Näytä suppeat kuvailutiedot

Intranet Security : Overlooked Importance

Hu, Cheng (2013)

dc.contributor.authorHu, Cheng
dc.date.accessioned2013-12-11T08:01:27Z
dc.date.available2013-12-11T08:01:27Z
dc.date.issued2013
dc.identifier.uriURN:NBN:fi:amk-2013120520154
dc.identifier.urihttp://www.theseus.fi/handle/10024/68221
dc.description.abstractThe aim of the study is to find out how does vulnerabilities affect intranet security and credentials in a small enterprise environment. Due to low Local Area Network security level will probably leave exploits and loopholes that could be utilized by attackers and eventually lead to data loss or credential leakage. Thus the research was carried out by studying on principles from typical attack representatives that were divided into both ‘offline’ and ‘online’ groups. Research was followed by one case study on an attack which originated internally from an enterprise, gave strong support to the importance of intranet security viewpoint that holding by previous theoretical studies. One whole process of attacks over LAN was designed and implemented within laboratory environment to verify the study. The series attack contains network join, exploits discovery, and penetration implement phases. The laboratory work was finally achieved by logging target victim’s personal credentials. Within Network join phase, wireless attack on WPA/WPA2 secured Wi-Fi signal with WPS function on was taken and layer-2 attack turns intruder into man-in-the-middle and got the relatively higher privilege than a regular network user. Genlist, Nmap, and Nessus was used to make full network scan in order to detect the intranet topology. Phishing was the main character in the penetration implement phase, thus milder attack method like web cloning, DNS fraud was utilized rather than offensive ones. In the end, the key logger in the back end captured the credentials from target victim successfully and the possibilities of migrating the attacks to mobile devices was analysed.en
dc.language.isoeng
dc.publisherMikkelin ammattikorkeakoulu
dc.rightsCreative Commons Attribution-NonCommercial-ShareAlike 1.0 Finland
dc.titleIntranet Security : Overlooked Importanceen
dc.type.ontasotfi=AMK-opinnäytetyö|sv=YH-examensarbete|en=Bachelor's thesis|
dc.identifier.dscollection10024/2088
dc.organizationMikkelin ammattikorkeakoulu
dc.ccbutton<a rel="license" target="_blank" href="http://creativecommons.org/licenses/by-nc-sa/1.0/fi/"><img alt="Creative Commons License" style="border-width:0" src="https://publications.theseus.fi/manakin/themes/Theseus/cc/by-nc-sa/1.0/fi/88x31.png"/></a>
dc.contributor.organizationMikkelin ammattikorkeakoulu
dc.subject.keywordIntranet
dc.subject.keywordNetwork Security
dc.subject.keywordVirus
dc.subject.keywordMalware
dc.subject.keywordWorm
dc.subject.keywordDoS
dc.subject.keywordDDoS
dc.subject.keywordPenetration
dc.subject.keywordWPS
dc.subject.keywordMAC Flood
dc.subject.keywordARP Spoof
dc.subject.keywordDNS Fraud
dc.subject.keywordWeb Clone
dc.subject.keywordPhishing
dc.subject.keywordSocial Engineering
dc.subject.specializationNetwork
dc.subject.degreeprogramfi=Tieto- ja viestintätekniikka|sv=Informations- och kommunikationsteknik|en=Information and Communications Technology|
dc.subject.disciplineDegree programme in Information Technology


Tiedostot

Thumbnail

Viite kuuluu kokoelmiin:

Näytä suppeat kuvailutiedot