Temple University

Monthly Archives: March 2016

Readings, In The News, and Question for class:

WireShark-Introduction: WireShark is an open source network packet capture, display and analysis tool that runs in many versions of Linux, UNIX, and Windows.  It can be used to achieve many positive outcomes, including: troubleshooting network problems, examining security problems, debug protocol implementations and learn internal details and functioning of network protocols.  It also can be used for nefarious purposes that breach the confidentiality of network data exchanges by observing the users as they interact with systems within intranets and across wide-area networks. Confidentiality breaches include: extracting usernames and passwords; identifying data stores, servers, services and applications, and determining how users access and use them directly and indirectly them through browser based screens, pages, applications and services.

WireShark-Using: This reading introduces how Wireshark works, including how to capture, view, filter, and analyze data packets exchanged over an IT network via a number of different computer, telephony, internet, and web data interchange protocols.

In The News: c|net Not in my house: Amazon’s unencrypted devices a sitting target, cybersecurity experts say: Amazon Fire tablet device latest OS5 upgrade removes device encryption for the product line. Encryption for data in transit and data stored in the cloud is still protected, but personal or sensitive data stored on the Fire tablet will no longer be encrypted with the latest update.   Amazon claims that their latest upgrade to the Fire’s OS removes features users did not take advantage of.  OS5 ships with new devices, and the OS upgrade removes encryption existing in prior OS’s running on users’ Fire tablet devices. Industry watchers suggest removal of encryption was implemented to speed the OS.

http://www.cnet.com/news/not-in-my-house-amazons-unencrypted-devices-a-sitting-target-cybersecurity-experts-say/

Question for class: Is there a way to control the Kali Linux font and screen resolution to make Wireshark more usable?

Week 9 – Summary

Readings:

Wireshark was developed in 2006 (originally called Ethereal as was developed by Gerald Combs back in 1998) and so far is the best free Open Source tool that is used for deep network data packet analysis, in which comprehensive information is extracted from captured network transmissions. Wireshark provides analysis of all 7 layers of the OSI model, which helps to troubleshoot network communications issues, discover security flaws, debug and learn network protocols. Wireshark is compatible with various OS flavors and customizable for development purposes.

Question to the Class: Would BurpSuite be a good fit as competitor for packet analysis of Layer 7 of OSI model?

 

In the News: Subgraph OS — Secure Linux Operating System for Non-Technical Users

Subgraph OS was designed from the ground-up to reduce the risks in endpoint systems so that individuals and organizations around the world can communicate, share, and collaborate without fear of surveillance or interference by sophisticated adversaries through network borne attacks.

Subgraph OS is designed to be difficult to attack. This is accomplished through system hardening and a proactive, ongoing focus on security and attack resistance. Subgraph OS also places emphasis on the integrity of installable software packages.

Special Features:

  • Oz is a system for isolating programs so that if an attacker exploits an application security vulnerability, the rest of your machine and your network will remain largely unaffected.
  • Mandatory Full Disk Encryption (FDE)

  • Online Anonymity — Everything through Tor

  • Advanced Proxy Setting

  • System and Kernel Security

  • Secure Mail Services

  • Package Integrity

Read more @: http://thehackernews.com/2016/03/subgraph-secure-operating-system.html

 

 

Week 8

Since there’s no assigned readings (according to the syllabus), I thought I would share this interesting article:  “Office puts chips under staff’s skin”.

Epicenter, a new hi-tech office block in Sweden, are trying a new approach on how they conduct business. The company is implementing an RFID chip about the size of grain of rice under employee’s hand. This allows the 700 employees to access doors, photocopiers, pay in the café all with a touch of a hand.

Even though this is a great idea to allow the convenience of the employee, but what about the actual radio frequency of that chip? How easy is to re-direct the frequency towards that chip or to interfere with other frequencies? It looks like chips will soon replace wearable technology, but how safe and secure are they? I will leave that to future studies…to be continued.

For more information, feel free to access it here.

 

Week 9 Reading Summary, Question, and recent Cyber Security News…

  1. Summarize one key point from each assigned reading…

According to tech from wireshark.org web site, “Wireshark is an open source network packet analyzer (capture live network packets & displays packet data for further analysis.)  Network administrators can use it to troubleshoot network problems, network security engineers can use it to examine security problems, etc.  However Wireshark isn’t an intrusion detection system, and can not manipulate things on the network.”  Additionally after one installs Wireshark on their computer, then chapter #3 from wireshark.org web site covered detailed info regarding the Wireshark user interface to aid the user with easy UI navigation.

  1. Question to classmates (facilitates discussion) from assigned reading…

Question: How would one setup Wireshark to receive all network packets?

*Answer: Here is my answer… when setting up Wireshark, select the check box “Capture all packets in promiscuous mode.”

Identify, read, and post to our blog a current event article regarding ethical hacking & penetration testing (follow theme topic of the week, or other interesting related article)…

In the Cyber Security News lately

Apple fights FBI’s iPhone demand as ‘oppressive’ (as reported recently within the Philly.com on 2/26/2016 originally from the Washington Post)…

www.philly.com/philly/news/20160226_Apple_fights_FBI_s_iPhone_demand_as__oppressive_.html

“This is not a case about one isolated iPhone (arguing that the order imposed an ‘unprecedented & oppressive’ burden on the tech company), Apple wrote in its motion,… the FBI has insisted that it is not asking for a back door or a master key, and instead argues that its requests are narrow and limited to this case (supposedly did not ask Apple to break the phone’s encryption, but rather to disable the feature that deletes the data on the phone after 10 incorrect tries at entering a password. That way, the government can try to crack the password using “brute force”)… While the debate centers on a locked iPhone 5C from the San Bernardino attackers, it has far-reaching consequences about the way a digital society balances privacy with law enforcement.”

… here is some more related & updated news info…

Apple backed by more online giants in FBI iPhone unlock battle (as reported very recently within BBC.com on 3/4/2016)…

www.bbc.com/news/business-35722996

Amicus Briefs in Support of Apple…

www.apple.com/pr/library/2016/03/03Amicus-Briefs-in-Support-of-Apple.html

…, and what do you think should happen with smartphone encryption technologies in all (government, corporations, individuals) our future together?