Difference between revisions of "Nick Apseloff"

From WLCS
Line 3: Line 3:
 
::AJ McLennan, Willie Stehm, and I set up a network of 3 computers. We first installed Xubuntu (a Linux distribution) on each machine and then networked them together using ethernet cables and a hub.
 
::AJ McLennan, Willie Stehm, and I set up a network of 3 computers. We first installed Xubuntu (a Linux distribution) on each machine and then networked them together using ethernet cables and a hub.
 
2. Use a [http://netsecurity.about.com/cs/generalsecurity/g/def_pacsniff.htm packet sniffer] to capture messages sent from one computer to another on the network. [X]
 
2. Use a [http://netsecurity.about.com/cs/generalsecurity/g/def_pacsniff.htm packet sniffer] to capture messages sent from one computer to another on the network. [X]
::We initially tried to get the program 'talk' working on the machines so we could easily send messages between two computers in an attempt to view the packets sent on the third computer, but after a few days of trying to get it to work, we settled on using Pidgin (a messenger client that is compatible with AOL Instant Messenger).
+
::We initially tried to get the program 'talk' working on the machines so we could easily send messages between two of the computers in an attempt to view the packets transmitted on the third computer, but after a few days of trying to get it to work, we settled on using Pidgin (a messenger client that is compatible with AOL Instant Messenger).
 +
::We then downloaded a packet sniffer called 'Wireshark' and ran it on one of the computers.  On AJ's computer, he signed onto AOL Instant Messenger using his screen name.  By changing the display filter of the packet sniffer to only show AIM packets, we were able to see his screen name when he logged on.  It was difficult to decipher which packets corresponded to what he was doing, but after getting familiar with the descriptions of the packets it was easy to pick out the ones that were messages.  We were able to read outgoing and incoming messages as well as buddy info that the other computer was viewing.
 
3. Research network security and vulnerabilities and document findings. [ ]
 
3. Research network security and vulnerabilities and document findings. [ ]

Revision as of 19:06, 30 September 2008

Goals for 1st Quarter

1. Set up a small network of 3 computers using a hub. [X]

AJ McLennan, Willie Stehm, and I set up a network of 3 computers. We first installed Xubuntu (a Linux distribution) on each machine and then networked them together using ethernet cables and a hub.

2. Use a packet sniffer to capture messages sent from one computer to another on the network. [X]

We initially tried to get the program 'talk' working on the machines so we could easily send messages between two of the computers in an attempt to view the packets transmitted on the third computer, but after a few days of trying to get it to work, we settled on using Pidgin (a messenger client that is compatible with AOL Instant Messenger).
We then downloaded a packet sniffer called 'Wireshark' and ran it on one of the computers. On AJ's computer, he signed onto AOL Instant Messenger using his screen name. By changing the display filter of the packet sniffer to only show AIM packets, we were able to see his screen name when he logged on. It was difficult to decipher which packets corresponded to what he was doing, but after getting familiar with the descriptions of the packets it was easy to pick out the ones that were messages. We were able to read outgoing and incoming messages as well as buddy info that the other computer was viewing.

3. Research network security and vulnerabilities and document findings. [ ]