SMB Analysis OPSEC 2016

Size: px
Start display at page:

Download "SMB Analysis OPSEC 2016"

Transcription

1 SMB Analysis

2

3 If Malware crafts a packet to negotiate only using LanMan v1, then Unlocked server will use it Security game over

4 Goal SMB Analysis Attacker Actions Where have they been What have they looked at Patterns of activity or targeting Corroborate findings from other sources, eg IOC s

5 Common Attack APT Login to user workstation from remote Read the user s files Surf to internal sites and access the data Copy and paste from shares or NAS to attacker space Exfiltrate the data

6 PTH Client to Client shares over SMB Unusual hours File share access from same account but from different machines, LANS or countries Enumeration of large number of files or shares Large copy actions

7 Analysis Steps Filter full SMB captures Load into Wireshark Apply Display Filters Hide the crap GPO, SMB announcements etc Gpt.ini and sysvol Read attacker actions Note: cannot capture filter for smb2, but use port 445

8

9 One of the three NetBIOS services is a name service Over NBT operates on UDP 137 or (rarely) TCP 137 Other services include: Datagram service (like UDP) UDP 138 Session Service (like TCP) TCP 139 Note: direct host SMB uses TCP 445, no NetBIOS Microsoft wants to be rid of NetBIOS

10 Filter 137, 138, 139, 445 IF apply SMB or SMB2 you will miss remote registry access events SAMR, LSARPC, DERPC Test filters first Tshark tweak

11 SMB2 19 Commands (old ver 100 s) Protocol Negotiation File, Directory and Volume Access Other Echo, oplock_break

12 Typical SMB Session Negotiate Protocol Session Setup Tree Connect Trans2, query file info NT Create, open or create Locking andx lock Read andx Locking andx unlock Close Tree Disconnect Logoff andx Multiple per file

13 SMB Remains Active Sessions can be Stacked inside a single Transport Layer Session Remains active until Network connection times out User closes the session User De-authenticates Connection fails a server-side security check SMB2 works on a credit system Like TCP window

14 FIDS SMB refers to File Handles or FIDS 16 bit integer SMB2 transaction FID only occurs once in either request or response, but not both Normal filtering is useless Wireshark gets it, when you filter for FID it operates on all packets

15 File Name Request or Response = NO FILE NAME Wireshark to the rescue Artificial field is created Puts FID and Filename MORE it will add info about how and when FID was opened DEMO FID DEMO SMB response time stats

16 Conversations Easy way to get list of all TCP connections Quick overview of all CIFS clients

17 SMB in Action - Filters SMB OpCodes

18 Protocol Negotiation Look for reduced security eg lanman 1 Smb.cmd == 0x72 Smb2.cmd == 0

19 Security Mode Mode 1: User level access control Password 1: Server supports challenge/resp Signatures 0: Server does not support SMB sigs (HMAC 256) Sig Req 0:Server does not require SMB sigs

20 Session Establishment Session Setup AndX Request/Response Usually needs a few TCP packets to set up User authentication Contains PID from client (pivot for our IOCs, logs memory etc.) Contains OS build info Server assigns a User ID (2bytes) Smb.cmd == 0x73

21 Session Setup AndX Data Point Value User ID (UID) Authentication Mechanism Server OS type, version, service pack Active Directory Domain Name Active Directory Username

22 Stackable Many Many Concurrent sessions Identified by their Mulitplex ID values Random value set by client, allows for pairing of request and response packets Contains GSS-API generic security service auth SPNEGO simple protocol negotiation

23 SMB Action Services Tree Connect AndX Request/Response Server assigns a Tree ID (TID) Shows access to services Same UID already received Smb.cmd == 0x75 Smb2.cmd == 3

24 SMB Obtain Network Directory Metadata Trans2 Request/Response Forensic WIN Can see MAC Times Smb.cmd == 0x32 && smb.trans2.cmd == 0x0005 && smb.qpi_loi == 1004 Not in SMB2

25 Create Response in SMB2 Contains MAC times of File smb2.create.action == 1

26 SMB Opening a File NT Create AndX Request/Response Server performs ACL check before opening Server assigns FID, only for session So track with File Name Not FID Client sends smb.file field (useful) Smb.cmd == 0xa2

27 Better way to track Smb.cmd == 0xa2 &&!smb.fid and smb.file Quickly finds all smb traffic with a file name (smb2.cmd == 5) && (smb2.flags.response == 1)

28 NOTE: SMB command also creates a new resource. If a resource does not exist and client has permissions, a new file will be created. Could be an issue with tracking, eg file did not exist Contains file based commands Maximal access rights Maximal guest access rights

29 Create AndX Response Access Rights Access Right Authenticated Account Guest Account Delete File Write File Attributes Write Content

30 Create AndX Response Access Rights MetaData Item MACB Meaning Value (UTC if required) Last Write M Time content of file was last updated Last Access A Time file was last opened Change C Time metadata of file was last updated Created B Time file was created on disk End of File N/A Last byte of File (file size)

31 Locking and Unlocking a file Locking AndX Request/Response Prevents concurrent access to same resource Smb.cmd == 0x24 Smb2.cmd == 0x0a Contains session FID

32 SMB Reading from File Read AndX Request/Response Client supplies a FID, requested number of bytes, offset to start reading. Server responds. Uses byte offset for partial reads Large Files require MANY exchanges Packet is 1440 bytes Minus Overhead is 1000 bytes for file Inefficient

33 SMB2 Block is Larger 65,536 bytes combine with a 116 byte SMB2 header Forms the full block.

34 Each exchange has SMB headers mixed into file contents CAN T Follow the Stream SMB Aware Carving MUST be used (network miner) Smb.cmd == 0x2e Smb2.cmd == 8

35 SMB Closing a File Close AndX Request/Response DeAssigns the FID value Smb.cmd == 0x04 smb2.cmd == 6

36 SMB Tree Disconnection Signals end of SMB session for the resource De-Assigns TID value Any new connection will require full negotiation Once TID de-assigned Stop Tracking Smb.cmd == 0x71 Smb2.cmd ==4

37 SMB Logoff Logoff AndX Request May not happen for each file access as client can keep it open Signals De-Assignment of UID and PID Can See multiple as sessions can be Tree d Smb.cmd == 0x74 Smb2.cmd == 2

38 Other Filters Boot Time Smb2.boot_time File Name Client Requested to Access Smb.file File writing smb2.write_data

39 More Filters Process ID smb(2).pid == xx User ID smb.uid == xxx Tree ID smb(2).tid == xxx File ID smb(2).fid == xxx

40 More Filters Identify upload of exe (smb.create.action == 2) and (smb.file matches \. (?i)exe ) Identify exe being opened (smb.create.action == 1) and (smb.file matches \. (?i)exe ) Identify Host OS smb.native_os && smb.native_lanman

41 Persistence - AT Scheduling of Remote Jobs ATSVC scheduler Atsvc.opnum == 0 0 Add scheduled Job 1 Delete scheduled job 2 Enumerate lists of scheduled jobs 3 Get info about a scheduled job

42 Remove Clutter Lots of group policy, syn traffic, smb file update eg browser Use a filter to get rid of it ((smb2.filename) &&!(smb2.filename == browser )) &&!(smb2.filename contains {31B2F D-11D2-945F- 00C04FB984F9}\\gpt.ini ) Note if gpo number pukes just use \\gpt.ini

43 SMB IO Graphs Use those filters in IO Graphs Can display SMB activity over time Useful visual track DEMO

44 SMB Carving Wireshark DEMO File Export Objects SMB/SMB2 Network Miner DEMO

These selected protocol definitions are extremely helpful in learning the

These selected protocol definitions are extremely helpful in learning the Appendix B Protocol Definitions These selected protocol definitions are extremely helpful in learning the finer points of network protocols. This information is exposed under Network Monitor s Display

More information

SMB / CIFS TRANSACTIONS PERFORMANCE ANALYSIS. Performance Vision 2015

SMB / CIFS TRANSACTIONS PERFORMANCE ANALYSIS. Performance Vision 2015 SMB / CIFS TRANSACTIONS PERFORMANCE ANALYSIS Content 1. Product Features 2. SMB Overview & Use Cases 1. Connect and Browse Files 2. Login Authorization Failure 3. Put a File on a Remote Folder 4. Not Authorized

More information

SharkFest 16 Europe. Windows Filesharing De-Mystified: SMB with a Eureka! Effect. Eddi Blenkers. October 19th packethunter.

SharkFest 16 Europe. Windows Filesharing De-Mystified: SMB with a Eureka! Effect. Eddi Blenkers. October 19th packethunter. SharkFest 16 Europe Windows Filesharing De-Mystified: SMB with a Eureka! Effect October 19th 2016 #sf16eu Eddi Blenkers packethunter NetBIOS in the "good old days" Ethernet: The new Yellow Cable Ethernet:

More information

Operating Systems. Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring Paul Krzyzanowski. Rutgers University.

Operating Systems. Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring Paul Krzyzanowski. Rutgers University. Operating Systems Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring 2014 Paul Krzyzanowski Rutgers University Spring 2015 April 22, 2015 2015 Paul Krzyzanowski 1 Question 1 A weakness of using

More information

CS 416: Operating Systems Design April 22, 2015

CS 416: Operating Systems Design April 22, 2015 Question 1 A weakness of using NAND flash memory for use as a file system is: (a) Stored data wears out over time, requiring periodic refreshing. Operating Systems Week 13 Recitation: Exam 3 Preview Review

More information

SMB 2.0 Next Generation CIFS protocol in Data ONTAP

SMB 2.0 Next Generation CIFS protocol in Data ONTAP Technical Report SMB 2.0 Next Generation CIFS protocol in Data ONTAP Reena Gupta, NetApp March 2009 TR-3740 SMB 2.0 in DATA ONTAP 7.3.1 Server Message Block (SMB) 2.0 is the next version of the Common

More information

Work Book. Sharkfest Presentation Material. Copyright Advance Seven Limited. All rights reserved.

Work Book. Sharkfest Presentation Material. Copyright Advance Seven Limited. All rights reserved. Work Book Presentation Material Copyright 1995-2013 Advance Seven Limited. All rights reserved. Advance Seven Limited Melville House High Street Dunmow Essex CM6 1AF United Kingdowm Table of Contents 1

More information

Server Message Block Protocol (SMB)

Server Message Block Protocol (SMB) http://ourworld.compuserve.com/homepages/timothydevans/smb.htm# Server Message Block Protocol () There are very many systems which can use the NetBIOS / NetBEUI interface or make use of the NetBIOS Frames

More information

HikCentral V1.3 for Windows Hardening Guide

HikCentral V1.3 for Windows Hardening Guide HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Hackveda Training - Ethical Hacking, Networking & Security

Hackveda Training - Ethical Hacking, Networking & Security Hackveda Training - Ethical Hacking, Networking & Security Day1: Hacking windows 7 / 8 system and security Part1 a.) Windows Login Password Bypass manually without CD / DVD b.) Windows Login Password Bypass

More information

Scan Report. March 6, 2015

Scan Report. March 6, 2015 Scan Report March 6, 2015 This document reports on the results of an automatic security scan. The scan started at Fri Mar 6 14:15:40 2015 UTC and ended at Fri Mar 6 14:25:44 2015 UTC. The report first

More information

Lab - Using Wireshark to Examine TCP and UDP Captures

Lab - Using Wireshark to Examine TCP and UDP Captures Topology Part 1 (FTP) Part 1 will highlight a TCP capture of an FTP session. This topology consists of a PC with Internet access. Topology Part 2 (TFTP) Part 2 will highlight a UDP capture of a TFTP session.

More information

Scan Report. March 6, 2015

Scan Report. March 6, 2015 Scan Report March 6, 2015 This document reports on the results of an automatic security scan. The scan started at Fri Mar 6 13:29:13 2015 UTC and ended at Fri Mar 6 13:34:10 2015 UTC. The report first

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

TCP/IP Transport Layer Protocols, TCP and UDP

TCP/IP Transport Layer Protocols, TCP and UDP TCP/IP Transport Layer Protocols, TCP and UDP Learning Objectives Identify TCP header fields and operation using a Wireshark FTP session capture. Identify UDP header fields and operation using a Wireshark

More information

Advances in the Samba Testsuite

Advances in the Samba Testsuite Advances in the Samba Testsuite Andrew Tridgell Samba Team tridge@samba.org In last years tutorial... Last year I introduced the Samba4 test suite. At the time it provided the following: Wide coverage

More information

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems Section 1: Command Line Tools Skill 1: Employ commands using command line interface 1.1 Use command line commands to gain situational

More information

CYBERSECURITY CHALLENGES FOR YOUR CLASSROOM:

CYBERSECURITY CHALLENGES FOR YOUR CLASSROOM: SELECTED STADIUM CYBERSECURITY CHALLENGES FOR YOUR CLASSROOM: META, FTP, DNS, HTTP, TELNET, AND SSH AUTH Meta from 2015 Fall Season NCL puzzle: http://www.nationalcyberleague.org/2016/spring/solutions_files/ncl-2015-meta.jpg

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Chapter 19. Domain Name System (DNS)

Chapter 19. Domain Name System (DNS) Chapter 19 Domain Name System (DNS) TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. OBJECTIVES: To describe the purpose of DNS. To define

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

Guide to TCP/IP, Third Edition. Chapter 12: TCP/IP, NetBIOS, and WINS

Guide to TCP/IP, Third Edition. Chapter 12: TCP/IP, NetBIOS, and WINS Guide to TCP/IP, Third Edition Chapter 12: TCP/IP, NetBIOS, and WINS Objectives Discuss the history of NetBIOS Understand what NetBIOS is and its limitations Understand the role of NetBIOS in Windows 2000

More information

Transport Level Security

Transport Level Security 2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,

More information

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark

More information

Scan Report. March 6, 2015

Scan Report. March 6, 2015 Scan Report March 6, 2015 This document reports on the results of an automatic security scan. The scan started at Fri Mar 6 14:05:50 2015 UTC and ended at Fri Mar 6 14:11:32 2015 UTC. The report first

More information

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet

More information

EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture)

EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture) EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture) Dept. of Computer Science & Engineering Chentao Wu wuct@cs.sjtu.edu.cn Download lectures ftp://public.sjtu.edu.cn User:

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

How to open ports in the DSL router firmware version 2.xx and above

How to open ports in the DSL router firmware version 2.xx and above How to open ports in the DSL router firmware version 2.xx and above This example shows how to open port 3389 (which is used by Remote Desktop service) in the DSL router running firmware version 2.xx or

More information

SMB 3.0 (Because 3 > 2) David Kruse Microsoft

SMB 3.0 (Because 3 > 2) David Kruse Microsoft SMB 3.0 (Because 3 > 2) David Kruse Microsoft SMB 2.2 (Per SDC 2011) Multichannel SMB over RDMA Scale-Out Awareness Persistent Handles Witness Notification Protocol Clustered Client Failover Directory

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

DISTRIBUTED FILE SYSTEMS & NFS

DISTRIBUTED FILE SYSTEMS & NFS DISTRIBUTED FILE SYSTEMS & NFS Dr. Yingwu Zhu File Service Types in Client/Server File service a specification of what the file system offers to clients File server The implementation of a file service

More information

Infodraw MRS Server Web Administration Interface

Infodraw MRS Server Web Administration Interface Infodraw MRS Server Web Administration Interface MRS Server is a TCP and UDP server that serves MRS device and monitor clients. Its most basic functionality and prime reason for its existence is to distribute

More information

Forensic Network Analysis in the Time of APTs

Forensic Network Analysis in the Time of APTs SharkFest 16 Forensic Network Analysis in the Time of APTs June 16th 2016 Christian Landström Senior IT Security Consultant Airbus Defence and Space CyberSecurity Topics - Overview on security infrastructure

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information

Wireshark Lab: Getting Started v6.0

Wireshark Lab: Getting Started v6.0 Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.

More information

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples

More information

Analyzing Huge Data for Suspicious Traffic. Christian Landström, Airbus DS

Analyzing Huge Data for Suspicious Traffic. Christian Landström, Airbus DS Analyzing Huge Data for Suspicious Traffic Christian Landström, Airbus DS Topics - Overview on security infrastructure - Strategies for network defense - A look at malicious traffic incl. Demos - How Wireshark

More information

08 March 2017 NETOP HOST FOR ANDROID USER S GUIDE

08 March 2017 NETOP HOST FOR ANDROID USER S GUIDE 08 March 2017 NETOP HOST FOR ANDROID USER S GUIDE Contents 1 Introduction... 2 1.1 Document Scope... 2 1.2 Technical Specifications... 2 2 Using the Netop Host... 3 2.1 Netop Host Display... 3 2.2 Netop

More information

CCNA Semester 1 labs. Part 2 of 2 Labs for chapters 8 11

CCNA Semester 1 labs. Part 2 of 2 Labs for chapters 8 11 CCNA Semester 1 labs Part 2 of 2 Labs for chapters 8 11 8.1.4.6 Lab - Calculating IPv4 Subnets 8.1.4.8 Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme 8.2.1.5 Lab - Designing and Implementing

More information

Transport Protocol (IEX-TP)

Transport Protocol (IEX-TP) Transport Protocol (IEX-TP) Please contact IEX Market Operations at 646.568.2330 or marketops@iextrading.com, or your IEX onboarding contact with any questions. Version: 1.1 Updated: December 22, 2014

More information

HikCentral V.1.1.x for Windows Hardening Guide

HikCentral V.1.1.x for Windows Hardening Guide HikCentral V.1.1.x for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1 Strict Password Policy... 2 1.2 Turn Off Windows Remote

More information

Available Commands CHAPTER

Available Commands CHAPTER CHAPTER 2 This chapter contains the Cisco IPS 6.2 commands listed in alphabetical order. It contains the following sections:. anomaly-detection load, page 2-4 anomaly-detection save, page 2-5 banner login,

More information

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers. Switches Routers PCs Networking 101 Introduction to Ethernet networking basics; Network types, components, configurations Servers Hubs Protocols Cat-5 UTP NICs Page 1 July 28, 2000 Network Types LAN Local

More information

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user

More information

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role

More information

Tanium Endpoint Detection and Response. (ISC)² East Bay Chapter Training Day July 13, 2018

Tanium Endpoint Detection and Response. (ISC)² East Bay Chapter Training Day July 13, 2018 Tanium Endpoint Detection and Response (ISC)² East Bay Chapter Training Day July 13, 2018 $> WhoamI 11 Years of Security Experience Multiple Verticals (Technology, Industrial, Healthcare, Biotech) 9 Years

More information

Distributed Systems. Hajussüsteemid MTAT Distributed File Systems. (slides: adopted from Meelis Roos DS12 course) 1/25

Distributed Systems. Hajussüsteemid MTAT Distributed File Systems. (slides: adopted from Meelis Roos DS12 course) 1/25 Hajussüsteemid MTAT.08.024 Distributed Systems Distributed File Systems (slides: adopted from Meelis Roos DS12 course) 1/25 Examples AFS NFS SMB/CIFS Coda Intermezzo HDFS WebDAV 9P 2/25 Andrew File System

More information

Distributed Systems. Distributed File Systems. Paul Krzyzanowski

Distributed Systems. Distributed File Systems. Paul Krzyzanowski Distributed Systems Distributed File Systems Paul Krzyzanowski pxk@cs.rutgers.edu Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License.

More information

Ausgewählte Betriebssysteme - Mark Russinovich & David Solomon (used with permission of authors)

Ausgewählte Betriebssysteme - Mark Russinovich & David Solomon (used with permission of authors) Outline Windows 2000 - The I/O Structure Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Components of I/O System Plug n Play Management Power Management I/O Data Structures File

More information

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang E&CE 358: Tutorial 1 Instructor: Sherman (Xuemin) Shen TA: Miao Wang Email: m59wang@uwaterloo.ca 1 About Tutorials TA: Miao Wang Office: EIT 3133; Tutorials: Th 4:30 5:20 pm Topics Supplementary knowledge

More information

Once all of the features of Intel Active Management Technology (Intel

Once all of the features of Intel Active Management Technology (Intel Chapter11 Connecting and Communicating with Intel Active Management Technology Disconnecting from change does not recapture the past. It loses the future. Kathleen Norris, O Magazine, January 2004 Once

More information

Defining IPsec Networks and Customers

Defining IPsec Networks and Customers CHAPTER 4 Defining the IPsec Network Elements In this product, a VPN network is a unique group of targets; a target can be a member of only one network. Thus, a VPN network allows a provider to partition

More information

CSCI 466 Midterm Networks Fall 2013

CSCI 466 Midterm Networks Fall 2013 CSCI 466 Midterm Networks Fall 2013 Name: This exam consists of 6 problems on the following 7 pages. You may use your single-sided hand-written 8 ½ x 11 note sheet and a calculator during the exam. No

More information

Computer Networks Security: intro. CS Computer Systems Security

Computer Networks Security: intro. CS Computer Systems Security Computer Networks Security: intro CS 166 - Computer Systems Security A very easy network 3/14/16 Computer Networks: Intro 2 Two philosophers example Translator Language Translator Engineer Communication

More information

Advanced Network Troubleshooting Using Wireshark (Hands-on)

Advanced Network Troubleshooting Using Wireshark (Hands-on) Advanced Network Troubleshooting Using Wireshark (Hands-on) Description This course is a continuation of the "Basic Network Troubleshooting Using Wireshark" course, and comes to provide the participants

More information

Fall 2003 Wincati Issue

Fall 2003 Wincati Issue Fall 2003 Wincati Issues SUMMARY...2 OVERVIEW...2 HISTORY...2 TECHNICAL DETAILS...2 ANALYSIS...3 DATA-GATHERING...3 RESULTS...3 Wincati...3 Efi Fiery Server ZX...3 WHAT REMAINS...3 LESSONS LEARNED...3

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2004 Kerio Technologies. All Rights Reserved. Printing Date: April 25, 2004 This guide provides detailed description on configuration of the local network

More information

CN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance.

CN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance. CN Assignment I 1. With an example explain how cookies are used in e-commerce application to improve the performance. In an e-commerce application, when the user sends a login form to the server, the server

More information

Networks and distributed computing

Networks and distributed computing Networks and distributed computing Abstractions provided for networks network card has fixed MAC address -> deliver message to computer on LAN -> machine-to-machine communication -> unordered messages

More information

I Was APT d. What Did They Steal?

I Was APT d. What Did They Steal? I Was APT d. What Did They Steal? Marcus H. Sachs, P.E. Verizon October 19, 2011 All Is Not Lost Just because you found the APT in your system (or were told by a third party that you ve been 0wn3d) doesn

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

The following topics describe how to configure correlation policies and rules.

The following topics describe how to configure correlation policies and rules. The following topics describe how to configure correlation policies and rules. Introduction to and Rules, page 1 Configuring, page 2 Configuring Correlation Rules, page 5 Configuring Correlation Response

More information

CNIT 121: Computer Forensics. 9 Network Evidence

CNIT 121: Computer Forensics. 9 Network Evidence CNIT 121: Computer Forensics 9 Network Evidence The Case for Network Monitoring Types of Network Monitoring Types of Network Monitoring Event-based alerts Snort, Suricata, SourceFire, RSA NetWitness Require

More information

CSE 124: Networked Services Fall 2009 Lecture-19

CSE 124: Networked Services Fall 2009 Lecture-19 CSE 124: Networked Services Fall 2009 Lecture-19 Instructor: B. S. Manoj, Ph.D http://cseweb.ucsd.edu/classes/fa09/cse124 Some of these slides are adapted from various sources/individuals including but

More information

Accelerating CIFS Over Satellite Networks. Muhamad Mjadleh

Accelerating CIFS Over Satellite Networks. Muhamad Mjadleh Accelerating CIFS Over Satellite Networks Muhamad Mjadleh Accelerating CIFS Over Satellite Networks Research Thesis Submitted in partial fulfillment of the requirements for the degree of Master of Science

More information

Lab 4: Network Packet Capture and Analysis using Wireshark

Lab 4: Network Packet Capture and Analysis using Wireshark Lab 4: Network Packet Capture and Analysis using Wireshark 4.1 Details Aim: To provide a foundation in network packet capture and analysis. You may be faced with network traffic analysis, from traffic

More information

Sam Pickles, F5 Networks A DAY IN THE LIFE OF A WAF

Sam Pickles, F5 Networks A DAY IN THE LIFE OF A WAF Sam Pickles, F5 Networks A DAY IN THE LIFE OF A WAF Who am I? Sam Pickles Senior Engineer for F5 Networks WAF Specialist and general security type Why am I here? We get to see the pointy end of a lot of

More information

IxLoad Common Internet File System (CIFS)

IxLoad Common Internet File System (CIFS) IxLoad Common Internet File System (CIFS) The Common Internet File System (CIFS) is a network protocol that enables resource sharing across a network. CIFS enables users to share files, directories, printers,

More information

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches

More information

User Guide NAS 3.0 Adapter (NAS30U2)

User Guide NAS 3.0 Adapter (NAS30U2) T E C H N O L O G I E S User Guide NAS 3.0 Adapter (NAS30U2) www.addonics.com v5.1.11 Technical Support If you need any assistance to get your unit functioning properly, please have your product information

More information

Symptom Condition / Workaround Issue Full domain name is not resolved by the RDP- ActiveX Client.

Symptom Condition / Workaround Issue Full domain name is not resolved by the RDP- ActiveX Client. Secure Remote Access Contents Platform Compatibility...1 Known Issues...1 Resolved Issues...3 Upgrading SonicOS SSL VPN Firmware Procedures...4 Related Technical Documentation...6 Platform Compatibility

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication This chapter describes how to configure web-based authentication on the switch. It contains these sections: Finding Feature Information, page 1 Web-Based Authentication Overview, page 1 How to Configure

More information

IEEE 802.1X RADIUS Accounting

IEEE 802.1X RADIUS Accounting The feature is used to relay important events to the RADIUS server (such as the supplicant's connection session). The information in these events is used for security and billing purposes. Finding Feature

More information

13. Internet Applications 최양희서울대학교컴퓨터공학부

13. Internet Applications 최양희서울대학교컴퓨터공학부 13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Computer Security and Privacy

Computer Security and Privacy CSE P 590 / CSE M 590 (Spring 2010) Computer Security and Privacy Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for

More information

System Programming. Introduction to computer networks

System Programming. Introduction to computer networks Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer

More information

Digital Forensics Practicum CAINE 8.0. Review and User s Guide

Digital Forensics Practicum CAINE 8.0. Review and User s Guide Digital Forensics Practicum CAINE 8.0 Review and User s Guide Ana L. Hernandez Master of Science in Cybersecurity Digital Forensics Concentration University of South Florida 12-8-2017 Table of Contents

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication This chapter describes how to configure web-based authentication on the switch. It contains these sections: Finding Feature Information, page 1 Web-Based Authentication Overview, page 1 How to Configure

More information

Domain Restructuring Windows Server 2008

Domain Restructuring Windows Server 2008 Domain Restructuring Windows Server 2008 Introduction: This document will describe design decision to add Additional Domain Controller in the existing Active Directory Forest. The infrastructure is assumed

More information

Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration

Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Modified 2-22-14 Objectives Describe the enumeration step of security testing Enumerate Microsoft OS targets Enumerate NetWare OS targets

More information

Hands-On Ethical Hacking and Network Defense 3rd Edition

Hands-On Ethical Hacking and Network Defense 3rd Edition Hands-On Ethical Hacking and Network Defense 3rd Edition Chapter 8 Desktop and Server OS Vulnerabilities Last updated 3-17-18 Objectives After reading this chapter and completing the exercises, you will

More information

Well, That Escalated Quickly! How abusing the Docker API Led to Remote Code Execution, Same Origin Bypass and Persistence in the Hypervisor via

Well, That Escalated Quickly! How abusing the Docker API Led to Remote Code Execution, Same Origin Bypass and Persistence in the Hypervisor via Well, That Escalated Quickly! How abusing the Docker API Led to Remote Code Execution, Same Origin Bypass and Persistence in the Hypervisor via Shadow Containers. Michael Cherny @chernymi Sagie Dulce @SagieSec

More information

Configure advanced audit policies

Configure advanced audit policies 7 LESSON Configuring Advanced Audit Policies 70-411 EXAM OBJECTIVE Objective 2.4 Configure advanced audit policies. This objective may include but is not limited to: implement auditing using Group Policy

More information

UNIT V Introduction to Application Layer HTTP Non persistent versus Persistent Connections Non persistent Connections

UNIT V Introduction to Application Layer HTTP Non persistent versus Persistent Connections Non persistent Connections UNIT V Introduction to Application Layer: Introduction, Client Server Programming, WWW and HTTP,FTP, e-mail, TELNET, Secure Shell, Domain Name System, SNMP. HTTP The Hyper Text Transfer Protocol (HTTP)

More information

Configuring Port-Based and Client-Based Access Control (802.1X)

Configuring Port-Based and Client-Based Access Control (802.1X) 9 Configuring Port-Based and Client-Based Access Control (802.1X) Contents Overview..................................................... 9-3 Why Use Port-Based or Client-Based Access Control?............

More information

Active Directory Attacks and Detection

Active Directory Attacks and Detection Active Directory Attacks and Detection #Whoami Working as an Information Security Executive Blog : www.akijosberryblog.wordpress.com You can follow me on Twitter: @AkiJos This talk is Based on Tim Madin

More information

CIFS/SMB2 Deep-Dive Report. Created for Sample Report Jun 25 th 2013 Jul 8 th 2013

CIFS/SMB2 Deep-Dive Report. Created for Sample Report Jun 25 th 2013 Jul 8 th 2013 CIFS/SMB2 Deep-Dive Report Created for Page 2 of 13 Contents Introduction... 3 Preface... 3 Executive Summary... 3 How sessions are counted... 4 Steelheads in Scope... 5 Optimization Errors vs. No Errors...

More information

QuickSpecs. HP Advanced Server V5.1B-5 for UNIX. Overview. Retired

QuickSpecs. HP Advanced Server V5.1B-5 for UNIX. Overview. Retired Overview The Advanced Server for UNIX (ASU) software is a Tru64 UNIX layered application that provides seamless interoperability between systems running the Tru64 UNIX operating system software and systems

More information

TexSaw Penetration Te st in g

TexSaw Penetration Te st in g TexSaw Penetration Te st in g What is penetration testing? The process of breaking something or using something for an unintended used case for the purpose of bettering the system or application. This

More information

TFTP and FTP Basics BUPT/QMUL

TFTP and FTP Basics BUPT/QMUL TFTP and FTP Basics BUPT/QMUL 2017-04-24 Agenda File transfer and access TFTP (Trivial File Transfer Protocol) FTP (File Transfer Protocol) NFS (Network File System) 2 File Transfer And Access 3 File Transfer

More information

Protocol Analysis: Capturing Packets

Protocol Analysis: Capturing Packets Protocol Analysis: Capturing Packets This project is intended to be done on the EiLab Network, but if you want to try to VPN into the EiLab Network on your own PC from your home or workplace, follow these

More information

CCNA Security PT Practice SBA

CCNA Security PT Practice SBA A few things to keep in mind while completing this activity: 1. Do not use the browser Back button or close or reload any Exam windows during the exam. 2. Do not close Packet Tracer when you are done.

More information

Lecture 12. Application Layer. Application Layer 1

Lecture 12. Application Layer. Application Layer 1 Lecture 12 Application Layer Application Layer 1 Agenda The Application Layer (continue) Web and HTTP HTTP Cookies Web Caches Simple Introduction to Network Security Various actions by network attackers

More information

CyberP3i Course Module Series

CyberP3i Course Module Series CyberP3i Course Module Series Spring 2017 Designer: Dr. Lixin Wang, Associate Professor Firewall Configuration Firewall Configuration Learning Objectives 1. Be familiar with firewalls and types of firewalls

More information

One Bay SATA/IDE Turbo NAS User Manual

One Bay SATA/IDE Turbo NAS User Manual One Bay SATA/IDE Turbo NAS User Manual Revision: v0117 Date: 2009/07/23 For firmware version v1.17 Table of Contents 1. Introduction... 3 1.1. Key Features... 3 1.2. Network Environment... 3 2. Hardware

More information

Texas Tech University Spring 2017 Digital Forensics Network Analysis

Texas Tech University Spring 2017 Digital Forensics Network Analysis Analyzing the Network Capture of WannaCry Ransomware Background: Network analysis can get very detailed. There are several different types of evidence. Full packet captures, logs and netflow information.

More information

Nasuni Data API Nasuni Corporation Boston, MA

Nasuni Data API Nasuni Corporation Boston, MA Nasuni Corporation Boston, MA Introduction The Nasuni API has been available in the Nasuni Filer since September 2012 (version 4.0.1) and is in use by hundreds of mobile clients worldwide. Previously,

More information