1 anonymous digital communications final lab presentation ece 4112 internetwork security group 3...
DESCRIPTION
3 Project Scope and Lab Inclusion Too big for Lab addition Related topics in current laboratory experiments Lab 3, Address Spoofing, Denial of Service, Spoofing Propose to retool Lab 3 and include this materialTRANSCRIPT
![Page 1: 1 Anonymous Digital Communications Final Lab Presentation ECE 4112 Internetwork Security Group 3 Alvin Schurman and Kelly Lehman Georgia Institute of Technology](https://reader036.vdocuments.site/reader036/viewer/2022062401/5a4d1b097f8b9ab059989e20/html5/thumbnails/1.jpg)
1
Anonymous Digital Communications Anonymous Digital Communications Final Lab PresentationFinal Lab Presentation
ECE 4112ECE 4112Internetwork SecurityInternetwork Security
Group 3Group 3Alvin Schurman and Kelly LehmanAlvin Schurman and Kelly LehmanGeorgia Institute of TechnologyGeorgia Institute of Technology
http://www.afrl.af.mil/images/pictures/abl-sor.jpg
![Page 2: 1 Anonymous Digital Communications Final Lab Presentation ECE 4112 Internetwork Security Group 3 Alvin Schurman and Kelly Lehman Georgia Institute of Technology](https://reader036.vdocuments.site/reader036/viewer/2022062401/5a4d1b097f8b9ab059989e20/html5/thumbnails/2.jpg)
2
Presentation Topics
Topic Description and Controversy Project Scope and Proposed Lab Inclusion Laboratory Set-up Web Client Information IP Address Spoofing (Obfuscation) Web Bugs Tor Networks Conclusions Questions
![Page 3: 1 Anonymous Digital Communications Final Lab Presentation ECE 4112 Internetwork Security Group 3 Alvin Schurman and Kelly Lehman Georgia Institute of Technology](https://reader036.vdocuments.site/reader036/viewer/2022062401/5a4d1b097f8b9ab059989e20/html5/thumbnails/3.jpg)
3
Project Scope and Lab Inclusion
Too big for Lab addition
Related topics in current laboratory experiments
Lab 3, Address Spoofing, Denial of Service, Email Spoofing
Propose to retool Lab 3 and include this material
![Page 4: 1 Anonymous Digital Communications Final Lab Presentation ECE 4112 Internetwork Security Group 3 Alvin Schurman and Kelly Lehman Georgia Institute of Technology](https://reader036.vdocuments.site/reader036/viewer/2022062401/5a4d1b097f8b9ab059989e20/html5/thumbnails/4.jpg)
4
Laboratory Set-up
Simplify Lab Set-up
VMware Appliances
Ready-made apps
Pre-configured devices
![Page 5: 1 Anonymous Digital Communications Final Lab Presentation ECE 4112 Internetwork Security Group 3 Alvin Schurman and Kelly Lehman Georgia Institute of Technology](https://reader036.vdocuments.site/reader036/viewer/2022062401/5a4d1b097f8b9ab059989e20/html5/thumbnails/5.jpg)
5
Web Client Information
Easiest First
Shows client information
Uses Firefox extensions Spoofs client information IP/port address not spoofed
Not included in Lab Firefox extension detection with chrome element in javascript
![Page 6: 1 Anonymous Digital Communications Final Lab Presentation ECE 4112 Internetwork Security Group 3 Alvin Schurman and Kelly Lehman Georgia Institute of Technology](https://reader036.vdocuments.site/reader036/viewer/2022062401/5a4d1b097f8b9ab059989e20/html5/thumbnails/6.jpg)
6
IP Address Spoofing (Obfuscation)
Client data with PhProxy Proxy + Ethereal = hackerpot Snooping HTTPS Proxy Examining server logs Research HTTPS sniffers
Proxypot Sebek Open Proxy Honeypot
It’s just HTTP/HTTPS right? Wrong … desproxy
![Page 7: 1 Anonymous Digital Communications Final Lab Presentation ECE 4112 Internetwork Security Group 3 Alvin Schurman and Kelly Lehman Georgia Institute of Technology](https://reader036.vdocuments.site/reader036/viewer/2022062401/5a4d1b097f8b9ab059989e20/html5/thumbnails/7.jpg)
7
Web Bugs
Traditional image in html
CSS element web bug in html
Both elements hidden in .doc
![Page 8: 1 Anonymous Digital Communications Final Lab Presentation ECE 4112 Internetwork Security Group 3 Alvin Schurman and Kelly Lehman Georgia Institute of Technology](https://reader036.vdocuments.site/reader036/viewer/2022062401/5a4d1b097f8b9ab059989e20/html5/thumbnails/8.jpg)
8
Tor Networks
The Onion Router (TOR) Layered approach
Provides anonymity for Internet traffic Web browsing IM IRC SSH
Downsides to Tor Networks Exiting the network Traffic Analysis
![Page 9: 1 Anonymous Digital Communications Final Lab Presentation ECE 4112 Internetwork Security Group 3 Alvin Schurman and Kelly Lehman Georgia Institute of Technology](https://reader036.vdocuments.site/reader036/viewer/2022062401/5a4d1b097f8b9ab059989e20/html5/thumbnails/9.jpg)
9
Tor Networks
![Page 10: 1 Anonymous Digital Communications Final Lab Presentation ECE 4112 Internetwork Security Group 3 Alvin Schurman and Kelly Lehman Georgia Institute of Technology](https://reader036.vdocuments.site/reader036/viewer/2022062401/5a4d1b097f8b9ab059989e20/html5/thumbnails/10.jpg)
10
Tor Networks
![Page 11: 1 Anonymous Digital Communications Final Lab Presentation ECE 4112 Internetwork Security Group 3 Alvin Schurman and Kelly Lehman Georgia Institute of Technology](https://reader036.vdocuments.site/reader036/viewer/2022062401/5a4d1b097f8b9ab059989e20/html5/thumbnails/11.jpg)
11
Tor Networks
![Page 12: 1 Anonymous Digital Communications Final Lab Presentation ECE 4112 Internetwork Security Group 3 Alvin Schurman and Kelly Lehman Georgia Institute of Technology](https://reader036.vdocuments.site/reader036/viewer/2022062401/5a4d1b097f8b9ab059989e20/html5/thumbnails/12.jpg)
12
Local Windows Account Hijacking
QUESTIONS?
References/Sources/Tools Vmware Workstation 6.0 Beta WYSIWYG Web Builder 4.1 Grandma’s Lamp v1.0.0 PhProxy 0.5 Beta Microsoft Windows XP Professional Microsoft Office 2007 Trial Web Bug Howto from http://ha.ckers.org/webbug.html EFF from http://tor.eff.org