CS 716: Introduction to communication networks. Instructor: Sridhar Iyer Demo by: Swati Patil IIT Bombay

Similar documents
Lab 2: Creating Secure Architectures

Lab 1: Creating Secure Architectures (Revision)

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Lab 1: Packet Sniffing and Wireshark

Configure Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) Service Settings on a Switch

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

CN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance.

When does it work? Packet Sniffers. INFO Lecture 8. Content 24/03/2009

Lab 3.4.3: Services and Protocols

Network Encryption Methods

Instituto Superior Técnico, Universidade de Lisboa Network and Computer Security. Lab guide: Traffic analysis and TCP/IP Vulnerabilities

Introduction to TCP/IP

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

General Network Troubleshooting

The Applications and Gaming Tab - Port Range Forward

Ethernet / TCP-IP - Training Suite Application level protocols

INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET

Comodo Dome Data Protection Software Version 3.8

CS 716: Introduction to communication networks th class; 11 th Nov Instructor: Sridhar Iyer IIT Bombay

Transport Level Security

UNIT V Introduction to Application Layer HTTP Non persistent versus Persistent Connections Non persistent Connections

8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista

EMT2455 Data Communications 4. Network Layer. Dr. Xiaohai Li. Dept. of Computer Eng. Tech., NYCCT. Last Update: Nov.

Exam Questions SY0-401

Stateless Firewall Implementation

Application Layer: OSI and TCP/IP Models

Lab - Using Wireshark to Examine TCP and UDP Captures

General Important Protocols for Examination of IA Examination 2018

Different Layers Lecture 20

Lab I: Using tcpdump and Wireshark

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

CS 716: Introduction to communication networks th class; 7 th Oct Instructor: Sridhar Iyer IIT Bombay

Chapter 2. Switch Concepts and Configuration. Part II

Lab Configure Basic AP security through GUI

Network: infrastructure (hard/software) that enables endpoints (hosts) to communicate

Defining Networks with the OSI Model. Module 2

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

Access Switch VLAN Y Y.1 /24

ASIT-33018PFM. 18-Port Full Gigabit Managed PoE Switch (ASIT-33018PFM) 18-Port Full Gigabit Managed PoE Switch.

Debian/GNU Linux Networking

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

1. Which OSI layers offers reliable, connection-oriented data communication services?

How to open ports in the DSL router firmware version 2.xx and above

The following virtual machines are required for completion of this lab: Exercise I: Mapping a Network Topology Using

Lab - Examining Telnet and SSH in Wireshark

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

COMP 2000 W 2012 Lab no. 3 Page 1 of 11

Activity Configuring and Securing a Wireless LAN in Packet Tracer

ITS332 Quiz 1 Answers

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

= Session-(1.4) Preparing the Workstation for the Lab / OS Installation = Session-(1.4) Preparing the Workstation for the Lab / OS Installation

CS321: Computer Networks FTP, TELNET, SSH

Configuring Traffic Policies

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

Lab Using Wireshark to Examine Ethernet Frames

CIT 380: Securing Computer Systems. Network Security Concepts

Introduction to Networking

Troubleshooting. Contacting Cisco TAC. Checking the Version Number of Cisco Configuration Engine APPENDIXA

Network Security. Kitisak Jirawannakool Electronics Government Agency (public organisation)

Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy

Integrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise

Chapter 4: Networking and the Internet

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Lab Configuring and Verifying Extended ACLs Topology

COMP2330 Data Communications and Networking

Use of the TCP/IP Protocols and the OSI Model in Packet Tracer

Lab Using Wireshark to Examine Ethernet Frames

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

Configuring a Palo Alto Firewall in AWS

1.3 Analyzing the performance of various configurations and protocols

CounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance

Chapter 4 The Internet

LAB THREE STATIC ROUTING

Deployment Guide AX Series with Oracle E-Business Suite 12

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

Hands-On Ethical Hacking and Network Defense

Lab Capturing and Analyzing Network Traffic

Network concepts introduction & wireshark

Fundamentals of Network Security v1.1 Scope and Sequence

Internet Overview. Introduction to Internet Technology Overview of Web Authoring. Internet Technology 1

Material for the Networking lab in EITF25 & EITF45

CSCE 463/612 Networks and Distributed Processing Spring 2018

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

The OSI Model. Level 3 Unit 9 Computer Networks

ECE697AA Lecture 2. Today s lecture

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer

Cisco Interconnecting Cisco Networking Devices Part 2

( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture

Linux Kurs Themen TCP / IP 20 October TCP vs. UDP Protocols Garanteed data transport(eg. ftp) vs speed(eg. nfs) ICMP Protocol

Lab #4 TECH 4281 Spring 2015

Net LineDancer v13. Install Guide for Linux. Revision History

PROGRAMMING Kyriacou E. Frederick University Cyprus. Network communication examples

Transcription:

CS 716: Introduction to communication networks - 16 th class; 28 th Sept 2011 Instructor: Sridhar Iyer Demo by: Swati Patil IIT Bombay

What is IP address An identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. For example: 10.129.50.94 could be an IP address. You can assign IP addresses at random as long as each one is unique. The four numbers in an IP address are used in different ways to identify a particular network and a host on that network.

Classes of IP There are five classes of available IP ranges: Class A, Class B, Class C, Class D and Class E, while only A, B and C are commonly used. Class A : Supports 16 million hosts on each of 127 networks. 1.0.0.1 to 126.255.255.254 Class B : Supports 65,000 hosts on each of 16,00 networks. 128.1.0.1 to 191.255.255.254 Class C : Supports 254 hosts on each of 2 million networks. 192.0.1.1 to 223.255.254.254 Class D : Reserved for multicast groups. 224.0.0.0 to 239.255.255.255 Class E : Reserved for future use, or Research and Development Purposes. 240.0.0.0 to 254.255.255.254

Network Configuration GUI : Graphical User Interface System----Preferences----Network Settings i) DHCP : Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers configured for a given network. ii) Manual Netmask : The Netmask, together with the IP address, defines the network the computer belongs to, that is which other IP addresses the computer can touch directly in the same LAN. Gateway: A node on a network that serves as an entrance to another network. In enterprises, the gateway is the computer that routes the traffic from a workstation to the outside network that is serving the Web pages.

Using Terminal a) ifconfig b) sudo vi /etc/network/interfaces c) sudo /etc/init.d/networking restart d) sudo /etc/hostname e) sudo /etc/host f) vi /etc/resolv.conf

PING : COMMAND Ping is a basic Internet program that allows a user to verify that a particular IP address exists and can accept requests. Ping works by sending an Internet Control Message Protocol (ICMP) Echo Request to a specified interface on the network and waiting for a reply.

PING PACKET SNIFFING USING WIRESHARK

Telnet Telnet is a protocol that allows you to connect to remote computers over a TCP/IP network. Command for telnet telnet <host> To create a connection with the remote host. The Telnet client will send a request to the Telnet server (remote host). The server will reply asking for a user name and password. If accepted, the Telnet client will establish a connection to the host and allows you to access the host's computer.

Telnet Packet Sniffing using Wireshark

How to send email using Telnet and sense SMPT with Wireshark Start a Telnet session from a command line by entering: Telnet your.mailserver.com 25 220 a.mail.server.com Microsoft ESMTP MAIL Service, Version: 6.0.3790.2499 ready at Thu, 29 Jun 2006 15:59:02-0600 helo

250 a.mail.server.com Hello [192.168.125.237] mail from: test@test.org 250 2.1.0 email@test.org... Sender OK rcpt to: test@test.com 250 2.1.5 test@test.com data

354 Start mail input; end with. This is a test.. (enter a dot/period to end the data) 250 2.6.0 Queued mail for delivery quit Connection to host lost.

Secure Shell Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. When using ssh, the entire login session, including transmission of password, is encrypted, therefore it is almost impossible for an outsider to collect passwords.

SSH Packet Sniffing using Wireshark

Telnet Vs SSH TELNET, by default, does not encrypt any data sent over the connection including password, and so it is often practical to eavesdrop on the communications and use the password later for malicious purposes. SSH by default encrypts password and traffic. SSH is recommended for all use.

HTTP HTTP - the Hypertext Transfer Protocol provides a standard for Web browsers and servers to communicate. HTTP is an application layer network protocol built on top of TCP. HTTP clients (such as Web browsers) and servers communicate via HTTP request and response messages. HTTP utilizes TCP port 80 by default

HTTP Packet Sniffing using Wireshark

HTTPS HTTPS stands for Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL. HTTPS encrypts and decrypts the page requests and page information between the client browser and the web server using a Secure Socket Layer (SSL). HTTPS by default uses port 443

HTTPS Packet Sniffing using Wireshark

HTTP Vs HTTPS HTTP doesn't encrypt data at all with all its communication pretty much readable, with no decoding, translation or decryption required, Completely insecure HTTPS is a secure connection, which means the data between the client and Web server is encrypted. HTTPS uses public key encryption to secure data