TextBook:
Stuart McClure, Joel Scambray, George Kurtz, "Hacking Exposed 7: Network Security
Secrets & Solutions," McGraw-Hill, July 2012.
Reference:
1. Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source
Approach,” Chapter 8 Network Security, McGraw-Hill, Feb 2011.
2. William Stallings, “Cryptography and Network Security, 6th edition,” Prentice Hall,
March 2013.
2018/03/27 Homework #2 Chapter2&3
Due: 04/16 (Mon) in the e3 system
(format: problem, solution with explanation, screen dumps)
- (50 points) Select a target domain and use Nmap for the following tasks.
- host discovery on the selected domain,
- port scanning on a selected host,
- active stack fingerprinting on the selected host,
- version scanning on a selected port,
- vulnerability scanning on the selected port.
- (20 points) List and compare nmap-os-fingerprints used in Nmap and osprints.conf used in Siphon. Discuss how and why they differ.
- (20 points) List and compare nmap-services and nmap-service-probe. Discuss how and why they differ.
- (10 points) On a UNIX/Linux host, list /etc/inetd.conf. Discuss what services are being offered.
- (30 points) Select a target domain, run metaexploit with Nmap scans and import Nmap results into the database. Show found hosts and available ports.
- (30 points) Select a website to do banner grabbing with telnet, netcat, and grendel-scan, respectively. Show and compare their results.
- (20 points) Select a target domain to do automatic DNS enumeration by dnsenum to find subdomains, servers, and their IP addresses.
2018/03/27 Homework 1 (Total: 180)
Due: 04/09 (Mon) uploaded to NCTU E3 (https://dcpc.nctu.edu.tw/)
(format: problem, solution with explanation, screen dumps)
- (20 points) Select a web site.
- Use "Wget" or "Teleport Pro" to mirror the site. Look for comments within comment tags. Give screen dumps and explain what you found.
- Use "DirBuster" with a proxy feature through "privoxy" to enumerate hidden files and directories. Screen dump and explain the hidden files and directories you found.
- (20 points) Lookup "How I met your girlfriend" in the BlackHat 2010 demo to explain, in 0.5 page, how this was done.
- (20 points) Select a person. Use on-line sites for phone book, social network, information, job, photo management, business directory, jigsaw.com, etc. to summarize, with screen dumps and explanations, what information you can get. If your target is not in US nor native English speaker, you might need to use on-line sites different from the textbook.
- (20 points) Google "XYZ resume firewall" and "XYZ resume intrusion detection" where "XYZ" is the name of your target company. Screen dump "useful" results and explain what you got.
- (20 points) Lookup Archive.org and Google cached results, and select a target web site. Compare the differences between an archived and cached copy with its current on-line web site. Give screen dump and explain the differences.
- (20 points) Find Google Hacking Database at hackersforcharity.org/ghdb/. Summarize what it has and select 3 strings to search. Screen dump and explain what you got.
- (20 points) Select a web site. Start from whois.iana.org to find its registry, registrar, and registrant. Also select an IP address. Start from arin.net to find who owns the IP address. Show your screen dump and explain.
- (20 points) Select a domain name. Use nslookup to dump its DNS records. Show your screen dump and explain.
- (20 points) Select a domain name. Use traceroute or similar tools to find the access path to that domain. Show your screen dump and explain.
- (bonus: 40 points) Follow the case study right before chapter 1. Select one target and run through all tools (Tor, Vidalia, Privoxy, tor-resolve, proxychains, Nmap, socat, nc). Screen dump the process and explain what you got in your screen.
2018-03-27 Midterm exam
Midterm exam: 4/16 (Mon) 10:10-12:00, open book, coverage: ch8 of reference book and ch1-5 of textbook
2018/2/28 No class on March 5
No class on March 5 because the instructor attends an international conference. Make-up class will be added later on if necessary.