The fifth homework assignment (HW5) is
due at 5 p.m. on December 11, 2003.
Late homeworks will not be accepted
without Deans' excuses.
For this homework, you will be working in groups, because
there is a need for platform compatibility. By now, you should
know who the other members of your group are and which of you has the
laptop running Windows 2000, NT, or XP that will be used for the
assignment. If you do not yet have this information, please
contact TA Wesley Maness
immediately. Remember that there will be one grade given to each
completed assignment; so members of the same group will get the same
grade.
Please address questions about HW5 to
the TAs, Wesley Maness and
kevin DOT chang AT yale DOT edu..
2. Introduction
The purpose of this assignment is
to raise your awareness of the basic fact that you put your computer at
risk when you connect it to a network. For example, there may be
traffic directed at your machine from elsewhere on the network that can
have undesired effects, and there may be programs running on your
machine that are doing things you are unaware of (including, in some
circumstances, sending sensitive information from your machine to other
machines on the network).
Two of the tools you will use in this
assignment are Zone Alarm and Shield's Up. You should read
about them before actually doing the assignment, which is explained in
detail in steps 0-16 in Section 3 below. You may also want to
read the following general overview
of firewalls.
3. Instructions
As Morrow Long explained in his Nov. 13 lecture, it is good
practice to keep back-up copies of your most important files on
memory-keys, CDs, floppies, or some other offline store. Back-up
is a particularly important thing to do before you begin a
network-security exercise. So make back-up copies now of the up
to date versions of your most important files.
If you are currently running a personal firewall, please disable
or uninstall it. If you have questions about how to re-enable or
re-install it after you have finished HW5, contact TA Wesley Manessbefore disabling or uninstalling
it.
If KaZaA is currently installed on your machine, uninstall
it. To uninstall KaZaA:
Bring up your Control Panel by selecting Start -> Control
Panel, for Win XP, or Start -> Settings -> Control Panel, for Win
NT and Win 2000.
Select "Add/Remove Programs" from the Control Panel.
Scroll down the list of programs, select "KaZaA Media
Desktop" and press the "Change/Remove" button.
Follow the onscreen prompts to uninstall KaZaA.
Uninstall should be complete.
Remove Kazaa-related adware and spyware by following the
instructions in step 17 below.
Click on 'Download & Buy' from the left-hand side column.
Scroll down, and click on 'Trial Version'
You should now see 'ZoneAlarm Pro Version 4.0' in your browser
Click on 'Click here to begin your download (English Version)
and save to your disk'
Install ZoneAlarm
Double-click and run the *setup*.exe file that you just
downloaded in step 3.
We recommend that you not give your
real email address or name when running the install.
You will also be asked a few User-survey questions. These
are
optional; just press the Finish button.
Restart Windows.
Install is complete.
Configuration: After restart you will be prompted with a 'License
Wizard' window; just press 'TRY'.
Press 'Next' in the 'Configuration Wizard' window.
In the 'Privacy Control' window, you can select
'privacy control' and/or 'cache cleanup'. You may do so if you
wish, but these are not needed for HW5. Press 'Next'.
In the 'Firewall Alerts' window, you can select when to receive
alerts and what
type of alerts to receive; the default of 'hacker activity' should
suffice. Press 'Next'.
There is no need to create a password. Press 'Finish'.
You will then be presented with the window 'Do You Want
ZoneAlarm to Preconfigure Access Permission'. Leave it at
'No'. This ensures that, when you launch an application that
needs to connect to
the Internet (e.g., Internet
Explorer or AIM), ZoneAlarms will allow
you to connect to the Internet for that particular
application.
Feel free to run the 'Tutorial'.
Now use your Internet connection! Run IE or AIM or a chat
application or anything else. You should get a prompt window from
ZoneAlarm asking for your
permission to allow a network connection for each application that you
use. Give permission.
Perform your first Internet
Vulnerability Assessment by using GRC's Shields Up!
Follow the 'Download Free' links and save kmd.exe to your local
disk. (There is also an Ad-Free version of KaZaA that one can pay
for. For the
purposes of this assignment, use the Free version.)
Install KaZaA: (These steps should done
while running ZoneAlarm.)
Double-click the kmd.exe file you downloaded.
Follow the on-screen prompts from the KaZaA Installer. (During
the install of KaZaA, you will be prompted by ZoneAlarm quite a few
times. It is necessary to answer 'yes' to all of these Internet
requests.)
Run KaZaA: (Press the Launch KMD button once the Install is
complete.)
Create a username for this onetime usage of KaZaA.
Use KaZaA to search for a few items.
Perform your second Internet
Vulnerability Assessment by using GRC's Shields Up! while running KaZaA.
Click on the Common Ports button to perform a 'Common Ports' scan.
Scroll down and read the results.
Are there any ports open? If so, then, for each open
port, give a reason that it is open. Compare these results to
those found in step 7.5.2.
Are there any differences? If there are no differences, explain
why there are none. If there are differences, then, for each one,
give a reason that this port is open now but wasn't in 7.5.2 or vice
versa.
Save this HTML file by selecting File -> Save As from your
browser.
After you have completed steps 0-11, save the log file that
ZoneAlarm has generated. To find
out where your log file is
stored, bring up the 'Zone Alarm Control Center' Window and select
'Alerts & Logs'. Press the 'Advanced' button and select the
'Log
Control' tab; you should see the location of your log file.
Make sure to save the log file somewhere other than in the ZoneAlarm
subdirectory structure. We suggest that you save your log file in
your
"My Documents" folder.
Disable ZoneAlarm if you no longer want it running on your
machine by right clicking on the ZoneAlarm icon in
the Systems
Icon Tray.
Disable KaZaA if you no longer want it running on your machine.
Using your Control Panel -> Add/Remove Programs, uninstall the
following if you no longer want them:
KaZaA Media Desktop (Also press the 'Uninstall P2P Networking'
button when prompted.)
P2P Networking (if not removed in the step above)
Peer Points Manager (if not removed in step above)
ZoneAlarm Pro
Re-enable or re-install your personal firewall if necessary.
In many cases, KaZaA will install adware and spyware components
to your machine without your knowledge. These components are, in most
cases, not removable via the Windows Control Panel. It is recommended
that you download and install Ad-aware 6.0.
Follow the on-screen prompts to install Ad-aware 6.0.
Once installed, run Ad-aware 6.0 and do a full system scan.
Once the full system scan completes, press 'Fix Selected Problems' to
fix the adware and spyware components found by Ad-aware 6.0.
Unistall of KaZaA and all of its associated components should now be
complete.
To uninstall Ad-aware 6.0, simply go to your Windows Control Panel
-> Add/Remove Programs and select Ad-aware 6.0 from the list.
4. Requirements
In each group, the person whose computer is being used should submit
the assignment on behalf of the whole group. Your answers to the
questions about open ports in 7.5.2 and 11.5.2
of Section 3 should be in one text file, along with the names of the
three people in the group, prepared with WORD or whatever
text editor you are most comfortable with. You should also have
three other files once you have finished steps 0 through 17: one HTML
file saved in 7.5.3, one HTML file saved in 11.5.3, and one log file
saved in 12.
Combine these 4 files
using WinZip or whichever compression program you have used in previous
assignments, and then submit the zip file using the same
instructions that
you used in HW1 - HW4.