For the following questions I would like you to discuss the particulars of each
ID: 3804011 • Letter: F
Question
For the following questions I would like you to discuss the particulars of each attack scenario and how Kerberos defends against it.
You will need to consider various elements of the attack scenarios. Some attacks can be implemented between multiple Kerberos components. For example, a MITM attack could occur between various components at various times. State your assumptions about how the attack is occurring, then describe how Kerberos defends against it. Good answers will describe both the particulars of the attack and the Kerberos defenses.
Question 1.) An eavesdropper obtains the IP address of a server and reconfigures another machine to impersonate the server and capture user requests.
Question 2.) An attacker acts as the “man in the middle” between two computers (e.g. client and the server). The attacker spoofs each computer to “think” they have connected to the correct computer, when in fact the attacker is intercepting all transmissions. The attacker can then monitor or change any of the data before routing it on to the intended computer.
Please label each question, then write the answer. For example, Question 1), then write answer.
Thank You
Explanation / Answer
Solution:-
Kerberos is a security protocol for an untrusted network communication. It is a strong authentication protocol which enforces the user to authenticate.
1) When an eavesdropper obtains the IP address of a server and reconfigures another machine to impersonate the server and capture user requests. This a type of attack which is happened possibly due to unauthorized access to the server. An outsider can make unauthorized access to machine by hacking tools. It is possible on unsecured network. An insider also can easily make unauthorized access to machine and get the IP of the server. So both types of attack is possible by unauthorized access and on an unsecured network. If they have some authentication mechanism then there is negligible chances of unauthorized access.
Kerberos is a powerful protocol used for authentication purposes on insecured networks. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. When an eavesdropper try to make unauthorized access then due to presence of authentication protocol he can't make access and server is protected from attacks. When an outsider try to make unauthorized access he fails to authenticate to the server due to Kerberos protocol. And when an insider try to make unauthorized access then he also unable to authenticate to the server. So Kerberos provide strong authentication tools so that only genuine user or clients can be authenticated.
2) Man in the middle attack is a network attack which is performed at somewhere between client and server. When client and server communicating to the each other then their messages are transported through communication link. That is the unsafe point where the malicious attacker can intercept the communication link or he can get the message data also. This is a man in the middle attack. The attacker spoofs each computer to think they have connected to the correct computer, when in fact the attacker is intercepting all transmissions. Internet is a very unsafe place and it needs the security modules at every point.
Now if Kerberos used here then the link and the Messages cn protected from the man in the middle attack.
As w know Kerberos uses secret key cryptography so messages are safe while they are on the link. And messages ca be accessed by the authenticated receiver.
Kerberos is a protocol for authenticating service requests between trusted hosts across an insecured networks.
Users, machines and services using Kerberos need only trust the KDC, which runs as a single process and provides two services, an authentication service and a ticket granting service. KDC tickets provide mutual authentication, allowing nodes to prove their identity to one another in a secure manner. Kerberos authentication uses conventional shared secretcryptography to prevent packets traveling across the network from being read or changed and to protect messages from eavesdropping and replay attacks.
So Kerberos provides a better alternative to secure the network and communication. And it is very necessary to use this type of authentication services so network or systems can stay protected from Malicious Attackers. Kerberos is efficiently used in these practices and purposes.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.