WLAN Setup and Security

Note: this was converted using from LaTeX to Markdown using ChatGPT and Gemini. The original PDF and bibliography can be found here and here. WLAN setup and security Laboratory protocol Exercise 11: WLAN setup and security Figure: Grouplogo Subject: ITSI/NWT Class: 3AHITN Name: Stefan Fürst, Justin Tremurici Group Name/Number: GROUPNAME/12 Supervisor: ANGE, ZIVK Exercise dates: 16.05.2025 | 06.06.2025 Submission date: 10.06.2025 Table of Contents Task definition Summary Complete network topology of the exercise Exercise Execution Setting up the Network Configuring the Router Configuring the Access Point Testing connectivity and DHCP addresses Access Point Isolation Attacking the Wi-Fi Network Setting up the Wi-Fi Adapter Starting the attack Sending Deauthentication Frames Analyzing the 4-Way Handshake in Wireshark Cracking the Password Testing My Own Wi-Fi Mitigations of This Attack How WPA3 improves security Possible WPA3 Attacks References Task definition This task focuses on the setup and subsequent attack of a WLAN network. The initial phase, “Übung 10: Einrichten eines WLAN-Netzwerks,” guides students through provisioning a WLAN. This involves configuring an Access Point (AP), planning channel usage, setting up Network Address Translation (NAT) and a DHCP service, and ensuring full connectivity between wireless and wired clients. Students configure a router with NAT, establish a DHCP server, and set up the AP with WPA2 security, assessing password strength and measuring channel utilization. Connectivity tests confirm communication within the network and to the internet. Access Point Isolation is also explored, with a bonus task involving its configuration and demonstration of its effects. ...

June 10, 2025 · 26 min · stefi

Secure data storrage on Windows Server

Note: this was converted from LaTeX to Markdown using ChatGPT 4.1. The original PDF can be found here along with the bibliography. Secure data storage on Windows Laboratory protocol Exercise 8: Secure data storage on Windows Figure: Grouplogo Subject: ITSI Class: 3AHITN Name: Stefan Fürst, Justin Tremurici Group Name/Number: todo/12 Supervisor: SPAC, ZIVK Exercise dates: 14.02.2025 | 21.02.2025 | 28.02.2025 | 7.02.2025 Submission date: 14.3.2025 Table of Contents Task definition Task Overview Summary Exercise Execution Introduction Explaining the first script Changing the execution policy Installing BitLocker Changing the Hostname Downloading the second script Enabling Remote Desktop Creating a Scheduled Task The second script Creating Users and Adding Them to Groups Resizing the Disk and Creating a New Partition Creating Directories Populating the Directories Creating Users and Groups Verifying the Creation of users and groups Managing NTFS Permissions Using icacls Sharing the Directories via SMB Encrypting the Volume using BitLocker References Task definition Task Overview The goal of this exercise is to set up a secure and structured data storage system on a Windows Server, ensuring proper access control and encryption. The tasks include installing the operating system, configuring users and groups, setting up a folder structure, and securing access with permissions. ...

March 14, 2025 · 9 min · stefi

Hardening a Linux Webserver

Note: this was converted from LaTeX to Markdown using ChatGPT 4.1. The original PDF can be found here along with the bibliography. Exercise 6: GNU/Linux - Securing active components Laboratory protocol Exercise 6: GNU/Linux - Securing active components Figure: Grouplogo Subject: ITSI Class: 3AHITN Name: Stefan Fürst, Marcel Raichle Group Name/Number: Team 7/7 Supervisor: SPAC, ZIVK Exercise dates: 6.12.2024, 13.12.2024, 20.12.2024, 3.1.2025, 4.1.2025, 5.1.2025 Submission date: 4.1.2025 Table of Contents Task definition Task 0 - Preparation Task 1 – Installing a Web Server Task 2 – Securing with Basic Authentication Task 3 – Encrypting with HTTPS Bonus Task – Local DNS Setup (Optional) Summary Complete network topology of the exercise Exercise Execution Preparation Testing the SSH connectivity Changes to the Docker setup Installing an active component Setting up PHP-FPM with Nginx Securing Nginx with Basic Authentication Creating a Password File Configuring the authentication in Nginx and testing it Configuring HTTPS with Self-Signed Certificates Adding a Domain References Task definition Task 0 - Preparation Ensure your server from Exercises 4 and 5 is configured with SSH. Verify that you can connect to the server via SSH using a client with a GUI. ...

January 4, 2025 · 12 min · stefi