National Repository of Grey Literature 5 records found  Search took 0.00 seconds. 
Traffic Analysis of Network Protocols Kerberos, NTLM, and SAML 2.0
Krůl, Michal ; Orsák, Michal (referee) ; Tisovčík, Peter (advisor)
This thesis engages the problem consisting of analysis and detection of the attacks carried out on the authentication protocols in the environment of network structures, like those used in big corporations. In~this thesis, the problem is examined in the light of the netflow analysis. Main content of the thesis is a simulation of the attacks targeting network architectures, where the authentication is served by mentioned protocols, and effort to detect these attack by the netflow monitoring. The outcome of this thesis is a draft, how to automatically detect the attacks carried out in the network structures, and plugin for the exporter of the Flowmon sond, the product of Flowmon Networks company, which will be extracting the information needed for the performance of the detection.
Using of the attack "Pass the hash attack" for the compromising of high privileged accounts.
Jakab, Vojtěch ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
The master thesis deals with the attack "‘pass the hash"’ on high privileged accounts. Within the theoretical part is discussed creating hashes and its use. Next is a descrip- tion of the authentication in Windows operating system. There are also pointed out weaknesses in the design of authentication mechanisms. The last part deals with the individual attack and security options for mitigating the impacts. In the practical part are tested available tools for retrieving hashes from the files of the operating systems and tools which allow the attack itself. The output of this section is selection of the appropriate tools to demonstrate the attack in a proposed real environ- ment. The last topic is about designing the experimental environment, demostration of the attack with the possibility of getting through the network. The last steps deal with mitigating the impact of the attack.
Traffic Analysis of Network Protocols Kerberos, NTLM, and SAML 2.0
Krůl, Michal ; Orsák, Michal (referee) ; Tisovčík, Peter (advisor)
This thesis engages the problem consisting of analysis and detection of the attacks carried out on the authentication protocols in the environment of network structures, like those used in big corporations. In~this thesis, the problem is examined in the light of the netflow analysis. Main content of the thesis is a simulation of the attacks targeting network architectures, where the authentication is served by mentioned protocols, and effort to detect these attack by the netflow monitoring. The outcome of this thesis is a draft, how to automatically detect the attacks carried out in the network structures, and plugin for the exporter of the Flowmon sond, the product of Flowmon Networks company, which will be extracting the information needed for the performance of the detection.
Using of the attack "Pass the hash attack" for the compromising of high privileged accounts.
Jakab, Vojtěch ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
The master thesis deals with the attack "‘pass the hash"’ on high privileged accounts. Within the theoretical part is discussed creating hashes and its use. Next is a descrip- tion of the authentication in Windows operating system. There are also pointed out weaknesses in the design of authentication mechanisms. The last part deals with the individual attack and security options for mitigating the impacts. In the practical part are tested available tools for retrieving hashes from the files of the operating systems and tools which allow the attack itself. The output of this section is selection of the appropriate tools to demonstrate the attack in a proposed real environ- ment. The last topic is about designing the experimental environment, demostration of the attack with the possibility of getting through the network. The last steps deal with mitigating the impact of the attack.
Configuration of Single Sign On against Active Directory in enterprise network
Křenek, Jan ; Pavlíček, Luboš (advisor) ; Bruckner, Tomáš (referee)
This work discusses about configuration and integration of Single Sign On against to Active Directory which serves as an authorization into web applications for Air Navigation Services, CZECH REPUBLIC by company Ifield Computer Consultancy Limited. Part of the work is performed the results of testing of the performance these two type of implementations for two different applications. For the theory part I've been using relevant literature, but for some tools, namely Scimark and JMeter, there is none, so I had to settle with internet sources. The main benefit of this thesis is the result of testing of comparison two different implementations of the Single Sign On generated using NTLMv2 and SPNEGO/Kerberos.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.