Saturday, October 24, 2009

For me, IP Sec means a security protocol from the IETF that provides authentication and encryption over the Internet. IPsec is supported by IPv6 and since IPsec was designed for the IP protocol, it has wide industry support and is expected to become the standard for virtual private networks (VPNs) on the Internet.

Here I will explain how to Capturing File Transfer Protocol (FTP) Username and
password:
1.Start VM containing winserv03_server and winserv03_client.
2.Login as Administrator
3. Set the IP address of your winserv03_server and winserv03_client
4. Check that your winserv03_server is already installed with FTP server and Wireshark. If FTP server installed than start the FTP service using [Start] | [Administrative tools] | [Internet
Information Services (IIS)] otherwise you need a Windows Server 2003 CD to installed Internet Information Services (IIS) with FTP.
5. if wireshark is not install then it can be downloaded for free from http://www.wireshark.org.
6.open Wireshark on winserv03_server.[Start] | [Program] | [Wireshark].
7.Click on [Capture] | [Interfaces] to choose the network interfaces you wanted to monitor

IPsec, Different to SSL which that provides services at layer 4 and secures two applications, IPsec works at layer 3 and secures everything in the network and which is typically built into the Web browser, IPsec requires a client installation.
The benefit is IPsec can access both Web and non-Web applications, whereas SSL requires workarounds for non-Web access such as file sharing and backup.

IPSec protocol:
• Authentication Header- use for provide connectionless integrity and data origin authentication for IP datagrams and for protection against replay attacks.
• Internet key exchange (IKE and IKEv2) - to set up a security association by handling negotiation of protocols and algorithms and to generate the encryption and authentication keys to be used by IPsec.
• Encapsulating Security Payload (ESP) - to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service.

Thursday, October 15, 2009

Hacking wireless can be done by any attacker or person which usually want to detect password and username of other people wireless connection. For security, Access Point should be topologically located outside the perimeter firewalls.I learned how to hacking wireless. This activities can be done by using software named as Backtrack. We can use gui or command to start hack the wireless connection.For start the GUI, type 'startx' to start the gui. To check the network connection, type 'ipconfig'.For checking the wireless type 'iwconfig'. Then type 's' to sort the network. The most important thing is need to remember the MAC address.Here is example :

--> To get network that connect
airodump -ng --ivs -w capture --channel 1 ahndhbo(name of device wireless)

--> To get a reply from network
aireplay -ng-o-e dlink -a 00:1E:FB:57:ED -h 00:22:4C:1E:FB

Monday, October 5, 2009

Wireless help us easy to connect to internet without using any external devices such as cable ,
switch, hub and so on.
Wireless is help us reduce the space. For connect to wireless, we only need access
point(AP) and wireless station(Eg: desktop, laptop,PDA)
In 1997, IEEE produce a Wi-Fi(802.11). Two type of wireless mode use in wireless connection:
1. Ad-Hoc Mode - connect without using access point, it is easy and called as peer-to-peer.
2. Infrastructure - at least need one access point.There are two type
a) Basic Service Set (BSS) - one Access Point
b) Extended Servce Set (ESS) - more than one BSS.

Wireless LAN (WLAN) is service of 802.11 which use Layer 1(Physical Layer) and Layer 2
(Data Link Physical). There are 3 basic security service in WLAN environment. First is authentication
which provide a security to identify an identity in communication. Second is an integrity to check
that the message from sender to receiver is secure without get attack or modify by hacker.Because
an attack also can manipulate message through access point.Third is confidentially, is to ensure that
there is secret between network and privacy all the detail.

In wireless connection, Wired Equivalence Privacy(WEP) is use for shared key between PC/laptop with access
point and provide the extended service set(for ensure access point have same shared key).

WPA is Wi-Fi Protected Access which use in 802.11a, 802.11b and 802.11g. This use to solve the
problem with Wired Equivalence Privacy because it used on small amd handled device for connectivity.

Wireless Transport Layer Security(WTLS) use to make sure the data is privacy before it being broadcast.

Email use to transmit data or information into other receiver. It’s operated by divide each email by two part (header and body). It uses MIME protocol. Email can easily expose to threats same as threats can easily exposed by email. The most theats that enabled by email is spamming, it dissipate memory and bandwidth of our computer.

PGP is Pretty Good Privacy, glamour as plug-in emails clients and also used as stand-alone software. It will sign a detached and stored separately.

Web security techniques that popular use by people in network. I think everybody is familiar with SSL, SSH, https, and SET.

1. SSL which provides two layers architecture can help to secure the used of web browser and servers. It popular use in electronic banking.

2. tSSH used to provide a security in application layer which built on TCP in transport layer.

3. SET specially designed to secure communication link and to protect credit card but it need confidentially pament and information, card holder authentication and merchant authentication.

4. Https used to secure communication between computers and www.

Nowadays, biometric technology is exposed in fingerprint(example shape is arch, loop and whorl), eye, face, hand geometry, signature and voice. It also had been found in body odour, palm print, earshape and DNA. Biometric is an identifier of person through physiological or behavioral. How biometric function is if there is unique, acceptability, stability and universality. It function with using storage, data collection, signal processing, matching, and transmission. Examples of device that apply all the function are Optical fingerprint sensor, electro-optical sensor, e-field sensor, thermal sensor, and capacitive sensor. But we must alert with threats that usually attack biometric sensor, example is replay attack of eavesdropped biometric data and manipulation of stored biometric reference data. Because over than 50% of email is now spam. Other protocol that is used is S/MIME that allows a good client security through signature also encryption.

Monday, September 28, 2009

When we talk about the security in networks, we actually need to know what network definition to make we more deeply understand. Network for me is something can make multiple user connect in same time to each other. Connection happend when there are seven layer in network connect each other and each layer do their task. Seven layer is Application, Presentation, Session, Transport, Network, Data Link and Physical. (click to get a detail about the layer).

Network Security problem area discuss on authentication, secrecy, non-repudiation and integrity control.Example of authentication is commonly done through the use of passwords when user login. So knowledge of the password important to assumed to guarantee that the user is authentic. While non-repudiation problem is exchange something on network without a trusted third party. For me, integrity control means certificate of access control which can be solved by employing one way hash functions.

The bigger problem in securing the network is to prevent our network from the hacker or attacker. Hacker is a bad people which try to attack our computer, resources or files.
Hacking can be divided into 5 :

  1. Reconnaisance - by initial planning study detecting enemy before attack example by using googling or dumpster diving
  2. Scanning - Attacker learn network using structure traceroute or ping.
  3. Gaining Access - issuing the access to the enemy resources
  4. Maintaining Access - such as troubleshoot identity and access solutions
  5. Covering Track - contruction phase or cover the data

Tuesday, August 25, 2009

Database Security makes me undertand the most important of security issue especially in database systems and the problems related to information protection. Beside that we investigate thepotential implementation of security mechanism in the database management system and operating system. I learned that how to create the new database and make sure the user can read their own account and a certain person which have priority can access the data to see, write and edit data. The task that we do is create a new records, read all fields and update data and so on.

To set the access right to any person , we need to set the acess control which enables us an authority to access data or resource. This is a one part of physical security and second layer in computer security achitecture. So the application will call the access control functions to set who can access specific resources provided by that application. When we create a access control, we must consider the decision is suitable for the problem. Such as make sure does the operating system respect the data or record. We must consider all of the factor and the pros and cons of our design decision.

Some people do not care on their user privileged. As a good in securing database, we must have policy and defines the privileges various user on organizational network, specify a group of users and so on. The policy is use to create a access and control the user and data.

Database Security is the most important especially when we use a server. It is to secure the database from unathorized users because we usually store the important data such as clients information, financial details, human resource details and all the data that need to be secure and secretly. The benefit of apply the database security is to monitor activity or proces , improved security database, ensures all the resourse is secure and most important is for integrity and availability to user. So the hacker do not have an authority to attack the data.

Concept of database divide by three (Database, Database Administrator(DBA), Database Management System (DBMS)). There is a few way to make sure that the database is under a good database such as there are good in

Tuesday, August 18, 2009

In this lab, i learned about the flaw of web application and how it is exploited. Beside that, we learn exploit web application vulnerabilities and prevention method that can be taken to overcome web
application vulnerabilities. Vulnerabilities is intersection of three elements.That is a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw.

Many application employ a tiered architecture and a failure to different tiers properly often leaves an application vulnerable. So it enable the attacker who has found a defect in one component to quickly compromises the entire. When threats arises in shared hosting environment, defects and malicious code in one application can sometimes be exploited to compromise the environment itself and other applications running within it.

Sometimes this vulnerabilities always target the web server that running. This vulnerabilities in web server are broadly composed of defects in their configuration and security flaws within the web server software.

A few reason why vulnerabilities occured is complex systems so the probability of flaws increase, peopele like using common, well-known code, software, operating systems, and/or hardware increases the probability an attacker has or can find the knowledge and tools to exploit the flaw
, more physical connections, privileges, ports, protocols, and services and time each of those are accessible increase vulnerability, weak password, the fundamental operating system design flaws, internet Website Browsing, Software bugs, Unchecked user input and so on. (wikipedia website)

This lab had been covered with this topic :
• Explain What is Symmetric and Asymmetric Cryptography
• Implementing Caesar Cipher for Symmetric Cryptography.
• Implementing Vigeneré Cipher for Symmetric Cryptography.
• Implementing RSA algorithm for Asymmetric Cryptography




For me, Symmetric crptography is the both paties involved in the communication use same key but secretly between them. That why we can called is as shared secret system or private key systems. The operation of this symmetric separated into strem ciphers and block ciphers. But the huge problem of this cyptography is key exchange. Different to assymmetric, means public key cyprography. This asymmetric works when people that has private key will keep it secretly then anyone is told the public key will enable them to unlock the private key and read the data that had been sent.



The comparison between symmetric and assymetric is symmetric key usually faster to use in electronically than asymmetric. But assymetric usually more computationally. Both of this key is related to each other and especially in mathematically related.There are a few example of symmetric ciphers such as Data Encyption Standard (DES), RSA and AES. While the popular example of assymetric is PGP(Pretty Good Privacy).



Caesar ciphers is the action of replace each plaintext letter with one a fixed number of places down the alphabet.






(Source from: http://www.wikipedia.com/)

Example of SHIFT 3 in Caesar Cipher :
Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: DEFGHIJKLMNOPQRSTUVWXYZABC

Example how to solve the problem :
Plaintext: the quick brown fox jumps over the lazy dog
Ciphertext: WKH TXLFN EURZQ IRA MXPSV RYHU WKH ODCB GRJ

Vigenere ciphers is polyalphabetic cipher based on using successively shifted aphabets, means a different shifted alphabetic and the step is based on the tableau and use the keyword. It use a series of different caesar cipher. This cipher is well known because we easy to understand and use it.

Here is the simple step of implementing RSA algorithm for Asymmetric Cryptography :

1. value for p, q had been given
2. n = p x q
3.φ(n) = (p – 1) (q – 1).
4.d= e -1 mod φ(n)

Sunday, August 16, 2009

A few propose of this operating system security such as multiprogramming had been introduced for the protection need..Some of purpose is for memory protection, means that prevents from corrupting the memory of another process running on the same computer and same time but we must allert with the method protection of memory.
There are seven of method :

  • Fence
  • Relocation
  • Paging
  • Segmentation
  • Base/bound register
  • tagged architecture
  • paging combined with segmentation

Besides that, we must protecting general object by using file protection, group protection, access control limitation,permission, authentication and so on. Below is general object protection :

  1. Memory
  2. File/Data set on an auxiliary storage device
  3. Program Executing in memory
  4. A directory file
  5. Hardware device

Monday, August 10, 2009

Security??Something that support our life and make our life easy to handle. So some organization provide program security for us because of attack such as brute force attack, replay attack, man in the midle attack and fault in cryptosystem. Program security is important part that teach us how the malicious proram will effect our computer and how to manage it.Malicious program is something that corrupt our computer from running as usually.

We can detect it is virus if we don't see raw data, it can do harm and can also be confidential. There are a few type of viruses such as parasitic virus, memory-resident virus, boot sector virus, stealth virus,macro virus, directory virus,false virus, FAT virus and polymorphic virus. Resident is new for me, it means type of virus that hides permanently in RAM memory and it can control and intercept all of the operations carried out by the system. It can corrupt our file and program we opened, closed, copied, renamed and so on. Virus phase can be divided into 4phase.1st, Dormant Phase.2nd,Propagation Phase.3rd, triggering phase and 4th is execution phase.There are a few type of malicious attack such as :

  1. Logic bomb - activates on an event
  2. Trap door - undocumented/piece of code for debugging and we do not delete when write a code
  3. Virus
  4. Bacteria/rabbit
  5. Trojen Horse
  6. Worm
  7. Spyware
  8. Macro
  9. Overwrite


Tuesday, July 28, 2009

I'll explain how to install PGP and the function of that particular software in network security...PGP is from a word Pretty Good Privacy, it is a public key enryption program originally written by Phil Zimmermann in 1991.Why PGP?For me, it is to secure email on internet because email is personal and it's private, beside that we don't want our private email or confidential documents read by anyone else. The advantages of PGP are language support and is available for many different platforms including Windows, Unix, MS DOS, OS/2, Macintosh and so on. After I do a research, the latest version of international freeware versions of PGP os 6.5.1i for Windows 95/98/NT and MacOS only while 5.0i for other platform.PGP works by combines some of the best features of both conventional and public key cryptography.PGP will compresses the plaintext that had been encrypt by user and creates a session key(secret key). Then after data is encrypted, the session key is then encrypted to the recipient's public key and transmitted along with the ciphertext to the recipient.














We can download PGP installer from
www.pgpi.org,version 6.5.8.
Step 1 : Unzipped installer
Step 2 : Double click to start install. At Welcome window.Click [Next].
Step 3 : Click [Yes] at 'Software License Agreement' after finish read all terms of agreement.
Step 4 : Enter full name and company then click [Next]
Step 5 : Files will be installed in:C:\Program Files\PGP.Click [Next].
Step 6 :Choose the PGP components you wish to install.
Step 7 : Click [Next]
Step 8 : The next window asks whether you have existing keyrings you wish to use. Click [No].
Step 9 : Restart computer and Click [Finish]
* Crptography is science that using mathematics to encrypt and decrypt data. It enalbe us to store private data and transmit across insecure networks.

Monday, July 27, 2009

There are two type of crptography -> substitution and transportation. Substitution is use by use one letter to refer to another letter. This substitution divided by two type, monoalphabetic(use same letter for the whole message) and polyalphabetic(use different letter in whole message).While transportation is use by change the arragement of text and letter. This method can be divided by key and unkeyed..

example what i learn in class is:
1 2 3 4 5 6 7 8 9 10
1 T H E R E I S N O S
2 E C U R I T Y O N T
3 H I S E A R T H T H
4 E R E I S O N L Y O
5 P P O R T U N I T Y
Conclusion: for unkeyed single transportation can be develop into a matrix of 10(vertical) by 5(horizontal). This step can be try on keyed single transportation just by using matrix 10 but do not in sorting.

this is some terms that need to memorize such as :

  1. Vigenere Ciphers - we must know the manual polyalphabetic cipher to perform encryption
  2. Simple substitution ciphers (random) - is use for random aphabet tp improve caesar ciphers.

Other thing that i learn today is about MAC, Message Authentication Codes is key-dependent one way hash function.It accepts as input a secret key and an arbitrary-length message to be authenticated, and outputs.MAC protects both a message's data integrity as well as its authenticity.While digital signiture is use for message from particular sender and cryptography value that depends on message and sender.A digital guarantee that information has not been modified, as if it were protected by a proof seal that is broken if the content were altered.

RSA is the algorithm was publicly described in 1978 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT.The letters RSA are the initials of their surnames, listed in the same order as on the paperis an algorithm for public-key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography (taken from wikipedia website).


Wednesday, July 22, 2009

What i'm understand about IT security goals is to provide strong network logon authentication and at the same time reduce the and help desk costs that are associated with supporting users who forget their passwords or who let their passwords expire.Besides that, to preventing users from downloading or from using nontrusted and nonsigned content from the Internet. Sometimes, IT security use to provide availability, integrity,confidentiality and nonrepudiation for general business e-mail messages. I will explain about availability, integrity and confidentiality after this. Let me explain about the different between NTFS and Fat32.

Fat 32 is old file system that is simple, but if need to access from DOS or win9x, this Fat32 is suitable. Is also well-documented, readable from a large number of OSs, and supported by a wide range of tools while a newer file system that is faster, safer, space efficient, feature-rich, proprietary, undocumented at the raw bytes level, and subject to change - even within Service Packs of the same OS version. To get detail, refer to this website http://cquirke.mvps.org/ntfs.htm.

The differentiate between availability, integrity,confidentiality :

CONFIDENTIALLY -
Means that, computer or asset cannot being used by other unauthorized person because it is privacy and secrecy.
Example : there are two user had been created. User1 do not have authority to see,modified or do anything to User2 folder or file.Only User2 have authority can do anything to their computer or assets.

AVAILABILITY -
Means that, user can access their own file or information anytime they want without a failure and it remains available or secure.
Example : User1 can access their own information anytime they want but User2 cannot do anything eventhough User1 had been removed or delete by administrator.

INTEGRITY -
Means that, only own user can do any changes to their data.
Example : User1 can added, deleted or updated their data. User1 can only do the task that been set by administrator.

Let me explain how to convert from FAT disk into NTFS.There are a few step :

  1. Log on Windows 2003 Server as Administrator.
  2. Click [Start] and after that Click [Run]
  3. Type cmd to open command line at type chkntfs d: Notes : You will get a message "D: is not dirty"
  4. Then type convert d: /fs:ntfs. If the drive has a volume label, enter it when prompted.
  5. Type chkntfs d : to verify that drive is now NTFS.
  6. Finish.

Monday, July 20, 2009

Some of people is very familiar with authentication, as you know it is something that verification of our identity as security to some data...Such as login for some application which we need to insert our username and password..Besides, we use smart card, passport, biometrics system, signature, retina or use voice to verification. All this kind of technique only for one purpose, protection from atacker.
Below is an example that we need to protect our password..


  1. 1st thing, do not show password to anybody. Example : cannot write password anywhere and login the password only at a secure places.
  2. Important to find a password that is easy for us to remember but difficult to guess by others.
  3. Create password more that six character(especially using combination of number and alphabets)
  4. Do not use familiar information such as names, birthday,phone number, plate numbers or family names
  5. Others

What best part of lecture today, we learned how to guess other passwords.

  • Use default passwords to guess.
  • Use short word and easy character to guess
  • Use all the words in an electronic dictionary(60,000).
  • Hm how about collect information about the user name, family names, birthday, so on.
  • Guess user’s phone number, social security number, street address.
  • Guess license plate numbers
  • Use a Key Looger or Trojan horse so we can keep track what had been type by users.
  • Lastly, tap the line between a remote user and the host system.
I'm leaning a new thing about CRYPTOGRAPHY today..

General meaning of cryptography is about how to get secret writing..It also about the plaintext and ciphertext.

The solution of RSA calculation :
Solution :
n = p x q
= 3 x 11
= 33
Ø(n)=(q-1)(p-1)
=(10)(2)
= 20
e = 7
d = e ¯¹ mod Ø(n)
= 7 ¯¹ mod 20
a = 7 , b = 20
b = x(a) + y
20= 2(7) + 6 …………………………………(1)
7 = 1(6) + 1………………………………….(2)


From (1)
1 = 7-1(6)…………………………………….(3)
From (2)
6 = 20 – 2(7)…………………………………(4)
From (3)
1 = 7-1(6)
= 7-1 [20-2(7)]
= 7 – 20 + 2(7)
= 3(7) – 20…………………………………(5)

Multiple (5) with mod 20
1 = 3(7) – 20
mod 20 = 3(7) mod 20 – 20 mod 20
mod 20 = 3(7) mod 20
1/7 mod 20 = 3 mod 20
7 ¯¹ mod 20 = 3 mod 20
d = 3

Here is example of calculation to find the plaintext:
In a public key-stream using RSA, you intercept the ciphertext c=10 sent to whose public key is e=5, n=35. What is the plaintext m?
p = 5, q = 7
n = p * q
= 5 * 7 = 35
Ø(n) =(q-1)(p-1)
=(6)(4)
=24
d = e ¯¹ mod Ø(n)
= 5 ¯¹ mod 24
a = 5 , b = 24
b = x (a) + y
24 = 4(5) + 4…………………………………………………(1)
5 = 1(4) + 1…………………………………………………(2)

From (1)
1 = 5 – 1(4)…………………………………………………..(3)
From (2)
4 = 24 – 4(5)………………………………………………...(4)
From (3)
1 = 5 -1(4)
= 5-1[24-4(5)]
= 5 – 24 + 4(5)
= 5(5) – 24…………………………………………………(5)

Multiple (5) with mod 24
1 = 5(5) – 24
mod 24 = 5(5) mod 24 – 24 mod 24
1/5 mod 24 = 5 mod 24
5 ¯¹ mod 24 = 5 mod 24
d = 5
m = Cˆd mod n
= 10ˆ5 mod 35
= 5


Sunday, July 19, 2009




Our Lecturer :
En. Zaki


?? IT Security??
For me, IT security is about the need of information which can prevents hackers from attacking our Web site but importance thing, we must know tools such as cryptography and firewall. If we are expert in this area, it is something good because it will become as career opportunities and importance of IT security. From day to day, belong to our country, we can see the increasing demand by government and private industry.

What I’m learned ………………..
WM8S
What IT Security

protection of information, system, software, hardware ffrom danger and hacker.


Method of defense
Prevent, deter , deflect, detect, recover
Control –Encryption, software or program controls, hardware control, policies & procedure control, physical control

Security Trends
Attack Sophistication increase from year to year.
Security Area

Detection(using scanner),prevention(proxy, firewall),recovery(cryptography techniques and proper planning)

Security Architecture
defined by ITU-T Recommendation X.800 or OSI Security Architecture and developed as an international standard to structured definition of services and mechanisms.

Security Principles
Confidentially, integrity and availability


Security Policy

set of rules includes of authorization, access control policy and accountability.

Security Attacks/ Threats
Passive Attack (to obtain data that being transmitted) vs Active Attack (to obtain authorization)

Security Services

defined by X.800 and RFC 2828. Categories : Data Integrity, authentication, data confidentially, non repudiation, access control

Security Mechanisms
Any process that is designed to detect, prevent or recover from a security attack.Two classes :

Wednesday, July 15, 2009

By this time section, i will explain about - Virtualization & VMware -Do you know about virtualization?Let me give a litle explaination about that. Virtualization is to support an OS, instruction set and computational resources which differ from underlying software because enables much higher degree of portability and flexibility...Beside that, to give the appearence of a different paltform.Example of virtualization environment created by such software is called virtual machine.VIRTUAL MACHINE it is same as real machine, more efficient and duplicate the real machine and is created using Virtual Machine Monitor(VMM). Why we use VMM because it provides a second layer on a machine for another OS to run on it. What I can get from study this lab actually I know that VMM can reproduces everthing from the CPU installation. Let's share how to intall VMware Workstation :
  • Download VMware Workstation from http://www.vmware .com/download/ws/
  • Double click on VMware launcher to start the installation wizards
  • Click on [Next]
  • Choose Typical setup type
  • Choose location for VMware Workstation installation.Click on [Next].
  • Configure the shortcuts for VMware Workstation and Click on [Next].
  • Click on [Install]
  • Enter serial number of VMware Workstation.
  • Click [Finish] and restart the Computer.



1.Create new Virtual Machine to open the Virtual Machine wizard. Click [Next]
2.Choose the typical configuration, click [Next]
3.Choose the type of OS to be installed on the Virtual Machine.
4.Then install Windows Server 2003 to virtual machine, select [Microsoft Windows] as the guest.
5.Select Windows Server 2003 Standard Edition in version list.
6.Click [Next]
7.Name the virtual machine and specify the location where the disk image for virtual machine will be stored in the hard disk.
8.Select [Use host-only Networking], to create LAN between other virtual machine.
9.Select [Use bridged networking]. Click [Next]
10.Specify the disk capacity of the virtual machine depends on your size of PC.
11.Select [Allocate disk space now].
12.Click [Finish]Notes : Virtual Machine residing on the image that can be cloned and copy from one host to another host by simply drag and drop.

;;