Question Details

(Answered)-How to find the DHCP Client addresses assigned to backtrack and


How to find the DHCP Client addresses assigned to backtrack and DVL machine by the router (server) in the following case?


CS 6823 ? Network Security ? Covert Communications

 


 

Covert Communications

 

Objective

 

The purpose of this lab is to gain an understanding of creating a covert channel

 

between two virtual machines in VLAB. A covert channel, sometimes called a stealth

 

channel, is a communication channel that uses a computer?s protocols, or hardware to

 

affect unsanctioned communications that is difficult to detect. For this lab you will be

 

using fields in the IP, TCP, UDP protocol to send messages between two VMs. The

 

VMS you will be using are DVL and BT5 both of which have Python/SCAPY

 

installed. They both also have wireshark installed

 


 

BT5 and DVL get their IP addresses from the DHCP server on RTR. On my

 

configuration the IP addresses for BT5, DVL and RTR re s follows: 10.10.111.113,

 

10.10.111.111, 10.10.111.112. Boot RTR, and then boot BT5 and DVL. Record the

 

address for each of the machines. For this experiment you will create a covert channel

 

between DVL and BT5.

 

1. Assumptions

 

Although it is possible for DVL and BT5 to communicate without using their respective

 

IP addresses (using other addresses) you may assume that DVL and BT5 communicate

 

directly using their respective IP addresses.

 

You may assume that communication between DVL and BT5 is perfect. i.e. no dropped

 

IP packets.

 

Choose one of the VMs to be the server, the other the client where the server sends a

 

covert message to the client. The server will make use of the send() function of SCAPY to

 

send the crafted IP packet. The client will make use of the sniff() to listen for the covert

 

message.

 

You may assume there is other traffic on the network between DVL and BT5 so you have

 

to parse out the correct IP packet for the covert channel.

 

Do NOT use socket programming!!!! This method is not only no convert it is easily

 

detected!!!

 


 

Page 1 of 2

 


 

CS 6823 ? Network Security ? Covert Communications

 


 

2. Covert Communication

 


 

Build your solution in a layered approach.

 

1. [50 pts] Start by creating two Python/SCAPY programs; one for client, one for

 

server assuming the only IP traffic is between DVL and BT5 is yours.

 

2. [25 pts] Send a string from the server to the client and have the client print out the

 

string that was sent.

 

3. [25 pts] Add code for selecting the correct IP packet from the overall background

 

traffic. Show that this works.

 

4. [Extra 50 pts] Add start commands that the client can send to the server to initiate

 

communications and a finish command that the server can send to the client to

 

indicate the string has been sent.

 

5. [Extra 25 pts] modify your programs so that your encoding of your message is not

 

easily determined by wireshark. You may use any Python or SCAPY function.

 

There is no right or wrong answer. Only righter or wronger answers. If you open wireshark and

 

the screen is filled with red flags on the fields you used that it a wronger answer. Think about why

 

you selected a certain field and think about how an administrator would detect you covert

 

communications.

 


 

What to Submit:

 

1. For each question, 1, 3, 4 and 5 provide the source code for the server and client.

 

2. Provide a written description of what your programs do and why you chose the

 

fields you used for covert communications.

 

3. Include screen shots of the constructed packet that?s generated. Provide

 

description and explanation of what?s required to complete each question

 

Put your name and ID at the top of each file you submit!!!

 


 

Page 2 of 2

 


 

 


Solution details:

Pay using PayPal (No PayPal account Required) or your credit card . All your purchases are securely protected by .
SiteLock

About this Question

STATUS

Answered

QUALITY

Approved

DATE ANSWERED

Oct 07, 2020

EXPERT

Tutor

ANSWER RATING

GET INSTANT HELP/h4>

We have top-notch tutors who can do your essay/homework for you at a reasonable cost and then you can simply use that essay as a template to build your own arguments.

You can also use these solutions:

  • As a reference for in-depth understanding of the subject.
  • As a source of ideas / reasoning for your own research (if properly referenced)
  • For editing and paraphrasing (check your institution's definition of plagiarism and recommended paraphrase).
This we believe is a better way of understanding a problem and makes use of the efficiency of time of the student.

NEW ASSIGNMENT HELP?

Order New Solution. Quick Turnaround

Click on the button below in order to Order for a New, Original and High-Quality Essay Solutions. New orders are original solutions and precise to your writing instruction requirements. Place a New Order using the button below.

WE GUARANTEE, THAT YOUR PAPER WILL BE WRITTEN FROM SCRATCH AND WITHIN A DEADLINE.

Order Now