Sunday, January 31, 2010

Question 4.








STEP 1
Screenshot of web address http;//www.nessus.org/download/ from where we are going to download Nessus Vulnerabiliby Scanner.








STEP 3
Submit your email address to get activation code to receive update.









STEP 5
Nessus Server Manager is started to configure settings.










STEP 6
Nusses client is started for the first time.






STEP 10
Dialog box will appears, after we click on connect.











STEP 13
IP Address will starts from 192.168.1.1 - 192.168.1.255.

STEP 17
Vulnerability scanning is helpful it can findout vulnerability or weakness in the system. So that we can come out with solution and prevent in future from attacks. Here it will show the vulnerability after the scan is done from IP range 192.168.0.1 - IP range 192.168.0.255. It had identified the vulnerabilities linked with my IP address 192.168.0.10. Vulnerability scanning tools such as Nessus provides identification of vulnerabilities, solution, risk and plug -inoutput.
Reference: http://www.nessus.org.com.

Saturday, January 30, 2010

Question 3.


STEP 1
Screen shots of www.klcconsulting.net/smac


STEP 7
SMAC displays network interface card adapter which is discoverable.


STEP 9
It shows the Active MAC Address which is 00-1D-72-3B-16-29.


STEP 11
A new MAC Address 0c-0c-0c-0c-0c-01 has been assigned.


STEP 13
Enter cmd at the run command box to open a command prompt.


STEP 14
The MAC Address has been changed from previous 00-1D-72-3B-16-29 to 0c-0c-0c-0c-0c-01
2. Complete Case Project 6-3.
Rouge access point is a WI-Fi access point that is setup by an attacker for the purpose of sniffing wireless netwirk to gain unauthorized access to the network. We can detect a rouge access point by the following steps mention as.
1. First perform manual check with laptop running NetStumbler(Tool for detecting all wireless networks with broadcast areas).
2. With the laptop walk to the direction that produce the greatest signal from the uestionable access point.
Note:- If you are using an 802.11b Wi-Fi card only 802.11b and 802.11g access point will be detected. But, if yuou are running 802.11a network then an 802.11b NIC will not detect it. That's because 802.11b uses a 2.4 GHz signal while 802.11a operates in 5 GHz range.
Reference
Pacchiano R. Track Down Rouge Wireless Access Point.(2006) viewed on 30th Jan 2010 retrived from http://www.wi-fiplanet.com/tutorials/article.php/3590551.

Question 2.


SYEP 1
Screen shot of web page http://www.md5deep.souceforge.net/ from where we are gonna download md5deep hash generator.



STEP 5
Word document created which shows" Now is the time for all good men to come to the aid of their country".




STEP 6
The above file is saved as country1.docx in the m5deep folder.




STEP 9
The HASH is 32 character long.




STEP 10
Below the Hash is created and it is also 32 character long same as country1.doc Hash length.




STEP 11
Opening Country1 document file.




STEP 12
Now the period is removed from the sentence and saved as country2.doc.




STEP 13
Length is same 32 characters long but the letters that are encrypted are completely different.


STEP 14
Using sha1 deep (SHA-1) the length of the country1.doc is 40 characters.




Now for country2.doc using sha1 deep length is same as country1.doc, but the characters are different.




Using whirlpooldeep hash generator the length of country1.doc is 128 characters.






Again, using whirlpooldeep hash generator the length of country2.doc is 128 characters but characters are different.

Cse Project 11.1 USES for Hashes.

Beside ATM's and passwords, what are other uses for hashes today? Use the Internet to explore how hashes are used in practical applications. Find three examples and write a one-paragraph description of each. Then, determine a way in which you would use a hash and write a description of it.
There are many purposes of hashes some of them are as follows.
1. Beside ATM's and passwords one of the important applications of Hashes is verification of message integrity, determining whether any changes have been made to a message or not which can be accomplished by comparing message degests calculated before and after transmission.
2. Hashes are also used to identify files on peer-to-peer file sharing network. For e.g. In an ed2k link and MD4- varient hash is combined with the file size, providing sufficient information for locating file sources, and downloading the file & verifying its contents.

Basically, I will use hash to check my important message/files integrity to know that it has not been tampered by an outsider or unauthorized person.

Reference
Cryptographic hash function.(nd) viewed on 30th jan 2010, retrived from
http://en.wikipedia.org/wiki/cryptographic hash function.

Question 1.


STEP 1
Download Wireshark address www.wireshark.org from the web.



STEP 6
Click capture then interface where we can select network interface card and then click START button at the bottom of the Wireshark Capture option menu.

STEP 7
Showing input command ftp server ! in command Prompt.

STEP 8
Below is a screenshot of a website www.bluehost.com/cgi-bin/uftp which show the account login box.


STEP 9
I tried to login with Gerald as Username and happy as passwork but it showed invalid login.



STEP 14
I tried to capture username & passwork from www.bluehost.com/cgi-bin/uftp but it didn't work because http use port 443 which uses encryption layer called Transport laver security(TLS) and
secure sockets layer (ssl) but http use port 80. So i have another wev address (http://en.wikipedia.org/). Here Wireshark is successful to capture the username and password that were typed.





How can you prevent Wireshark capturing these data ?

As we know, from above scenerio it is very easy to obtain sensitive data from snooping using software like wireshark which is very dangerous so to prevent this from happening we have to encode the data that's being sent in a manner that an outsider cannot decode it, which is known as encryption. Commonly use encryption method on the internet is SSL and TLS.