your exercise ilab 1 2 info event online
play

your exercise iLab 1+2 info event online Tell your friends! - PowerPoint PPT Presentation

The iLab Experience a blended learning hands-on course concept you set the focus Final Lecture Marc-Oliver Pahl, Jul 25, 2017 your exercise iLab 1+2 info event online Tell your friends!


  1. The iLab Experience a blended learning hands-on course concept you set the focus Final Lecture Marc-Oliver Pahl, Jul 25, 2017 your exercise

  2. iLab 1+2 info event online • Tell your friends! • https://www.net.in.tum.de/teaching/ws1718/ilab_information.html

  3. your exercise 25.4. Kick Off, Mini Labs, IPv6 - part I 1 2-3 mini labs IPv6 2.5. IPv6 - part II, Mini Lab Lectures 2 9.5. MiniLabs, BGP 3 Your Exercise Mad Brainstorming 16.5. BGP 4 Advanced Wireless Playground YE Topic Presentation and Voting, Advanced WL 23.5. 5 Modern Cryptography 30.5. World-Wide-Web Security Holes 6 SEC 8.6. DIY1 - Smart Space HW 7 S2O 1 13.6. DIY2 - Smart Space SW 8 S2O 2 20.6. YE Didactics and Techniques 9 27.6. 10 YE 1st Lecture 4.7. 11 Giving good Feedback Your Exercise (11.7.) 12 summer term 2017 18.7. YE Review Presentation 13 25.7. YE Final Presentation, Wrap-Up 14 15

  4. Introductory Lecture didactic concept | authoring tutorial | topic selection | assignment review teams ~2h * ~30-35h Team Prepares Exercise slides for talk | prelab | lab | slides | tutor support Internal Tests ~2h First Lecture Presentation Student Run presentation | feedback | quality alignment Revision ~20-25h Review Feedback review another team ~2h Received Feedback Pres. presentation | feedback | quality alignment Revising new lab ~20-25h updating learning material Somehow “Stable” Final Presentation ~2h how is it now | what did you change/ learn | your take home?

  5. wikimedia: Biser Todorov I give you some tools and experience

  6. Learn from each other…

  7. Topic Brainstorming Result May 16, 2017

  8. Topic Voting Event May 23, 2017

  9. 2017-07-04 First Lecture - What was good? What could be improved?

  10. 2017-07-04 Giving Feedback - What do you know about Feedback?

  11. 2017-07-04 Giving Feedback - What are your open Challenges?

  12. 2017-07-18 Review Reporting - What are your main Points for PreLab, Lab, and other aspects?

  13. Expected Artefacts Deadline • your exercise X • Week -5: • 2 slide decks for your two • Prepare your 2x3 min talks topic presentations (each talks one topic!) 22.5. • Week -4: • • Plan the structure and content of your lab, prelab, and lecture. Creation of Lecture, PreLab, Lab 19.6. • Week 1: • • Lecture Preparation (most relevant concepts?) • Prelab Preparation (detailing the lecture content + tools + more) X • Slide deck lecture (2 talk!) • Practical Part Lab Preparation (no cooking recipe) 26.6. • Week 2+3: X • Ready PreLab, Lab • Work on your content. 11.7. • Week 4: X • Review report • Review other team • Get reviewed by other team X • Slide on review feedback & • Start improving based on the feedback peer grading planned improvements 18.7. • Week 5: X • Final lecture slides • Improve your exercise based on the feedback Revision X • Final PreLab, Lab, Peer Grade 25.7. • Week 6: • Finish your lab and the review reports. 30.7. Marc-Oliver Pahl 2017

  14. The Peer Review You will grade your reviewed team. http://www.utahcompose.com/sites/utahwrite/files/peer%20review%20kids.jpg

  15. you set the focus Your Final Lecture 15 (+1) Minutes The iLab Experience a blended learning hands-on course concept

  16. You make it interesting… Flickr:nist6dh

  17. Order of Presentations Team Topic 201 Email spoofing 202 War Rooms! 203 Hiding in plain sight

  18. create your own exercise Armin Baur & Moritz Kellermann EMAIL SPOOFING MY BANK NEEDS MY PASSWORD 1

  19. Motivation • Email Spoofing – My Bank needs my Password • Sender email address can be spoofed easily – People trust the sender address – Spam can be send on behalf of others • Messages can be manipulated 2

  20. SMTP • Simple Mail Transfer Protocol ( SMTP ) • First RFC published August 1982 • Original design of SMTP has no facility to authenticate sender 3

  21. SMTP MUA Mail User Agent MSA Mail Submission Agent MTA Mail Transmission Agent MDA Mail Delivery Agent 4

  22. Email Header 5

  23. Security Mechanisms • Sender Policy Framework ( SPF ) • DomainKeys Identifed Mail ( DKIM ) • Domain-based Message Authentication, Reporting and Conformance ( DMARC ) 6

  24. SPF CC BY-SA 2.5: openspf.org • Checks that incoming mail from a domain comes from a host authorized by that domain • Authorizes hosts by IP addresses via DNS – TXT Resource Record – SPF Resource Record (obsolete) source.tld TXT = "v=spf1 ip4:192.0.2.0/24 mx a –all" 7

  25. Spoofing MTA ( Return-Path ) 8

  26. SPF 9

  27. DKIM • Cryptographic signing of outgoing email • Prevents email manipulation • Public key is published via DNS – TXT Resource Record unknown._domainkey. source.tld TXT = "DKIM1; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDeo/3jmZJii2wKBBpCiE 10

  28. DMARC CC BY 3.0 : dmarc.org • Prevents spoofing of email addresses • Requests reports about spoofed email • Publishes the DKIM signing policy of a domain – TXT Resource Record _dmarc. source.tld TXT = "v=DMARC1; p=reject;" 11

  29. Spoofing Sender Email ( From ) 12

  30. DMARC/DKIM 13

  31. Lab • Analysing email headers • Spoofing MTA host address • Spoofing email address • Configure SPF , DKIM and DMARC 14

  32. Teaser Practical Part (DNS) Switch Eve (MTA) Alice Bob (MTA + (MTA + MDA) MDA) 15

  33. Order of Presentations Team Topic 201 Email spoofing 202 War Rooms! 203 Hiding in plain sight

  34. create your own Andreas Janiak and Donika Mirdita exercise WAR ROOMS! 1

  35. What is War Rooms? Is inspired from the game over the wire, and was meant to learn and practice security concepts within a secure environment. The name was derived from the rooms = current pc and the battle against the system to win the victory file. http://overthewire.org 2

  36. Motivation • Be comfortable working with the command line • Know how to debug and explore – Incomplete knowledge of networks – Handle unknown environments • Learn to use new tools • Improve skills with the old tools 3

  37. Lecture Overview 1.IPv4/IPv6 Recap 2.Systemd-Networkd deamon 3.Linux tools 4.OverTheWire Demo 4

  38. IPv4/IPv6 Recap Networks need to be able to interact with a variety of host configurations: • IPv4 and IPv6 compatibility • Dual Stack IPv4/IPv6 support • Gateway and Broadcast addresses • Routing for the Internet 5

  39. Introduction to Systemd Linux service and system manager. • Runs as PID 1; starts the rest of the system • Enables control over daemons • Built-in daemons for logging and system configuration https://wiki.archlinux.org/index.php/systemd 6

  40. Systemd Tools 1.Systemctl - manager for systemd 2.Journalctl - logging system 3.Systemd-networkd - network manager 4.Hostnamectl - system hostname manager 5.Services - Service Unit Configuration https://www.freedesktop.org/software/systemd/man/ 7

  41. Linux tools • ssh, sshpass → secure shell • find → search data • grep → searches content • | → pipelines • nmap → network discovery and security tool 8

  42. Over the wire demo Demo... 9

  43. Teaser Practical Part 6 1 2 4 3 5 10

  44. Order of Presentations Team Topic 201 Email spoofing 202 War Rooms! 203 Hiding in plain sight

  45. https://www.youtube.com/watch?v=4vlu8ld68fc https://www.youtube.com/watch?v=4vIu8ld68fc

  46. reate your own exercise Yoav Schneider Hiding in plain sight 2

  47. Covert Channels  De%nition  How to encode and decode data  Examples  Detection and Prevention 3

  48. Covert Channels „In computer security, a covert channel is a type of computer security attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy” https://en.wikipedia.org/wiki/Covert_channel 4

  49. Scenario  Leak Data  Control computers in a botnet  Distribute Malware 5

  50. „The Medium is the Message”  Protokol  Data  Timing  Physical  Fan speed  Blinking leds Marshall McLuhan, 1964 6 Source : https://en.wikipedia.org/wiki/File:Marshall_McLuhan.jpg

  51. „The Medium is the Message”  Protokol  Data  Timing  Physical  Fan speed  Blinking leds Source : https://en.wikipedia.org/wiki/File:Marshall_McLuhan.jpg 7

  52. „The Medium is the Message”  Protokol  Data  Timing  Physical  Fan speed  Blinking leds 8

  53. „The Medium is the Message”  Protokol  Data  Timing  Physical  Fan speed  Blinking leds Source (left) : https://en.wikipedia.org/wiki/File:Benjamin_Franklin2_1895_Issue-1c.jpg Source (right): own work using: http://manytools.org/hacker-tools/steganography-encode-text-into-image/go 9

  54. „The Medium is the Message”  Printer Watermarks Source : https://pixabay.com/p-161063/?no_redirect 10

  55. „The Medium is the Message”  Protokol Source : https://en.wikipedia.org/wiki/Transmission_Control_Protocol 11

  56. „The Medium is the Message”  Example: Send “0x12345678” using the source port 0x1234 Source : https://en.wikipedia.org/wiki/Transmission_Control_Protocol 12

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend