Question 1. Analysis of Protocols with Wireshark
Question 1. Analysis of Protocols with Wireshark
a) netcat file netcat.pcap file b) Message Sequence Diagram
c) Information
Information
Value
Packets
MAC address of the client
08:00:27:9a:13:80
3
IP Address of the server
192.168.2.21
3
Flags for 1st TCP segment containing data
0x00000002
3
Length of data for 2nd TCP segment containing data
74
4
Absolute sequence number of 1st TCP segment sent by server that contains data
1
16 Question 2. Web Application Attacks
a) SQL injection
SQL injection is a common type of attack which use malicious code for the back end database. The attacker enters some malicious code into the database to view the data or perform some illegal operation for changing data into the database. A successful SQL injection attack can view all user information or an organization private data.
b) Prevention of SQL injection
SQL injection can be prevented in many ways. Parameterized query is one of the most efficient option or approach for preventing the SQL injection attack. In this approach the database designer defines all SQL code first and then pass it in required parameter later with the query. This process allows the database to understand the difference between the SQL code and user input. Another way to prevent the SQL injection attack which is user input validation. Another way to prevent the SQL injection attack which is user input validation. In this process database will not take un-validate data from the user.
c) Weakness of MyUni website
The SQL injection attack is successful in the MyUni website because the data validation is not given in the SQL code. In the time of login, the system stores the user ID as $currentid in query.php page. It is carried in the next page automatically which is view.php. Therefore, the user can not view or enter other student id in the id section. But the user can enter different type of course in the course section because the SQL query want some user input to perform this operation. Here, the malicious user performs the SQL injection attack in the course id section by using 1=1 which is always true.
SQL code is $query = “SELECT * FROM coursegrades WHERE studentid = ‘$id’ AND coursecode = ‘$course’ ORDER BY studentid”;
d) Perform Attack
The attacker performs the SQL injection attack in the course id section by using 1=1 along with the course id.
e) Attack screenshot
f) Information gain from the attack
The attacker can view all student grades by performing this attack.
Question 2. Web Application Attacks
g) Attack success screenshot
h) prevent the attacker
To prevent the attacker, the escape functionality will be used. The bellow code need to use for preventing the attack.$course = mysqli_real_escape_string($con, $_POST[‘course’]);
Question 3. Cryptography Concepts a) how symmetric key encryption work
In symmetric key encryption a secret key is used in both side (sender and receiver). A secret key is generated and the file are encrypting with this secret key. In the time of decryption this same secret key is used by the receiver. In this process all files and disks are encrypted.
b) Full disk encryption and file level encryption
Full disk encryption is a process where an entire drive and its data will be encrypted. All of this data is in inaccessible mode. To access this data, the user, need to decrypt this is first. But in the time of decryption the user need the secret key which is used to encrypt this.
File level encryption all file can be encrypt like full disk encryption but it has a special functionality which is provide access of data to a specific user. This type of encryption is used in operation and offline. Its offer role base access. Its provide access control mechanism.
The file level encryption is the best solution for this organization because this organization is an operational organization where they are dealing with their client. Every time they are dealing they need to access the file server. File level encryption will provide an access control encryption functionality which is the best solution for this organization.
c) Security Ramifications Backing up the file server into the cloud can cause many security ramifications. One of the major security ramifications is data retrieval form the cloud.d) Digital signature
Digital signature is like hand written signature. It is a codded signature in electronic format. Its follow a specific protocol that is PKI. A digital signature is created by a private key which is always private. The PKI mathematical algorithm creating a hash data and encrypt is with the signature. This is called digital signature.
Digital signature will help, the organization to securely transfer data or information over the internet. It also helps the organization to reduce the use of paper. It saves time and improve the digital workflow.
e) Encryption process and type
The company will use symmetric key AES -256 for file server and PKI for digital signature.
Question 3. Cryptography Concepts
Automated key management MUST be used if any of these conditions hold:
A party will have to manage n^2 static keys, where n may become large.
Any stream cipher (such as RC4 [TK], AES-CTR [NIST], or AES-CCM [WHF]) is used.
An initialization vector (IV) might be reused, especially an implicit IV. Note that random or pseudo-random explicit IVs are not a problem unless the probability of repetition is high.
Large amounts of data might need to be encrypted in a short time, causing frequent change of the short-term session key.
Question 4. Trojan Downloads Research a) Motivation of malicious users The main motivation of malicious users is to accessing the users’ private data and steal it. The attacker can delete, copy, modify, block the user data. b) Distribution of Trojan Trojan is distributed from google play store. Kaspersky lab discover Trojan from google play store. Google discover 4347 number of Trajan from SourceForge.
c) hashes, digests or signatures
Hashes, digests or signatures technique produce a secure from of data which will help to download data or information securely. The digest is a fixed size of numeric representation of a data which is computed by hash function and after encrypt it is forming a digital signature. The main private key must be kept securely. If this key is lost, then the data also be lost.
d) Recommendation for software developer
The software developer must encrypt the software or compress the distributed software.e) Recommendation for users
The users should use a secure process for downloading software. They must use malware detection system for protect data from malware. The user must review the website first before downloading any software from it.
Alagic, G. and Russell, A., 2017, April. Quantum-secure symmetric-key cryptography based on hidden shifts. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 65-93). Springer, Cham.
Bowles, S. and Hernandez-Castro, J., 2015. The first 10 years of the Trojan Horse defence. Computer Fraud & Security, 2015(1), pp.5-13.
Chappell, L., 2017. Wireshark 101: Essential Skills for Network Analysis-Wireshark Solution Series. Laura Chappell University.
Chaudhari, F. and Patel, S., 2017. A Survey: Trojan horse Detection Techniques in Network.
Fogel, A., Fung, S., Pedrosa, L., Walraed-Sullivan, M., Govindan, R., Mahajan, R. and Millstein, T.D., 2015, May. A General Approach to Network Configuration Analysis. In NSDI(pp. 469-483).
Geneiatakis, D., 2015, December. Minimizing databases attack surface against SQL injection attacks. In International Conference on Information and Communications Security (pp. 1-9). Springer, Cham.
Jain, N., Anisimova, E., Khan, I., Makarov, V., Marquardt, C. and Leuchs, G., 2014. Trojan-horse attacks threaten the security of practical quantum cryptography. New Journal of Physics, 16(12), p.123030.
Messier, R., 2017. Packet Capture and Analysis. Network Forensics, pp.81-112.
Pathak, R., Bhatt, A. and Choudhary, S., 2016. Devising Solution to SQL Injection Attacks. International Journal of Computer Applications, 154(2).
Pawar, R.G., 2015. SQL Injection Attacks. KHOJ: Journal of Indian Management Research and Practices, pp.125-129.
Saranya, K., Mohanapriya, R. and Udhayan, J., 2014. A review on symmetric key encryption techniques in cryptography. International Journal of Science, Engineering and Technology Research (IJSETR), 3(3), pp.539-544.