Network Security reports

Project reports on network security

Brute force attack detection using wireshark

Project Scope

Brute force attacks are used for detecting login credentials using random combinations of username and passwords. The project demonstrates a technique by which brute force attacks on FTP servers can be detected using Wireshark Analysis.

Hardware and Software

1. Ubuntu or Windows (2 nos)
2. Switch
3. Wireshark.

Report Contents

1. Project Scope
2. Lab components
3. Lab setup
4. FTP Analysis after incorrect password
5. Wireshark Analysis of FTP with incorrect password
6. Brute force detection technique
7. Using wireshark filter for brute force detection

Report Format – PPT

No of Slides – 12

Price – $16

Buy and Download with PayPal or credit card on PayPal website using the Add to Cart button

Add to Cart

The report would be downloaded automatically and you would also receive the download link in the email used for payment.

—————————————————————————————————————–

Best Sellers and Latest Reports – Click Here

—————————————————————————————————————–


Detecting TCP Xmas Scan using pattern analysis techniques

Project Scope

TCP Xmas scan is a port scanning technique which is used for identifying if a port is open or closed. The scan utilizes the urg, psh and fin flags in the TCP header. The project understands how to craft the scan with nmap and methodology by which specific pattern which corresponds to the TCP Xmas scan can be applied on wireshark protocol analyzer on the destination to detect the scan and the IP address from which it originated.

Hardware Used

1.Switch ( 1nos)
2.Ubuntu 12.0 (1 nos)
3.Windows 7 or Ubuntu( 1 nos)

Tools Used

1.NMAP (Free download)
2.Wireshark (Free download)

Buy the report

Report Contents

1. Project Scope
2. Hardware Used
3. Tools Used
4. Understanding TCP XMAS Scan
5. Lab Topology Diagram
6. Lab setup procedure
7. TCP Xmas scan crafting
8. TCP header analysis with wireshark after Scan
9. Pattern detection filter on wireshark
10.Pattern detection screenshot on wireshark

Report format – PDF

Pages – 6

Price – $20

Buy and Download with PayPal or credit card on PayPal website using the Add to Cart button

Add to Cart

The report would be downloaded automatically and you would also receive the download link in the email used for payment.

Best Sellers and Latest Reports – Click Here

DHCP Infrastructure security threats, mitigation and assessment.

Project Scope

This project understands the basics of dhcp communication, and the security vulnerabilities in the generic dhcp protocol. Security issues related to DHCP infrastructure and how it can be mitigated using appropriate features on switches are understood. The mechanism by which DHCP vulnerability assessment can be performed on a network is also analyzed.

Report Contents

Understanding DHCP communication
Security issues in DHCP protocol and communication
DHCP attacks
Rogue DHCP Servers
DHCP Starvation attack
Mitigating Attacks
Switch and Features
DHCP Snooping
Port-Security
Recommended product
DHCP vulnerability assessment
Rogue DHCP Server detection
DHCP Starvation assessment

Report format – PDF

Pages – 8

Price – $18

Buy and Download with PayPal or credit card on PayPal website using the Add to Cart button

Add to Cart

The report would be downloaded automatically and you would also receive the download link in the email used for payment.

Best Sellers and Latest Reports – Click Here

—————————————————————————————————————–


Network Security Policy Implementation for Campus

Project Title : Network Security Policy Implementation for Campus

Project Scope

A network has to designed aligning to the network security policy requirements outlined below for a campus. The campus has faculty and students. There are 50 users in the faculty and 150 users in the student section respectively. There are two servers on the network, which is used for a social network application and file sharing. The social network application is accessible by web browsers with appropriate username and password combinations. The file server is accessible using FTP client.

Network & Policy Requirements

1. Provide only FTP access to users to the FTP server and all other service only to network admin.
2. Allow only web access to the Social network server and disallow all other service to users other than admin.
3. Mac-level authentication to be provided to users on the network.
4. Remote access to router should be secured with password for admin.
5. The users and the servers should be on separate networks.
6. Cisco based infrastructure to be used.
7. Identify the configurations wherever appropriate.
8. Identify the quantity of switches, routers etc.

Buy the report for the solution

Report Contents

1. Project Scope
2. Network & Policy requirements
3. Requirement analysis
4. Hardware analysis
5. TCP/IP Network Design
6. Topology diagram with IP addressing.
7. Network configuration (Cisco configs) ( FTP server access control using ACL, Social network server access control using ACL, Secure Telnet configuration, Port-Security configuration )
8. Hardware quantity list.

Report format – PDF

No of Pages – 7

Price – $20

——————————————————————————————————————
Click on the Add to Cart button to buy and download with PayPal or credit card on PayPal website

Add to Cart

The report would be downloaded automatically and you would also receive the download link in the email used for payment.

—————————————————————————————————————–

Best Sellers and Latest Reports – Click Here

—————————————————————————————————————–