Sunday, October 25, 2009

13th October 2009

I think that today's lab is the most attractive lab for me because Mr. Zaki is going to teach us how to hack a wireless password of a modem. We need wireless NIC (USB) and a software called backtrack or backtrack 2, 3 and 4.

First of all, Mr. Zaki ask us to find out a network called D-Linkvia wireless through our pc and connect it and the password give is '1a2b3c4d'. We using command prompt to login with the username is 'root' and the password is 'toor'. While for the backtrack, Mr. Zaki gave us a link and ask us to download from the website, the link given is www.remote-exploit.org/backtrack.html. Then we have to confirm whether the wireless card has been switch on and we start to check it out with command prompt. Type 'ipconfig' to know whether the network card can be used then type 'iwconfig' to know whether the wireless network card can be used.

According to Mr. Zaki, real key is set on wireless access point, 24 key is given by the IV and 40 key is given by ourselves. Next if want to switch on the rausb 0, then type 'ipconfig rausb0 up' in the command prompt to switch it on. Then a problem comes again, how to get to know whether it has been switch on? The answer is type 'ipconfig' again, then type 'iwconfig rausb0 mode monitor' following by 'iwconfig' nad we will see the 'Mode: Monitor'. After that, start the backtrack and plugin USB.

There are a lot of backtrack tool can get to hack computer. One of the way is type 'kismet' to scan the wireless. By doing that we can find all the information of D-Link. 's' is for sorting while 'b' is to sort according to BSSID. We need an encryption key here. Then we press 'q' to reach to Network List screen. Use airodump to cache the packet and save it in some path. Type 'airodump-ng --ivs -w output-abg rausb0' where the 'output' is the filename and rausb0 is the wireless network card.

After that, we need to type 'aireplay-ng -3 -b 00:1E:58:FB:57:ED -h 00:22:6B:A9:59:AF -x 1024 rausb0' where the first address is the MAC address, and the second address is local MAC address. While we do send a lot of packet to the network, it will send back some response too as feedback. We need to know how many IDs have cached. But don't worry, because Mr. Zaki mention that we can get the password even with a few of IDs have cached. Next, Type 'aircrack-ng -0 -n 64 -f 4 output-06.ivs' where 'output' is the file name, this command is to used to get the password.

Well, seems like we already reach our target today because we learnt the way to hack password and Mr. Zaki ask we not to use it on wrong way but what i feel the deepest is that I'm success learn what I want along this time.

Saturday, October 24, 2009

Lecture, 12th October 2009
Law and ethics, this is today's lecture title. Please don't doubt on the title, this is really cover in our Information Security's topic. Law is a rule of conduct prescribed or formally recognized as binding or enforced by a controlling authority and implies imposition by a sovereign authority and the obligation of obedience on the part of all subject to that authority. There are several categories of law like civil law, criminal law, tort law. Law can divide into private law which is law that regulate in some organization and public law which is regulating by the structure and administration of government. While for ethic, its definition is a set of moral principle or values, the principles of conduct governing an individual or a group, and an objectively defined standard of rights and wrong.
Well, ethics are always related to information security by several concepts which are differences across cultures, software license infringement, illicit use misuse of corporate resources and education. It is necessary to protect our data and programs so there are some laws regulate. Copyright, patents and trade secret are the methods. Since the copyright protection not only for the licensed program but also for open source program so the developer of an open source program can sue the one who sold his product without permission.
We should maintain the good ethics and obey the laws to reduce the IT criminal in order to produce a fair environment for the benefit among organization and among individual.

Lecture, 5th October 2009
Wireless security is the title of today's lecture. There are four types of wireless LANs which are 802.11, 802.11b, 802.11a, and 802.11g. Mr. Zaki said that 802.11g is is the most good features among in the wireless types, it support up to 54 Mbps in 2.4GHz range. The 802.11g contains 3 non-overlapping channels.
The standard wireless is Open System Authentication. An access point can broadcast their SSID (Service Set Identifier). SSID needed when a station need to access an access point. Access Control List (ACL) is a list that allowed MAC addresses but this is no good to access a station with this method because MAC address is sniffable and spoof able.
There are three basic security services define by IEEE for the WLAN environment which are Authentication, Integrity, and confidentially but 802.11b only provided authentication and encryption for security service. All the security provided can be attack by using some tools like Wepcrack or Airsnort. Therefore after that, WPA is used to fixes WEP’s problem but still this can be attack with using pre-shared key mode or Denial of service attack.

Lab, 29th September 2009

Unfortunately, we cannot have our lecture on time, the lecture was cancel because of the electric power blows off and the result is we change our lecture class to the Tuesday lab.

Then when in the lab session, our title for that is Security in Application. Email is the part will always involved in the application. There are five types of security provided in email which are 'Confidentiality', 'Data origin authentication', 'Message-repudiation of origin' and 'Key management'.

There are two main groups of Email security threat, so it is very unsecure when we using email. The less of confidentiality, integrity, lack of data authentication, lack of non-repudiation and lack of notification of receipt are the main causes of unsecure way to use email. There got a lot of example of threat, and one of them is spamming. Spamming will cause the bandwidth wasted and decrease productivity. So that, encryption play an important role to ensure security when we send the email. S/MIME and PGP are the two main encrypt function for confidentiality and signature for non-repudiation.

Mr. Zaki also taught us about SSL/TLS, SSH, and SET. E-commerce like electronic banking is always secure by SSL/TLS while SET is an open encryption and security specification designed to protect credit card transaction on the internet.

Biometric is the measurement and statistical analysis of biological data. It is use the unique for each person to identify a person for example finger print, ear and etc. There are dynamic and static biometric. Static is authentication based on a feature that is always present while dynamic is based on a certain behavior pattern. Finger print recognition, retinal scan, iris scan and hand geometry are static biometric while signature recognition, speaker recognition, and keystroke dynamics are the dynamic biometric.

Lab, 15th September 2009
Security in Network, this is what consisted in lab 7. There are two tasks for us to complete in this lab. Of course without explanation of Mr. Zaki we wouldn’t able to understand what we going to doing in this lab. Mr. Zaki has briefly describes on how to perform lab task when we start our lab which involved two tasks.
During the lab, we need to install software in virtual machine and create two virtual machine which are winserv03_server and winserv03_client. The window server needs to install Wireshark. Firstly, our task is to capturing File Transfer Protocol (FTP) username and password. So through Wireshark we can easily see the password and username that used FTP. It has proved that the FTP is unsecure to use.
The client and server OS need to check whether the Internet Information Services (IIS) and the FTP server have been installed. After that we have to activate them then we have to type several commands which are 'ftp', 'open', 'ip address of the server OS', 'username', 'password' and 'bye'. We can capture the packet transfer by opening the Wireshark. Because of that, the username and password of the administrator are revealing.
IPSec introduce in this lab so cover the disadvantages of FTP transmission. It provide two basic mode transport and tunnel mode. After I use the IPSec I feel that this is more secure because it is support with authentication and confidentiality.

Monday, October 19, 2009

Lecture, 14th September 2009
What a normal lecture again on Monday. Mr. Zaki conducted the lecture 6 for information security BITS 3423 in lecture room of 11. Today's lecture title is Security in Network.
Mr. Zaki has started the lecture with some introduction about this lecture. I felt that I can't concentrate in this lecture, maybe that's because I have many assignments to do recently and that makes me always can't sleep well at night. According to Mr. Zaki, hacker, spy, student, businessman, ex-employee, stockbroker and terrorist are the people who will cause security problem. Three types of hackers white hacker, grey hacker and black hacker which have different characteristic are available on the network system. The hacking phase is started with reconnaissance, scanning, gaining, maintaining access and covering tracks. Threats in network includes security exposures, impersonating, eavesdropping, denial for service, packet replay and packet modification while network security control includes encryption, strong authentication, Kerberos, Honeypot, and firewalls. Mr. Zaki continues on explaining the more details about the types of encryption which involved the layer 6 or 7 in the OSI model. Other than that, he also mentioned about the SSL (Secure Sockets Layer) encryption.
After that, everything seems like under prediction, Mr. Zaki continue explained and give examples for the Kerberos, Honeypot and firewalls. The lecture is ended on time today, no additional question from us. I think the other students also worry busy for their other assignments and it’s normal because we already pass our mid SEM. We are now busy for the final projects.

Lab, 25th August 2009
This is a lab that aims to install MySQL front and server for practical. We just follow Mr. Zaki's instructions to do this lab. At first, I can't install it because there are some errors before i proceed to the finish step. We asked Mr. Zaki to check out what's the problem. He found that got another people install it with another password so he taught us to type it in command prompt set password for root@localhost = old password ('abc123') to reset the password.
The next step is we have to use the SQL front to create a table and scheme that required in lab section. We have to set privilege for the database by choose the user account control at the top menu bar to set it. We learned the way to prevent potentially aggregate by accessing the data items individually. The steps are a bit complicate and we are confused sometime.
This is a quite short period lab, we felt happy because we can end our lab earlier.