GT ECE 4112 - Lab: Network Devices Security (29 pages)

Previewing pages 1, 2, 3, 27, 28, 29 of 29 page document View the full content.
View Full Document

Lab: Network Devices Security



Previewing pages 1, 2, 3, 27, 28, 29 of actual document.

View the full content.
View Full Document
View Full Document

Lab: Network Devices Security

53 views


Pages:
29
School:
Georgia Institute of Technology
Course:
Ece 4112 - Internetwork Security
Internetwork Security Documents

Unformatted text preview:

ECE4112 Internetwork Security Lab Network Devices Security Group Number Member Names Authored By Krunal Shah Kulin Shah Date Assigned Date Due Please read the entire lab and any extra materials carefully before starting Be sure to start early enough so that you will have time to complete the lab Answer ALL questions in the Answer Sheet and be sure you turn in ALL materials listed in the Turn in Checklist on or before the Date Due Goal This lab will introduce you to the concept of security of network devices You will learn about vulnerabilities that exist on these devices the backbone and lifeline of the internet which can so easily be exploited and certain counter measures that a sys admin would take to prevent their compromise to a certain extent Background The lab gives you hands on experience on hacking into routers and switches This lab is important for a security expert in the sense that whenever a hacker tries to attack a network or a subnetwork he first has to go through the default gateway of the network or default router in case of a subnetwork which is the entry point If properly secured it acts like an extra barricade that must be overcome before getting in However most sys admin are ignorant and not aware of the vulnerabilities existent This makes them the Achilles heel of networks in terms of security Summary In the first section we will learn how to gain administrative privileges assuming physical access and in the second obtaining it through remote access In the third section we will implement CAM overflow of switch MAC address tables The fourth section describes a PVLAN setup and exploit on a switch while the last section deals with a vulnerability which is on by default on switches Pre lab Questions Q In which format are the Cisco router and switch passwords stored Q Which operating systems do Cisco routers and switches use Section 1 Physical access compromise Lab Scenario For this section of the lab you will try to gain administrative privileges to



View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Lab: Network Devices Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lab: Network Devices Security and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?