Creation of Two Modules for the Network Authentication Cracking

Creation of Two Modules for the Network Authentication Cracking

Creation of two modules for the Network Authentication Cracking Tool Ncrack Ilias Panagiotis SID: 3306150004 SCHOOL OF SCIENCE & TECHNOLOGY A thesis submitted for the degree of Master of Science (MSc) in Mobile and Web Computing OCTOBER 2015-2016 THESSALONIKI – GREECE Ilias Panagiotis SID: 3306150004 Supervisor: Prof. Papadopoulos Apostolos Supervising Committee Members: SCHOOL OF SCIENCE & TECHNOLOGY A thesis submitted for the degree of Master of Science (MSc) in Mobile and Web Computing OCTOBER 2015-2016 THESSALONIKI – GREECE Contents CONTENTS........................................................................................................ 1 INTRODUCTION ................................................................................................ 4 INFORMATION SECURITY..................................................................................... 4 NCRACK OVERVIEW .......................................................................................... 5 PROBLEM ANALYSIS ...................................................................................... 6 ANALYSIS OF NCRACK ARCHITECTURE...................................................... 7 OPERATING SYSTEM OF CHOICE ............................................................... 11 ARCH LINUX .................................................................................................. 11 ARCH LINUX ADVANTAGES ....................................................................................... 12 Simplicity......................................................................................................... 12 Modernity ........................................................................................................ 12 Pragmatism ..................................................................................................... 12 User centrality ................................................................................................ 12 Versatility ........................................................................................................ 13 KALI LINUX .................................................................................................... 14 CREATING A MODULE .................................................................................. 15 MODULE DEVELOPMENT PROCESS ANALYSIS .................................................... 15 TOOLS ANALYSIS .......................................................................................... 16 NMAP ........................................................................................................... 16 NCAT ............................................................................................................ 17 WIRESHARK ................................................................................................... 19 GNU DEBUGGER ............................................................................................ 20 GIT – GITHUB ................................................................................................ 21 IMAP MODULE DEVELOPMENT .................................................................... 24 WHAT IS A IMAP? .......................................................................................... 24 IMAP: The Basics ............................................................................... 25 1 | P a g e Mail Servers, Email Clients and IMAP ................................................ 25 IMAP versus POP ............................................................................... 25 Using IMAP ......................................................................................... 25 Main Advantages of IMAP .................................................................. 25 IMAP Server Configuration ................................................................. 26 DOVECOT IMAP SERVER ................................................................................ 26 Dovecot server Configuration.............................................................. 28 Authentication ..................................................................................... 28 MAILSTORE SERVER ...................................................................................... 28 How to install....................................................................................... 29 Logging on as Administrator ............................................................... 29 Install Test License ............................................................................. 29 Change Password ............................................................................... 29 Create Users ....................................................................................... 29 Create Users Manually ................................................................................... 30 ARCHIVING MANAGEMENT BASED ON PROFILES ......................................................... 31 Overall Concept .............................................................................................. 31 Archiving Your First Email ............................................................................. 31 User Access to the Archive ................................................................. 32 Using MailStore Client ........................................................................ 32 Using the MailStore Outlook Add-In .................................................... 32 Using Other Email Clients ................................................................... 32 Via an Internet Browser (MailStore Web Access) .......................................... 32 Using Smartphone (iPhone, Android, Windows Phone, etc.) .............. 32 DEVELOPMENT PROCEDURE ............................................................................ 33 Ncat Authentication Attempt................................................................ 37 BUILDING A MODULE ....................................................................................... 38 IMAP protocol packets ........................................................................ 40 IMAP module Source-code Analysis: .................................................. 41 CASSANDRA MODULE DEVELOPMENT ...................................................... 47 APACHE CASSANDRA ...................................................................................... 47 NOSQLDATABASE .................................................................................................... 48 FEATURES OF CASSANDRA ......................................................................................... 48 INSTALLING CASSANDRA .................................................................................. 49 PREREQUISITES .......................................................................................................... 49 2 | P a g e INSTALLATION PROCEDURE ......................................................................................... 49 Configuration....................................................................................... 49 Main runtime properties ...................................................................... 50 Changing the location of directories .................................................... 50 CQLSH ....................................................................................................... 50 Description .......................................................................................... 51 Using CQL commands ........................................................................ 51 Saving CQL output in a file ................................................................. 52 Using files as input .............................................................................. 52 The cqlsh environment variables ........................................................ 52 CQLSH Authentication ........................................................................ 53 CQLSH failed authentication ............................................................... 54 Cassandra Wireshark authentication Packet ...................................... 55 Cassandra Server Reply - Positive ..................................................... 56 Cassandra Server Reply - Negative .................................................... 57 Cassandra Packet Analysis ................................................................ 58 CASSANDRA MODULE SOURCE-CODE ANALYSIS ................................... 59 MODULE FINAL TOUCHES ............................................................................ 66 MERGING OF THE TWO NEW MODULES ............................................................... 68 EMAIL TO NMAP’S DEVELOPERS TEAM ............................................................... 71 GENERAL NCRACK SCAN ................................................................................ 72 NCRACK SCAN USING THE IMAP MODULE ......................................................... 73 NCRACK SCAN USING THE CASSANDRA MODULE ................................................. 75 CONCLUSIONS ............................................................................................... 77 BIBLIOGRAPHY .............................................................................................. 78 3 | P a g e Introduction Information security Information security or cybersecurity is a field that becomes more and more popular. Information security or infosec, is several strategies we use in order to control

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    81 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us