Desklib - Online Library for Study Material with Solved Assignments, Essays, Dissertations
Verified
Added on  2023/06/08
|20
|1349
|252
AI Summary
Desklib is an online library for study material with solved assignments, essays, dissertations and more. This page contains a submission for COIT20262 - Advanced Network Security, Term 2, 2018. It includes a cookie stealing attack, cryptography and ransomware research. The page also includes recommendations and a bibliography.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COIT20262Assignment 1 SubmissionTerm2,2018 COIT20262-Advanced Network Security, Term2,2018 Assignment 1 Submission Due date:5pm Friday 24 August 2018 (Week 6)ASSESSMENT Weighting:40% 1Length:N/A Student Name:enter your name Student ID:id Campus:campus Tutor:tutor Advanced Network SecurityPage1of20
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
COIT20262Assignment 1 SubmissionTerm2,2018 Question 1.Cookie Stealing Attack Phase 1: Setup Creation of topology 7 in Virtnet Adding new normal user to the MyUni grading system with the student ID and First name Advanced Network SecurityPage2of20
COIT20262Assignment 1 SubmissionTerm2,2018 Adding new malicious user to the MyUni grading system Adding grade for the normal user Advanced Network SecurityPage4of20
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
COIT20262Assignment 1 SubmissionTerm2,2018 Part (d) Information from Packets InformationAnswer Packet number fromnormal-student.pcapthat contains the normal students’ password 26 Packetnumberfromnormal-student.pcapinwhichtheserver originally sends the cookie to the browser 28 Last 4 HEX digits of theid_hashin the cookie (give the value of the last 4 digits, not the packet number) 6f96 Packetnumberfrommalicious-student.pcapthatcontainsthe normal students grade for coit20262. 37 Packet number frommalicious-student.pcapin which the client originally sends the stolen cookie 49 Part (e) Write your answer here The id_hash is calculated with the generation of random number and applying RSA algorithm for the generation of the exponential bits. Part (f) Write your answer here For grading of web application the id_hash is used for encrypting the message with the private key and decrypting using the public key for management of the integrity and increasing the security of data transmission. Part (g) Write your answer here The algorithms that are used for the generation of id-hash are easily available to the hacket and the hacker can intercept the message for decrypting the cipher text into plain text and fraud the user identity. Part (h) Write your answer here Part (i) Write your answer here The cookie header file is send by the server to the browser and it is stored in the browser for fetching the cookie from the server. A domain name or path can be set for receiving the cookie and enforcing a limitation. Here the nano editor in virtnet is used for modifying the cookie and the student id is used as the username for logging into the grading website automatically. Advanced Network SecurityPage16of20
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
COIT20262Assignment 1 SubmissionTerm2,2018 Question 2.Cryptography Part (c) Write your answer here In the scenario of sender generate a random 256 bit secret key and use encryption it is not considered as a secure mechanism because the encrypted file can be decrypted for getting the random string generated by the user. Moreover brute force attack can be used for getting the access of the system thus it is necessary to use strong password with the combination of uppercase lowercase numeric and special character for increasing the security. Part (d) Write your answer here If the sender encrypts a secret key but not the Iv it can be easily predicted if the hacker have the access of it by guessing its pattern.The hash values of the cookies can also be used for accessing the web browser and intercepting the ciphertext. Advanced Network SecurityPage18of20
COIT20262Assignment 1 SubmissionTerm2,2018 Question 3.Ransomware Research Overview of Ransomware Write your answer here The following are the common methods of infection in ransomware such as: Downloading of file from insecure or malicious websites can cause installation of bundled sophisticated codes in the machine and execute when the website is visited. Emails can be a source of planting malicious agents and the user can download the file by clicking a link or downloading an attachment If the RDP port is left opened it can help the hacker to access the system and execute different operation that can compromise the security of the system. Technical Details of Ransomware Write your answer here The payload is used for generating fake designed warning for locking the important files and does not open when the condition of the hacker is met. There are different techniques in cryptography and it can be combined with the malware for operating as a ransomware. As an example of ransomware WannaCry can be taken which is used for the exploitation of the vulnerability of the windows and keep a control on the information sharing. For obtaining the ransoms the vulnerabilities of a network or system is analysed by the hacker by performing a penetration test and reverse engineering. A strong public key encryption is used for encryption of the files. The ransom cannot be break easily it a combination of different encryption techniques and it is hard to predict the encryption for decrypting the file. Recommendations Write your answer here It is recommended that the data should be backed up regularly such the infected files can be wiped out and the installation procedure can be started from the beginning. The security updates should be installed after a regular interval of time for the mitigation of the problems in the operating system. Antivirus software should be updated regularly and secure connection should be used for sending and receiving files in the network. Advanced Network SecurityPage19of20
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
COIT20262Assignment 1 SubmissionTerm2,2018 Bibliography Savaglia, J., & Wang, P. (2017). CYBERSECURITY VULNERABILITY ANALYSIS VIA VIRTUALIZATION.Issues in Information Systems,18(4). Takeuchi, Y., Sakai, K., & Fukumoto, S. (2018, August). Detecting Ransomware using Support Vector Machines. InProceedings of the 47th International Conference on Parallel Processing Companion(p. 1). ACM. Advanced Network SecurityPage20of20