Kerberos & WINS Protocols Security Research Paper
This project was awarded to muzzamilnoor for $250 USD.Get free quotes for a project like this
Project Budget$30-$250 USD
1 Line description:
Research the Kerberos & WINS protocols and their use in Microsoft Windows. Suggest vulnerabilities in each protocol, and describe the work in a detailed technical paper.
Goals of the project:
1. Research and understand the Kerberos & WINS protocols
2. Research and understand the ways Windows uses these protocols
3. Research known vulnerabilities in these protocols
4. Write two technical papers (one per protocol) which describe and explain the protocol, and enumerate the protocol's known vulnerabilities.
1. Describe the purpose of the Kerberos protocol and its general use.
2. Describe the authentication algorithms used by the protocol. Include detailed flow diagrams to explain every use case of the Kerberos protocol.
3. Describe the different messages of the protocol, including tables representing the format of the packet. Be as detailed as possible, i.e. describe each field of every message, its size in bytes, and its possible values. For bitmask fields, explain every bit.
4. Describe Windows processes which use Kerberos for authentication. For example: user login to a domain workstation, user access of a shared folder on a file server, login to exchange, login to IIS servers, etc. Include flow diagrams to describe the different use cases. Include network captures (pcap files) of these processes. Make sure to describe both human driven processes (e.g. user login) and automatic/program driven processes (i.e. operating system services, web applications, client software, etc.).
5. Research known vulnerabilities of the protocol and explain each one. All types of vulnerabilities may be included: denial of service, brute force attacks, replay attacks, credentials theft, spoofing, etc.
1. Describe the purpose of the WINS protocol and its general use.
2. Describe the different messages of the protocol, including tables representing the format of the packet. Specify the use of every field and the possible values of every field. Include table diagrams portraying of type of message.
3. Describe Windows processes which use the WINS protocol for name resolution. Focus on when the operating system uses DNS for name resolution and when it uses WINS. List as many use cases as possible, describe each one and include a network capture (pcap file) of it.
4. Research known vulnerabilities of the WINS server. Include denial of service attacks, reply forging, WINS server spoofing, etc.
1. Do not copy&paste from popular web sites
2. Include links, citations & bibliography to back up your work
3. Use proper, well explained English.
4. In-text citations: Every description, example, quotation etc. is expected to be supported in the text by relevant links and citations. Additionally, all references should be listed in a detailed bibliography
5. Arial 10 font, 8 pages min per protocol (16 pages min total)
Looking to make some money?
- Set your budget and the timeframe
- Outline your proposal
- Get paid for your work
Hire Freelancers who also bid on this project
Looking for work?
Work on projects like this and make money from home!Sign Up Now
- The New York Times
- Wall Street Journal
- Times Online