Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

By default, the pfsense firewall __________ outbound access from the lan interface.

15/12/2020 Client: saad24vbs Deadline: 7 Days

CIS 534 - Advanced Network Security Design 1


CIS 534


Advanced Network Security Design


CIS 534 - Advanced Network Security Design 2


Table of Contents Toolwire Lab 1:Analyzing IP Protocols with Wireshark ........................................................................ 6


Introduction ............................................................................................................................................. 6


Learning Objectives ................................................................................................................................ 6


Tools and Software ................................................................................................................................. 7


Deliverables ............................................................................................................................................. 7


Evaluation Criteria and Rubrics ........................................................................................................... 7


Hands-On Steps ....................................................................................................................................... 8


Part 1: Exploring Wireshark ............................................................................................................... 8


Part 2: Analyzing Wireshark Capture Information .......................................................................... 12


Lab #1 - Assessment Worksheet .............................................................................................................. 19


Analyzing IP Protocols with Wireshark ............................................................................................. 19


Overview ................................................................................................................................................ 20


Lab Assessment Questions & Answers ............................................................................................... 20


Toolwire Lab 2: Using Wireshark and Netwitness Investigator to Analyze Wireless Traffic ........... 22


Introduction ........................................................................................................................................... 22


Learning Objectives .............................................................................................................................. 23


Tools and Software ............................................................................................................................... 23


Deliverables ........................................................................................................................................... 23


Evaluation Criteria and Rubrics ......................................................................................................... 23


Hands-On Steps ..................................................................................................................................... 24


Part 1: Analyzing Wireless Traffic with Wireshark .......................................................................... 24


Part 2: NetWitness Investigator ......................................................................................................... 31


Lab #2 - Assessment Worksheet .............................................................................................................. 34


Using Wireshark and NetWitness Investigator to Analyze Wireless Traffic .................................. 34


Overview ................................................................................................................................................ 34


Lab Assessment Questions & Answers ............................................................................................... 35


Toolwire Lab 3: Configuring a pfSense Firewall on the Client ............................................................ 36


Introduction ........................................................................................................................................... 36


Learning Objectives .............................................................................................................................. 37


Tools and Software ............................................................................................................................... 37


Deliverables ........................................................................................................................................... 37


Evaluation Criteria and Rubrics ......................................................................................................... 37


CIS 534 - Advanced Network Security Design 3


Hands-On Steps ..................................................................................................................................... 38


Part 1: Planning the Configuration .................................................................................................. 38


Part 2: Configuring the Firewall ....................................................................................................... 46


Lab #3 - Assessment Worksheet .............................................................................................................. 48


Configuring a pfSense Firewall on the Client ..................................................................................... 48


Overview ................................................................................................................................................ 48


Lab Assessment Questions ................................................................................................................... 49


Toolwire Lab 4: Configuring a pfSense Firewall on the Server ........................................................... 50


Introduction ........................................................................................................................................... 50


Learning Objectives .............................................................................................................................. 51


Tools and Software ............................................................................................................................... 51


Deliverables ........................................................................................................................................... 51


Evaluation Criteria and Rubrics ......................................................................................................... 51


Hands-On Steps ..................................................................................................................................... 52


Part 1: Planning the Configuration .................................................................................................. 52


Part 2: Configuring the Firewall ....................................................................................................... 59


Lab #4 - Assessment Worksheet .............................................................................................................. 63


Configuring a pfSense Firewall on the Server .................................................................................... 63


Overview ................................................................................................................................................ 63


Lab Assessment Questions & Answers ............................................................................................... 63


Toolwire Lab 5: Penetration Testing a pfSense Firewall ...................................................................... 65


Introduction ........................................................................................................................................... 65


Learning Objectives .............................................................................................................................. 66


Tools and Software ............................................................................................................................... 66


Deliverables ........................................................................................................................................... 66


Evaluation Criteria and Rubrics ......................................................................................................... 66


Hands-On Steps ..................................................................................................................................... 67


Part 1: Configuring a pfSense Server Firewall ................................................................................ 67


Part 2: Penetration Testing ................................................................................................................ 68


Lab #5 - Assessment Worksheet .............................................................................................................. 72


Penetration Testing a pfSense Firewall ............................................................................................... 72


Overview ................................................................................................................................................ 72


Lab Assessment Questions & Answers ............................................................................................... 72


CIS 534 - Advanced Network Security Design 4


Toolwire Lab 6: Using Social Engineering Techniques to Plan an Attack .......................................... 74


Introduction ........................................................................................................................................... 74


Learning Objectives .............................................................................................................................. 75


Tools and Software ............................................................................................................................... 75


Deliverables ........................................................................................................................................... 75


Evaluation Criteria and Rubrics ......................................................................................................... 76


Hands-On Steps ..................................................................................................................................... 76


Part 1: Targeted Social Engineering Attack ..................................................................................... 76


Part 2: Targeted Reverse Social Engineering Attack ....................................................................... 82


Lab #6 - Assessment Worksheet .............................................................................................................. 84


Using Social Engineering Techniques to Plan an Attack .................................................................. 84


Overview ................................................................................................................................................ 84


Lab Assessment Questions ................................................................................................................... 84


Toolwire Lab 7: Configuring a Virtual Private Network Server ......................................................... 87


Introduction ........................................................................................................................................... 87


Learning Objectives .............................................................................................................................. 88


Tools and Software ............................................................................................................................... 88


Deliverables ........................................................................................................................................... 88


Evaluation Criteria and Rubrics ......................................................................................................... 89


Hands-On Steps ..................................................................................................................................... 89


Part 1: Configuring the VPN: Server Side ........................................................................................ 89


Lab #7 - Assessment Worksheet .............................................................................................................. 98


Configuring a Virtual Private Network Server .................................................................................. 98


Overview ................................................................................................................................................ 98


Lab Assessment Questions & Answers ............................................................................................... 98


Host-to-Host Configuration Worksheet .............................................................................................. 99


IPsec.conf file ......................................................................................................................................... 99


Toolwire Lab 8: Configuring a VPN Client for Secure File Transfers .............................................. 100


Introduction ......................................................................................................................................... 100


Learning Objectives ............................................................................................................................ 101


Tools and Software ............................................................................................................................. 101


Deliverables ......................................................................................................................................... 101


Evaluation Criteria and Rubrics ....................................................................................................... 102


CIS 534 - Advanced Network Security Design 5


Hands-On Steps ................................................................................................................................... 102


Part 1: Configuring a Windows VPN Client to work with a Linux VPN Server ........................... 102


Part 2: Comparing Secure and Non-secure File Transfers in Wireshark ..................................... 107


Lab #8 - Assessment Worksheet ............................................................................................................ 116


Configuring a VPN Client for Secure File Transfers ...................................................................... 116


Overview .............................................................................................................................................. 117


Lab Assessment Questions & Answers ............................................................................................. 117


Toolwire Lab 9: Attacking a Virtual Private Network ........................................................................ 118


Introduction ......................................................................................................................................... 118


Learning Objectives ............................................................................................................................ 119


Tools and Software ............................................................................................................................. 119


Deliverables ......................................................................................................................................... 119


Evaluation Criteria and Rubrics ....................................................................................................... 120


Hands-On Steps ................................................................................................................................... 120


Part 1: Social Engineering / Reverse Social Engineering Attack .................................................. 120


Part 2: Creating Spam Emails ......................................................................................................... 126


Lab #9 - Assessment Worksheet ............................................................................................................ 129


Attacking a Virtual Private Network ................................................................................................ 129


Overview .............................................................................................................................................. 129


Lab Assessment Questions & Answers ............................................................................................. 129


Toolwire Lab 10: Investigating and Responding to Security Incidents ............................................. 131


Introduction ......................................................................................................................................... 131


Learning Objectives ............................................................................................................................ 132


Tools and Software ............................................................................................................................. 132


Deliverables ......................................................................................................................................... 132


Evaluation Criteria and Rubrics ....................................................................................................... 133


Hands-On Steps ................................................................................................................................... 133


Part 1: Gather System Performance Information .......................................................................... 133


Part 2: Scan a Windows 2008 Server for Vulnerabilities ............................................................... 136


Lab #10 - Assessment Worksheet .......................................................................................................... 138


Investigating and Responding to Security Incidents........................................................................ 138


Overview .............................................................................................................................................. 138


Lab Assessment Questions & Answers ............................................................................................. 138


CIS 534 - Advanced Network Security Design 6


Toolwire Lab 1:Analyzing IP Protocols with Wireshark


Introduction


Click the link below to view the network topology for this lab:


Topology


Wireshark is probably the most widely used packet capture and analysis software in the world. It is available free of charge and while it lacks some of the more sophisticated diagnostic tools of similar commercial products, the use of Wireshark saves many organizations thousands of dollars and thousands of hours. And, Wireshark allows capture of network packet traffic and the ability to save frame detail in multiple formats that make them usable by the more sophisticated, more expensive software tools.


This lab has three parts which you should complete in order.


1. In the first part of the lab, you will either learn the basics of Wireshark, if you have not already used it, or you will improve and fine tune your Wireshark skills. In either case, you will learn about probe placement, clocking/timing issues, Wireshark traffic capture and the use of filters.


2. In the second part of the lab, you will utilize a capture file to answer basic questions about key IP protocols and the basic configuration of the IP hosts from which traffic is captured.


3. Finally, if assigned by your instructor, you will explore the virtual environment on your own in the third part of the lab to answer a set of challenge questions that allow you to use the skills you learned in the lab to conduct independent, unguided work, similar to what you will encounter in a real-world situation.


Learning Objectives


Upon completing this lab, you will be able to:


• Use basic features of the Wireshark packet capture and analysis software> • Apply appropriate filters to view only the traffic subset of interest • Be able to reliably and consistently place probes to capture packet traffic> • Determine if timing and clocking is synchronized for better reliability and repeatability


javascript:popUp;

CIS 534 - Advanced Network Security Design 7


• Guarantee that all traffic is being captured and that the interface rate and capture rate are compatible


• Capture and analyze basic Internet Protocol transactions and determine basic configuration information about the IP hosts from which traffic is captured


Tools and Software


The following software and/or utilities are required to complete this lab. Students are encouraged to explore the Internet to learn more about the products and tools used in this lab.


• Wireshark


Deliverables


Upon completion of this lab, you are required to provide the following deliverables to your instructor:


1. Lab Assessments file; 2. Optional: Challenge Questions file, if assigned by your instructor.


Evaluation Criteria and Rubrics


The following are the evaluation criteria for this lab that students must perform:


1. Use basic features of the Wireshark packet capture and analysis software. - [10%] 2. Apply appropriate filters to view only the traffic subset of interest. - [20%] 3. Be able to reliably and consistently place probes to capture packet traffic. - [20%] 4. Determine if timing and clocking is synchronized for better reliability and repeatability. -


[20%] 5. Guarantee that all traffic is being captured and that the interface rate and capture rate are


compatible. - [20%] 6. Capture and analyze basic Internet Protocol transactions and determine basic


configuration information about the IP hosts from which traffic is captured. - [10%]


CIS 534 - Advanced Network Security Design 8


Hands-On Steps


Note: This lab contains detailed lab procedures which you should follow as written. Frequently performed tasks are explained in the Common Lab Tasks document on the vWorkstation desktop. You should review these tasks before starting the lab.


1. From the vWorkstation desktop, double-click the Common Lab Tasks file to open the file in Adobe Reader.


If desired, use the File Transfer button to transfer the file to your local computer and print a copy for your reference. Instructions for transferring the file can be found in the file itself.


Figure 1 “Student Landing” workstation


2. On your local computer, create the lab deliverable files. 3. Review the Lab Assessment Worksheet at the end of this lab. You will find


answers to these questions as you proceed through the lab steps.


Part 1: Exploring Wireshark


Note: Wireshark is already loaded on the vWorkstation, as indicated by the Wireshark shortcut on the desktop. Wireshark can be downloaded, free of charge, from http://www.wireshark.org if you would like to have your own personal copy, though doing so is not a requirement for this lab.


1. Double-click the Wireshark icon on the desktop to start the Wireshark application.


Figure 2 Wireshark splash screen


The main screen of Wireshark includes several shortcuts to make your job easier. There are four categories of shortcuts.


Wireshark Screen Sections SECTION TITLE DESCRIPTION


javascript:popUp();

javascript:popUp();

CIS 534 - Advanced Network Security Design 9


Capture This section displays a list of the network interfaces, or machines, that Wireshark has identified, and from which packets can be captured and analyzed.


Files This section displays the most recent list of files that you were analyzing in Wireshark. The default status for this section is blank because no files have been opened yet.


Online This section displays shortcuts to the Wireshark website. Capture Help This section displays shortcuts to the Wireshark website for help in


using the tool.


2. Click Interface List to bring up a list of active interfaces.


Figure 3 Wireshark Capture Interfaces


Notice that only one interface, the student workstation, is available for capturing packets in the virtual lab. This Capture Interface is a virtual interface described as “Citrix” with an IP address of 172.30.0.2.


Note: If you were running Wireshark on your local computer, it is possible that would see many interfaces. It is also possible that some interfaces you were expecting to see may not appear on the list at all. If you know that a logical or physical interface exists but it does not show up on the list, check the installation of winpcap and troubleshoot accordingly. Very often it is necessary to reinstall or update the Network Interface Card (NIC) drivers.


3. Click the checkbox to the left of the Student device to select it, and click Details to display additional information about the interface.


The Interface Details dialog box displays a great deal of information about the interface that may be useful in troubleshooting and resolving packet capture problems, for instance if you are not capturing all of the packets you may be exceeding the transmit and/or receive buffers. Take a moment to review the information in this dialog box before proceeding with the lab.


Figure 4 Wireshark Capture Interface Details


4. Click Close to close the Interface Details dialog box. 5. With the Student checkbox still checked, click Start to open Wireshark and


begin capturing data packets affecting the Student’s virtual workstation.


Note: Because Wireshark is capturing traffic live, your default content will be different from the screen captures in this part of the lab. However, in Part 2, you will load a static file and your results should match the examples almost


javascript:popUp();

javascript:popUp();

CIS 534 - Advanced Network Security Design 10


exactly once. All of these steps are not needed for every packet analysis, but it is a good way of familiarizing yourself with the various capabilities of Wireshark.


6. Maximize the Wireshark window.


The Wireshark window opens with the detailed information about the first packet captured, Frame 1, displayed in the middle pane. Use your mouse to drag the borders of any pane up or down to change its size.


o The top pane of the Wireshark window contains all of the packets that Wireshark has captured, in time order and provides a summary of the contents of the packet in a format close to English. Keep in mind that the content will be different depending upon where you capture packets in the network. Also remember that the “source” and “destination” is relative to where a packet is captured. This area of the Wireshark window will be referred to as the frame summary.


o The middle pane of the Wireshark window is used to display the packet structure and contents of fields within the packet. This area of the Wireshark window will be referred to as the frame detail.


o The bottom pane of the Wireshark window displays the byte data. All of the information in the packet is displayed in hexadecimal on the left and in decimal, in characters when possible, on the left. This can be a very useful feature, especially if passwords for which you are looking are unencrypted. This area of the Wireshark window will be referred to as the byte data.


Figure 5 Wireshark application window


How Does Wireshark Work?


Wireshark can be used in a variety of ways. The following figures illustrate the Wireshark Capture Environment. In the simplest terms, Wireshark is used to capture all packets to and from the IP Host on the left (a computer workstation) and the IP Host on the right (a server).


Figure 6 Wireshark capture environment


The most common configuration for Wireshark, and the configuration that we are running in this lab, has the software running on a local host.


Figure 7 Wireshark running on local host


javascript:popUp();

javascript:popUp();

javascript:popUp();

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Top Essay Tutor
Homework Guru
Best Coursework Help
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$77 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$80 Chat With Writer
Homework Guru

ONLINE

Homework Guru

Hi dear, I am ready to do your homework in a reasonable price and in a timely manner.

$77 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$75 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Breaking night summary discussion questions - Personal values clarification worksheet - Stats Assignment - - - Mid digital hair - Telepictures warner bros television - Threats of substitutes in the airline industry - Royal newcastle aero club - Discussion Topic - Evidence based practice powerpoint presentation - Physics lab report outline - Peer commentary - What is the net electric flux through the cylinder - Eating christmas in the kalahari article - Zombie corp has a profit margin - Tissue phantom ratio definition - Business - Social Innovation - Phil 347 crtitical thinking/ reasoning - English - Australia post collection authorisation form - Peter abelard sic et non pdf - Construction expert - The condition of learning - East egg new york - Tarasoff vs regents university california brief - Bishop martin primary school - Anz smart choice super financial hardship - VIOLENT CRIMES CJT202 ASSIGNMENT - Real life example of cd investment name or company - Corey 8 step ethical decision making model - Watt v hertfordshire cc - What is a fixed term contract in teaching - Blood Vessel, Blood Pressure, And Blood Components - E commerce solutions using iis architecture - 100 in standard form - Www uxbridgecollege ac uk moodle - Teaching kindergarten a developmentally appropriate approach - Coventry ac uk nova - Nessus plugin code invalid expired activation code - An electrician's side-cutting pliers could properly be used to - The college of will writing - Give me liberty eric foner second edition - Create an Annotated Bibliography - Wireshark guide for beginners - LAB Activity: Installing PostgreSQL and Querying Data - V2500 engine training manual - Negotiation skills for nurse leaders - A high temperature gas cooled nuclear reactor consists - Reading plus answers level e the shrinking penny - Chelsi griffin myrtle beach - X 2y 6 make y the subject - In the corn market demand often exceeds supply - The cremation of sam mcgee lyrics - White and mcburney goals of science - Full time equivalent formula excel - Susan beal hypothesized that _____ played a role in sids deaths. - Arkadin conference dial in numbers - Er diagram uml notation - Network Sniffing - Flow measuring apparatus lab report discussion - Hayes addressing model - How to antidifferentiate on cas - Three phases of systemic formulation - At what discount rate would you be indifferent between accepting the project and rejecting it? - Fifty in roman numerals - What is pop art facts - Importance of classroom management plan - A great place to work creating a healthy organizational climate - Zappos ceo tony hsieh leadership style - Kurth kiln scout loop - Planting caladium bulbs upside down - Half wave rectifier experiment readings - Reading Assignment - Paper follow up - 4 layers of diversity - Complex sentence with adjective clause examples - Which characteristics support an agile mis infrastructure - Internal factors of samsung - Fractions - Checking d4d injector values - Community Advocacy Agencies Resources - Groups in action evolution and challenges workbook answer key - Back titration caco3 hcl naoh - Cora unashamed full movie - Snhu acc 202 milestone 1 - Refutation Essay Guide READ CAREFULLY - Ant3451 - race and racism - Assignment 1 - Synthesis of ferrocene lab report - Use case diagram for pizza ordering system - Periodic sentence literary definition - Example of linear motion - Phet wave on a string answers - Marynet marymount university - ACC 305 Intermediate Accounting I - Jesus as a role model - Gaia cs umass edu wireshark labs - Who was W e b Dubois? - Océ north america inc - Assignment