| |
|
Creating a VPN Access Point on Raspberry Pi
Kovařík, Martin ; Hájek, Jaroslav (referee) ; Benedikt, Jan (advisor)
This bachelor thesis deals with creating a virtual private network (VPN) access point on a single-board Raspberry Pi computer. The theoretical part describes the principle of VPN, the most common tunneling protocols and the Raspberry Pi computer in general with its various generations and models. Selected protocols are implemented on the Raspberry Pi and their hardware load, response and throughput are measured. The stability of the protocols is tested and reliability evaluated.
|
| |
|
Installation, configuration and testing of server services DHCP, FTP, VPN, NAT and SNMP in IPv4 and IPv6 environments
Brázda, Libor ; Sysel, Petr (referee) ; Novotný, Vít (advisor)
This bachelor thesis focuses on selecting server services such as FTP, DHCP, VPN, NAT and SNMP and their implementation in operating system Windows Server 2008 R2 and linux distribution Debian. The theoretical part analyzes the problems of TCP/IP protocol including addressing in IPv4 and IPv6 environments. In next chapters, thesis contains detailed descriptions of individual services, their principles, security, etc. The last part is focused on the description of the laboratory task, their activities and contribution to student and also software used in the implementation tasks. The result of laboratory work is created job on the configuration of individual services in both operating systems. Tasks are made for students without previous knowledge of the problem, so they can successfully configure and test these tasks.
|
|
Wireless network attacks
Brusnický, Pavel ; Martinásek, Zdeněk (referee) ; Stančík, Peter (advisor)
Objective of this thesis is to point out to almost everywhere present flaw in realization of second level network security access to WiFi networks with using traffic tunneling over DNS protocol. Realization has been accomplished by existing utilities OzymanDNS, DNS2TCP, NSTX, Iodine, Heyoka. Measurements were done on realistic traffic on the network. The effort was to show outline of these implementations. Transfer speeds in some implementations can be marked as applicable thanks to high speeds, which are on the same level as broadband internet. Functionality was tested on WiFi network, where was also compromised PPTP VPN tunnel, its function was to provide security of the communication on wireless network due to absence of first level security mechanisms such as WPA, WPA 2 and so on, with the help of Asleap, which comes out of Cisco LEAP attack. At the end of the work are suggested possible countermeasures for securing network by the topology change of the network infrastructure or by implementing IDS.
|
| |
|
Tunneled Data Extraction into Separate Flows
Nahálka, Roman ; Hranický, Radek (referee) ; Holkovič, Martin (advisor)
The goal of this work is to design and implement an application for extraction of tunneled data into seperate flows. The app will be removing all layers of encapsulation, that the file contains.The use of the app lays in better analysis and diagnostics of network communication. Thanks to removing the tunnels from the network flow, it will only contain data we can use. In the theoretical part, the work focuses on network architecture TCP/IP, the tunneling protocols and ways of capturing communication on the network. The practical part describes the way of retrieving test data, it also contains a design of the target application, as well as implementation of this design and testing of the final application.
|
| |
|
Creating a VPN Access Point on Raspberry Pi
Kovařík, Martin ; Hájek, Jaroslav (referee) ; Benedikt, Jan (advisor)
This bachelor thesis deals with creating a virtual private network (VPN) access point on a single-board Raspberry Pi computer. The theoretical part describes the principle of VPN, the most common tunneling protocols and the Raspberry Pi computer in general with its various generations and models. Selected protocols are implemented on the Raspberry Pi and their hardware load, response and throughput are measured. The stability of the protocols is tested and reliability evaluated.
|
|
Tunneled Data Extraction into Separate Flows
Nahálka, Roman ; Hranický, Radek (referee) ; Holkovič, Martin (advisor)
The goal of this work is to design and implement an application for extraction of tunneled data into seperate flows. The app will be removing all layers of encapsulation, that the file contains.The use of the app lays in better analysis and diagnostics of network communication. Thanks to removing the tunnels from the network flow, it will only contain data we can use. In the theoretical part, the work focuses on network architecture TCP/IP, the tunneling protocols and ways of capturing communication on the network. The practical part describes the way of retrieving test data, it also contains a design of the target application, as well as implementation of this design and testing of the final application.
|