Lab 12: Wi-Fi Access Point Security

Identify issues affecting Wi-Fi security and compare with what you can observe from the NMIT Wi-Fi network that is publicly available or where you have access to connect.

The NMIT provide their current students with access to their wi-fi connection so that they can have access to the Moodle website that holds all the online resources for each subject.

The library has a large number of computers that students can use to access Moodle if they do not have a digital device of their own such as a laptop.

However, to gain access to the library all that a person needs to do is walk in. as long as they look like a student they will not be stopped at the door.

Once a person has access to the computer room all they need to do is wait for a person to leave one of the computer’s unattended while being sighed in. This will allow the attacker to gain access to the network through someone else account information that could be recorded for later use on a device off site.

Based on the Documentation if a school is going to have devices publicly accessible the best step is to ensure that it uses User Authentication rather that device Authentication. This will ensure that only registered current students have access to tho wi-fi through those devices. However, to secure the Access points even further locking the computers behind a locked door accessed only by current student cards will record and restrict who has access to the computers.

Lab 11: Firewall Rule Based Management

  1. Investigate and discuss the configuration required on a firewall for a web server providing
    1. HTTP

HTTP is a web standard to secure an encrypted link between a web server and a web client. In order to allow this connection to work correctly over a network the firewall needs to be configured to open port 80.

HTTPS

Runs on port 443 and secures sensitive information such as passwords over the network by making them hard to decrypt. You will need to make sure that the inbound rules in your firewall are set to allow port 443.

  1. FTP over TLS/SSL 

Secure File transfer protocols (FTP) are send on the same port as non secure communications. There are two types of FTPS that we can have a closer look at

Explicit FTPS:

By default port 21 is used for the control channel between both the server and client. when the client connects to the server through the control channel. it will then negotiate over the SSL and TLS in order to gain access to the control or data channel.

Implicit FTPS:

this is regarded as an older form of transfer over SSL. In Implicit a SSL handshake needs to take place before communication can occur. Implicit transfer works on port 990.

  1. SMTP for sending emails from the websites
    1. Remote Administration

SMTP stand for simple mail transfer protocol which is used by a websites email service to make it easier for them to send emails more reliability so that it does not get blocked or send to the spam folder for the recipient.

The administrator will need to specify which domain name is allowed through the firewalls so that the emails do not get blocked.

  1. Investigate and discuss the configuration required on a firewall for a database server providing
    1. MariaDB 

Was created by the same developers of MySQL and is a popular database server that can be used to backup information from websites

In order to ensure that your firewalls are not blocking MariaDB from doing its job you will need to make sure that inbound rules on the server side allow port 3306 access.

  1. Remote Administration

In order to allow access remotely to the Database server an inbound firewall rule need to allow port 1433

Lab 10: Implementing NAT and OpenSSH

  1. Investigate and discuss the use and function of the NAT Firewall in a security context

Network Address Translation allows devices on a network to access the internet via a shared gateway. Thanks to the NAT all devices traveling through the gateway will have the same local ip address. In regards to NAT firewalls it offers a front line defense against exposure to the internet. If any packets or connection requests come from the internet side without any approval from any device on the local network the NAT firewall discards the packets.

2.Investigate and discuss at least two uses of OpenSSH on either Windows or Linux

A)Open source of Secure shell that allows cross platform management of remote systems. On Windows OpenSSH allows for a secure approach to systems administration.

It offers a set to tools that can be used to Authenticate windows users across domains

B)sftp.exe is the service that provides the Secure File Transfer Protocol, and runs over SSH to help secure file transfer.

Lab 9: Managing Certificates

  1. AD Certificate Services and CA Web Enrollment

Active directory service enables both users and computers to perform certificate enrollment through the HTTPS protocol. This accepts certificate requests and issue certificates as needed. This helps users that are not part of a domain to receive certificates.

  1. Key Archival and Key Recovery Agent 

Is the process of saving a copy of the key to a central location for the purpose of recovery if the key is deleted or lost.

The reason for key archives is to safeguard any data loss that may occur if a user is deleted from the system and the private key is lost.

In order to backup and recover a key the user will need to run the certificates snapin fuction and export the key.

Lab 8: Understanding PKI Concepts

Investigate and discuss two uses of PKI in an organisation such as NMIT

As NMIt relies on Moodle for the distribution of course content for both student and lectures that access the website from their own devices both mobile and laptops NMIT will rely heavily on PKI to safeguard the content of their website and ensure that all who are connecting to the site are connected to the legitimate NMIT Moodle site via the 3 way hand shack.

As NMIT handles a large amount of their business over the web through their Moodle they rely on the PKI and CA to protect the sensitive data being exchanged over the web. NMIT has a large amount of international students that will be communicating mainly through Moodle.

Lab 7: Password Cracking Tools

  1. Discuss how to use Cain & Abel to initiate a brute force attack.

from within the Cain and Abel Window select the user you wish to attack and right click and select Brute force attack. then make sure to select NTLM hashes. You will need to select the password length. You will need to decide if you are going to use the Custom or predefined tabs.

Finally click start and wait for the result.

What does NTLM hashes mean:

NT Lan Management which is a Windows Authentication protocol(Sanders, 2010)

  1. Discuss the problems with using the brute force attack and compare and contrast with another password attack.

Based on the experience from the Cain and abel lab brute force attacks can take a long period to complete (days and months or even years). With the option of manipulating the password length you can extend the time taken to complete the task.

What is a Rainbow table?

Rainbow tables is a collection of passwords that have been encrypted by getting converted in a hash- which is a selection of random letters and numbers. Once a password has been hashed it cannot be converted back into plain text.

They way in which a Rainbow attack works is by preforming a cryptanalysis extremely fast. In order to try and avoid a Rainbow table attack you can add “salt”technique which is random data passed into the hash. By adding a random data both the plain text and the hash will ensure that each hash is unique making it impossible to use a predetermined Rainbow table.

Compared to a brute force attack that tries to guess each character from words in a dictionary a Rainbow table attack.(geeksforgeeks, 2018)

Bibliography

geeksforgeeks. (2018, June 10). Understanding Rainbow Table Attack. Retrieved from geeksforgeeks: https://www.geeksforgeeks.org/understanding-rainbow-table-attack/

Sanders, C. (2010, January 20). Retrieved from techgenix: http://techgenix.com/how-cracked-windows-password-part1/

Lab 6: Encryption and Hashing

MD5 hashing a method of encryption that takes a string of characters regardless of length and produces a 128bit fingerprint. MD5 hashing is commonly used in databases such as Mysql to store sensitive data. However, MD5 hashing is not trusted now days there is techniques to identify the hash. For example software known as Rainbow tables have been proven to decrypt the hash.(Rouse, n.d.)

The important thing to note is that MD5 hashing is not encryption as the results are permanent. Once a string of text has been converted into a hash it cannot be un-hashed back to its original state. For that reason alone hashing is not considered encryption.

Known attacks on relating to MD5

Back in 2016 a Video streaming service company in China known as YouKu was attacked and had 92 Million users personal information exposed along with each ones MD5 hashes.(Mooney, 2020)

Bibliography

Mooney, G. (2020, June 24). What is MD5? Retrieved from ipswitch: https://blog.ipswitch.com/what-is-md5

Rouse, M. (n.d.). MD5 . Retrieved from techtarge: https://searchsecurity.techtarget.com/definition/MD5

Blog 2) Model View View Model (MVVM)

What have i learnt?

When it comes to Mobile application there is an architecture known Model View View Model or better known as (MVVM) the principle of using this model when it comes to mobile application development is code reuse. MVVM helps developers structure their code in such a manner that it can be shard across platforms with only a adjustments to the code relating to the UI, as User interfaces change based on the platform it is being displayed on

The View block of code holds the UI elements that the user sees on the screen and interacts with, there is no code it is purely responsible for human interaction.

The ViewModel segment of the code is where the logic is located. It is responsible for communicating between the user interaction through the UI and the data stored in the database.

The Model is where the data is stored

Data binding is when the dependency objects such as a button is linked with the logic via properties. In order for use data binding we can use Icommand in place of a click event handler with. The Code that is linked to the button is located in a class, chances are if there are properties the information being accessed are locked away in private classes

Why have i learnt it?

With such a wide range of devices out in the marketplace it is important to design code in a manner that can be easily adapted to suit a wide range of devices and Operating Systems (OS). As technology advances the power in cell phones and tablets are negating the need for a computer as all the tasks such as online banking and more power hungry apps such as Youtube can be accessed and used through mobile devices.

How have i learnt this?

Currently the best method i have discovered to understand this information is through the links provided to me through Moodle. So far the best explanation i have received so far is through a Youtube channel https://www.youtube.com/watch?v=k77dqVVWgB8&list=PLdkt3RKz_b0w9Ouo03ZGMbXIOreJ7bE9C

What do I know now that i did not know before?

Before today i was unaware that there was an architecture specifically designed to for Mobile Applications. As Mobile applications is the field in which i potentially may find myself working in the future i need to have a strong grasp of how MVVM works and implemented.

What is the point?

To best set me in the right direction to develop mobile applications in the future.

What will i do to fill in any gaps in my understanding?

In order for me to keep expanding my knowledge and expertise on this subject matter i will utilize all the resources available to me such as Youtube and Linkedin.

Blog 4 )Assessment 1)

What have i learnt?

We had the chance to work on our Assessment 1) documentation. What i have learnt was that before coding even takes place it is important to have good documentation in order to make the development of a game or application much smoother. For the game I’m currently working on I have crafted a storyboard with screenshots of the game and all its main activities the player will need to undertake in order to complete the game.

Why have i learnt it?

Regardless of how big or small the project may be, having good documentation will ensure that all the people working on the project stay within scope and deliver a finished product that the client may expect.

How have i learnt this?

The hard way. In the past when developing application for web based or desktop applications i jumped straight into the coding side with little or no documentation to help guide me and to keep me focused on task.

What is the point?

The idea is to expose ourselves to an environment that best fits the environment in the real world. It is important to know what is expected of you and what are the current industry standards.

What are the real life applications?

When you enter the workforce it is very likely that we will be working in teams with other developers and clients. It is vital that we know the development life cycle and know how to read and write good documentation that will satisfy both the company and the client.

What will i do to fill in any gaps?

These is only so much that the Tutor can do for us in the small amount of time they have in class. It is important to continue research outside of class and get some clarity on topics that are confusing. The web is filled with great resources that can greatly improve ones understanding of each element of the documentation.

Lab 5: Scanning and Remediating Vulnerabilities with OpenVAS

  1. Investigate and discuss one of the more severe vulnerabilities found as a result of the OpenVAS scan. Depending on the vulnerability the Common Vulnerabilities and Exposures (CVE) database may be of use.

Before the Windows update the LDAP was potentially leaking data placing the server and site names at risk. So what is LDAP?

Lightweight Directory Access Protocol(LDAP) which is used to access directory services. If an attacker were to get hold of the information stored by the LDAP they could potentially pose as an employee and trick real staff into providing sensitive information or services to the attacker thinking that they are helping a fellow staff member. This kind of use of insider information falls under Social Engineering techniques.

2.Investigate and discuss vulnerability assessment of services on Cloud Infrastructure such as Amazon Web Services.

Intruder is a vulnerability scanner that has been designed to work with the three major cloud based provides such as AWS,GCP and Azure.

The benefit of using Intruder is that it also can scan physical networks aswell cloud based services. The difficulty with cloud based services is tracking what assets you have, what is being used and what assets are not currently being used. This problem makes it difficult for cloud services to keep track of activities. You cant monitor activity if you do not know that it is there.

Intruder has a builtin Cloudbot that is used to provide hourly checks for any new IP addresses and hostnames accessing your network

Design a site like this with WordPress.com
Get started