Welcome Guys

Penggemar :D

Showing posts with label networking. Show all posts
Showing posts with label networking. Show all posts

Rencana Belajar : Jaringan Komputer

Written By pcbolong on Tuesday, December 6, 2011 | 11:35 AM

Rencana perjalanan yang saya buat kali ini bukan merupakan perjalanan untuk wisata, melainkan perjalanan menuju hidup enak. Hidup dimana saya bisa mendapatkan apa saja apa yang saya inginkan. Saya adalah hanya seorang anak muda, yang bisa dibilang sudah gagal dalam jenjang pendidikan. Skripsi sudah selesai, sudah dinyatakan lulus, tetapi sudah lebih dari 1 bulan belum revisi. Belum membayar pendaftaran wisudah juga. Mungkin dosen pembimbing saya sudah enggan untuk menerima revisi dari saya lagi. Mungkin bisa dibilang saya sudah putus asa.

Untuk membayar semua kegagalan saya, saya akan berusaha menjadi yang terbaik dan membuktikan bahwa saya bisa. Untuk mencapai hal ini, saya mempunyai rencana mencari sertifikat-sertifikat international dalam bidang IT yang tentu saja dengan kemampuan yang saya miliki. Saya memiliki kemampuan terhadap linux, jaringan komputer baik lokal maupun internet, dan sedikit mengenai digital forensic dan keamanan komputer. Agar saya bisa mendapatkan sertifikat saya harus terus belajar menambah kemampuan saya.

Rencana perjalanan saya akan terbagi menjadi beberapa point yang akan saya jalankan secara paralel dan simultan setiap hari. Setiap hari-nya saya harus mempelajari mengenai satu buah materi yang berkaitan dengan beberapa kemampuan yang sudah saya sebutkan diatas, yaitu linux, jaringan komputer, digital forensic, dan keamanan komputer.

Pada postingan ini khusus membahas rencana belajar mengenai jaringan komputer. Di bawah ini adalah point-point yang harus saya kuasai. Dan setiap sub point akan saya pelajari dalam satu hari.
Networking hardware. Cables, connectors, interfaces, hubs, bridges, routers, and other networking devices
Network topology and design. How to deploy and employ networking technologies from 10Mbps up to 1Gbps and beyond
Network addressing and routing. How to design, implement, and troubleshoot common network addressing, subnetting and supernetting, and name resolution services
Common network protocol suites. Includes some or all of TCP/IP, frame relay, ATM, X.25, and so forth (may occasionally also include legacy protocols like IPX/SPX, NetBEUI, SNA, and so forth)
Common network services. Includes protocol-related request-reply sequences, traffic patterns, related packet formats, and so on
Network attack and pathology signatures. Includes common attacks (Denial of Service, Distributed Denial of Service, Ping of Death, and so forth) and misbehaviors (broadcast storms, excessive errors, and so on)
11:35 AM | 1 comments | Read More

Menjadi Network Engineers

Written By pcbolong on Thursday, November 24, 2011 | 8:54 PM

Seorang Network engineers mempunyai tugas utama untuk mengatur jaringan computer pada sebuah perusahaan. Baik itu jaringan computer kecil ataupun besar, yang akan digunakan untuk pertukaran data maupun sumber daya yang lain seperti printer. Pekerjaan seoran network engineers biasanya meliputi network administrator, design, install dan maintenance komunikasi antar computer yang ada di dalam sebuah perusahaan atau organisasi.

Seorang network engineers harus dapat bekerja pada 4 sistem :
- Local area networks (LANs)
- Metropolitan area networks (MANs)
- Wide area networks (WANs)
- Global area networks (GANs)

Topik-topik yang dipelajari di beberapa lembaga-lembaga pengajaran dengan konsentrasi networking yaitu :
- Internet, wide area networks, dan local area networks.
- Networking configuration and protocols
- Routing and traffic management
- Network operating systems
- Wireless and wired networks
- Network analysis and design

Sekarang sebagian besar perusahaan-perusahaan baik besar maupun kecil, membutuhkan seorang network engineer untuk mengurusi jaringan computer yang ada di perusahaan mereka. Biasanya beberapa kebutuhan umum yang dicari oleh sebuah perusahaan dalam mencari network engineer adalah sebagai berikut :
• Implementation and possible design of converged networks
• Implementation and possible design of local and remote systems
• Development and monitoring of network dial-up or VPN Connection
• Analyzing corporate network applications and client-server environments

Untuk dapat memenuhi kebutuhan sebuah perusahaan dalam bidang jaringan computer, kita harus memiliki beberapa keahlian sebagai berikut :
• Design, implement and maintain a routed and switched IP wired and wireless network infrastructure based on an understanding of core networking concepts and industry best practices.
• Design, implement and maintain major network systems and services such as active directory, email, DNS, servers, clients and data storage based on an understanding of core information systems concepts and industry best practices.
• Visualize, communicate and document technology related to consumer, service provider and industry requirements, trends and use cases.
• Demonstrate the ability to select and architect the most appropriate network, information systems and technologies to meet the requirements of specific projects and communicate these decisions clearly in written and oral forms.
• Articulate, implement and support contemporary IP network–based communications, collaboration, virtualization and mobile systems and services.

Sebagai pendukung dan nilai plus, seorang network engineers juga harus memiliki skill programming, tentu saja programming yang berhubungan dengan jaringan computer. Beberapa bahasa pemrograman yang banyak digunakan sebagai bahasa pemrograman jaringan atau client-server yaitu c/c++, perl, bash, dan assembly.

Sekarang banyak sekali lembaga-lembaga pendidikan baik yang dikelola pemerintah maupun swasta, yang menyediakan pelatihan jaringan computer, seperti cisco, juniper, compTIA, dll.

Mungkin saya harus bisa memiliki salah satu sertifikat specialis networking, karena setiap hari saya selalu berhubungan dengan jaringan computer. Semangat!!!
8:54 PM | 2 comments | Read More

Web Security: Why You Should Always Use HTTPS

Written By pcbolong on Tuesday, May 31, 2011 | 8:51 AM

Mike Shema is the engineering lead for the Qualys web application scanning service. He has authored several books, including Hack Notes: Web Application Security, and he blogs on web security topics at the companion site for his latest book, Seven Deadliest Web Attacks.

The next time you visit a cafe to sip coffee and surf on some free Wi-Fi, try an experiment: Log in to some of your usual sites. Then, with a smile, hand the keyboard over to a stranger. Now walk away for 20 minutes. Remember to pick up your laptop before you leave.



While the scenario may seem silly, it essentially happens each time you visit a website that doesn’t bother to encrypt the traffic to your browser — in other words, sites using HTTP instead of HTTPS.

The encryption within HTTPS is intended to provide benefits like confidentiality, integrity and identity. Your information remains confidential from prying eyes because only your browser and the server can decrypt the traffic. Integrity protects the data from being modified without your knowledge. We’ll address identity in a bit.

There’s an important distinction between tweeting to the world or sharing thoughts on Facebook and having your browsing activity going over unencrypted HTTP. You intentionally share tweets, likes, pics and thoughts. The lack of encryption means you’re unintentionally exposing the controls necessary to share such things. It’s the difference between someone viewing your profile and taking control of your keyboard.


The Spy Who Sniffed Me


We most often hear about hackers attacking websites, but it’s just as easy and lucrative to attack your browser. One method is to deliver malware or lull someone into visiting a spoofed site (phishing). Those techniques don’t require targeting a specific victim. They can be launched scattershot from anywhere on the web, regardless of the attacker’s geographic or network relationship to the victim. Another kind of attack, sniffing, requires proximity to the victim but is no less potent or worrisome.

Sniffing attacks watch the traffic to and from the victim’s web browser. (In fact, all of the computer’s traffic is visible, but we’re only worried about websites for now.) The only catch is that the attacker needs to be able to see the communication channel. The easiest way for an attacker to do this is to sit next to one of the end points, either the web server or the web browser. Unencrypted wireless networks — think of cafes, libraries, and airports — make it easy to find the browser’s end point because the traffic is visible to anyone who can obtain that network’s signal.

Encryption defeats sniffing attacks by concealing the traffic’s meaning from all except those who know the secret to decrypting it. The traffic remains visible to the sniffer, but it appears as streams of random bytes rather than HTML, links, cookies and passwords. The trick is understanding where to apply encryption in order to protect your data. For example, wireless networks can be encrypted, but the history of wireless security is laden with egregious mistakes. And it’s not necessarily the correct solution.

The first wireless encryption scheme was called WEP. It was the security equivalent of pig latin. It seems secret at first. Then the novelty wears off once you realize everyone knows what ixnay on the ottenray means, even if they don’t know the movie reference. WEP required a password to join the network, but the protocol’s poor encryption exposed enough hints about the password that someone with a wireless sniffer could reverse engineer. This was a fatal flaw, because the time required to crack the password was a fraction of that needed to blindly guess the password with a brute force attack: a matter of hours (or less) instead of weeks.

Security improvements were attempted for Wi-Fi, but many turned out to be failures since they just metaphorically replaced pig latin with an obfuscation more along the lines of Klingon (or Quenya, depending on your fandom leanings). The problem was finding an encryption scheme that protected the password well enough that attackers would be forced to fall back to the inefficient brute force attack. The security goal is a Tower of Babel, with languages that only your computer and the wireless access point could understand — and which don’t drop hints for attackers. Protocols like WPA2 accomplish this far better than WEP ever did.

Whereas you’ll find it easy to set up WPA2 on your home network, you’ll find it sadly missing on the ubiquitous public Wi-Fi services of cafes and airplanes. They usually avoid encryption altogether. Even still, encrypted networks that use a single password for access merely reduce the pool of attackers from everyone to everyone who knows the password (which may be a larger number than you expect).

We’ve been paying attention to public spaces, but the problem spans all kinds of networks. In fact, sniffing attacks are just as feasible in corporate environments. They only differ in terms of the type of threat, and who might be carrying out the sniffing attack. Fundamentally, HTTPS is required to protect your data.

S For Secure



Sites that don’t use HTTPS judiciously are crippling the privacy controls you thought were protecting your data. Websites’ adoption of opt-in sharing and straightforward privacy settings are laudable. Those measures restrict the amount of information about you that leaks from websites (at least they’re supposed to). Yet they have no bearing on sniffing attacks if the site doesn’t encrypt traffic. This is why sites like Facebook and Twitter recently made HTTPS always available to users who care to turn it on — it’s off by default.

If my linguistic metaphors have left you with no understanding of the technical steps to execute sniffing attacks, you can quite easily execute these attacks with readily-available tools. A recent one is a plugin you can add to your Firefox browser. The plugin, called Firesheep, enables mouse-click hacking for sites like Amazon, Facebook, Twitter and others. The creation of the plugin demonstrates that technical attacks can be put into the hands of anyone who wishes to be mischievous, unethical, or malicious.

To be clear, sniffing attacks don’t need to grab your password in order to impersonate you. Web apps that use HTTPS for authentication protect your password. If they use regular HTTP after you log in, they’re not protecting your privacy or your temporary identity.

We need to take an existential diversion here to distinguish between “you” as the person visiting a website and the “you” that the website knows. Websites speak to browsers. They don’t (yet?) reach beyond the screen to know that you are in fact who you say you are. The username and password you supply for the login page are supposed to prove your identity because you are ostensibly the only one who knows them. So that you only need authenticate once, the website assigns a cookie to your browser. From then on, that cookie is your identity: a handful of bits.

These identifying cookies need to be a shared secret — a value known to no one but your browser and the website. Otherwise, someone else could use your cookie value to impersonate you.

Mobile apps are ignoring the improvements that web browsers have made in protecting our privacy and security. Some of the fault lies with the HTML and HTTP that underlies the web. HTTP becomes creaky once you try to implement strong authentication mechanisms on top of it, mostly because of our friend the cookie. Some fault lies with app developers. For example, Twitter provides a setting to ensure you always access the web site with HTTPS. However, third-party apps that use Twitter’s APIs might not be so diligent. While your password might still be protected with HTTPS, the app might fall back to HTTP for all other traffic — including the cookie that identifies you.

Google suffered embarrassment recently when 99% of its Android-based phones were shown to be vulnerable to impersonation attacks. The problem is compounded by the sheer number of phones and the difficulty of patching them. Furthermore, the identifying cookies (authTokens) were used for syncing, which means they’d traverse the network automatically regardless of the user’s activity. This is exactly the problem that comes with lack of encryption, cookies, and users who want to be connected anywhere they go.

Notice that there’s been no mention of money or credit cards being sniffed. Who cares about those when you can compromise someone’s email account? Email is almost universally used as a password reset mechanism. If you can read someone’s email, then you can obtain the password for just about any website they use, from gaming to banking to corporate environments. Most of this information has value.

S For Sometimes

Sadly, it seems that money and corporate embarrassment motivates protective measures far more often than privacy concerns. Some websites have started to implement a more rigorous enforcement of HTTPS connections called HTTP Strict Transport Security (HSTS). Paypal, whose users have long been victims of money-draining phishing attacks, was one of the first sites to use HSTS to prevent malicious sites from fooling browsers into switching to HTTP or spoofing pages. Like any good security measure, HSTS is transparent to the user. All you need is a browser that supports it (most do) and a website to require it (most don’t).

Improvements like HSTS should be encouraged. HTTPS is inarguably an important protection. However, the protocol has its share of weaknesses and determined attackers. Plus, HTTPS only protects against certain types of attacks; it has no bearing on cross-site scripting, SQL injection, or a myriad of other vulnerabilities. The security community is neither ignorant of these problems nor lacking in solutions. Yet the roll out of better protocols like DNSSEC has been glacial. Never the less, HTTPS helps as much today as it will tomorrow. The lock icon on your browser that indicates a site uses HTTPS may be minuscule, but the protection it affords is significant.
8:51 AM | 15 comments | Read More

Planning sementara Network Topologi Ar-Rizzqu

Written By pcbolong on Monday, April 11, 2011 | 10:18 AM

Ini adalah planning pertama topologi networking untuk Ar-Rizzqu milik saya. Rencananya akan saya jadikan rt/rw net. Screenshot nya adalah :

Topologi ini ditargetkan akan selesai dalam 2 hari ke depan. SEMANGAT!!!
10:18 AM | 0 comments | Read More

Wireless Network Architecture

Written By pcbolong on Wednesday, February 11, 2009 | 11:57 AM

The logical architecture of a network refers to the structure of standards and protocols that enable connections to be established between physical devices, or nodes, and which control the routing and flow of data between these nodes.

Since logical connections operate over physical links, the logical and physical architectures rely on each other, but the two also have a high degree of independence, as the physical configuration of a network can be changed without changing its logical architecture, and the same physical
network can in many cases support different sets of standards and protocols. The logical architecture of wireless networks will be described in this chapter with reference to the OSI model.

The OSI Network Model
The Open Systems Interconnect (OSI) model was developed by the International Standards Organisation (ISO) to provide a guideline for the development of standards for interconnecting computing devices. The OSI model is a framework for developing these standards rather than a
standard itself — the task of networking is too complex to be handled by a single standard.

The OSI model breaks down device to device connection, or more correctly application to application connection, into seven so-called “layers” of logically related tasks (see Table 2-1). An example will show how these layers combine to achieve a task such as sending and receiving an e-mail between two computers on separate local area networks (LANs) that are connected via the Internet.


The process starts with the sender typing a message into a PC e-mail application (Figure 2-1). When the user selects “Send”, the operating system combines the message with a set of Application layer (Layer 7) instructions that will eventually be read and actioned by the corresponding operating system and application on the receiving computer. The message plus Layer 7 instructions is then passed to the part of sender’s operating system that deals with Layer 6 presentation tasks. These include the translation of data between application layer formats as well as some types of security such as Secure Socket Layer (SSL)encryption. This process continues down through the successive software layers, with the message gathering additional instructions or control elements at each level.

By Layer 3 — the Network layer — the message will be broken down into a sequence of data packets, each carrying a source and destination IP address. At the Data Link layer the IP address is “resolved” to determine the physical address of the first device that the sending computer needs to transmit frames to — the so-called MAC or media access control address. In this example, this device may be a network switch that the sending computer is connected to or the default gateway to the Internet from the sending computer’s LAN. At the physical layer, also called the PHY layer, the data packets are encoded and modulated onto the carrier medium — a twisted wire pair in the case of a wired network, or electromagnetic radiation in the case of a wireless network — and transmitted to the device with the MAC address resolved at Layer 2.

Transmission of the message across the Internet is achieved through a number of device-to-device hops involving the PHY and Data Link layers of each routing or relaying device in the chain. At each step, the Data Link layer of the receiving device determines the MAC address of the next immediate destination, and the PHY layer transmits the packet to the device
with that MAC address.

On arrival at the receiving computer, the PHY layer will demodulate and decode the voltages and frequencies detected from the transmission medium, and pass the received data stream up to the Data Link layer. Here the MAC and LLC elements, such as a message integrity check, will
be extracted from the data stream and executed, and the message plus instructions passed up the protocol stack. At Layer 4, a protocol such as Transport Control Protocol (TCP), will ensure that all data frames making up the message have been received and will provide error recovery if any frames have gone missing. Finally the e-mail application will receive the decoded ASCII characters that make up the original transmitted message.

This post copyed from the book of "Wireless Networking Technology" by Steve Rackley, Newnes.

Enough for today. Maybe will continued in the next posted.

11:57 AM | 0 comments | Read More