Home
        Formal Report - PROJ354 Home
         Contents
1.     Select Create extended label and icon files    If you wanted to ensure file system and drive integrity you could also select the check for bad    blocks check box and choose the number of passes for the check     Kali Installation onto MacBook Air    Connect Kali Live USB to computer   Turn on machine  holding the ALT button during boot  Select the Live USB stick from the boot options menu  Select Graphical Install   Select Manual Partitioning   Create a 500MB partition     At the beginning of the drive     Format to FAT32      No mount point       7  Create 100GB Partition    Set at the beginning of the remaining free space    Format to ext4    Use as the mount point  8  Create swap partition    Use remaining freespace    Format as swapspace    No mount point  9  Save and Write the partition information  Install Kali  Select Yes when asked to install GRUB to the MBR  Re boot the MacBook Air when install completed  Hold the ALT key during the reboot and select the USB stick from the boot options    10    11    12    13    14 Select the live boot option  15 Mount the 500MB FAT32 partition   16 Create a folder named EFI in the root if the FAT 32 partition  17 Create a folder named Boot inside of the EFI folder   18     Download all files from  ftp   mirrors kernel org fedora releases 18 Fedora x86_64 os EFI boot  19 Transfer files to  EFl Boot on the FAT32 partition  20 Mount installed Kali filesystem  21 Navigate to  boot grub  22 Copy grub cfg from  boot grub to  EFI Boot
2.    Server rack     391 64       Monitor    LG 19    monitor     105 00       Cat5 Cables    Ethernet cables     10 50       D Link Wi Fi Router    Wireless Router     55 00       USB Mouse    Mouse     10 50       USB Keyboard       Keyboard        10 50          Total Hardware Costs        5801 39             The table below shows the breakdown of the software costs of the project        Software Costs       Item Description Cost       Windows Server 201 2 7  Standard Edition  924 10       Linux Operating System Kali Free       Perl Programming Language Free       C Programming Language Free       Metasploit Hacking Tool Free       Snort Hacking Tool Free          Total Software Costs    924 10                Operation Costs    The table below shows the estimated operating costs for each team member broken down into  management costs and production labour costs        Item Hours Rate Cost       Tyler Hellard       Management  100 00  6 800 00       Labour Costs  69 00  20 700 00       Zachary Preece       Management  100 00  12 500 00       Labour Costs  69 00  16 905 00          Taylor Kraft       Management  100 00  6 500 00       Labour Costs  69 00  22 149 00                   Total Operating Costs    90 554 00                   Final Revision    Equipment and Facilities    The table below shows the breakdown of the hardware equipment costs        Hardware Equipment Costs       Item    Description    Quantity    Cost of Hardware       11 inch Macbook Air  64GB  1     Sta
3.   PROJECT BUDGET    Initial Appropriations    To complete our project  we will need  97 279 49 to cover the required hardware  equipment  software equipment and operation costs for the project  We have taken hardware   software  networking  security equipment and operation costs in consideration for the calculation of  the costs     The breakdown of the initial costs is as follows     e Hardware equipment   5 801 39  e Software   924 10   e Management   25 800 00   e Labour   59 754 00    As the project completed  we calculated the total budget of it  as it turns out  we are under  budget     Final Revision    Hardware equipment   5 554 26  Software   924 10  Management   3 274 00  Labour   11 476 77    To see the detailed budget  please go to page 49        PROJECT RESULT    The project was completed successfully  The installation of the Linux distribution was  successfully installed and updated as the sole available operating system on the MacBook Air   The included security tools in the Linux distribution  Kali  were tested and performed flawlessly   They do not perform at the same speed of a more traditional fully sized laptop but perform at  nearly 70  of the speed  This is an acceptable trade off due to the fact we achieve a superior  battery life and at about 1 3  of the cost of a similarly sized machine with a full GPU  The only  area where the current prototype is at a disadvantage is when performing a password crack   This is where it performs at about 30 to 40 perc
4.   properly crack a WPA password you must have a password list to run through and compare to the hash  value of the captured handshake  There are many easily obtainable large and well organized open  source password lists  This is balanced by requiring much less data to be captured by the network  portion  A WPA password crack only requires that the handshake between a device and the network be  captured  This occurs when a device authenticates to a network        7b  Listen to a specific channel and write all of the data to disk to be used for cracking of the password      airodump ng   ignore negative one  c  lt channel the network is on gt    bssid  lt of target network gt    w  lt prefix for capture file gt   lt monitoring interface gt       The ignore negative one option bypasses a known error in the current version of the airodump  command  Without this option data will not be captured       The  c command is what determines the wireless channel the command will copy information  from       The   bssid command is the mac address of the network you wish to capture data from     The  w command is used to both write to the file and give it a prefix so it is easy to find     The interface specified here must be the same as created in step 3     8b  Wait until the top right corner of the information displayed on the screen tell you that a WPA  handshake has been captured  This area will remain blank until the capture has occured  This may take  anywhere from hours to days dep
5.  baseline  for a forensics analysis and also helps to prevent intrusions and infections from the system    being analyzed     Bootable USB creation Options    All of the above instructions for creation of the Live USB creation are assuming you  either have access to a Windows 7 or higher installation  There may be other ways to create  an Apple UEFI bootable USB drive in either OSX or Linux environments  They would still use  an identical  ISO image to the instructions that are used for the creation using Rufus but would    require an extensive knowledge of a command line environment        APPENDIX C   MACBOOK AIR DIS ASSEMBLY AND  RE ASSEMBLY INSTRUCTIONS    Macbook Air Disassembly Instructions  All Images property of www  ifixit com  Taken by Technical Writer Andrew Goldberg    Distributed under the Creative Commons BY NC SA 3 0       Important Information highlighted in Red    1  Assemble Required Tools  a  Macbook Pro and Air Pentalobe Screwdriver  b  Nylon Spudger  c  T5 Torx Screwdriver  d  T8 Torx Screwdriver  2  Lower Case  a  Shut down machine and lay top down on soft surface  b  Remove ten screws from bottom of machine and sort by size  c  Label screws by size and location    3  Wedge fingers into space between display assembly and lower case       4  Pull lower case upwards to pop off the lower case    5  Battery Steps    This is where the battery will be disconnected   i  This will help prevent the shorting out of any components during the disassembly  Grab nylon
6.  more than one port at a time  in step 6 you can use the following syntax  when selecting the port  EXAMPLE 90  123  143 149    It is recommended that you only block one port at a time  as it makes it easier to make  changes to it in the long run  as well as its easier to keep it organized this way     We will repeat steps 3 9 for the inbound rule  but instead of the TCP option  we will use the  UDP option     Starting from step 2  we will select the    Outbound Rules    option  then  follow exact same    procedure as we did for the inbound rules option  Once you have ran through it the first    time  you will have to do it again a second time for the UDP or TCP option  which ever    option you didn   t select the first time        You have no successfully blocked off one port  You can run an nmap scan on your server     make sure It is OK to do so   to make sure that it is closed  if nmap doesn   t see it  then    you re in the clear        Deleting Internal Windows Commands    With the Windows internal commands  there might a few you may not need depending on what  services you plan on installing  or the intended use of the server  here is a guide on how to  delete those commands so that won   t be able to be used against you if your system happens  to get compromised     All of the commands are located in the system32 folder  which is located here   C  Windows System32    If you sort the    Type    and look for applications  this is where the actual commands are  the  comm
7.  on FAT32 partition  23 Open  EFI Boot grub cfg from the FAT32 partition    25 Change instances of initrd to initrdefi  26 Save changes to grub cfg    27 Enter command shutdown  r now into a terminal window                   24 Change instances of Linux to Linuxefi                28  Hold the ALT key during the reboot until the image of an Hard Drive labeled EFI Boot  appears   29  Select EFI Boo   30 GRUB bootloader will then appear    31 Select your boot option       Bootloader Information    If the EFl Boot structure is the only boot device on the machine the laptop should begin  by loading the GRUB bootloader by default  It will also directly load the full non repair version  of the Kali installation without any intervention  This allows the machine to natively boot to Kali  and run it as the sole Operating System installed on the machine     There may also be additional repositories required for the update and installation of new  software  For instructions on how to add the repositories along with an extensive repository list  please visit www Linuxg net add the needed repositories for kali Linux      Forensics Mode    If you need to access the forensics mode for Kali please boot up using the USB  installation key that was created earlier in this process  Select the forensics option from the  GRUB bootloader instead of the installation or repair options  The forensics mode will not by  default mount any file systems external to the operating system  It gives you a clean
8.  spudger and using the flat end pry both sides of the connector upward to  dislodge from the socket on the logic board  Bend the cable attached to the battery away from the logic board  slightly  so that it will  not contact the socket during further disassembly       6  SSD Removal    a   b     c   d     Remove single 2 9mm T5 Torx screw securing the SSD to the Macbook Air Logic board  Use the flat end of the nylon spudger lift the free end of the SSD enough to hold with  free hand   Be very careful not to lift excessively   Slowly pull drive straight back to remove from logic board   During re installation make sure the SSD is seated fully before re installing the retaining       7     1 O Board Cabling    a     b   c     Use the flat end of the nylon spudger to pry the I O board cable from the socket  attaching it to the I O board  Using your hands peel the I O board cable up from the adhesive on the fan  Use the flat end of the nylon spudger to lift the I O board connector from the connector  on the logic board  i  Bevery careful to lift the connector straight up out of the logic board as itis a   very deep socket and prying it from side to side may damage the socket   Remover the I O board cable       8  Fan Removal Steps  a  Use the point on the nylon spudger to flip the retaining flap on the fan cable ZIF socket  i  Make sure you are prying up on the hinged retaining flap and not on the socket  itself   b  Remove the two 5 2mm T5 Torx screws and 3 6mm T5 Torx screw sec
9.  target network gt    w  lt prefix for capture file gt   lt monitoring interface gt       The ignore negative one option bypasses a known error in the current version of the airodump  command  Without this option data will not be captured       The  c command is what determines the wireless channel the command will copy information  from       The   bssid command is the mac address of the network you wish to capture data from     The  w command is used to both write to the file and give it a prefix so it is easy to find     The interface specified here must be the same as created in step 3    8a  Crack the WEP key using the aircrack ng command    aircrack ng  b  lt bssid gt   lt packetfile gt       The  b option in the command accepts identical information to the   bssid option in the  previous step  It is the mac address of the target network       The packet file to be checked is the one containing the prefix given to it in the previous step   You can also scan multiple packet files by using the   wildcard in the name     If for some reason you have not captured enough packets then the command will give you an error and  be unable to get the password  At this point you will need to begin from step 7a and repeat  It is  recommended that you retrieve between 40 and 85 thousand points of data  This may take anywhere  from seconds to minutes depending on the network traffic     The cracking of a WPA password is both simultaneously easier and more difficult than WEP  In order to
10.  the MacBook Air involved was taken apart and placed within a  laptop carry case  the tablet has the propped VNC program integrated within it     e One disassembled MacBook Air integrated into laptop carry case  e One nexus tablet integrated to attack system    Attack machine controller  the attack machine has incorporated the following aspects  to be made functional and implemented successfully    Linux installation onto a USB drive  Kali attack aspects   Penetration software   Boot ability   Integration with tablet     Security of prey and network  has incorporate efficient security to make a realistic  attack and to keep the network safe    e Harden a Windows Server 2012 installation  e Network security  as to stay within the projects Wi Fi address allocation    OUT OF SCOPE    We achieved our out of scope adjectives   e Create a well detailed hardening guide for the server installation  e Create a well detailed guide on the attack processes   During the project we reached outside of our scope and accomplished     e A full and functional version of windows intrusion detection system        PROJECT ACKNOWLEDGEMENTS    Ted Hellard    Sponsor of the project  If it were not for Ted  we would have not been able to complete  this project the way we had planned to     Jason Fisher    Our project advisor  and in charge for distributing some of the equipment that we used  to complete this project  Jason also provided us with guidance throughout the completion of  this project      
11. A way of providing network connectivity over the wireless spectrum     NMAP     Network Mapper  A open source software tool used to discover hosts and running services on a network   Developed by Gordon Lyon originally for Linux     TO T5     Stealth level of Network Mapper scan   Used to define the level of aggressiveness and frequency of packets being sent by the  Nmap scan  It begins with TO being the stealthiest scan  possibly taking weeks to complete   and T5 being the most aggressive  potentially only taking seconds or minutes to complete     FMS Attack     Fluher  Mantin and Shamir Attack    Stream cipher attack that    takes advantage of a weakness in the RC4 key scheduling  algorithm to reconstruct the key from a number of collected encrypted message    10     VNC     Virtual Network Computing       APPENDIX B   LINUX INSTALLATION  INSTRUCTION    Kali Live USB Stick Creation    3    1  1  1                         0  1  2    Download Kali 64 bit ISO image from www kali org   Check the hash values of the resulting downloaded image against the value provided  from the download page   Download Rufus Live USB Creator from rufus akeo ie   Connect 4 to 8 GB USB flash drive to computer    Open Rufus Live USB Creator   Select your USB Drive from the Device dropdown   Select MBR Partition Type for BIOS or UEFI   Select Large FAT32 File System type   Select Cluster Size   Give it a Volume name   Select Create a Bootable Disk image check box and from ISO from the Dropdown Menu 
12. FORMAL REPORT 7    The development of a lightweight security testing  tool using off the shelf hardware and software        TABLE OF CONTENTS    Executive Summary   Project Vision   Project Opportunity   Project Objectives   Project Team and Stakeholders   Project Scope   Project Acknowledgements   Project Budget   Project Result   Lessons Learned   Achievements   Project Recommendations   Conclusion   References   Appendix A     Glossary of Terms   Appendix B   Linux Installation Instructions   Appendix C     MacBook Air Disassembly and Re assembly Instructions  Appendix D     Wi Fi Monitoring and Password Retrieval Instructions  Appendix E     Server Hardening Instructions   Appendix F     Detailed Budget    Appendix G     User Manual       EXECUTIVE SUMMARY    The contents of this document outline the vision and goals of our four month final ITCS  project at SAIT  The Cloak and Dagger  A low cost wireless penetration tester  The project will  be completed by Cloak and Dagger  a team composed of three team members  Tyler Hellard   Zachary Preece and Taylor Kraft     The source of this project came about as a need of Ted Hellard and AppColony for a  low profile and inexpensive way to test their security  We also were asked to take a look at it  from a business perspective  as a product for possible future development for the  small medium business market  With it being inexpensive to create  it will give companies a  cheaper alternative to IT security     The manufacturing o
13. ackpad ribbon cable  socket   i  Make sure you are lifting the flap and not the socket itself  Pull the trackpad ribbon cable straight out of its socket toward the front edge of the  machine       h  Use the point of the nylon spudger to de route the right speaker cble from the slot cut  into the logic board    Use the flat end of the spudger to pry the right speaker connector up and out of it   s  socket on the logic board  i  Remember to pry from beneath the cables       j  Gently push the point of the nylon spudger under the black plastic flap stuck to the  display data cable  i  This will make the lock pop upward and away from the socket  k  Remover the small rubber gasket from the corner of the upper case near the display  data cable       While holding the lock away from the display cable socket gently pull the cable away  from the socket  i  Make sure you do not ever pull upward on the cable well removing it from its  oe as this may cause the socket to break off the logic board       m  Use the flat end of the nylon spudger to pry both antenna cable connectors up and off  their sockets on the AirPort Bluetooth card       Remove from the logic board three 3 6mm T5 Torx screws used to secure it to the upper  case structure    p  Gently lift the logic board assembly out of the upper case structure while being careful  not to damage the fragile heat sink and any cables that may get caught       11  Display Assembly Removal Steps    a  Remove the small rubber gasket from th
14. ands are listed in the name as you would if you were to run the command in the  command prompt  If we head on over to this Technet Microsoft website  they have a pretty  detailed list of the Windows commands and what they do  htto   technet microsoft com en     us library cc754340 aspx    Please black up all commands you chose to delete  tamper or modify them in anyway     Now that you have a list of all the commands you wish to delete  and they have now been  backed up to another drive  let   s get started     So if you initially just try to delete a command it will give you a    File Access Denied    message  and not delete the command  Even though you are the administrator for the account you still  don   t have permissions to delete it     But with a few simple steps we can give ourselves permissions  so then we are able to delete    the command       Right click on the command you wish to delete  and select    Properties        Select the    Security    tab along the top  then click    Advanced        Now select the account you wish to increase the permissions for  and select    Edit       Under    Basic permissions     click the    Full control    box  Then hit    Ok        Close all the other tabs so that only the System32 window is open     You can now delete that command     Just repeat these steps for all the commands you need to delete        Installation and Setup of Windows Intrusion Detection System    We use the classic Snort program and it s provided installat
15. der Actions   gt  Inbound Rules  you will see an option called    New Rule       click it    4  The following screen has four options to choose from  Program  Port  Predefined  and  Custom  Since we are dealing with a port we will select the Port option  and then click    next          We now have an option to choose what protocol and what port we want to block  we will  start with TCP  and the port you wish to block  we will be going back and blocking the  UDP one as well after this  Select TCP and Specific local ports    will be using port 555    as an example      The next screen prompts you to choose one of three options     Allow the connection         Allow the connection if it is secure     and    Block the connection     Since we don   t want    any communication along this port we will choose the    Block the connection    option       Inthe next step  the screen wants to know where this rule will apply  in the    Domain         Private    and or    Public    network location  again  as we want to fully block  communication from this port we will have all three selected  which should be the  default option  Then click    Next          The final step is to name it  you can name it anything you want  Although   do suggest  giving it a practical name so you can find it later  if you need to delete or reconfigure this  rule    will call it    TCP Port 555 Blocked     Then click    Finish        We are now 1   4 the way there to fully blocking off a port     You can block
16. e Rack   Cabinet 4POSTRACK25    Accessed  21 Nov 2013        Windows Server 2012 Standard License     Online  Available   httos   www google ca url sa t amp rct   amp q  amp esrc s amp Source web amp cd 2 amp ved 0CFsQFJAB amp url     http 3A 2F 2Fdownload microsoft com 2Fdownload 2F4 2FD 2FB 2F4DB352D  1 C610 466A 9AAF EEF4F4CFFF27 2FWS2012 Licensing    Pricing FAQ pdf amp eiz EXqOUrDFG   OBiwKM04GwAw   amp usg AFQjCNEtmNeilPtwObolAju2kH4iqgOAxvw amp sig2 s765JxBml27hC    R_K9RGrkg amp bvm bv 5698801 1 d cGE   Accessed  20 Nov 2013        TSA Approved Messenger Bag     Online  Available   http   www futureshop ca en CA product init 13 3 polyester laptop case nt   nb940 10108348 aspx path cff1 7bf02e5bb956094bd78e772ac095en02   Accessed  2 Apr 2014       Aircracking ng Website     Online  Available     http   www aircrack ng org    Accessed  7 Apr 2014         10     Fluher  Mantin and Shamir Attack Wikipedia     Online  Available     http   en wikipedia org wiki Fluhrer  Mantin and Shamir attack   Accessed  7 Apr 2014        APPENDIX A   GLOSSARY OF TERMS    WEP     Wired Equivalent Privacy  This is an old and obsolete wireless protection standard  Original wireless security standard  that has been replaced by newer more secure standards    WPA WPA2     Wi Fi Protected Access   Wi Fi Protected Access II  A more secure wireless security standard developed to supplement WEP  It is subject to  fewer security vulnerabilities than WEP     Wi Fi     A wireless local area network  
17. e corner of the upper case nearest to the small  I O board    Use the pointed tip of a nylon spudge to carefully flip up the retaining flap on the  microphone cable socket  i  Be sure you are prying up on the retaining flap itself and not the socket       c  Pull the microphone ribbon cable straight out of its socket       e  Use the flat end of the nylon spudger to pry the left soeaker cable connector up and out  of its socket on the small I O board  i  Remember to pry from beneath the wires    f  Pull the camera cable parallel to the face of the small I O board toward the rear edge of  the machine to disconnect it from its socket  i  Remember not to list upward on this cable as it may result in the breaking off of  its socket from the board       g  Remove from the small I O board the single 3 6mm T5 Torx screw securing it to the  upper case    h  Carefully lift the I O board from its edge nearest to the logic board and remove it from the  upper case       i  Peel up the six cable loops used to secure the antenna cables to the upper case    j  Gently pull the cable loops lightly out of the channel cut into the upper case one at a time       Use your spudger to open up the plastic loops as you de route the antenna cables  through them  i  Repeat this for all of the retaining loops    Remove the inner 4 9mm T8 Torx screw securing each display hinge to the upper case  i  This is will result in two screws total removed       m  Open the display until it is perpendicular to the 
18. e recovery disk was created   The 64 bit Kali image must be used in order to enable the use of the UEFI option in   Rufus   The option for making the USB drive bootable must be selected and the option must be   set to use an ISO image and not either FREE DOS or MS DOS   Booting into the Live USB environment and then installing from the live installer is faster   and smoother than booting to the graphical install mode    A network connection and update is required during installation for full functionality  An   update of the software upon install is also required  The commands for the post install   updates are apt get update   The default Linux web setup page is 192 168 1 1   The version of the aircrack ng suite in the downloaded version of Kali will give a channel   error when trying to sniff for packets  An update to the version 1 2 beta build combine   with the   ignore minus one option when running the airodump ng command is required   to fix this bug  ok            When the attack target is too far from a wireless access point and using the internal  wireless card the four way handshake indicating authentication may not always be  captured when a client authenticates   There are two ways to configure the RealVNC service to start when the machine boots   The TD LINK wireless card is considered plug and play within the Kali environment  The video setting in the VNC viewer app should be set to high quality to enable a full  screen sharing    Using the Zenmap GUI interface 
19. ending on how often people authenticate to the network     9b  Run the capture file against the user supplied password list  This will hash each value in the  password file and compare it to the contents of the WPA handshake       aircrack ng   bssid  lt target network gt   w  lt password dictionary file gt   lt capture file gt       The   bssid option is used identically to the previous steps  This is the mac address of the  target network  This is considered useful when your packet file contains the handshakes and  information for multiple networks       The  w option is used to give the location of the password file to hash     The capture file option is used to specify any file using the prefix that was created in step 7b     This will pull up a command window that will show each password being run through the command  along with the rate at which passwords are being hashed  If the password crack is not successful then  you have the option to find either a larger password list  which can run into the billions of combinations   or run the packet file through another tool such as hashcat  These tools allow you to bruteforce the  password but are outside the scope of this guide     The final attack option is the reaver tool  The reaver tool exploits a vulnerability in the WPS  Wi Fi  Protected Setup   This is a tool that most modern routers are equipped with  There are many small  businesses and consumers that never disable this option because of it s simplicity and ease of 
20. ent of the speed  The machine was also  successfully disguised into the space separating two pockets of a laptop briefcase  This allows  it to be hidden and remotely controlled via the Nexus 7 completely  A wireless attack can also  be conducted via this method     The second half of the project  a hardened server  was also completed to the best of our  abilities  The ports that we do not need were closed and the firewall was setup  We also  succeeded in removing Windows commands that are not used by our installed services  We  also removed the commands not used upon startup  The most important portion of our  hardened server  a Snort installation  was successfully installed  We chose to go with what is  known as the Windows Intrusion Detection System  This allows a link between snort and a  postgres sql database  This gives us a database of the events that triggered our snort rules   This database can then be read via an apache server and displayed in an easy to use web  based platform        LESSONS LEARNED    Measure the server racks that the project room has before ordering to see if we need to   order a specific rack  server did not fit in rack    When working with the website  work with it locally  don   t save directly to dropbox folder   There are a huge amount of open ports on the server then initially anticipated   Use windows firewall with advanced security to close ports   There is a 5 minute login delay with the security policy that was implemented    Snort is co
21. f this project will require the skills and techniques that were  learned through the Information Technology Computer Systems program  which includes  categories such as programming  networking  system administration  hardware integration   server and database administration  and information security  and will therefore will be the  scope of the project     The development of The Cloak and Dagger will cost approximately  97 279 49   between the hardware and software costs  as well as the projected labour costs from the Gantt  chart  The labour costs will be the major component of the budget with it being approximately   90 554 00 between the three of us  The hardware will be approximately  5801 39 and  software is the least expensive component being approximately  924 10     Upon completion of the project  The Cloak and Dagger will present the final deliverable  to the SAIT instructors  our clients sponsors  the general public and the Information  Technology Computer Systems Capstone Project Showcase        PROJECT VISION    Our project vision is one of providing security and peace of mind to both medium and small  business enterprises  These businesses have traditionally either been ignored by the larger security  market or have neglected to develop a security plan  The security of our personal and corporate  information is becoming more and more important each and every day  We see an opportunity to  develop a combination of products that will determine the social and techno
22. hree column layout        ACHIEVEMENTS    At the beginning of this project  Cloak and Dagger set goals that had to be completed in  order to complete this project  Throughout the course of the project  we have completed all the  goals that had to be done     These are the following achievements that Cloak and Dagger did through the course of the  project     We installed a Linux operating system onto a MacBook Air as the lone operating  system    Hardened Windows Server 2012  Successfully installed and ran Snort    Removed the display for the MacBook Air  and placed it into the laptop  messenger bag    Remotely controlled the MacBook Air though a tablet       PROJECT RECOMMENDATIONS    Technical recommendations    Use a laptop with a discrete graphics card   To fully sew the laptop into the compartment   To install a 3G connection to take advantage of using a cloud instance   Keep your website current and up to date throughout your project    Team recommendations    Starting your project as early as possible as to not get behind    Leave leeway in your charter as to leave room for last minute adjustments   Document and timestamp everything for accountability   Communicate with your team members often as to keep up to date with their progress   Keep your journal well maintained and up to date       CONCLUSION    In conclusion  team Cloak and Dagger was successful in building a fully functional  lightweight security testing tool using off the shelf hardware and software  This i
23. instead of nmap provides easier access to information  and storage of scans   The beta version of the aircrack ng suite requires the use of the   ignore negative one  options when capturing the packets for the handshake   Further disassembly of the display assembly itself is required to remove the wi fi  antenna   The display T8 torx screws are very difficult to remove without damaging the display  The logic board required a little bit of fitting and re fitting in order for the ports to properly  align with their outputs in the case   Failure in the file system check  This was due to the battery being drained and  disconnected    A WEP attack requires the capture of a large number of individual packets to provide  enough information to break the password   A 4 way handshake will not be captured by the utility on every occasion  This tends to  occur due to signal strength issues    The installation of the graphing components requires an internet connection to install  the pear graphing system    The problem automated scans in our situation is if something happens to go wrong with  it we could end up break the SAIT network and not have control of that scan   To install snort you first have to installWinPcap so you can capture and transmit network  packets  You also need to configure the conf file to your configuration not the forums   That a screw driver and clamp weren t strong enough to pry the encasing of the wireless  antennas    The web site flows and looks better with a t
24. ion instructions for the  Windows Intrusion Detection System  These instructions are available at  http   www  winsnort com index php module Pages amp func display amp pageid 39  Some of the  software required for installation requires that the user apply for membership in the website   This usually takes between 4 hours and a day to be activated  The instructions can also be  followed manually but will require modification of or creation of some of the configuration    scripts        APPENDIX F   DETAILED PROJECT BUDGET    Initial Appropriations    Equipment and Facilities    The table below shows the breakdown of the hardware equipment costs        Hardware Equipment Costs       Item    Description    Quantity    Cost of Hardware       11 inch Macbook Air  64GB  1     Standalone computer and  backup    2     1572 90       TP LINK TL WN722 High  Gain Wireless Adapter  2     Wireless network adapter     53 20       Nexus 7 32G  3     Computer Tablet     293 99       32GB USB Stick    USB Flash Drive     121 76       iFixit com ProTech Toolkit   4     Tool kit to fix the equipment     224 85       iFixit com Magnetic Project  Mat  4     Work on aclean area     59 85       iFixit com Air Pentalope  Screw Driver  4     Macbook screw driver     35 85       TSA Approved  Messenger Bag    To carry our equipment     360 00       HP DL360e Gens E5   2403 8SFF US Svr  S   Buy  With 2 Hard drives    5     Server hardware     2495 85       25U 4 Post Server  Open Frame Server  Rack  6  
25. logical vulnerabilities of  our client s   This will be a lightweight  low cost penetration tool and a hardened server installation   This will allow these corporations and businesses to satisfy coming legal and societal requirements  for the protection of data     The first deliverable will be a lightweight and low cost penetration tool  This will be used to  gather the wireless connection information of our client  This information will then be used to  discover the password of the wireless network and gain access  The tool will then be used to run  several scans to gather data on the vulnerabilities present on the network  This data will then be  used to create a report for the client detailing the vulnerabilities on their network     The second deliverable will be a hardened server installation  The purpose of this deliverable  will be to show our client s  how to begin protecting themselves from security breaches along  with giving us a demonstration target  The process of hardening the server will be documented  in minute detail  The server will then be tested by using the first half of the project to test the  security of the network and the strength of the installation  The server and documentation  would then be used by a client as a template for hardening their own server equipment        PROJECT OPPORTUNITY    There is a large discrepancy between the security capabilities and knowledge of  small medium businesses when they are compared to large multi national corpo
26. mmand line based   Snort commands are stored in c  WINDOWS system32   There are a lot of different screws when it comes to the MacBook Air very easy to get   confused if you do not label them when you remove them    You can take over permissions from trusted installer by  Right Click on the file folder      gt  Permissions   gt  Security tab   gt  Advanced   gt  Under permission entries click admin   gt    then select edit   gt then give full control to the account you want   gt  Apply   A USB   A USB stick smaller than or equal to 32GB must be used as any larger cannot be   formatted to FAT32    The Operating System download required an installation of the Microsoft Secure   Download Manager    HP Intelligent Provisioning has an initial setup that must be completed before an   operating system can be installed    License key is required for the use of the SAS drives   Kali requires a secondary program named Rufus to create a UEFI bootable live USB   flash stick   The MacBook Air runs a customized version of the UEFI EFI boot structure    Kali will require the customized files from the UEFI version of Fedora in order to be   bootable on the MacBook Air  It will also require the creation of OSX Mavericks   recovery USB memory stick in order to restore the OSX Mavericks installation if   required   The USB drive can only be used to restore an installation of OSX on the machine it was   created on  It can also only be used for the version of OSX that was on the machine   when th
27. ndalone computer and  backup    2     1572 90       TP LINK TL WN722 High  Gain Wireless Adapter  2     Wireless network adapter     53 20       Nexus 7 32G  3     Computer Tablet     293 99       32GB USB Stick    USB Flash Drive     182 64       iFixit com ProTech Toolkit     4     Tool kit to fix the  equipment     224 85       iFixit com Magnetic  Project Mat  4     Work on a clean area     59 85       iFixit com Air  Pentalope Screw  Driver  4     Macbook screw driver     35 85       TSA Approved  Messenger Bag 8     To carry our  equipment     51 99       HP DL360e Geng E5   2403 8SFF US Svr  S   Buy  With 2 Hard  drives   5     Server hardware     2495 85       Monitor    LG 19    monitor     105 00       Cat5 Cables    Ethernet cables     10 50       D Link Wi Fi Router    Wireless Router     55 00       USB Mouse    Mouse     10 50       USB Keyboard       Keyboard        10 50          Total Hardware Costs        5554 26             The table below shows the breakdown of the software costs of the project        Software Costs       Item Description Cost       Windows Server 201 2 7  Standard Edition  924 10       Linux Operating System Kali Free       Perl Programming Language Free       C Programming Language Free       Metasploit Hacking Tool Free       Snort Hacking Tool Free          Total Software Costs    924 10                Operation Costs    The table below shows the estimated operating costs for each team member broken down into  management costs and prod
28. ow the    penetration of most consumer or small business networks  The best defence against these attacks is to  change your password on a regular basis  You can also completely disable the reaver attack vector by  disabling the WPS functionality on your router        APPENDIX E   SERVER HARDENING  INSTRUCTIONS    Hardening Windows Server 2012    The Windows Server 2012 is a very sturdy piece of software that doesn   t need many  modifications to harden it  Depending on what services you plan on installing or what you plan  on doing with it  you may need to block certain ports  or remove some Windows internal    commands     will tell you how to remove the internal Windows commands and how to block ports   Blocking ports on your Windows Server 2012    1  From the desktop screen you want to search for the Windows Firewall with Advanced  Security applet  you can do this in a couple of ways   e Hit the Windows key on your keyboard  If you have one   then type Windows  Firewall with Advanced Security  Then click on the only applet available   Go to the start menu  Bottom left of the desk top  far left on the tool bar  and open it   Click on the control panel  then go to advanced settings  on the left hand plane      2  Now that we have this applet window open  we will make use of two options that are    listed on the left had side called    Inbound Rules    and    Outbound Rules        3  We will start with Inbound Rules  once its selected you will see on the right hand side   Un
29. rations  This  causes the personal information of their clients to be more vulnerable to theft or destruction  It  also means they may fail to meet their legal and social obligations in regards to the  information     This problem is not one that can be solved by a singular approach  It will require a two   pronged approach that will create two physical deliverables  The first will be a Linux based  network penetration testing tool  This will allow us to identify the wireless and network  vulnerabilities  This information will then be used to prepare a report detailing these  vulnerabilities and suggestions to fix them  The second will be a hardened Linux server  This  will be used to demonstrate a fully functional hardened server  It will also be used to prepare a  document detailing the steps to harden the server  The client can then use these steps to  develop a process to harden their own infrastructure     There is currently little technology like this outside of SAIT polytechnic that focuses  on small to medium business markets  We see the small to medium markets more vulnerable with  the lack of money available to them for security purposes  this will provide them with an easy  understanding as well with a very economical solution for their security needs     This project can be completed and maintained without a large sum of money  The  initiation of the project is based on a desire to see it being implemented as a starting ground  for smaller companies to get a head 
30. s a proto type  item  in which we were able to successfully hide the attacking machine within a laptop carry  case  with room for ventilation  With more time we would be able to encase the attack machine  or disable the keyboard as to prevent accidental button press within the carry case along with  proper re stitching of the carry case        REFERENCES     1     Refurbished 64 GB 11 inch Macbook Air    Apple  Online  Available     http   store apple con ca browse home specialdeals mac   Accessed  5 Oct 2013      2     TP Link Wireless Adaptor TL WN722N USB 2 0    Newegg  Online  Available   http   www newegg ca Product Product  aspx  ltem N82E 16833704045C VF amp  Tpk TL   WN722   Accessed  5 Oct 2013      3     Nexus 7 32GB Wi Fi Only    Google  Online  Available     httos   play google cor store devices details Nexus 7 32GB id nexus 7 32gb 2013   Accessed  6 Oct 2013      4     iFixit The free repair guide for everything written by everyone     iFixit  Online  Available     htto   www  ifixit com Parts Store   Accessed  6 Oct 2013        HP Proliant DL360e Gen8 E5 2403 8SFF US    HP  Online  Available    http   www  metafore ca Product Default aspx  SearchSubmitted True amp ManufacturerName   Hewlett  _Packard amp ManufacturerlD 270 amp MfPN 686210    S01 amp MflD 2708 amp AltCatID  10010402    Accessed  21 Nov 2013        Startech 25U Open Frame Server Rack Cabinet    Startech  Online  Available   http   ca startech con Server Management Racks 25U 4 Post Server Open Fram
31. start on their computer security     PROJECT OBJECTIVES    There are several requirements    that must be met for this opportunity that must be covered   e The attack machine must be hidden and capable of remaining undetected in a crowded   public area   The attack machine must be capable of gathering wi fi packets from both WEP and  WPA WPA2 protected networks  It must also be capable of decoding those packets to gain  login information   The hardened server must be capable of detecting a vulnerability scan of the network it is a  member of   The hardened server must be capable of withstanding several simultaneous basic  attacks from an attacker who has gained access to the wireless network        PROJECT TEAM AND STAKEHOLDERS    The table that follows is the key stakeholders in this project  Our client and project sponsor is  Ted Hellard  He is the current Owner and Managing Partner of the mobile application developer  AppColony  He believes there is market for a device and associated documentation to help small  and medium sized businesses secure their data  The performing organization is our group known  as Cloak and Dagger  We are a small group of people devoted to securing the data of others    around us        Stakeholders    Comment       Project Manager   Team    Tyler Hellard  Taylor Kraft  Zachary Preece       Client    Ted Hellard       Performing Organization    Cloak and Dagger       Sponsor          Ted Hellard             PROJECT SCOPE    Hardware integration 
32. tructions  1  Determine network interfaces running on attack machine    ifconfig  2  Choose the wireless interface to use for monitoring    The network will be prefaced with wlan to indicate that it is a wireless network   3  Place the wireless interface into monitoring mode    airmon ng start  lt chosen interface gt   4  Confirm wireless interface placed into monitoring mode    iwconfig      You will need to look for the wirless interface chosen in the previous step  If monitoring mode  has been successfully enabled it will display an interface with the name of mono     5  Look for available networks to attack    airodump ng  lt interface gt     The interface entered here must be the monitoring interface created in step 3     6  This command will display as much information that can be gathered about all of the wireless  networks accessible by the machine  This information includes the BSSID  mac address of the router    the CH  channel the network is operating on  and the ENC  encryption type   These encryption types  include WEP  OPN  open   WPA and WEP   do not know encryption type     This is now the stage where the instructions differ when cracking WEP and WPA  The cracking of WEP  requires the capture of a large number of packets  also known as initialization vectors         7a  Listen to a specific channel and write all of the data to disk to be used for cracking of the password      airodump ng   ignore negative one  c  lt channel the network is on gt    bssid  lt of
33. uction labour costs        Item Hours Rate Cost       Tyler Hellard       Management  100 00  1 028 00       Labour Costs    69 00  3 829 50       Zachary Preece       Management  100 00  1 385 00       Labour Costs  69 00  4 019 25          Taylor Kraft       Management    100 00  861 00       Labour Costs  69 00  3 628 02                   Total Operating Costs    14 750 77                   APPENDIX G   USER MANUAL       
34. upper case and place it on a table  i  Remove the remaining 4 9mm T8 Torx screw from the lower display bracket    n  Remove the last 4 9mm T8 Torx screw securing the display to the upper case  i  Before removing the last display screw be sure to hold the display assembly  steady with your other hand  Failing to do so may cause components to fall onto  the table causing possibly expensive damage       o  Push the upper case slightly toward the display assembly then rotate it away from the  front of the display assembly    p  Once the two display hinges have cleared the upper case remove the display and set it  aside    To re assemble the machine into the attack configuration follow these steps in reverse  Any of  the steps that involve re attachment of connections to the display or modules in the display can be  safely ignored  You may also wish to remove the antenna from the base of the display which can be  accomplished using a Dremel tool and a careful hand  You may wish to confirm the startup functionality  before removing the display module     OO  co       APPENDIX D   WI FI MONITORING AND PASSWORD  RETRIEVAL INSTRUCTIONS    These instructions will help you  the user  conduct basic wireless attacks on several styles of  networks using several styles of security  These will include attacks against WEP  WPA and WPA  networks secured using WPS  Wi Fi Protected Setup   The instructions are different for each network  type but they share a common starting point     Common Ins
35. uring the fan to  the upper case   c  Lift the fan assembly out of the upper case and carefully remove the fan ribbon cable out  of its socket as your remove it from the machine       9  Battery Removal Steps   a  Remove from the battery the two 5 2mm T5 Torx screws from the battery closest to the  logic board and CPU  Remove the two 2 6mm T5 Torx screws from the battery closest to the trackpad location  Remove the single 6mm T5 Torx screw from the center of the battery  Be sure to label the size and location of all screws removed from the battery  Lift the battery beginning from the edge closest to the logic board and remove from the  upper case   i  Do not touch or squeeze the battery cells when handling the battery    10  Logic Board Steps  a  Using the flat end of the nylon spudger to free the adhesive loop securing the I O board  power cable to the upper case  b  Disconnect the I O board from the logic board by pulling the power cable gently away  from it   s socket on the logic board  Pull the cable parallel to the face of the logic board toward the front edge of the machine    d  Use the point on the nylon spudger to flip the retaining flap on the keyboard backlight  ribbon cable socket  i  Be careful you are lifting the hinged retaining flap and not the socket itself  e  Pull the backlight ribbon cable out of its socket    N            i  Make sure to pull parallel to the logic board until loose    Using the point of the nylon spudger lift the retaining flap on the tr
36. use  It is  symbolized by a button on the router that appears to be two arrows chasing each other  This sends a  pin between the two devices  Reaver uses this vulnerability in order to brute force the pin number and  connect to the network        7c  Install the Reaver package     apt get install reaver     This installs the reaver package as not all distributions come with it pre installed   8c  Run Reaver against the target network     reaver  i  lt interface gt   b  lt BSSID gt       This will send pins at a constant rate to the designated network until it finds the pin that allows  a connection       The  i option is used to specify the wireless interface that was placed into monitoring mode in  step 3 of this guide       The  b option is used to specify the BSSID or MAC address of the target network     This will continue to run until you either run into the limit of the router or you find the proper pin and gain  access to the network  There are some routers that will only allow a certain number of pins to be sent to  them before they lock themselves from remote pins  At this point the only way to crack the password is  to use one of the previous options  Reaver is also highly dependent on the signal strength of the  network connection  If there is a weak signal the pins will not always be able to make it to the router  and the attack machine may not also be able to retrieve the response     These instructions cover the most common wireless attack methods  They will all
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
エクスプレス TM 印象材  HOBLink JWT Benutzerhandbuch  User Manual  WADE-8072 User`s Manual    Manual de instruções Amplificador valvulado colossal  Dossier tecnico con certificati  USER`S MANUAL  Yamaha P-70 User's Manual  Antec KÜHLER shelf    Copyright © All rights reserved. 
   Failed to retrieve file