100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Samenvatting

Lab on Offensive Computer Security (2IC80) Summary Q4 2021

Beoordeling
-
Verkocht
6
Pagina's
22
Geüpload op
20-06-2021
Geschreven in
2020/2021

EN: Lab on Offensive Computer Security (2IC80) is a course taught at Eindhoven University of Technology. It is an elective course part of the package Security for CSE, which is meant for Bachelor Computer Science and Engineering students. The course is given in the fourth quartile of the second or third year. Lab on Offensive Computer Security discusses the OSI model and its layers, (exploitation of) vulnerabilites, social engineering, malware and more. ---- NL: Lab on Offensive Computer Security (2IC80)) is een vak die wordt gegeven op de Technische Universiteit Eindhoven. Het is een keuzevak deel van het pakket Security for CSE, dat bedoelt is voor Bachelor Computer Science and Engineering studenten. Het vak wordt gegeven in het vierde kwartiel van het tweede of derde jaar. Lab on Offensive Computer Security bespreekt het OSI model en zijn lagen, (het gebruiken van) vulnerabilities, social engineering, malware, en meer.

Meer zien Lees minder










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Documentinformatie

Geüpload op
20 juni 2021
Aantal pagina's
22
Geschreven in
2020/2021
Type
Samenvatting

Onderwerpen

Voorbeeld van de inhoud

Lab on Offensive Computer Security (2IC80)
Summary Q4 2021
Lectures 1 to 5 are about Network Security. Lecture 6 to 12 are about System Security.

Contents
L1 – Intro + foundations ................................................................................................................................ 2
L2 – Data Link and Network Layers .............................................................................................................. 3
L3 – Transport layer ..................................................................................................................................... 5
L4 – Application Layer .................................................................................................................................. 7
L5 – Network reconnaissance....................................................................................................................... 9
L6 – Vulnerabilities ..................................................................................................................................... 11
L7 – Vulnerability and exploit ecosystem .................................................................................................... 13
L9 – Hacking a human ................................................................................................................................ 15
L10 – Web vulnerabilities............................................................................................................................ 16
L11 – Malware ............................................................................................................................................ 18
L12 – Malware Distribution Networks.......................................................................................................... 19
Labs 0 – 5................................................................................................................................................... 21
Challenges – OSINT and Forensincs.......................................................................................................... 22
OSINT challenge..................................................................................................................................... 22
Forensincs challenge .............................................................................................................................. 22




1
Lab on Offensive Computer Security (2IC80) Summary Q4 2021 by Isabel Rutten

,L1 – Intro + foundations
Computer security is about preserving security / maintaining already established security properties. All a
computer system is about information. Security properties: confidentiality (only read by those allowed),
integrity (correct), availability (reachable). There are both human and automated users. Computer systems
do not know what they are doing and can only be instructed to preserve the security properties of that
information by means of some mechanism. The core idea of computer security is to instruct and trust a
computer system not to compromise the security properties of the information itself manages. The user
trusts the authentication mechanism, but is this trust funded?
The source code is high level code written by a human programmer. This is not executable by a computer
and must first be compiled i.e. translated in assembly code. Assembly code is the lowest level at which
humans operate. This can then be directly translated in machine code by the assembler. For example, a
compiler is written in C and is compiled by a previous version of itself: it takes one generation to add a
“backdoor’ that will automatically be included in the code with the next compiler (i.e. 11 (ASCII for |) => \v).
Chicken or egg problem: can increase trust in software by looking at source code, but who generated
that? Human who wrote code? Compiler? Human who wrote compiler? Etc. Thompson’s view: The
compiler can be modified in any way to include code that never appears in the source code. Don’t trust!
From Client (web browser) to a Server (website), the data needs to cross many routers/servers. The
problem is whether all these nodes can be trusted. Possible attack scenarios:




Attack models:
- outright malicious attacker: typically reads or modifies some information (in part or fully)
- honest-but-curious attacker: use the client’s information after correctly handling the service, resides at
service level e.g. server provides agreed service but uses given data to perform user profiling




2
Lab on Offensive Computer Security (2IC80) Summary Q4 2021 by Isabel Rutten

, L2 – Data Link and Network Layers
Internet is made of several Autonomous Systems (AS) which are logically separated networks. Each AS
autonomously manages communications within itself using Interior Gateway Protocols (IGP). Each AS
can communicate to other ASs using Exterior Gateways Protocols and Border Gateway Protocol.
The OSI model means that a “network” packet is really composed of several layers which are transmitted
“stacked” on top of the other. L1: bits. L2: frame. L3: packet/datagram. L4: segment. L5-L7: mapping.




Data link layer (L2): lowest logical level, interconnects physical interfaces. Two sub layers:
- Logical Link Control (LLC): error control physical layer
- Media Access Control (MAC): physical addressing, scheduling
Each physical interface is uniquely identified by a MAC address (“Ethernet address”) which are 48-bit
Network interface identifiers with HEX notation. First 24 bits are set by IEEE standard. You can identify the
network interface producer/vendor in the MAC. The MAC is used to route packets in local networks.
Network layer (L3): provides information on how to reach other systems (addressing) and uses IP: high-
level representation of a host’s addresses, dynamically assigned by an authority. The IP is used to route
datagrams. IP provides a structured way to abstract host addresses away from their physical attributes
which makes it possible to efficiently talk between systems in different networks/not in proximity. Two
version: IPv4 (most common, 32 bits), IPv6 (new, 128 bits). Routing with IP addresses is done by querying
the nearest router about the destination of an IP packet and them forwarding the question to the next router
until an answer is found and returned.
ARP protocol (Address Resolution Protocol) allows systems to associate an IP address to a MAC address
by using ARP tables which contains the necessary info. All addresses in an ARP table are added by one of
two mechanisms: ARP request-reply (who is <requested IP> tell <sender IP>. <requested IP> is at <MAC
address>), Gratuitous ARP (<requested IP> is at <MAC>). The discovery process happens through
queries to neighbor devices. The system with the requested IP replies back with its correct MAC address.
ARP frame header contains the header OPERATION where 1 = request, 2 = reply. ARP answers or
Gratuitous ARP frames do not require an (additional) answer/confirmation (declarative protocol). Nodes are
not authenticated. Thus ARP poisoning can occur: C can tell A “B is at <C MAC address>” and can tell B
“A is at <C MAC address>”. This works only on local networks and because systems are not authenticated.
Subnets are logical divisions of IP addresses, so we can split a network into multiple sub-networks. IP bits
are divided in x network bits, y subnet bits and z host bits. Subnet mask indicates sections of IP addresses
meant for network + subnet. CIDR (Classless Inter-Domain Routing) is a synthetic way to represent subnet
masks and indicate number of bits covered by the mask.
Example: See table below. IP address: 132.134.15.96. Network mask: 255.255.0.0 (prefix length of 6, so to
get nr of bits covered by the mask 6*8/3=16. To prefix length, calculate 16*3/8=6).
CIDR representation: 132.134.15.96/16. Nr of hosts: 2^16 = 65536-1.




3
Lab on Offensive Computer Security (2IC80) Summary Q4 2021 by Isabel Rutten

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
IsabelRutten Technische Universiteit Eindhoven
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
97
Lid sinds
5 jaar
Aantal volgers
66
Documenten
21
Laatst verkocht
2 maanden geleden
Summaries for Computer Science, Industrial Engineering, and ICT in Business

If you have any questions about the summaries or other study-related topics, you can always send me a message on this platform. For a cheaper price, you can also message me privately: I only receive 40% of the price you pay on this platform. I hope that these summaries help you advance your studies!

4,4

12 beoordelingen

5
9
4
1
3
1
2
0
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen