Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Protocols and Servers 2

Premium room

Learn about attacks against passwords and cleartext traffic; explore options for mitigation via SSH and SSL/TLS.

medium

100 min

83,708

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

The Protocols and Servers room covered many protocols:

  • Telnet

Servers implementing these protocols are subject to different kinds of attacks. To name a few, consider:

  1. Sniffing Attack (Network Packet Capture)
  2. Man-in-the-Middle () Attack
  3. Password Attack (Authentication Attack)
  4. Vulnerabilities

From a security perspective, we always need to think about what we aim to protect; consider the security triad: Confidentiality, , and Availability (). Confidentiality refers to keeping the contents of the communications accessible to the intended parties. is the idea of assuring any data sent is accurate, consistent, and complete when reaching its destination. Finally, availability refers to being able to access the service when we need it. Different parties will put varying emphasis on these three. For instance, confidentiality would be the highest priority for an intelligence agency. Online banking will put most emphasis on the of transactions. Availability is of the highest importance for any platform making money by serving ads.

Knowing that we are protecting the Confidentiality, , and Availability (), an attack aims to cause Disclosure, Alteration, and Destruction (). The figures below reflect this.

These attacks directly affect the security of the system. For instance, network packet capture violates confidentiality and leads to the disclosure of information. A successful password attack can also lead to disclosure. On the other hand, a Man-in-the-Middle () attack breaks the system’s as it can alter the communicated data. We will focus on these three attacks in this room as these attacks are integral to the protocol design and server implementation.

Vulnerabilities are of a broader spectrum, and exploited vulnerabilities have different impacts on the target systems. For instance, exploiting a Denial of Service () vulnerability can affect the system’s availability, while exploiting a Remote Code Execution () vulnerability can lead to more severe damages. It is important to note that a vulnerability by itself creates a risk; damage can occur only when the vulnerability is exploited. We don’t cover vulnerabilities in this room as they have their own module, Vulnerability Research.

This room will focus on how a protocol can be upgraded or replaced to protect against disclosure and alteration, i.e. protecting the confidentiality and of the transmitted data. We will be recommending other modules that cover additional topics.

Moreover, we introduce to find weak passwords.

Answer the questions below
We suggest that you start the AttackBox and the virtual machine as you proceed to tackle the following tasks. You can connect to the different services over Telnet or Netcat for better practice and learning experience.

Ready to learn Cyber Security?

The Protocols and Servers 2 room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.