in the rest of the world. Few well-known attacks which happen in recent days are enlisted bellow.

Muni system’s network attack: It was also known as Black Friday attack. On November 25-26, 2016 Mamba and HDDCryptor malware attacks Muni’s transportation system and causes the total breakup of the system. It was demanded $73,000 to withdraw the attack.

Police Trojan[3]: It is a Reveton based Ransomware attack was performed on several computer systems during 2012 in Europe based country. It mainly victimized end computer users by an act like a law enforcement agency.

Fusion: It belongs to ransomware family. It was active during April 2015 and March 2016. It is the most popular mobile ransomware. Like other ransomwares it also uses scare tactics to force people to pay a ransom otherwise it claims to give fictitious charges on the user. It uses iTunes gift cards for payment.

Working Technologies: Ransomwares basically spread using Trojan. Ransomwares get hidden in a payload of Trojan and act like a legitimate file. It enters the system during a malicious site visit, malicious file downloading or gets speeded in the local network from a single infected node due to a vulnerability in a network service. After entering in a system, Trojan program executes the payload and then in may lock the system or encrypt data present in the HDD, or make modification in MBR. Finally, it claims some ransom amount to withdraw the attack. MBR modifications or file encryption based attacks are more vulnerable as if the victim somehow able to remove the malware but its effect will remain unchanged in the system. Modern file encryption based ransomware are known as CryptoLocker and Crypto- ransomware, and it internally uses RSA-2048 and AES together.

Ransom payment techniques: To void legal obligation in ransom taking, designer of those ransomware uses sophisticated techniques to obtain the ransom. But in some scenario, it is observed that some traceable medium also acts like the money transfer medium, as in Fusob in uses iTune account for payment transfer but this kind of examples is rare. Ransomware mainly uses Bitcoin, Factom, Zcash cryptocurrencies[4] as it is difficult to trace the money in these cryptocurrencies system.

Pretension Techniques: Ransomware based attacks are an avoidable attack, we can easily avoid this kind of attack by following few security measures [5] like:

Avoid opening unverified or spam mails or clicking embedded link on eye-catching advertisement link.

Back up sensitive files in regular interval. It was better to create three backup copies on two different media with one backup in a separate location.

Regularly update operating system and anti-malware protection software.

Use Anti-Ransomware Tools in sensitive system Example RANSOM_MILICRY.A, RANSOM_POGOTEAR.A, R980 ransomware, RANSOM_STAMPADO.A,

 

 

 

References

Young, A.; M. Yung (1996). Cryptovirology: extortion-based security threats and countermeasures. IEEE Symposium on Security and Privacy. pp. 129–140. doi:10.1109/SECPRI.1996.502676. ISBN 0-8186-7417-2.

Ransomware locks up San Francisco public transportation ticket machines URL: https://arstechnica.com/security/2016/11/san-francisco-muni-hit-by-black-friday-ransomware-attack/

Gardaí warn of ‘Police Trojan’ computer locking virus. TheJournal.ie. Retrieved 31 May 2016.

Jerry Brito & Andrea Castillo (2013). “Bitcoin: A Primer for Policymakers.” Mercatus Center. George Mason University. Retrieved 22 October 2013.

Jack Schofield (28 July 2016). “How can I remove a ransomware infection?”. The Guardian. Retrieved 28 July 2016

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask