Network and Mobile Security

This course offers a set of hands-on exercises (labs) that covers a spectrum of security topics such as network and mobile security.

START:
July 1, 2019
DURATION:
5 Days
ID:
1065
CREDITS:
2
FEE:
PES Participants:
Rs. 5,000
Non-PES Participants:
Rs. 10,000

INSTRUCTORS:

Prasad B Honnavali
Professor
Sivaraman E
Assistant Professor

Address

Crucible of Continuing Education (CCE)
PES University Campus
100 Feet Ring Road, BSK III Stage
Bengaluru – 560 085   View map

About the Course


This course offers a set of hands-on exercises (labs) that covers a spectrum of security topics such as network and mobile security.

Course Objectives(What will you learn)

Through a series of hands-on exercises, the student will learn the practical aspects of Network Security. By doing the exercises and labs, students will learn how to

  • Sniff and spoof a packet;
  • Various attacks on TCP protocol;
  • Configure a firewall in Linux and bypass the firewall using VPN;
  • Various attacks on DNS including local and remote DNS cache poisoning;
  • VPN labs to show how VPN works;
  • Heartbleed attacks
  • Android repackaging, rooting and clickjacking attacks

The details are in the course schedule.

Who should attend

B.Tech (6th Semester & above), M.Tech & MCA having exposure to Computer Networks and Network Security Concepts.

Out station students / candidates have to make their arrangements for accommodation and boarding

Course Outline and schedule


Day-01


Welcome Address & Introduction to the Course

Session 1 (8.30 to 10.30 AM)

  • Introduction to Network Security
  •  Introduction to Sniffing and Spoofing
  • Comparison of Packet Sniffing (Snooping) and Spoofing
  • Session Hijacking
  • Counter measures of Attacks
  • Sniffing and Spoofing Tools

Session 2 (11 to 12.30 PM)

  • Hands on Demo by Faculty on How to Use VirtualBox to Run SEED Ubuntu VM (Lab Environment Set Up)
  • VM Configuration
  • Taking Snapshots of VM

Session 3 (1.30 to 4 PM)

Lab 1: Packet Sniffing and Spoofing Lab

Task Set 1: Using Tools to Sniff and Spoof Packets
Task 1.1: Sniffing Packets
Task 1.2: Spoofing ICMP Packets
Task 1.3: Traceroute
Task 1.4: Sniffing and-then Spoofing

Task Set 2: Writing Programs to Sniff and Spoof Packets
Task 2.1 Writing Packet Sniffing Program – Writing Filters, Sniffing Passwords
Task 2.2 Spoofing – Writing a Spoofing Program, Spoof an ICMP Echo Request
Task 2.3 Sniff and then Spoof

Day-02


Quiz

Session 1 (8.30 to 10.30 AM)

  • TCP/IP Attacks
  • SYN Flooding Attack
  • TCP Session Hijacking
  • Introduction to Firewall
  • How Firewall works
  • Implementing a Simple Personal Firewall for Linux
  • Web Proxy (Application Firewall)
  • URL Rewriting/Redirection
  • How VPN works
  • Bypassing Firewalls using VPN

Session 2 (11 to 12.30 PM)

Lab 2: TCP Attack Lab

Task 1: SYN Flooding Attack
Task 2: TCP RST Attacks on telnet and ssh Connections
Task 3: TCP RST Attacks on Video Streaming Applications
Task 4: TCP Session Hijacking
Task 5: Creating Reverse Shell using TCP Session Hijacking

Session 3 (1.30 to 4 PM)

Lab 3: Linux Firewall Exploration

Lab Environment Set Up
Task 1: Using Firewall
Task 2: How Firewall Works
Task 3: Evading Egress Filtering
Task 4: Evading Ingress Filtering

Lab 4: Firewall Evasion Lab: Bypassing Firewalls using VPN

Task 1: Environment Set Up
Task 2: Set Up the Firewall using ufw in VM1
Task 3: Run VPN Server – Run VPN Client – Set Up Routing – Set Up NAT on Server VM – Test Firewall Bypass using VPN

Day-03


Quiz

Session 1 (8.30 to 10.30 AM)

  • Introduction to DNS
  • DNS Client
  • Malicious DNS Server
  • Local DNS Cache Poisoning Attack
  • Remote DNS Cache Poisoning Attack
  • Heartbleed Bug
  • OpenSSL ‘Heartbleed’ vulnerability

Session 2 (11 to 12.30 PM)

Lab 5: Local DNS Attack Lab

Task Set 1: Setting Up a Local DNS Server
Configure the User Machine & Set Up a Local DNS Server; Host a Zone in the Local DNS Server.Attack on DNS
Task 4: Modifying the Host File
Task 5: Directly Spoofing Response to User
Task 6: DNS Cache Poisoning Attack
Task 7: DNS Cache Poisoning: Targeting the Authority Section

Lab 6: Remote DNS Cache Poisoning Attack Lab

Task 1: Remote Cache Poisoning (The Kaminsky Attack)
Spoofing DNS Request
Spoofing DNS Replies
Task 2: Result Verification

Session 3 (1.30 to 4 PM)

Lab 7: Heartbleed Attack Lab

Lab Environment (SEED Ubuntu 12.04VM)
Configure the DNS Server for Attacker Machine
Task 1: Explore the damage of the Heartbleed Attack
Task 2: Investigate the Fundamental Cause of the Heartbleed Attack
Task 3: Countermeasure and Bug Fix

Day-04


Quiz

Session 1 (8.30 to 10.30 AM)

  • MITM Attacks
  • How MITM works
  • Introduction to Mobile Security
  • Attack Vectors
  • Mobile Security – Android OS
  • Android Repackaging Attack

Session 2 (11 to 12.30 PM)

Lab 8: Man-In-The-Middle-Attack

Lab Environment
Task 1: MITM Proxy Set Up
Task 2: Client Set Up – Installing MITM Proxy Certificate in Client
Task 3: Intercept HTTP Traffic & HTTPS Traffic
Task 4: Hosting HTTPS Application on Lab’s Website
Task 5: Explore Public Key Pinning in Android Apps

Session 3 (1.30 to 4 PM)

Lab 9: Android Repackaging Attack Lab

Task 1: Obtain an Android App (APK File)
Task 2: Disassemble Android App
Task 3: Inject Malicious Code
Task 4: Repack Android App with Malicious Code – Rebuild APK, Sign the APK File
Task 5: Install and Change Time
Task 6: Stealing Location Information

Day-05


Quiz

Session 1 (8.30 to 10.30 AM)

  • Android Rooting
  • Build & Run the OTA Package
  • Injecting Malicious Code
  • Construct and Transfer OTA Package

Session 2 (11 to 12.30 PM)

Lab 10: Android Device Rooting Lab

Task 1: Build a Simple OTA Package – Write the Update Script – Build & Run the OTA Package
Task 2: Inject Code via app_process
Task 3: Implement SimpleSU for Getting Root Shell – Compile the Code – Construct OTA Package – Transfer the OTA Package and Execute it

Session 3 (1.30 to 4 PM)

Evaluation and Assessment


Share this page


TOP