1 / 34

Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Training | Edureka

** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **<br>This "Cybersecurity tutorial" ppt presented by edureka gives an in-depth information about the Cyber Security world and talks about its basic concepts. Below are the topics covered in this tutorial:<br><br>1. Packet structure<br>2. Network architecture<br>3. Addressing<br>4. IP/MAC<br>5. Firewalls<br>6. Symmetric Cryptography<br>7. Public key Cryptography<br><br>Cybersecurity Training Playlist: https://bit.ly/2NqcTQV

EdurekaIN
Télécharger la présentation

Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Training | Edureka

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  2. CYBERSECURITY o Refers to every thing digital o Requires the understanding of how a network runs o Refers to the art of hiding and encrypting information o Requires the understanding of cryptography Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  3. AGENDA 01 Packet Structure 05 Firewall 02 Network Architecture SECURITY NETWORK 06 Symmetric Cryptography 03 Addressing Method 07 Asymmetric Cryptography 04 IP & Mac Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  4. Network Part Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  5. Downloading a file? Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  6. Packet of what? Contains critical information regarding the packet. The information includes things like source address, destination address, type of service, IP version information Packet Header Payload Packet Trailer Payload refers to the actual data being contained in the packet. This could be anything ranging from a media file, executables or even a simple text file Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  7. IPv4 Packet Header Explicit Congestion Notification; Information about the congestion in route to handle, these ‘flags’ tells if they can be fragmented or not Version no. of Internet Protocol used (e.g. IPv4). Length of entire IP header Differentiated Service Code Point; This refers to the type of service As required by the network resources, if IP Packet is too large Length of entire IP Packet (including IP header and IP Payload). Total Length DCSP Version Header Length ECN If IP packet is fragmented during the transmission, all the fragments contain same identification number. to identify original IP packet they belong to. set, which tells the network how many routers (hops) this packet can cross This offset tells the exact position of the fragment in the original IP Packet. This field is used to keep checksum value of entire header which is then used to check if the packet is received error-free. Sender (or source) of the packet. Flags Fragment Offset Identification To avoid looping in the network, every packet is sent with some TTL value Time to Live Protocol Header Checksum 32-bit address of the Source IP Address 32-bit address of the Receiver (or destination) of the packet. greater than 5. These options may contain values for options such as Security, Record Route, Time Stamp, etc. Tells the Network layer at the destination host, to which Protocol this packet belongs to Destination IP Address This is optional field, which is used if the value of IHL is Options (if any) Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  8. OSI Model This is where the user application sits that needs to transfer data between or among hosts. For example: HTTP, file transfer application (FTP) and electronic mail etc. password verification for access and if credentials are provided then for that session password verification does not happen again. This layer can assist in synchronization, dialog control and critical operation management (e.g., an online bank transaction). technology and actual communication mechanism such as signaling, voltage, cable type and length, etc. This layer helps to understand data representation in one form on a host to other host in their native representation. Data from the sender is converted to on-the-wire data (general standard format) and at the receiver’s end it is converted to the native representation of the receiver. above layer and breaks it into smaller units called Segments and then gives it to the Network layer for transmission. pulses etc.) from the Physical Layer and makes Data Frames, and sends that to the upper layer and vice versa. This layer also checks any transmission errors and sorts it out accordingly. This layer provides session management capabilities between hosts. For example, if some host needs a Application Presentation This layer provides end to end data delivery among hosts. This layer takes data from the Session Transport This layer helps to uniquely identify hosts beyond the subnets and defines the path which the packets will follow or be routed to reach the destination. This layer deals with hardware This layer takes the raw transmission data (signal, Network Datalink Physical Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  9. TCP/IP Model The Application layer allows applications to access the services of the other layers, and it defines the protocols that applications use to exchange data. The Application layer contains many protocols, and more are always being developed. Transport layer. The core protocols of the Transport layer are TCP and UDP. The core protocols for the IPv4 Internet layer consist of the following: The Internet layer responsibilities include addressing, packaging, and routing functions. The Internet layer is analogous to the Network layer of The Transport layer (also known as the Host-to-Host Transport layer) provides the Application layer with session and datagram communication services. The Transport layer encompasses the responsibilities of the OSI the OSI model. Application The most widely known Application layer protocols help users exchange information: service. TCP establishes connections, sequences and acknowledges packets sent, and recovers packets lost during transmission. address to a Network Interface layer address such as a hardware address. TCP provides a one-to-one, connection-oriented, reliable communications • The Address Resolution Protocol (ARP) resolves the Internet layer • The Hypertext Transfer Protocol (HTTP) transfers files that make up pages on the World Wide Web. In contrast to TCP, UDP provides a one-to-one or one-to-many, connectionless, unreliable communications service. UDP is used when the amount of data to be transferred is small (such as the data that would fit into a single packet), when an application developer does not want the overhead associated with TCP connections, or when the applications or upper-layer protocols provide reliable delivery. information to help you diagnose unsuccessful packet delivery. use TCP/IP to communicate across differing network types that use LAN technologies—such as Ethernet and 802.11 wireless LAN—and WAN technologies—such as Frame Relay and Asynchronous Transfer Mode (ATM). By being independent of any specific network technology, TCP/IP can be adapted to new technologies. Transport • The Internet Protocol (IP) is a routable protocol that addresses, routes, fragments, and reassembles packets. The Network Interface layer (also called the Network Access layer) sends TCP/IP packets on the network medium and receives TCP/IP packets off Internet • The File Transfer Protocol (FTP) transfers individual files, typically for an interactive user session. • The Internet Control Message Protocol (ICMP) reports errors and other the network medium. TCP/IP was designed to be independent of the network access method, frame format, and medium. Therefore, you can • The Simple Mail Transfer Protocol (SMTP) transfers mail messages and attachments. TCP and UDP operate over both IPv4 and IPv6 Internet layers. • The Internet Group Management Protocol (IGMP) manages IP multicast groups. Link Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  10. Addressing: Unicast Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  11. Addressing: Broadcast Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  12. Addressing: Multicast Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  13. Visiting Google? https://www.google.com Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  14. TCP/IP Three-way Handshake https://www.google.com Server Client Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  15. Connected! https://www.google.com Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  16. What’s my computer’s address? IP ADDRESS 192.168.32.28 A unique string of numbers separated by full stops that identifies each computer using the Internet Protocol to communicate over a network. MAC ADDRESS F4-96-34-89-F9-98 A media access control address (MAC address) of a device is a unique identifier assigned to a network interface controller (NIC) for communications at the data link layer of a network segment Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  17. Unique MAC 192.168.1.3 192.168.1.3 192.168.1.3 192.168.1.3 P4-96-H4-88-F9-09 A7-85-14-91-Z1-10 F4-96-34-89-F9-98 B4-96-54-89-K9-99 Computer A Computer B Computer D Computer C Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  18. Address Resolution Protocol Who is 192.168.1.33? 192.168.1.31 192.168.1.34 192.168.1.33 192.168.1.32 Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  19. Hey that’s me. Here have my MAC address too so that we can communicate more easily in future Well….that’s easily exploitable! I could just lie. 192.168.1.33 192.168.1.31 Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  20. Liars…liars everywhere 192.168.1.32 192.168.1.33 192.168.1.31 Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  21. Man in the Middle “Man in the Middle” (MITM) What is it? By impersonating the endpoints in an online information exchange (i.e. the connection from your smartphone to a website), the MITM can obtain information from the end user and the entity he or she is communicating with. 192.168.1.32 For example, if you are banking online, the man in the middle would communicate with you by impersonating your bank, and communicate with the bank by impersonating you. The man in the middle would then receive all of the information transferred between both parties, which could include sensitive data, such as bank accounts and personal information. 192.168.1.33 192.168.1.31 Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  22. This is exactly where the security part of cybersecurity comes in Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  23. Firewall A firewall is a network security system that monitors and controls over all your incoming and outgoing network traffic based on advanced and a defined set of security rules. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  24. Firewall Packet Filtering firewall Application/Proxy Firewall Hybrid Firewall Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  25. Packet Filtering Firewall Packet Header Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  26. Application/Proxy Firewall A proxy firewall is a network security system that protects network resources by filtering messages at the application layer. A proxy firewall may also be called an application firewall or gateway firewall. Packet Header Both, the packet header and the payload is checked 192.102.4.88 Payload 192.168.1.31 Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  27. Hybrid Firewall A hybrid firewall is the combination of Application firewall and Packet Filtering Firewall. They are applied in series. Application Firewall Packet Filtering Firewall Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  28. Hybrid Firewall: Parallel Application Firewall Packet Filtering Firewall Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  29. Cryptography Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  30. Symmetric Cryptography Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  31. Symmetric Cryptography A cryptographic key is the core part of cryptographic operations. Many cryptographic systems include pairs of operations, such as encryption and decryption. A key is a part of the variable data that is provided as input to a cryptographic algorithm to execute this sort of operation. Cipher Text Plain Text ? ?,? = C ftq cguow ndaiz raj vgybe ahqd 13 xmlk pase The quick brown fox jumps over the lazy dog ?−1?,? = ? Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  32. Public/Key Cryptography Transaction Message Digital Signature Bill decides to send Transaction Message Bob’s Secret key (sk) Sign Alice’s Public key (pk) Verification Mandy receives Bil transaction Blockchain Technology Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  33. Demo Time! Copyright © 2018, edureka and/or its affiliates. All rights reserved.

More Related