! 

Assignment #4

Type of assignment: This assignment should be done in groups except problem #1.

Note: The assignment submission should clearly list the student members of the group, their names, and student numbers on the first page.

Points: The maximum number of points for this assignment is 75, which will be prorated accordingly after all assignments are posted. Weight of each problem is in parenthesis.

Format:

  1. Assignment submissions are accepted in the following formats only: HTML (extension .html), PDF (.pdf), RTF (.rtf) , ASCII text (.txt). Assignments submitted in any other format will be discarded. All text in the assignment submissions must be typed and figures plotted to be easy to read and understand. Spelling, grammar, and other language errors will result in fewer points credited to the corresponding problem solutions.
  2. Your submission file should be named to reflect the names of the group members, and the assignment number, e.g., alice_bob-assignment_1.pdf.

Problems

  1. (10) (Authentication) Sysadmin Qiang has created a unix passwd file for the students of EECE 412 and decided to assign a unique password to each of the students. Unfortunately, he always chooses passwords that are very weak, but after reading Section 11.2 in the Bishop's textbook, he has made some improvements.

    Since Qiang has decided to tempt fate by refusing to use shadowed passwords, can you teach him the error of his ways?

    In your solution, address and/or answer the following:

    1. (7) Find the password associated with your student ID.
    2. (3) Detail the methods / tools you used to extract your password.

/etc/passwd
-------
76045996:54jf34sReTaCg:0:0:A Student:/root:/bin/sh
80209018:aqIOHZRaH1p3.:0:0:A Student:/root:/bin/sh
85135010:rtZ30PXQFJVwA:0:0:A Student:/root:/bin/sh
56673023:4rPHF5mFzpUb6:0:0:A Student:/root:/bin/sh
43562008:p.K7W64CPSw2Q:0:0:A Student:/root:/bin/sh
84010016:goyp4ZsN7iiNQ:0:0:A Student:/root:/bin/sh
82123019:U9hAoPcLe3ljY:0:0:A Student:/root:/bin/sh
57688020:A4EV7a1K7uBBQ:0:0:A Student:/root:/bin/sh
55514020:/pCWJ50FQv3hA:0:0:A Student:/root:/bin/sh
83378018:L0NHLxCH2/D7.:0:0:A Student:/root:/bin/sh
45197001:M9DiXaypdvN9k:0:0:A Student:/root:/bin/sh
81468019:9z0NBvvjfx4tI:0:0:A Student:/root:/bin/sh
84698018:3eRn9fyKsUb6A:0:0:A Student:/root:/bin/sh
64278054:y7ZiNMezCeg06:0:0:A Student:/root:/bin/sh
77308013:XAuR9d5fEbGjM:0:0:A Student:/root:/bin/sh
86111010:.4MVxBJVOB//g:0:0:A Student:/root:/bin/sh
40840027:/.W02eni4pfsY:0:0:A Student:/root:/bin/sh
63030050:b7minvYSgs81g:0:0:A Student:/root:/bin/sh
80197999:e39h4EleMGX4.:0:0:A Student:/root:/bin/sh
44160000:90NfjrIu1fXoU:0:0:A Student:/root:/bin/sh
38451001:7q6AnSB5ek4X.:0:0:A Student:/root:/bin/sh
39216031:Hgf3x6HPjVZJY:0:0:A Student:/root:/bin/sh
40558025:MNbF64b33rINM:0:0:A Student:/root:/bin/sh
92242015:dGZUI3Q1ANLGI:0:0:A Student:/root:/bin/sh
95827010:g7nHqdklhzDOc:0:0:A Student:/root:/bin/sh
36260008:Yus/JqKu8WroQ:0:0:A Student:/root:/bin/sh
26074039:OkPrzsPXaRIAs:0:0:A Student:/root:/bin/sh
44005023:0/DHR/k0N73is:0:0:A Student:/root:/bin/sh
52758984:9.BzApneUbkI2:0:0:A Student:/root:/bin/sh
58381021:KQ0wD4FO3fLpY:0:0:A Student:/root:/bin/sh
38029021:9K6ROb2xDDXnw:0:0:A Student:/root:/bin/sh
39390026:c5BenGWuejYvs:0:0:A Student:/root:/bin/sh
71040059:/oDMMGgXVLGXI:0:0:A Student:/root:/bin/sh
38121026:q97b0eL15FSUY:0:0:A Student:/root:/bin/sh
41002023:j/xfrKUUmtybw:0:0:A Student:/root:/bin/sh
82779018:gbAJ8UcAUYxkw:0:0:A Student:/root:/bin/sh
79203014:vBZZmSCgn8nmg:0:0:A Student:/root:/bin/sh
41937020:orFplOoF1l/pw:0:0:A Student:/root:/bin/sh
56842024:aLaUnaaFJ4mhA:0:0:A Student:/root:/bin/sh
42359026:hLheT5NV7xe5c:0:0:A Student:/root:/bin/sh
29161031:c7WCY6UvWuojQ:0:0:A Student:/root:/bin/sh
36866028:GLiGaU1VzhWwg:0:0:A Student:/root:/bin/sh

-------

  1. (15) (Malicious Logic)

    1. Pick one of the following malicious software:
      1. Zotob
      2. Antinny
      3. Netsky
      4. Rbot
      5. Sasser
      6. Bagle
      7. Msblast
      8. Doomjuice
      9. Berbew
      10. Yaha
      11. Wootbot
      Sdbot
    2. Post a message (one message per group) in the course WebCT discussion topic named "Malicious software" indicating which malicious software your group has picked.
    3. If another group posted an earlier message indicating that they had picked the same software as your group, go back to step 1 and pick "free" software.
    4. Classify the picked software according to the classification discussed in the corresponding session of the course.
    5. Analyze the design of the picked software, i.e., its structure, behavior, mechanisms it uses for selecting victims, infecting them, hiding itself and its authors, etc.
    6. Based on your analysis, recommend short, medium and log term countermeasures (i.e., protection and detection techniques) against the threat posed by this software. Classify your techniques using material from the correspponding course session.
    7. Use no more than 4 pages to write a short report (with proper title, authors, abstract, introduction, body, conclusion, and references section) in format of IEEE Transactions documenting your findings obtained in steps 4--6. Use figures and tables, if necessary to achieve better impact of your report.
    8. Post your report in PDF on WebCT discussion topic named "Malicious software" by the same deadline as the one for this assignment. Marks for late reports will be decreased, 1% of the problem mark per each minute after the deadline.
  2. (10) (Design Principles) Write no more than 2 pages analyzing the system(s) or solution(s) that is/are subject of your term project in regards to the principles of designing secure systems. Specifically, explain a) how each of the 10 principles was (or not) or will be applied to the system(s) or solution(s), and b) whether there is a synergy or conflict among (and which) principles. If the term project of your group is design project your group should analyze the system(s)/solution(s) you are designing. If your group is doing an analysis project, do this exsesize for the analyzed system(s)/solution(s). Remember that your mini-conference and term project report will benefit from having this, albeit shorter, analysis included. As you could realize by now, this problem is quite open-ended making the strength of your argument more important than its perceived correctness.
  3. (40+ 20 bonus points) (Development of Secure Software) : Each group is to complete succesfully as many lessons as it can by loging in http://webgoat.ece.ubc.ca/WebGoat/attack with the corresponding user name and password from the following table. Groups cannot help each other. If it is found out that one group recieved helpf from another group, both groups will recive zero points for this problem even if one of them is elligible for the 20 bonus popints (see below). Two points per completed lesson will be credited for this problem. The lessons are on learning about common vulnerabilities of Web applications. Some of these vulnerabilites are common to many other types of software applications.

    Please append a page with a screenshot of the score card for your account.
    group members
    username
    password
    group01
    Ym8QLM
    group02
    rV7MIL
    group03
    msu0tW
    group04
    ERW9aj
    group05
    LJKndF
    group06
    CXyqz0
    group07
    goAN3Y
    group08
    beVJ8q
    group09
    qam6nr
    group10
    M9ALuH
    group11
    uNIxhM

    First group who can also complete the challange (see the bottom of the navigation bar in WebGoat) and post a message on the course WebCT discussion topic "Assignments" inidcating that it completed the challange will recieve additional (i.e., bonus) 20 points for this assignment . The group will have to demonstrate to the course TA the technique of accomlishing the challange before the credit will be dispensed. If the group fails to demostrait, the second group will become elligible for the bonus.


Copyright © 2003-2005 Konstantin Beznosov