April 18, 2025

10 thoughts on “TECH 581W Computer Network Operations: Laboratory 2, Team 3

  1. Team three begun their lab with an abstract that while doing a good job of explaining what was going to be accomplished in the lab, did not meet the requirements of the syllabus in terms of length. Team there had a very complete introduction to the definitions as they found would apply both to the literature review and the tasks of the lab itself. The introduction, while like team one, in that there was one, team three had a much more defined introduction that put the reader in the mindset of the lab. This introduction read as though from someone who has had experience with active recon in the past, maybe not network based, but active recon nonetheless. After the introduction the literature review, while covering all of the assigned literature, did read as a list of analyzed literature with APA style citations. They did manage to bring the disparate articles to a cohesive finish, but I question if that method makes for a scholarly and effective literature review. Team three broke their methods into two sections, one for pure methods, and one for procedural methods. The combination of the two results in a complete and accurate methods section. There is no improvement need be made to the methods for this lab, as they offer scholarly and accurate information. Team three has a very complete section on anonymizing the attacker, but I fail to see a reference to professor Liles blog anywhere in the lab. Team three appears to agree with team one in that they chose to use the four layer TCP/IP model, but explain where some believe there is a fifth. Where I question their TCP/IP model information is in how they do not provide a reason for Stallings claiming a fifth layer. Team one presented a reason from Stallings, however team three listed that no reason was available. Team three then goes into how the chosen SCADA protocols fit in with the OSI model, and give a brief description of each protocol, followed by a section on exploiting SCADA. Thus approach seems to be rather effective in explaining SCADA attack vectors, rather than listing vectors for each. Again team three said nothing about MODBUS TCP port 502, which seems to be an omission as in my mind is a rather important part of MODBUS. Team three presented well-found conclusions and their technical position cannot be questioned in my opinion. The table of active recon tools is seemingly well formatted, and balanced, but upon further review they placed tools in multiple layers of the OSI model instead of the best fit layer making the table more difficult to read. Team three also lacked in their SCADA table. I found it be simpler to read than team ones, the color coding being a nice touch, but still complicated to get information out of. The size of the image might play a part in that, and creating individual tables for the TCP/IP model, as well as each SCADA protocol might have proven to be a better method.

  2. This group’s lab report had a great abstract. They let me know exactly what I am expecting to find within this lab report and what they set out to do during this process. Once again this group put an introduction into their lab report. Last time I stated that this was not necessary for the lab report, but this time I am looking at this from a standpoint pretending that I am someone that does not know a lot about the topics. I found that when I did that, I found that the introduction was good and made the lab report easier to follow and understand how the group organized their ideas. I hope that this group is not spending needed time creating this introduction. Like other groups, this group realized that they would be able to truncate the list that they made for the first lab report. Having this knowledge, it should make all groups happy that they had done the majority of the research for this part of the lab, assuming that the group put the time and effort into their research for the first lab exercise.
    The most noticeable problem with this group’s table for active reconnaissance tools was the lack of any layer 0 tools. They included the extended layer of people or layer 8. Other groups found some kinetic tools but I liked that the group put problems that the tools on layer 8 could run into. Another problem I saw with this table was the placement of some of the tools into an OSI layer. Some of the tools had more than one location, for example MBSA. The group placed this tool in layers 4,5,6 and 7. The lab exercise stated that the tools must be placed into only 1 layer; the group should place the tool into the best layer, not any layer that it can go into. The group put all tables into the lab report at the end. This made for a little complicated reading. I would like to have seen the table, then the description afterwards. To me, this would have made the lab report a little more cohesive. One thing I found really interesting with this lab’s report was their issues section. No other group seemed to have the problems this group had. Does this mean that other groups did not do the same thing in their laboratory exercise? Two of the groups found that they found no issues or problems. The other two groups had some issues. It does not seem that all groups are performing the same tasks in the laboratory exercises. Once again, we are in the beginning of the lab exercises and I would like to see more cohesiveness in this group’s lab report. I think that it is noticeable that different people wrote different part of this lab report. I think maybe one person of the group should work on making all the different parts flow together better.

  3. The literature again treats each article almost as an individual entity. Each paragraph of the beginning lit review treats only one article and gives a summary of the article’s contents. The authors don’t give any insight into the methodologies, omissions, or relation to the task at hand except for the last two paragraphs. The last two paragraphs of the literature review relate the content of the articles to the broader topic of penetration testing but only in terms of mentioning content in the articles that relates to penetration testing. The last part of the literature review mentions an article that further defines red-teaming in the context of a military exercise along with a brief statement saying that it “may be extended to test distributed computer systems.” These last two paragraphs would’ve read much better and provided the reader much more context for the lab exercises had they been expanded and provided greater detail of the subject matter mentioned in them.
    The second portion of the methodologies section that mentioned how the group planned on splitting up the work was interesting to read as a fellow student. Seeing how other groups communicate internally and split up the work load, while not directly related to the lab exercises, helps get an insight into how the group works and adds depth to the methodology. The procedures section could be included with the methodology section, the both seem to discuss the same process. I like the inclusion of additional exploit tools in the lab exercises, using Backtrack alone would’ve introduced some bias into the tool selection process and it’s nice to see additional security tools evaluated. The explanation of the anonymity options was a little short. How were they tested? I agree with the conclusions regarding onion routing and proxies, those seem to be the predominant methods in the field and the inclusion of the link to freehaven.net is useful.
    The headings used for the different section were a little difficult to follow since they all used the same formatting. Is TCP/IP part o f the “Results and Discussion” section? The results section about the active reconnaissance tools was interesting because it discussed the VoIP (SIP) and SNMP results as well as only covering the standard ping sweep and port scan results one would expect. The anonymization section was very well done and treated the problem from many different aspects including covert channels.
    The TCP/IP layering discussion is rather brief but does handle both sides and makes the important point that the model is just that, a model. The argument was made in some of the literature that layering was harmful (http://tools.ietf.org/html/rfc3439) because it implies that the “functions of each layer are carried out completely before the protocol data unit is passed on to the next layer.”
    The issue with classification of tools as “active reconnaissance” is an interesting problem when viewed in a larger context. The mention of the ‘passive’ compromised host serving as an active reconnaissance tool is interesting. Presumably the attacker would’ve had some involvement in the compromising of the host, thought that might not always be the case, but if the machine is blindly forwarding data (captured passwords, keystrokes, etc.) to a server somewhere, is that active or passive? Does it matter if the machine is sending the data using TCP or UDP?

  4. Team 3’s abstract was excellent. They described their lab and how they were going to use it. Again as in their first lab I appreciated their introduction. It helped to better understand what we are trying to accomplish with this exercise. I liked how they organized their literature review. It made it very easy to read and understand how the articles tied back to the lab exercise. The methodology section was well written and the steps of the process of performing the lab were detailed. I thought they did a good job organizing their tables; however I did not see any tools listed in Layer 0. Some of the other groups were able to find recon tools at the layer 0 level. Also this group replicated some of their tools and put them into more than one layer. Their problems were well documented. The conclusions section in comparison to their lab 1 conclusion section was more comprehensive. Overall I thought their paper was well written.

  5. This group starts off with an abstract that does a good job in introducing this lab paper. The abstract divides the lab up into two parts, examining active reconnaissance tools and the examination of SCADA protocols. The abstract covers all the parts of the lab and briefly explains what is to be expected in this lab. Next the group does an introduction to the second lab. In the introduction they begin by explaining that their research would be focused on active reconnaissance and that the use of a tool was examined better in the whole of the attack rather than individual events in the attack. They also defined active reconnaissance as having the components of: presence, risk, and limitation of scope. This start to the second lab does a great job in showing how the focus of the students should be at this point and to show how to be examining how to approach the research in this lab. The group goes on in the introduction describing the components given in the beginning of the introduction. In this description the group conveys that in active reconnaissance the attacker is known and that risk is closely associated to the presence of the attacker. Also the group conveys that there is a limit to the scope of this type of attack because information is sent in milliseconds, so the attack is a preparatory attack and that damages are the effects of the information gathered for the attack ahead of time. This is a very good leading up to the what this lab is about because it puts the reader into the mind set of what this lab is about and what this lab is trying to teach. The last part of the introduction explains what is going to be done in this lab. Next the group goes into the literature reviews. In the beginning of the literature reviews the group gives an introduction to what kind of articles are in the literature review. The group at first evaluates each article separately. In each evaluation of the articles the group describes the topic and theme of the article. They also point out some important points in each of the articles. I did not see any discussion of the research question, methodology, or supporting data or research. At the end of the literature review the group did discuss how the readings relate to each other and how they relate to the current lab nicely. At the very end of the literature review the group briefly mentioned that they did not see any errors or omissions. Next the group wrote up a methodology of the lab. The group stated that the table created in the first lab would be used throughout the rest of the labs. They said that they would pull the tools for the active recon table from that list. Also the group decided to use existing security tools to install in their virtual environment, because of the amount of tools available and that the tools have been reviewed in advanced. They also mentioned that they were going to divide up the work between the groups depending on the experience in that part of the lab. Next the group discussed the procedures. The group then took the tools from the first lab and eliminated tools in three passes. The first pass weeded out the obvious tools that were not active recon tools. The second pass consisted research on the remaining tools to further weed out any tools that could not be considered active recon. The last pass applied three criteria to each tool to see if it was an active tool or not, that criteria was presence, risk, and limited scope. This way of narrowing down the tools seemed to work nicely. This shows that the tools were well researched in how they function and how they will fit into these labs. Next the group tested several different tools in different environments including real network environments and virtual environments. The group then did an extensive research using specific web sites to examine techniques in anti-forensics. Last in the procedure section the team mentioned that they did research in the different types of SCADA protocols given in the lab and also details on the TCP/IP model, and that they aligned them to the OSI model. The group then reviewed the results of their findings. They started with the active reconnaissance tools. The group found that using a logical definition made categorizing the tools was a lot simpler. They listed several types of programs that they tested out. A couple of the types of tools did not go as they expected and explained that this could have been due to lack of experience in using those particular tools. Not a whole lot of information was discovered in testing these tools. They did find that most of the tools worked as they said they would and that proved that they could rely on using them in actual situations. Next they discussed anonymizing the attacker. The group explains that there is three ways to hide an attacker: proxies, obfuscation, and out-of-band communication. The group then does a good explanation of how each of these ways of hiding an attacker can be used. They even explain different ways that an attacker could use each of these methods to hide himself. They mention that the attacker could even use multiple methods to further hide the attack using an analogy of an onion. Next the group talks about the TCP/IP model that they chose. The group stayed with the four layer TCP/IP model. They argue that the TCP/IP model has to be able to handle any type of network so the physical layer doesn’t have any specific requirements. They do mention that some people argue that there should be a hardware layer but that they could not come up with a good explanation on why. They ended saying that this whole argument is a moot point anyway, because it is all just a model. Next they discuss the SCADA protocols. In each one of the descriptions the group does a good job in describing the protocol, but they do not explain any details of each of the layers. The group did all the protocols given by the lab and they also included Allen-Bradley’s DH+ protocol and the PROFIBUS protocol. The group then explains that even though most SCADA networks are separated from the internet, they can still be exploited through various methods including a specific tool they found. They also explain that even though the SCADA networks are more difficult to exploit the risks are much greater. As far as problems and issues the group found a few in categorizing active recon tools and the use of a beta version of Backtrack. In the conclusion of the lab they just quickly explained what they did in each of the steps of this lab. They did not give any type of explanation of what they learned from this lab. Last they showed the tables that were a result from the lab. The tables were well put together. The table with the tools categorized each active recon tool into the different OSI model layers and also aligned them with McCumber’s cube. The table of the SCADA protocols was nicely put together also. The table shows each protocol in comparison with the others and even categorizes them in color.

  6. Overall team 3 had a great improvement over the first lab. They started off with the abstract and created a strong abstract that explain what was going to happen in the lab and what was some information going forward. Next they gave an introduction to their thoughts on what active reconnaissance, and limitation of scope. Which gives the question; are there other variables that can affect the reconnaissance? Would skill set take a role in how active reconnaissance would be not only used but implemented? The lab then goes to the literature and first gives an overview of all of the readings for this lab and gives the common theme. Then they break each article/ paper down and review them and how they relate to the class. The literature reviews where well done and gave an understanding to each of the subjects and how they would relate to class. But upon further discussion we where notified that the literature review was to be more cohesive and blend with each other. Each week is a learning process and the team’s labs are getting better. The group then goes onto their methodologies and discusses what tools where used upon the actual hands on part of the lab in the virtual environment. They described using Backtrack 4 BETA. Later on they will have in the issues that they encountered problems using Backtrack 4 BETA. Which gives a question should we rely on a beta version of a program? Are their benefits that trying to use a new version that just might not be ready then the final release of Backtrack 3? I commend them in trying to use the newer version because some information may have been differently obtain using the beta and what they got when using the Backtrack 3. This information could have been used within their lab. Yes it might have failed but what was gain from the experience? After this the lab goes onto the SCADA protocols and the TCP/IP comparison and their version of the table. They explained each aspect of the tables and where able to explain why the different layers where placed at where they where. It seems like each group has these protocols in different areas still. Is it possible that it can be argued where certain protocols lie on these tables and why? The tables are at the end of the document and where put together in a clean fashion and where easy to read. The teams then goes onto define their issues with the lab about ambiguity and exploitation and then the issues they had with Backtrack 4. They then conclude on what was experience with in the lab and what had been gained. One thing that I did miss was any findings they may have had from their results with the testing they explained well how they where going to implement but when it came to the results I wanted to know more. Their where minor issues that created and overall good lab which made the reader ask questions and get involve.

  7. The team’s abstract is clear and they identify everything that is they are going to discuses in this lab. The team then goes on with a strong introduction, which so far is the only team to have an introduction for there lab. Within there introduction they identify the limitation of the scope.
    In the literature reviews they mention that it is necessary to define goals, just as the other groups, for the reading of About Penetration Testing by Mat Bishop. Agreed, that define goals are important part when conducting projects such as penetration testing. What do you hope to get out of this test? This would be an acceptable goal when conducting a penetration test. The team, is one of three to leave out the example about the police officer attempting to break-into the car to see the different forms of attacks an attacker may take. This seem somewhat worth mentioning only because the author did use the analogy several times throughout the paper. Ethical hackers are described as penetration testers but are they? Perhaps a penetration tester is someone who knows how to use certain tools to exploit certain systems. They can be considered ethical because they are instructed to do so by they the client. Perhaps they are just an ethical worker, maybe this person was trained on how to push a button but not much more than that? I could drive a car does not mean I know how to repair a ball joint. The team then goes on to talk about Black, White and Gray box model of ethical hacking. In the methods the group talked about gathering active reconnaissance tools from the list they already made in lab 1, which is great since it was said that lab 1 is the basics for the research for this exercise. The teams then goes on to talk greatly about SCADA an SCADA protocols. In the teams problems and issues they were the only team to mention about using Backtrack 4 Beta. Since Backtrack 4 Beta was release, the stability was not stable which why Backtrack 3 final is a more stable and reliable choice.

  8. I think that group 3’s write-up for lab 2 was decent. The abstract for this lab was very good. The literary review was somewhat poor. Group 3 did not answer all of the required questions for the literature review. They did not explain the research methodology, how it relates to the laboratory or whether or not they agreed with the readings. All of the citing for the literary review was adequate. The literature review was cited properly except when including page numbers. The table containing the penetration testing tools was adequate. More depth could have been put into how these tools are actually installed. What if you needed to make your own Live CD or install these on a computer that BackTrack is not compatible with? I think the group did well when actually discussing why they chose the 4-layer TCP/IP model. However, do these layers match up exactly with the OSI model? Or is it fuzzy where layers like the session and transport layers meet? When dealing with SCADA, what about the Kinetic layer? When dealing with the DeviceNet protocol, what about the Pseudo Transport Layer? Is it really its own layer or does it exist in another layer? I liked how the group included a section discussing the exploitability of SCADA. The conclusion to this laboratory was also well done because it accurately sums up their procedures and findings.

  9. Within the abstract team three gave a brief overview of the laboratory assignment. Unlike other groups team 3 referred to the virtual lab environment that was created with a series of virtual machines as a mock-up penetration testing environment.

    Group 3 included an impressive introduction section as they did in their previous lab. The group went on to say that active reconnaissance tools defines the scope of what the tools are to do and described the concept of presence to risk , for the lab wanted the groups to find tools that would give an attacker anonymity on a victim’s network. The introduction also mentioned SCADA protocols and that the groups are ultimately aligning their layers to that of network models to figure out what tools could exploit the SCADA protocols.

    Within the literature review section, group three needed to relate each of the articles to relate the articles to each other and address the methodology used within the articles. The summary for Automated Red Teaming: A Proposed Framework for Military Applications appeared to be too brief. The group did a good job relating the articles to the laboratory assignment by applying the general concepts from the articles to penetration testing. I had to partially disagree with the statement “The type of penetration testing we are using in this course would fit into the white box model due to our detailed knowledge of the target system” because while we know about the systems we are targeting, we are also using tools that would be more black box orientated. Group three did not find any apparent errors or discrepancies within the literature review.

    In the methodology section, group 3 also used the table from the first lab to aid in the collection of active reconnaissance tools. Group three used tools that were already pre-loaded onto images that would be used within the virtual environment. Group 3’s laboratory environment differs from the other groups in that they have installed tool collection such as The ‘Backtrack’ and ‘Knoppix-STD’ on a live network with real hardware and in a virtual environment as well.

    In regards to the subject of anonymity of an attacker on a victim network, group three described a few techniques such as proxies, obfuscation, and ‘out-of-band’ communications. The group pointed out the caveat about proxies was that while they are effective in hiding the origin of connections, the traffic generated could easily be spotted on a network.
    In the OSI and TCP/IP alignment section team three sided with those who think the TCP/IP model should have only four layers. I have to agree with the group’s statement “In reality, it’s a moot point the model is just that, a model. It is designed to visualize the communication process between two networked devices.”
    In the SCADA protocol section of the laboratory report group three besides describing MODBUS, DNP3, and DeviceNet SCADA protocols also researched DH+ and Profibus. The group went on to describe some exploits to SCADA protocols such as CitecSCADA exploit.

    In the issue section team three stated that they had a couple problems. The first was the ambiguities associated with classifying an exploit tool as an ‘active reconnaissance’ type. The second problem was stability problems encountered with the ‘BackTrack 4 Beta’ release used for the tool-utilization test machines.

  10. @nbakker: We said we couldn’t find Stallings’ reason, not that there wasn’t one. TCP port 502 is a default, not the answer to the equation.

    @shumpfer: Like TCP/IP, the SCADA protocol stacks are models. There is a lot of overlap in functionality, so yes, you can argue it differently depending on your point of view.

    @chaveza: The spelling and grammar check in Word is your friend.

    @prennick: We did cover the kinetic layer in SCADA, it’s in the chart. We agree with you about the ambiguity of the layers, and made the point with TCP/IP. Perhaps we should have been clearer with the idea that the point extends to all models.

    Thank you to everyone who gave criticism rather than just summarizing. Your feedback is helpful.

Comments are closed.