Your contribution can guide someone’s learning journey. Share your
documents today.
COIT20262Assignment 1 SubmissionTerm2,2018 COIT20262-Advanced Network Security, Term2,2018 Assignment 1 Submission Due date:5 pm Friday 24 August 2018 (Week 6)ASSESSMENT Weighting:40%1Length:N/A Student Name:enter your name Student ID:id Campus:campus Tutor:tutor Advanced Network SecurityPage1of8
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
COIT20262Assignment 1 SubmissionTerm2,2018 Question 1.Cookie Stealing Attack Part (c) Message Sequence Chart Advanced Network SecurityPage2of8 ClientServer 192.168.1.11192.168.2.21 HTTPGET/grades/ HTTPHTTP/1.1 200 OK HTTPGET/grades/login.php HTTPHTTP/1.1 200 OK HTTPPOST/grades/login.php HTTPHTTP/1.1 302 Found HTTPGET/grades/index.php HTTPHTTP/1.1 200 OK HTTPGET/grades/query.php HTTPHTTP/1.1 200 OK HTTPGET/grades/view.php HTTPHTTP/1.1 200 OK
COIT20262Assignment 1 SubmissionTerm2,2018 Part (d) Information from Packets InformationAnswer Packet number fromnormal-student.pcapthat contains the normal students’ password 4 Packetnumberfromnormal-student.pcapinwhichtheserver originally sends the cookie to the browser 6 Last 4 HEX digits of theid_hashin the cookie (give the value of the last 4 digits, not the packet number) 36 36 35 31 Packetnumberfrommalicious-student.pcapthatcontainsthe normal student's grade for coit20262. 36 Packet number frommalicious-student.pcapin which the client originally sends the stolen cookie 4 Part (e) For id_hash calculation, we have used the MD5 hash algorithm. The id_hash calculation which we have used is basically a type of PHP. This hash algorithm sends the hash to the browser as a cookie. This hash calculation algorithm is applying for password encryption. The browser automatically saves this cookie generated by hash calculation algorithm. Part (f) The id_hash provides security in this assignment. The security is fully encrypted in this assignment. Only one user at a time can log in in this grading web application. In the grading web application, the user 12032177 can log in as a single user at a single time. The id_hash provides single authentication in this web application. Part (g) When user login in the grading application first time, at that time the username and password go into plain text. After login into the system, the PHP server starts and then the username and password go into the browser and save as a cookie. At that time the login information is not secure. This login and password can be stolen, Part (h) At the security level the login password was going through plaintext but if we provide client- side encryption then the only hash will be verified. This encryption method is more secure. This security function will perform in JavaScript. JavaScript is browsing language if the browser turns off then the encryption method will be interrupted at that time. Advanced Network SecurityPage3of8
COIT20262Assignment 1 SubmissionTerm2,2018 Part (i) Figure1Cookie Advanced Network SecurityPage4of8
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
COIT20262Assignment 1 SubmissionTerm2,2018 Question 2.Cryptography Part (c) If we use AES-256-CBC encryption key than the possible combination of the key will be maximum and this encryption is unbreakable. But if we use alphabetical numeric in the capital and small like a-A, Z-Z and so on then at that time the possible combination of the key will be minimum and the security could be hack easily. Part (d) IV is a most secure feature in a plaintext process. This provides high security and high encryption functionality. If we removed the IV security in the error will be generated and the error will be irremovable at a particular time. We should not remove the IV encryption from the browser. This IV generate a security key in the client-server browsing process. The security of the IV prevents the SSH to generate security. Advanced Network SecurityPage5of8
COIT20262Assignment 1 SubmissionTerm2,2018 Question 3.Ransomware Research Overview of Ransomware Overview Software apps and malicious email attachments are the examples of ransomware malware which changes the login credentials of the victim and infects the device by encryption. It locked data on the victim’s computer and before decrypting the data they demand payment. To hide the identity the payment demanded in a virtual currency such as bitcoin. How it works Cybercriminals can easily purchase the ransomware kit and create ransomware to generate malware for their own distribution. It is easy for the non-technical field to purchase inexpensive ransomware as a service and with no efforts can encrypt the files of the infected device. attackers use several approaches to demand digital currency from the victim. The victim receives a pop-up message or emails in which attacker demands money and warn the victim that if the victim will not pay on the specified date then the decrypt data will be destroyed. Prevention of ransomware To control the ransomware malware attack antivirus software plays an important role. Users should not click on links or open the emails which are unfamiliar. We can’t stop the ransomware but reduce the effects of ransomware and recover the data quickly. There are some strategieswhichcanbeusedtominimizetheeffectsofransomwaresuchas compartmentalizing authentication domains and systems, by updating storage snapshots and sets limits on who can access the data. What are the common methods of infection? Today time malware attackers use the complex technique to spread their malware virus. Commonly there is three type of ransomware malware spread; malicious email attachment, untrusted download website, Remote desktop protocol. Malicious email attachment:Attackers attach a malicious file with a link, this file capable of destroying your computer data or can send the personal data to a hacker. This file can be a word, PDF, Zip, and RAR. , Video, Image. Untrusted download website:There is some duplicated website which attacks the computer user to download the software from there website. When a user downloads the file from this website, a malicious software will download automatically in your computer. This malicious software will this your data or may access your computer function. Remote desktop protocol:Hacker use this service to access the user desktop. There is so many software by which hacker can control the user computer from a remote area. Hacker can see all that a user is doing in computer remotely. What are common payloads? Advanced Network SecurityPage6of8
COIT20262Assignment 1 SubmissionTerm2,2018 Payload means a malicious virus that does malicious activity in the computer. A virus with more payload that means more harmful. There is a different type of virus. Some virus can multiply themselves, some can access your data, and some can destroy your computer file. Some of the ways to execute a payload include: 1 By executing an infected program 2 computer without an anti-virus installed 3 By opening an infected file What are cryptographic techniques commonly used? The whole world run on code and software like ATM, mobile, online shopping, industries, airlines etc. In fact today we can’t live with code and software. Cryptography is a technique for the communication of data in an encryption mode. The encryption is done in such a way that no third person can decrypt the data. Triple DESis used to replace the old DES algorithm. EarlierDes is using 56 bits key for encryption, so a hacker can hack this code so now Triple DES is used up to 168 bits for encryption. Blowfishis also designed to replace the old DES algorithm. Blowfish is known for his effectiveness and speed. As many say that to crack the blowfish is very difficult. Blowfish work on variable length means from 32 bits to 448 bits. Blowfish used in e-commerce and database security. RSAis known for his an asymmetric key encryption technique. In this technique, the encryption key is different than decryption key which is kept private. RSA key is increase by encryption of data. What technologies are used to obtain ransoms? Ransomware hacker uses payment in form of cryptocurrency.Cryptocurrency is a virtual currency that uses cryptography technique for security. Cryptocurrency is different from countries currency like Dollar, Euro, and Rupees, due to his different security features. Cryptocurrency uses blockchain technology. blockchain technology uses decentralized for all transition. By using theses technology user can confirm their transition without the approval of central bank authority. Why is some ransomware very hard to break? Now day’s hackers using higher bits keys to make ransomware virus more complex so it’s difficult to break by anti-virus industries. Ransomware uses malicious code to gain control over user file, data, and computer. These viri use RSA, Blowfish and Triple DES algorithm to make a complex virus structure. Nowadays we can break the code or decrypt up to 600 bits key in a short period of time, but above that keys are hard to break. Recommendation Advanced Network SecurityPage7of8
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
COIT20262Assignment 1 SubmissionTerm2,2018 There are several ways to handle the ransomware such as to clean the ransomware from the machine use anti-malware or anti-virus; the user should not open the stranger email attachments. GPO restrictions restrict the ransomware or malware to install on the device and perform a regular back up. The user should not open the spam emails or the open attachments in email from unknown origin. Advanced Network SecurityPage8of8