All posts by mistermarmolejo

Cyber Security Boot Camp – Wireshark Packet Analysis 2

Objective: 

Students will continue preparing for proficiency in cyber security with an introduction to the basics of packet analysis in the Wireshark application.

Links:

Topics Discussed:

  • Kali Linux
  • Wireshark
  • Packet Analysis
  • Wireshark Configuration

Assignment:

  1. Continue working with Wireshark. This powerful packet collection and analysis tool is free to download and is pre-installed in the Kali Linux distribution.
  2. Watch Professor Messer’s Using Protocol Analyzers video to get a more in-depth introduction to the features of Wireshark.
  3. Review the good Professor’s Wireless Packet Analysis video and read Lifewire.com’s How to Use Wireshark: A Complete Tutorial to get a better idea of how the Wireshark interface works, and a few tips on how you can configure the Wireshark GUI to meet your specific needs and preferences.
  4. Note: Our Virtualbox installs of Kali use emulated network interfaces, which means that our wireless interface will not work like the one Professor Messer demonstrates in his video.
  5. Wireshark will, however, be able to analyze the packets being sent over the emulated hard-line network interface. Try running a packet capture on your en0 network interface and see what you can see! Run a packet capture, then visit a few websites, then filter the port 80 traffic to get an idea of what kind of information can be gathered by an analysis of the packets. We will discuss the results tomorrow.

Assigned: March 6th, 2019
Teacher Pacing Due Date: March 7th, 2019

Cyber Warfare Boot Camp – Period 7 – Wireshark Packet Analysis

Objective: 

Students will continue preparing for proficiency in cyber security with an introduction to the basics of packet analysis in the Wireshark application.

Links:

Topics Discussed:

  • Kali Linux
  • Wireshark
  • Packet Analysis
  • Wireshark Configuration

Assignment:

  1. Today we will start working with Wireshark – a powerful packet collection and analysis tool that is free to download and pre-installed in the Kali Linux distribution.
  2. Watch Professor Messer’s Wireless Packet Analysis video and read Lifewire.com’s How to Use Wireshark: A Complete Tutorial to get a basic idea of how the Wireshark interface works, and a few tips on how you can configure the Wireshark GUI to meet your specific needs and preferences.
  3. We will be using this and other videos to gain a familiarity with the Wireshark environment, and look at the methods and construction of network packets, so we can begin to develop “the eye” for packet formation and transmission anomalies.

Assigned: March 5th, 2019
Teacher Pacing Due Date: March 6th, 2019

Period 5 – Cyber Security Boot Camp – Router Configuration Quiz

Objective: 

Students will continue preparing for proficiency in cyber security by demonstrating their understanding of Router configuration basics with a brief quiz.

Links:

Topics Discussed:

  • Network Basics
  • OSI Model
  • TCP/IP Model
  • Network Addressing
  • Network Configuration
  • Network Interfaces
  • Network Manager
  • route Command
  • dhclient Command
  • ARP
  • Routers

Assignment:

  1. Complete the 10 question quiz on the Google Classroom page.
  2. Use the completed dual-router network set up in the front of the room as your reference point. You may access any settings on the routers, but please do not change any settings.
  3. For extra credit, tell me what the two key elements were that allowed the network to meet the required parameters:
    • Dual Routers, both serving routing functions.
    • Two subnets, each serving 24 hosts.
    • Router 2 receives Internet from Router 1
  4. Complete the quiz by end of day today, and good luck!

Assigned: March 5th, 2019
Teacher Pacing Due Date: March 5th, 2019

Cyber Security Boot Camp – Week 6, Lab 1 – Period 5 Dual Router Challenge

Objective: 

Students will continue preparing for proficiency in cyber security and networking fundamentals with a hands-on networking configuration exercise.

Links:

Topics Discussed:

  • Network Basics
  • OSI Model
  • TCP/IP Model
  • Network Addressing
  • Routing
  • Switching
  • Flooding
  • Routing Table
  • Routing Protocols

Assignment:

  1. Today, 5th hour NetOp will take their turn in using the concepts discussed in the last couple of weeks by configuring our own routers. The class will be divided into two teams, each of which will be assigned a router, a 24-port switch, and a workstation, and a communal collection of network and power cabling.
  2. Both teams will be tasked with configuring their router to form two interconnected subnetworks, each supporting 24 hosts. Team 1’s network will be supplied Internet access from the school’s gateway. Team 2’s subnetwork will be required to receive Internet access from its connection with Team 1’s router.
  3. Each team will have to work together to correctly configure its router, but both teams will have to work together to form the links between the two networks.
  4. Use all the materials we have studied and the links I have provided above to set up and configure the network to the required specifications by end of day on Friday, February 22nd!
  5. All team members will be expected to participate, and pay close attention to the router configuration, as there will be a quiz on the details of the finished router configuration next week (i.e. Network Name, First Useable IP, Last Useable IP, Subnet Mask and Broadcast Address).

Assigned: February 21st, 2019
Teacher Pacing Due Date: February 25th, 2019

Cyber Security Boot Camp – Week 6: Router Configuration Quiz

Objective: 

Students will continue preparing for proficiency in cyber security by demonstrating their understanding of Router configuration basics with a brief quiz.

Links:

Topics Discussed:

  • Network Basics
  • OSI Model
  • TCP/IP Model
  • Network Addressing
  • Network Configuration
  • Network Interfaces
  • Network Manager
  • route Command
  • dhclient Command
  • ARP
  • Routers

Assignment:

  1. Complete the 10 question quiz on the Google Classroom page.
  2. Use the completed dual-router network set up in the front of the room as your reference point. You may access any settings on the routers, but please do not change any settings.
  3. For extra credit, tell me what’s wrong with the network configuration, and how it failed to meet the required parameters:
    • Dual Routers, both serving routing functions.
    • Two subnets, each serving 24 hosts.
    • Router 2 receives Internet from Router 1
  4. Complete the quiz by end of day today, and good luck!

Assigned: February 19th, 2019
Teacher Pacing Due Date: February 19th, 2019

Cyber Security Boot Camp – Week 6, Lab 1 – Dual Router Challenge

Objective: 

Students will continue preparing for proficiency in cyber security and networking fundamentals with a hands-on networking configuration exercise.

Links:

Topics Discussed:

  • Network Basics
  • OSI Model
  • TCP/IP Model
  • Network Addressing
  • Routing
  • Switching
  • Flooding
  • Routing Table
  • Routing Protocols

Assignment:

  1. Today 7th hour will use the concepts discussed in the last couple of weeks by configuring our own routers. 5th hour will conduct this activity next week.
  2. The class will be divided into two teams, each of which will be assigned a router, a 24-port switch, and a workstation, and a communal collection of network and power cabling.
  3. Both teams will be tasked with configuring their router to form two interconnected subnetworks, each supporting 24 hosts. Team 1’s network will be supplied Internet access from the school’s gateway. Team 2’s subnetwork will be required to receive Internet access from its connection with Team 1’s router.
  4. Each team will have to work together to correctly configure its router, but both teams will have to work together to form the links between the two networks.
  5. Use all the materials we have studied and the links I have provided above to set up and configure the network to the required specifications!

Assigned: February 13th, 2019
Teacher Pacing Due Date: February 19th, 2019

Cyber Security Boot Camp – Week 6: Router Configuration

Objective: 

Students will continue preparing for proficiency in cyber security by reviewing networking fundamentals.

Links:

Topics Discussed:

  • Network Basics
  • OSI Model
  • TCP/IP Model
  • Network Addressing
  • Network Configuration
  • Network Interfaces
  • Network Manager
  • route Command
  • dhclient Command
  • ARP
  • Routers

Videos:

  1. Introduction to Ethernet
  2. TCP/IP Addressing
  3. Network Switching Overview
  4. Broadcast Domains and Collision Domains
  5. Static and Dynamic Routing
  6. IGP and EGP
  7. Dynamic Routing Protocols
  8. Network Segmentation

Assignment:

  1. Review the Linux Journey website’s “Networking Nomad” section.
  2. Network Configuration is how you set up your network. In Windows, much of this is done for you on the client side by the OS. The rest is configured on the switching devices deployed throughout the network, whether they be managed switches or routers.
  3. This week, we will continue to investigate router configuration, and by the end of the week we will engage in a hands-on activity where we build a multi-router network consisting of two subnets.

Assigned: February 11th, 2019
Teacher Pacing Due Date: February 15th, 2019

Cyber Warfare Boot Camp – Week 5: Routing Explained

Objective: 

Students will continue preparing for proficiency in cyber security by reviewing networking fundamentals.

Links:

Topics Discussed:

  • Network Basics
  • OSI Model
  • TCP/IP Model
  • Network Addressing
  • Routing
  • Switching
  • Flooding
  • Routing Table
  • Routing Protocols

Assignment:

  1. Visit Professor Messer’s Network+ training videos site, and scroll down to Section 1.3 – Routing and Switching.
  2. Watch the following videos:
    1. Introduction to Ethernet (review)
    2. TCP/IP Addressing (review)
    3. Network Switching Overview
    4. Broadcast Domains and Collision Domains
    5. Static and Dynamic Routing
    6. IGP and EGP
    7. Dynamic Routing Protocols
  3. We will use the concepts discussed in these videos later this week and next week, when we begin configuring our own routers.

Assigned: February 7th, 2019
Teacher Pacing Due Date: February 8th, 2019

Cyber Warfare Boot Camp – Week 5: Routing

Objective: 

Students will continue preparing for proficiency in cyber security by reviewing networking fundamentals.

Links:

Topics Discussed:

  • Network Basics
  • OSI Model
  • TCP/IP Model
  • Network Addressing
  • Routing
  • Switching
  • Flooding
  • Routing Table
  • Routing Protocols

Assignment:

  1. Visit the Linux Journey website and scroll down to the “Networking Nomad” section. Click on the “Routing” item.
  2. Routers are the “traffic cops” or “post office” of networks, depending on what metaphor you choose to follow.
  3. Read the information provided on the Linux Journey website to discover how routers work, learn the difference between routers, switches and hubs, and learn about the routing protocols that determine how a packet gets from one host to another in the shortest amount of time.

Assigned: February 4th, 2019
Teacher Pacing Due Date: February 8th, 2019

Cyber Warfare Boot Camp – Week 4: Subnetting

Objective: 

Students will continue preparing for proficiency in cyber security by reviewing networking fundamentals.

Links:

Topics Discussed:

  • Network Basics
  • OSI Model
  • TCP/IP Model
  • Network Addressing
  • Subnetting
  • Subnet Mask
  • Octet
  • Host
  • IP Address Classes

Assignment:

  1. Visit the Linux Journey website and scroll down to the “Networking Nomad” section. Click on the “Subnetting” item.
  2. Subnetting is one of those things that you do with a calculator in the real world, but you’re not going to be allowed to take a calculator with you if you take a test like the Network+, CySA+ or CCNA exams, so you better learn how to do it on your own.
  3. The “Subnetting” section of the Linux Journey website gives you a quick explanation of what subnetting is, and how it works. It also provides a subnet math cheat method that should get you through most of the problems you’ll encounter. However, if you want a more thorough understanding of how it works (and trust me, you do) visit the Subnetting.net link for further details.
  4. The “How to Subnet” page at Subnetting.net provides a thorough overview of what subnetting is and how it works. If you’re too lazy to read the page (and I know most of you are) you can watch the Subnetting Tutorial video series, and get a full explanation of what subnetting is, how it works, and how to figure out subnets without the need for a calculator.
  5. Once you understand the patterns of how “borrowing bits” for the subnet mask works, take a look at Professor Messer’s Seven Second Subnetting video. In it, he explains a very effective method of quickly determining the number of subnets, the addresses of the created subnets, the broadcast address, and the first and last usable address from a given IP address and subnet mask presented in CIDR notation.
  6.  With the materials provided here, you should be able to achieve a strong foundation in subnetting, which will allow you to handle a good portion of the questions on the CCNA and Network+ certification exams, as well as have a strong understanding of how packets figure out how to travel from one host to another, even when they’re on very different networks.

Assigned: January 31st, 2019
Teacher Pacing Due Date: February 1st, 2019