Documente Academic
Documente Profesional
Documente Cultură
Internet History
The Internet is a global network of interconnected computers, enabling
users to share information along multiple channels.
http://en.wikipedia.org/wiki/Internet
Basic Setup
Each computer must have a unique identifier
IP number and IP name
Computers must be able to exchange data (electrons,
Router A
DHCP
Router B
ISP
fiber optic
lines
www.google.com
ISP:
DNS
Internet Service
Provider
DHCP: Dynamic Host
Config. Protocol
DNS: Domain Name
Server
(149.150.254.102)
(149.150.254.102)
The Protocol
A mutually agreed-upon convention or standard that
controls or enables the connection, communication, and
data transfer between computing endpoints.
http://en.wikipedia.org/wiki/Protocol_(computing)
one occurs
GET / HTTP/1.0
fixed header:
how many bytes
are coming,
type of data
An smtp Conversation
Speaker
Server:
Text
220 Simple Mail Transfer Service ready
Client:
HELO mycomputer.mydomain
Server:
250 kitten.shu.edu
Client:
MAIL FROM:<Smith@shu.edu>
Server:
250 OK
Client:
RCPT TO:<Jones@shu.edu>
Server:
250 OK
Client:
DATA
Server:
Client:
Server:
250 OK
Client:
QUIT
Homework
1.
2.
Hacking 101
Identify a target system
Find an open port
Check which server program services that port
Learn about vulnerabilities of that server program
Exploit vulnerability for evil purposes
Firewall Protection
Every packet transported over the
ISP
SPAM Protection
Every Internet packet contains the port,
ISP
Privacy/Content Protection
All Internet traffic is public!
To protect content, the data portion of IP packets
must be encrypted
ISP
Encryption
Encryption is usually based on a key that used to encrypt and
decrypt a message.
Pre-Shared Key (PSK) Encryption:
both parties know a single key (e.g. WPA encryption: both your
router and your computers know the key)
Public Key Encryption:
each party has two keys, a public and a private one. They swap
public keys: Bob uses Annies public key to send her an
encrypted message, she can decrypt it using her private key
based on difficulty of factoring huge numbers into large primes
and ease of multiplying them
See http://www.explainthatstuff.com/encryption.html
Example:
public key x = 15 => private key is:
Homework: Find factorization of RSA-100, which is
1522605027922533360535618378132637429718
0681149613806886579084945801229632589528
97654000350692006139
More Info:
http://en.wikipedia.org/wiki/Public-key_cryptography
http://en.wikipedia.org/wiki/RSA_numbers
http://primes.utm.edu/mersenne/
Enigma by Robert Harris, and Enigma the Movie