computer security lab #2

4
Computer Security | Lab #2Wayne Jones Jnr Activity # 1 [ 25 minutes - 30 minutes ] Assessment of the presentations for the continuous assessments given in the last week. i.e. Text and Image based Encryption tool analysis activities Activity # 2 - Cryptanalysis overview (Footprinting , tracing and scanning) [30 minutes and more !!] Lab task#1 - Using key-loggers and Anti-key- loggers VMware downloads are advised to test applications (a) Overview the functions of key-loggers and Anti- key-loggers for personal and business use. (b) Students will download and assess the use of the Elite key-logger and Anti-key-logger Applications and observe the key-logger , as to whether it is effective as a foot-printer , scanner and tracer tool . Equally how effective is the Anti-key-logger in providing adequate protection for your file system? (c) Download and test the “Infiltrator” and evaluate it as a suitable Footprint , trace and Scanning tool. Lab task # 2 - Continuous assessment activity [5%] ** Complete as groups of two for presentation by wk. 03/2/09 labs (a) Students are to find up to four key-logger tools, and test and compare their performances as a form of a cryptanalytic tool. In other words students should be able to evaluate their functionalities as foot-printers , tracers and scanners in each case. (b) From part (a) Find Four Anti-key-loggers and test them and comment

Upload: wayne-jones-jnr

Post on 18-Nov-2014

111 views

Category:

Documents


3 download

DESCRIPTION

Cryptanalysis Overview

TRANSCRIPT

Page 1: Computer Security Lab #2

Computer Security | Lab #2 Wayne Jones Jnr

Activity # 1 [ 25 minutes - 30 minutes ] Assessment of the presentations for the continuous assessments given in the last week. i.e. Text and Image based Encryption tool analysis activities

Activity # 2 - Cryptanalysis overview (Footprinting , tracing and scanning)[30 minutes and more !!]

Lab task#1 - Using key-loggers and Anti-key-loggers VMware downloads are advised to test applications

(a) Overview the functions of key-loggers and Anti-key-loggers for personal and business use. (b) Students will download and assess the use of the Elite key-logger and Anti-key-

logger Applications and observe the key-logger , as to whether it is effective as a foot-printer , scanner and tracer tool . Equally how effective is the Anti-key-logger in providing adequate protection for your file system?

(c) Download and test the “Infiltrator” and evaluate it as a suitable Footprint , trace and Scanning tool.

Lab task # 2 - Continuous assessment activity [5%] ** Complete as groups of two for presentation by wk. 03/2/09 labs (a) Students are to find up to four key-logger tools, and test and compare their performances as a form of a cryptanalytic tool. In other words students should be able to evaluate their functionalities as foot-printers , tracers and scanners in each case.

(b) From part (a) Find Four Anti-key-loggers and test them and comment on what makes them either a good or bad countermeasure policy. Try and find two that are good and two that are bad. In each case your responses are to be validated and presented to your tutor.

Page 2: Computer Security Lab #2

Computer Security | Lab #2 Wayne Jones Jnr

Cryptanalysis Overview

Foot-printing - footprinting is the process of accumulating data regarding a specific network environment, usually for the purpose of finding ways to intrude into the environment.

Tracing – tracing is a technique used to find out the information about all the computers that information leaving one’s computer has to pass through before reaching the destination. It can uncover the user’s, router’s and other computers’ IP addresses.

Scanning – this is a countermeasure technique that that uses software such as WireShark and Nessus to evaluate a computer system in the effort of unraveling irregularities in critical system files which may give some indication as to how intruders may have accessed the system, which is the ultimate goal of doing a scan.

Lab Task #1

(d) Overview the functions of key-loggers and Anti-key-loggers for personal and business use.

Key Loggers – these are software or hardware devices that are used to record the instantaneous activity of a computer through keyboard impressions/key press.

Personal

Keyloggers are used for home purposes to monitor the network usage of people without their direct knowledge. It may specifically be used as a parental guidance mechanism.

Business

In business, keyloggers are used in organizations to troubleshoot technical problems with computers and network.

Anti-Key Loggers – keyloggers may be used for good intentions as stated above. But, just as with any other technology people may abuse it and use it to take advantage of unaware suspects. Anti-key loggers are used to combat the unlawful use of key loggers by intruders to log information of unaware victims. Detecting the presence of a key logger may be difficult, so anti-key loggers are used to thwart the effort.

Page 3: Computer Security Lab #2

Computer Security | Lab #2 Wayne Jones Jnr

Personal

For home use, anti-key logging mechanisms such as anti-virus and firewalls are used to detect the presence and activities of intruders.

Business

The above stated mechanisms are effective to some extent especially as it relates to attacks via the internet. However, they have tradeoffs such as for instance antiviruses often either ignore keyloggers, or do not have information about one or another particular copy of keylogger in the database. Firewall can temporarily disable or provide an access to a network for a keylogger by mistake. A violator can also obtain desired information without using the network, with the help of portable devices. Organizations use more sophisticated anti-key loggers that those used in the home. We will look at some of these in the next activity.

Lab Task #2 all in one elite spytech stealth