Data Security Tools and Techniques

Digital Data Safety
1
undefined
SADET – Module A.1: Digital Data Safety
Exploring Digital Data
Michael B. Spring
Department of Informatics and Network Systems
School of  Computing and Information
Introduction
This slide set looks at some techniques and tools for
understanding computers and networks focused on
protecting your data.
This slide set is optional and intended for students interested
in the technical side of data security issues.
Prior presentations examined the issues of data privacy
conceptually and looked at things you can do to keep your
data private
Overview
Looking at your PC
Processes
Addresses
Networking activity
Routing
Where is my data?
Doing a search
Using the wayback machine
Snooping on Twitter
Two More Tools
Wireshark
Twitter Streams
Task Manager
On any windows PC, pressing the keys “Ctrl”, “Alt”, and “Del” at the
same time will either launch task manager or display a list which will
allow you to select task manager.
Task manager allows you to look at the applications that are running
and gather some information about them.
For now, simply note that while only a few applications are running,
there are dozens of processes and services running.
Also note that services that are running have a PID – Process ID.  We
will want to look at these PID’s later.
Many of the services and some of the processes are communicating
over the network.
Two Screen Shots of Task Manager
Only a few
applications running
More than 100
processes are running
The Process ID of the
dozens of services
What Might You Do Using Task Manager
You turn to Task Manager to get more information about why
things are slow on your machine.
By clicking on the CPU column heading you can sort processes by
how much CPU 
they are absorbing.  Before deleting a process, you
should do a web search on the process name – often you will find it
may be marked as a malicious process with directions about how to
remove it.
Sometimes, a windows indexing process is absorbing too much time
and you can remove it.
Malicious software (malware) 
sometimes hides as a service.  They can
be more difficult to remove, but a web search will often tell you how.
What Might You Do Using Task Manager
- malware as an example
KingMiner malware mines cryptocurrency without users'
consent.
Source: https://www.pcrisk.com/removal-guides/14146-kingminer-virus
Added by: Xin
Liu
What Might You Do Using Task Manager
- malware examples
Think about what else malwares can do to our PC?
It can be about
Ads
File scanning
Added by: Xin Liu
Address Information
Your device, connected to the internet a network card, needs to keep
track of a number of addresses.
It needs to know:
Its MAC address for Ethernet functionality
Its Internet Protocol (IP) address
The name of the Domain Name Server that does address resolution
The address of the gateway that it uses to access the internet.
All of this information used to be entered manually.  Now it occurs
automatically via a number of mechanisms.
We can access this information by issuing the command ipconfig –all
in a command window
ipconf -all
MAC Address
IP Address
Default gateway
DNS Servers
What might you do with ipconfig?
The program will show you all of the information for each
network card on your computer – make sure you find the
information for the right card.
If you are dealing with a help desk or a technician, being
able to provide this information will be of great help.
This information will be of use if you are trying to 
sniff
packets intended for your machine
 – see the section on
wireshark.
What’s going on over the network
As we indicated earlier, while you may be running only a few
applications, there are many processes running on your machine
that are communicating with each other and with other
machines.
The program that reveals these connections is called 
netstat
.
On the next three slides, we show three executions of netstat
Netstat –f
Netstat – o
C:\>netstat -f
Note that ports 
3306
 (mysql) and 
8080
(webserver) are open
Active Connections
  Proto  Local Address          Foreign Address        State
  TCP    127.0.0.1:3306         Spring-PC:51929        ESTABLISHED
 ...
  TCP    127.0.0.1:3306         Spring-PC:59055        ESTABLISHED
  TCP    127.0.0.1:8009         Spring-PC:58983        TIME_WAIT
  TCP    127.0.0.1:8080         Spring-PC:58982        TIME_WAIT
  TCP    127.0.0.1:20121        Spring-PC:58948        TIME_WAIT
  TCP    127.0.0.1:20121        Spring-PC:59027        TIME_WAIT
  TCP    127.0.0.1:49158        Spring-PC:49159        ESTABLISHED
  TCP    127.0.0.1:49159        Spring-PC:49158        ESTABLISHED
  ......
  TCP    136.142.121.73:51935   107.152.27.219:https   TIME_WAIT
  TCP    136.142.121.73:52061   ns1.pitt.edu:domain    TIME_WAIT
  TCP    136.142.121.73:52062   52.96.4.178:https      ESTABLISHED
 TCP    136.142.121.73:52081   a23-15-8-
131.deploy.static.akamaitechnologies.com:http  ESTABLISHED
  TCP    136.142.121.73:52110   40.97.41.66:https      ESTABLISHED
  TCP    136.142.121.73:52856   ec2-34-214-162-88.us-west-
2.compute.amazonaws.com:https  ESTABLISHED
  TCP    136.142.121.73:53131   40.97.157.66:https     ESTABLISHED
  TCP    136.142.121.73:53132   40.97.157.66:https     ESTABLISHED
  ....
  TCP    136.142.121.73:58881   iad23s63-in-f4.1e100.net:https
ESTABLISHED
  TCP    136.142.121.73:59025   107.152.26.219:https   ESTABLISHED
  TCP    136.142.121.73:59082   ec2-52-39-131-77.us-west-
2.compute.amazonaws.com:https  ESTABLISHED
  TCP    136.142.121.73:59661   107.152.26.197:https   CLOSE_WAIT
  TCP    136.142.121.73:60358   107.152.27.197:https   CLOSE_WAIT
  TCP    136.142.121.73:61903   qv-in-f188.1e100.net:5228  ESTABLISHED
  TCP    136.142.121.73:64495   107.152.26.197:https   CLOSE_WAIT
  TCP    [::1]:8080             Spring-PC:52078        TIME_WAIT
 ...
C:\>netstat -o
Note that the last column contains the 
PID
 of the
process on my machine
Active Connections
  Proto  Local Address          Foreign Address        State           PID
  TCP    127.0.0.1:49170        Spring-PC:49171        ESTABLISHED     2660
  TCP    127.0.0.1:49171        Spring-PC:49170        ESTABLISHED     2660
  TCP    127.0.0.1:49172        Spring-PC:49173        ESTABLISHED     2660
.....
  TCP    127.0.0.1:55348        Spring-PC:55349        ESTABLISHED     6500
  TCP    127.0.0.1:55349        Spring-PC:55348        ESTABLISHED     6500
  TCP    127.0.0.1:56848        Spring-PC:5681         SYN_SENT        10524
  TCP    127.0.0.1:59044        Spring-PC:59045        ESTABLISHED     11744
  ....
  TCP    127.0.0.1:59069        Spring-PC:59070        ESTABLISHED     11744
  TCP    127.0.0.1:59070        Spring-PC:59069        ESTABLISHED     11744
  TCP    127.0.0.1:59657        Spring-PC:59658        ESTABLISHED     1076
  TCP    127.0.0.1:59658        Spring-PC:59657        ESTABLISHED     1076
  TCP    136.142.121.73:50026   107.152.27.197:https   CLOSE_WAIT      2984
  TCP    136.142.121.73:50028   107.152.27.197:https   CLOSE_WAIT      
2984
 TCP    136.142.121.73:52044   40.97.131.114:https    ESTABLISHED     2636
  TCP    136.142.121.73:52320   40.97.85.98:https      ESTABLISHED     2636
  TCP    136.142.121.73:52856   ec2-34-214-162-88:https  ESTABLISHED
7552
  TCP    136.142.121.73:55226   107.152.26.197:https   CLOSE_WAIT      2984
 ....
  TCP    136.142.121.73:60335   40.97.162.146:https    ESTABLISHED     2636
  TCP    136.142.121.73:60358   107.152.27.197:https   CLOSE_WAIT      2984
  TCP    136.142.121.73:60973   ns1:domain             TIME_WAIT       0
  TCP    136.142.121.73:60974   40.97.205.2:https      ESTABLISHED     2636
  TCP    136.142.121.73:61001   ec2-52-42-153-139:https  ESTABLISHED
7552
  TCP    136.142.121.73:64419   ns1:domain             TIME_WAIT       0
  TCP    136.142.121.73:64495   107.152.26.197:https   CLOSE_WAIT      2984
What Netstat can tell you
It takes a while to get used to netstat and you need more information to
interpret it, but here is what these reports are showing:
In the first report, I note that port 3306 and 8080 are open.  These are the
default ports for a database listener and a web server.  
It would be dangerous
to have them open if I was not behind a firewall
The second report shows me the process ID (PID) of the software running on
the various ports.  Using Task Manager, I can 
see if the software is OK
For more information about netstat, see:
https://docs.microsoft.com/en-us/windows-server/administration/windows-
commands/netstat
https://www.lifewire.com/netstat-command-2618098
Routing of Packets
When you connect to a web server, or get your mail, the
exchanges between your computer and the server 
follow a given
path
.
That path is not always the same, but it often is.
The hops across the internet incur delays at each router
You can see 
the path and the delays 
using the tracert or trace
route command
Open a command window and issue the command tracert destination
You will see a prinout of the route and delays as shown on the
following slide.
tracert
C:\>tracert -w 1 google.com
Tracing route to google.com [172.217.8.14] over a maximum of 30 hops:
  1     2 ms     2 ms     2 ms  vl3342.cl-core-2.gw.pitt.edu [10.215.48.1]
  2     3 ms     2 ms     3 ms  et4-3.cl-core-2.gw.pitt.edu [136.142.253.108]
  3     2 ms     3 ms     2 ms  vl801-oakland-wifi-vrf-palo-vs.cl-core-2.gw.pitt.edu [136.142.252.162]
  4     3 ms     3 ms     3 ms  vl800-oakland-wifi-vrf-bb.cl-core-2.gw.pitt.edu [136.142.252.160]
  5     4 ms     2 ms     2 ms  et-2-3-0-712.externals-cl.gw.pitt.edu [136.142.2.161]
  6    21 ms    24 ms    30 ms  cdn.pitt.3rox.net [147.73.16.162]
  7    15 ms    10 ms     9 ms  72.14.213.79
  8   187 ms   278 ms   114 ms  108.170.246.33
  9   139 ms    79 ms    50 ms  216.239.49.47
 10    50 ms    59 ms    13 ms  iad23s59-in-f14.1e100.net [172.217.8.14]
Trace complete.
What can tracert tell you.
Tracert sends three packets to each routing point and measures the round trip
time (RTT).
Generally speaking the times in the three columns should be pretty consistent.
When there is a big jump for one of the routers it gives you a sense of where
congestion exists
In general local devices should be in a few milliseconds, across the US times should
be around 100ms (1/10 of a second), international times may be 300-400 or more
For more information about tracert, see
https://mediatemple.net/community/products/dv/204643870/using-the-traceroute-
command
https://www.lifewire.com/tracert-command-2618101
undefined
What’s on the Network about Me
 
Just do a search
A Google search will get you a lot of information.
Searching for Michael B. Spring, I found 237 million pages –
obviously a lot not about me.
I added “Pitt” and dropped the number to 11 million – pretty good but
still too much
I added quotes around my name and found 9,620 pages  -- pretty good
and most were about me or something that had my name on it.
Using very little time, you can find a persons Facebook page
and a lot of information about them – just do a search in
Facebook
Historical search
If you find a webpage that’s of interest and you are really
curious, you can go back in time.
The internet archive, also known as the wayback machine, is
constantly taking snapshots of the web.  Its address is
https://archive.org
.
I found that my homepage had been captured 207 times
between September 8, 1999 and October 21, 2017.
If I had deleted things from my pages because they were
embarrassing, I might be able to go back and capture them
Historical search
Update
: I found that my homepage had been captured
52 times between January 23, 2015 and June 25, 2021.
Added by: Xin Liu
Historical search
- our own behavior
Think about if possible to find out all our network behaviors
by Google search? Why?
It can be about
Facebook social comments
Amazon purchases
Added by: Xin Liu
undefined
Two Last Tools to get Started
 
Wireshark
Wireshark is shareware that allow you to 
look at the traffic 
on an Ethernet.
Recall that all the machines on an Ethernet can see all of the packets on the Ethernet
Wireshark allows you to “
sniff
” all or a selected subset of those packets.
We will provide a rudimentary example of using wireshark.  You can download
wireshark at:
https://www.wireshark.org/
In our example we will trap packets that are http requests
Open wireshark, and select Capture Options
Choose your network card, click on filter and select TCP http” as the filter, and click start
After it starts, open your browser and go to a web page
You can find more information at:
https://www.lifewire.com/wireshark-tutorial-4143298
https://www.computerweekly.com/tutorial/Quick-and-dirty-Wireshark-tutorial
Using Wireshark to capture a web page request
 
Rolling Your Own: Twitter
This last example involves developing an application to 
watch Twitter streams
.
It requires a fair amount of work, but demonstrates how people use programs to spy on
other people.
Basically, you need to understand that you can access twitter information by writing a
program.  To do that you need to understand the Twitter “API” or Application Program
Interface.
You begin by:
Checking Twitter’s Main Developer Page -- 
https://developer.twitter.com/en.html
Find info on getting started -- 
https://developer.twitter.com/en/docs/basics/getting-started
Info on subscribing -- 
https://developer.twitter.com/en/docs/accounts-and-users/subscribe-
account-activity/overview
September 29, 2024
RESTful Web Services
28
Rolling Your Own: Twitter
Having read the basic info, you needed to register, obtain a library, and
find a simple example.
To use the API, you must create an app and use our OAuth-based
authorization system. Visit apps.twitter.com to create one.
Create an App -- 
https://apps.twitter.com/app/new
Generate Tokens (assuming an app was created --this is my app --
https://apps.twitter.com/app/14280438/keys
Use existing libraries and utilities
I used twitter4J -- 
http://twitter4j.org/en/index.html
Download the zip file with the jars and docs
Find a simple example to begin the process --
http://simpledeveloper.com/twitter-client-using-java/
 
September 29, 2024
RESTful Web Services
29
Programming
I like to work in Java but there are libraries that allow you to use pretty
much any language.
The next slide show the basic procedure for telling twitter you have
registered and agreed to their terms
The slide after that shows how to filter all tweet looking for a given
term – in my case I was looking for tweets about Las Vegas right after
the mass shooting in that city.
Law enforcement might be looking for all the tweets from a given
suspect they are following – indeed program like this have found
criminal at large tweeting that they are going to a movie at a given
place at 8:00!!!!
Using Twitter (Same for all uses)
I chose to store access tokens in a properties file
Properties prop = new Properties();
InputStream in;
in = new FileInputStream("twitter4jd.properties");
prop.load(in);
The access token properties are used to set authorization
ConfigurationBuilder configurationBuilder = new ConfigurationBuilder();
configurationBuilder
.setOAuthConsumerKey(prop.getProperty("oauth.consumerKey"))
.setOAuthConsumerSecret(prop.getProperty("oauth.consumerSecret"))
.setOAuthAccessToken(prop.getProperty("oauth.accessToken"))
.setOAuthAccessTokenSecret(prop.getProperty("oauth.accessTokenSecret"))
Instantiate a re-usable and thread-safe factory for either a tweet or a stream
Twitter twitter = twitterFactory.getInstance();
TwitterStream twitterStream = new
TwitterStreamFactory(configurationBuilder.build()).getInstance();
September 29, 2024
RESTful Web Services
31
Tapping the Twitter Stream
twitterStream.addListener(new StatusListener () {
@Override    public void onStatus(Status status) {   System.out.println(status.getText()); //
print tweet to console    }
@Override    public void onDeletionNotice(StatusDeletionNotice statusDeletionNotice) { System.out.println("Got status
del notice id:" + statusDeletionNotice.getStatusId());        }
@Override    public void onTrackLimitationNotice(int numberOfLimitedStatuses) {   System.out.println("Got track
limitation notice:" + numberOfLimitedStatuses);        }
@Override    public void onScrubGeo(long userId, long upToStatusId) {    System.out.println("Got scrub_geo event
userId:" + userId + " upToStatusId:" + upToStatusId);       }
@Override    public void onStallWarning(StallWarning warning) {  System.out.println("Got stall warning:" + warning);
}
@Override   public void onException(Exception ex) {         ex.printStackTrace();   }   });
FilterQuery tweetFilterQuery = new FilterQuery();
tweetFilterQuery.track(new String[]{"Las Vegas"}); // OR on keywords
tweetFilterQuery.language(new String[]{"en"}); //
twitterStream.filter(tweetFilterQuery);
September 29, 2024
RESTful Web Services
32
The Results
[Fri Oct 13 16:07:57 EDT 2017]Establishing connection.
[Fri Oct 13 16:07:58 EDT 2017]Connection established.
[Fri Oct 13 16:07:58 EDT 2017]Receiving status stream.
What happened to Jesus Campos? https://t.co/hi40APpvg4 https://t.co/esK2wwTub8
RT @IWillRedPillYou: George Soros Fund Management LLC bet 42 Million dollars on the downfall of MGM stocks right
before the events of La…
Zappos matching up to $1M for Las Vegas shooting victims and families - https://t.co/VlfWCXRxOm https://t.co/Mi3c5Nwzfy
Zappos matching up to $1M for Las Vegas shooting victims and families - https://t.co/NTCwtu3Mdj https://t.co/ZLWnVkSVnj
So cool at Las Vegas it legal to drink alcohol in public while you walkimg for example.
Hidden Valley and Primm Valley Extreme RZR Tour from Las Vegas
From USD: $162.99
https://t.co/09KIgHakj4
#Beijing… https://t.co/KXTgoJTo7b
RT @MikeTokes: @seanhannity @KellyannePolls @TomiLahren @SebGorka @GeraldoRivera @LeslieMarshall
@SheriffClarke @parksesq You shou…
Authorities: Las Vegas shooter fired at aviation fuel tanks 'with intent' https://t.co/qY0EI2FpOb #blog https://t.co/8yw9jdtsFP
UNBELIEVABLE! CHECK OUT HOW MANY PATIENTS LAS VEGAS HOSPITALS TREAT IN ONE NIGHT: -
https://t.co/td0K6S1y4M https://t.co/6Tjs1cjLBN
September 29, 2024
RESTful Web Services
33
Conclusion
This presentation look at some of the tools, from simple to
complex, that can be used to look at you and what you are
doing.
This is but a brief introduction to a complex world that includes
everything from standard tools to complex programs written to
capture all the information on the internet.
Anything you put out there can be captured.  It just depends
how badly somebody want to know about you.
Slide Note
Embed
Share

This presentation explores techniques and tools for understanding digital data, focusing on protecting your data. Topics include analyzing PC processes, network activity, and utilizing tools like Task Manager to manage processes effectively. Learn how to identify and address potential security threats, such as malware, using practical examples and best practices in data security.

  • Data Security
  • Tools
  • Techniques
  • Malware
  • Task Manager

Uploaded on Sep 29, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Digital Data Safety 1

  2. SADET Module A.1: Digital Data Safety Exploring Digital Data Michael B. Spring Department of Informatics and Network Systems School of Computing and Information

  3. Introduction This slide set looks at some techniques and tools for understanding computers and networks focused on protecting your data. This slide set is optional and intended for students interested in the technical side of data security issues. Prior presentations examined the issues of data privacy conceptually and looked at things you can do to keep your data private

  4. Overview Looking at your PC Processes Addresses Networking activity Routing Where is my data? Doing a search Using the wayback machine Snooping on Twitter Two More Tools Wireshark Twitter Streams

  5. Task Manager On any windows PC, pressing the keys Ctrl , Alt , and Del at the same time will either launch task manager or display a list which will allow you to select task manager. Task manager allows you to look at the applications that are running and gather some information about them. For now, simply note that while only a few applications are running, there are dozens of processes and services running. Also note that services that are running have a PID Process ID. We will want to look at these PID s later. Many of the services and some of the processes are communicating over the network.

  6. Two Screen Shots of Task Manager The Process ID of the dozens of services Only a few applications running More than 100 processes are running

  7. What Might You Do Using Task Manager You turn to Task Manager to get more information about why things are slow on your machine. By clicking on the CPU column heading you can sort processes by how much CPU they are absorbing. Before deleting a process, you should do a web search on the process name often you will find it may be marked as a malicious process with directions about how to remove it. Sometimes, a windows indexing process is absorbing too much time and you can remove it. Malicious software (malware) sometimes hides as a service. They can be more difficult to remove, but a web search will often tell you how.

  8. What Might You Do Using Task Manager - malware as an example KingMiner malware mines cryptocurrency without users' consent. Added by: Xin Liu Source: https://www.pcrisk.com/removal-guides/14146-kingminer-virus

  9. What Might You Do Using Task Manager - malware examples Think about what else malwares can do to our PC? It can be about Ads File scanning Added by: Xin Liu

  10. Address Information Your device, connected to the internet a network card, needs to keep track of a number of addresses. It needs to know: Its MAC address for Ethernet functionality Its Internet Protocol (IP) address The name of the Domain Name Server that does address resolution The address of the gateway that it uses to access the internet. All of this information used to be entered manually. Now it occurs automatically via a number of mechanisms. We can access this information by issuing the command ipconfig all in a command window

  11. ipconf -all MAC Address IP Address Default gateway DNS Servers

  12. What might you do with ipconfig? The program will show you all of the information for each network card on your computer make sure you find the information for the right card. If you are dealing with a help desk or a technician, being able to provide this information will be of great help. This information will be of use if you are trying to sniff packets intended for your machine see the section on wireshark.

  13. Whats going on over the network As we indicated earlier, while you may be running only a few applications, there are many processes running on your machine that are communicating with each other and with other machines. The program that reveals these connections is called netstat. On the next three slides, we show three executions of netstat Netstat f Netstat o

  14. C:\>netstat -f Note that ports 3306 (mysql) and 8080 (webserver) are open TCP 136.142.121.73:52081 a23-15-8- 131.deploy.static.akamaitechnologies.com:http ESTABLISHED TCP 136.142.121.73:52110 40.97.41.66:https ESTABLISHED TCP 136.142.121.73:52856 ec2-34-214-162-88.us-west- 2.compute.amazonaws.com:https ESTABLISHED TCP 136.142.121.73:53131 40.97.157.66:https ESTABLISHED TCP 136.142.121.73:53132 40.97.157.66:https ESTABLISHED .... TCP 136.142.121.73:58881 iad23s63-in-f4.1e100.net:https ESTABLISHED TCP 136.142.121.73:59025 107.152.26.219:https ESTABLISHED TCP 136.142.121.73:59082 ec2-52-39-131-77.us-west- 2.compute.amazonaws.com:https ESTABLISHED TCP 136.142.121.73:59661 107.152.26.197:https CLOSE_WAIT TCP 136.142.121.73:60358 107.152.27.197:https CLOSE_WAIT TCP 136.142.121.73:61903 qv-in-f188.1e100.net:5228 ESTABLISHED TCP 136.142.121.73:64495 107.152.26.197:https CLOSE_WAIT TCP [::1]:8080 Spring-PC:52078 TIME_WAIT ... Active Connections Proto Local Address Foreign Address State TCP 127.0.0.1:3306 Spring-PC:51929 ESTABLISHED ... TCP 127.0.0.1:3306 Spring-PC:59055 ESTABLISHED TCP 127.0.0.1:8009 Spring-PC:58983 TIME_WAIT TCP 127.0.0.1:8080 Spring-PC:58982 TIME_WAIT TCP 127.0.0.1:20121 Spring-PC:58948 TIME_WAIT TCP 127.0.0.1:20121 Spring-PC:59027 TIME_WAIT TCP 127.0.0.1:49158 Spring-PC:49159 ESTABLISHED TCP 127.0.0.1:49159 Spring-PC:49158 ESTABLISHED ...... TCP 136.142.121.73:51935 107.152.27.219:https TIME_WAIT TCP 136.142.121.73:52061 ns1.pitt.edu:domain TIME_WAIT TCP 136.142.121.73:52062 52.96.4.178:https ESTABLISHED

  15. C:\>netstat -o Note that the last column contains the PID of the process on my machine TCP 136.142.121.73:52044 40.97.131.114:https ESTABLISHED 2636 TCP 136.142.121.73:52320 40.97.85.98:https ESTABLISHED 2636 TCP 136.142.121.73:52856 ec2-34-214-162-88:https ESTABLISHED 7552 TCP 136.142.121.73:55226 107.152.26.197:https CLOSE_WAIT 2984 .... TCP 136.142.121.73:60335 40.97.162.146:https ESTABLISHED 2636 TCP 136.142.121.73:60358 107.152.27.197:https CLOSE_WAIT 2984 TCP 136.142.121.73:60973 ns1:domain TIME_WAIT 0 TCP 136.142.121.73:60974 40.97.205.2:https ESTABLISHED 2636 TCP 136.142.121.73:61001 ec2-52-42-153-139:https ESTABLISHED 7552 TCP 136.142.121.73:64419 ns1:domain TIME_WAIT 0 TCP 136.142.121.73:64495 107.152.26.197:https CLOSE_WAIT 2984 Active Connections Proto Local Address Foreign Address State PID TCP 127.0.0.1:49170 Spring-PC:49171 ESTABLISHED 2660 TCP 127.0.0.1:49171 Spring-PC:49170 ESTABLISHED 2660 TCP 127.0.0.1:49172 Spring-PC:49173 ESTABLISHED 2660 ..... TCP 127.0.0.1:55348 Spring-PC:55349 ESTABLISHED 6500 TCP 127.0.0.1:55349 Spring-PC:55348 ESTABLISHED 6500 TCP 127.0.0.1:56848 Spring-PC:5681 SYN_SENT 10524 TCP 127.0.0.1:59044 Spring-PC:59045 ESTABLISHED 11744 .... TCP 127.0.0.1:59069 Spring-PC:59070 ESTABLISHED 11744 TCP 127.0.0.1:59070 Spring-PC:59069 ESTABLISHED 11744 TCP 127.0.0.1:59657 Spring-PC:59658 ESTABLISHED 1076 TCP 127.0.0.1:59658 Spring-PC:59657 ESTABLISHED 1076 TCP 136.142.121.73:50026 107.152.27.197:https CLOSE_WAIT 2984 TCP 136.142.121.73:50028 107.152.27.197:https CLOSE_WAIT 2984

  16. What Netstat can tell you It takes a while to get used to netstat and you need more information to interpret it, but here is what these reports are showing: In the first report, I note that port 3306 and 8080 are open. These are the default ports for a database listener and a web server. It would be dangerous to have them open if I was not behind a firewall The second report shows me the process ID (PID) of the software running on the various ports. Using Task Manager, I can see if the software is OK For more information about netstat, see: https://docs.microsoft.com/en-us/windows-server/administration/windows- commands/netstat https://www.lifewire.com/netstat-command-2618098

  17. Routing of Packets When you connect to a web server, or get your mail, the exchanges between your computer and the server follow a given path. That path is not always the same, but it often is. The hops across the internet incur delays at each router You can see the path and the delays using the tracert or trace route command Open a command window and issue the command tracert destination You will see a prinout of the route and delays as shown on the following slide.

  18. tracert C:\>tracert -w 1 google.com Tracing route to google.com [172.217.8.14] over a maximum of 30 hops: 1 2 3 4 5 6 7 8 9 10 2 ms 3 ms 2 ms 3 ms 4 ms 21 ms 15 ms 187 ms 139 ms 50 ms 2 ms 2 ms 3 ms 3 ms 2 ms 24 ms 10 ms 278 ms 79 ms 59 ms 2 ms vl3342.cl-core-2.gw.pitt.edu [10.215.48.1] 3 ms et4-3.cl-core-2.gw.pitt.edu [136.142.253.108] 2 ms vl801-oakland-wifi-vrf-palo-vs.cl-core-2.gw.pitt.edu [136.142.252.162] 3 ms vl800-oakland-wifi-vrf-bb.cl-core-2.gw.pitt.edu [136.142.252.160] 2 ms et-2-3-0-712.externals-cl.gw.pitt.edu [136.142.2.161] 30 ms cdn.pitt.3rox.net [147.73.16.162] 9 ms 72.14.213.79 114 ms 108.170.246.33 50 ms 216.239.49.47 13 ms iad23s59-in-f14.1e100.net [172.217.8.14] Trace complete.

  19. What can tracert tell you. Tracert sends three packets to each routing point and measures the round trip time (RTT). Generally speaking the times in the three columns should be pretty consistent. When there is a big jump for one of the routers it gives you a sense of where congestion exists In general local devices should be in a few milliseconds, across the US times should be around 100ms (1/10 of a second), international times may be 300-400 or more For more information about tracert, see https://mediatemple.net/community/products/dv/204643870/using-the-traceroute- command https://www.lifewire.com/tracert-command-2618101

  20. Whats on the Network about Me

  21. Just do a search A Google search will get you a lot of information. Searching for Michael B. Spring, I found 237 million pages obviously a lot not about me. I added Pitt and dropped the number to 11 million pretty good but still too much I added quotes around my name and found 9,620 pages -- pretty good and most were about me or something that had my name on it. Using very little time, you can find a persons Facebook page and a lot of information about them just do a search in Facebook

  22. Historical search If you find a webpage that s of interest and you are really curious, you can go back in time. The internet archive, also known as the wayback machine, is constantly taking snapshots of the web. Its address is https://archive.org. I found that my homepage had been captured 207 times between September 8, 1999 and October 21, 2017. If I had deleted things from my pages because they were embarrassing, I might be able to go back and capture them

  23. Historical search Update: I found that my homepage had been captured 52 times between January 23, 2015 and June 25, 2021. Added by: Xin Liu

  24. Historical search - our own behavior Think about if possible to find out all our network behaviors by Google search? Why? It can be about Facebook social comments Amazon purchases Added by: Xin Liu

  25. Two Last Tools to get Started

  26. Wireshark Wireshark is shareware that allow you to look at the traffic on an Ethernet. Recall that all the machines on an Ethernet can see all of the packets on the Ethernet Wireshark allows you to sniff all or a selected subset of those packets. We will provide a rudimentary example of using wireshark. You can download wireshark at: https://www.wireshark.org/ In our example we will trap packets that are http requests Open wireshark, and select Capture Options Choose your network card, click on filter and select TCP http as the filter, and click start After it starts, open your browser and go to a web page You can find more information at: https://www.lifewire.com/wireshark-tutorial-4143298 https://www.computerweekly.com/tutorial/Quick-and-dirty-Wireshark-tutorial

  27. Using Wireshark to capture a web page request

  28. Rolling Your Own: Twitter This last example involves developing an application to watch Twitter streams. It requires a fair amount of work, but demonstrates how people use programs to spy on other people. Basically, you need to understand that you can access twitter information by writing a program. To do that you need to understand the Twitter API or Application Program Interface. You begin by: Checking Twitter s Main Developer Page -- https://developer.twitter.com/en.html Find info on getting started -- https://developer.twitter.com/en/docs/basics/getting-started Info on subscribing -- https://developer.twitter.com/en/docs/accounts-and-users/subscribe- account-activity/overview 28 September 29, 2024 RESTful Web Services

  29. Rolling Your Own: Twitter Having read the basic info, you needed to register, obtain a library, and find a simple example. To use the API, you must create an app and use our OAuth-based authorization system. Visit apps.twitter.com to create one. Create an App -- https://apps.twitter.com/app/new Generate Tokens (assuming an app was created --this is my app -- https://apps.twitter.com/app/14280438/keys Use existing libraries and utilities I used twitter4J -- http://twitter4j.org/en/index.html Download the zip file with the jars and docs Find a simple example to begin the process -- http://simpledeveloper.com/twitter-client-using-java/ 29 September 29, 2024 RESTful Web Services

  30. Programming I like to work in Java but there are libraries that allow you to use pretty much any language. The next slide show the basic procedure for telling twitter you have registered and agreed to their terms The slide after that shows how to filter all tweet looking for a given term in my case I was looking for tweets about Las Vegas right after the mass shooting in that city. Law enforcement might be looking for all the tweets from a given suspect they are following indeed program like this have found criminal at large tweeting that they are going to a movie at a given place at 8:00!!!!

  31. Using Twitter (Same for all uses) I chose to store access tokens in a properties file Properties prop = new Properties(); InputStream in; in = new FileInputStream("twitter4jd.properties"); prop.load(in); The access token properties are used to set authorization ConfigurationBuilder configurationBuilder = new ConfigurationBuilder(); configurationBuilder .setOAuthConsumerKey(prop.getProperty("oauth.consumerKey")) .setOAuthConsumerSecret(prop.getProperty("oauth.consumerSecret")) .setOAuthAccessToken(prop.getProperty("oauth.accessToken")) .setOAuthAccessTokenSecret(prop.getProperty("oauth.accessTokenSecret")) Instantiate a re-usable and thread-safe factory for either a tweet or a stream Twitter twitter = twitterFactory.getInstance(); TwitterStream twitterStream = new TwitterStreamFactory(configurationBuilder.build()).getInstance(); 31 September 29, 2024 RESTful Web Services

  32. Tapping the Twitter Stream twitterStream.addListener(new StatusListener () { @Override public void onStatus(Status status) { System.out.println(status.getText()); // print tweet to console } @Override public void onDeletionNotice(StatusDeletionNotice statusDeletionNotice) { System.out.println("Got status del notice id:" + statusDeletionNotice.getStatusId()); } @Override public void onTrackLimitationNotice(int numberOfLimitedStatuses) { System.out.println("Got track limitation notice:" + numberOfLimitedStatuses); } @Override public void onScrubGeo(long userId, long upToStatusId) { System.out.println("Got scrub_geo event userId:" + userId + " upToStatusId:" + upToStatusId); } @Override public void onStallWarning(StallWarning warning) { System.out.println("Got stall warning:" + warning); } @Override public void onException(Exception ex) { ex.printStackTrace(); } }); FilterQuery tweetFilterQuery = new FilterQuery(); tweetFilterQuery.track(new String[]{"Las Vegas"}); // OR on keywords tweetFilterQuery.language(new String[]{"en"}); // twitterStream.filter(tweetFilterQuery); 32 September 29, 2024 RESTful Web Services

  33. The Results [Fri Oct 13 16:07:57 EDT 2017]Establishing connection. [Fri Oct 13 16:07:58 EDT 2017]Connection established. [Fri Oct 13 16:07:58 EDT 2017]Receiving status stream. What happened to Jesus Campos? https://t.co/hi40APpvg4 https://t.co/esK2wwTub8 RT @IWillRedPillYou: George Soros Fund Management LLC bet 42 Million dollars on the downfall of MGM stocks right before the events of La Zappos matching up to $1M for Las Vegas shooting victims and families - https://t.co/VlfWCXRxOm https://t.co/Mi3c5Nwzfy Zappos matching up to $1M for Las Vegas shooting victims and families - https://t.co/NTCwtu3Mdj https://t.co/ZLWnVkSVnj So cool at Las Vegas it legal to drink alcohol in public while you walkimg for example. Hidden Valley and Primm Valley Extreme RZR Tour from Las Vegas From USD: $162.99 https://t.co/09KIgHakj4 #Beijing https://t.co/KXTgoJTo7b RT @MikeTokes: @seanhannity @KellyannePolls @TomiLahren @SebGorka @GeraldoRivera @LeslieMarshall @SheriffClarke @parksesq You shou Authorities: Las Vegas shooter fired at aviation fuel tanks 'with intent' https://t.co/qY0EI2FpOb #blog https://t.co/8yw9jdtsFP UNBELIEVABLE! CHECK OUT HOW MANY PATIENTS LAS VEGAS HOSPITALS TREAT IN ONE NIGHT: - https://t.co/td0K6S1y4M https://t.co/6Tjs1cjLBN 33 September 29, 2024 RESTful Web Services

  34. Conclusion This presentation look at some of the tools, from simple to complex, that can be used to look at you and what you are doing. This is but a brief introduction to a complex world that includes everything from standard tools to complex programs written to capture all the information on the internet. Anything you put out there can be captured. It just depends how badly somebody want to know about you.

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#