The lecture is MONDAY - not tuesday
04 December 2019
16-19 in U170
The lecture is MONDAY - not tuesday
This is the last week of classes, and in this lecture we will wrap up everything.
We will start with covering WiFi security, which we will extend a bit beyond the book, which does not cover WPA2 in depth. We will also study the KRACK vulnerabilities which targets WIFI.
Then, we will take a look at a few tools and methods for penetration testing/ethical hacking and security monitoring. This will include tools for
Staying anonymous/hidden (Proxies, MAC address changer)
Password cracking
DoS options
Exploiting using Metaspoit
Security testing with Owasp Zap
Please consider if something could be improved in the course. This year, there is no official evaluation, but I’m always open to ideas and opinions, that can improve the experience. You are encouraged to email sugguestions to me.
If there is time left, we will do a bit more pen-testing (either the last assignment), or for those that have handed it in, a different application.
If you have a preferred timeslot or day for the exam, you can signup for this at the class. If you do not sign up, I will assign one of the days. The official list will come from the secretary through blackboard.
Friday December 13th. 12-14 in U24 or 14-16 in U146
Preparation:
Watch the video from the KRACK attack website.
Prepare a list of 10-15 keywords for the exam question: Mobility, Wireless networks and Wireless security.
Select one of the topics from this list, and prepare to give a 10 min. presentation to the class on the topic:
Functionality and interfaces for the application layer of the TCP/IP model and the functionality of DNS
Functionality and interfaces for the transport layer of the TCP/IP model and the difference between UDP and TCP
Functionality and interfaces for the network layer of the TCP/IP model with focus on the data plane.
Functionality and interfaces for the network layer of the TCP/IP model with focus on the control plane.
Functionality and interfaces for the link layer of the TCP/IP model, including error detection and correction
Symmetric and public key crypography, Key distribution and User authentication
Security: Transport- and Network-layer security
Security: Firewalls, intrusion detection
Mobility, Wireless networks and Wireless security
Penetration Testing: Planning and Methods
In class:
Use the first part of class to work on this exercise and discuss the content of your keyword lists, and consider possible alternatives.
P24 - Streaming encryption, and IV
from Chapter 8 in the textbook.
Use the second part of the class to give and see a few presentations that you have prepared at home.
This is You that should make the presentations, the TA will not step in and do them for You!
Chapter 8.8