Securing Router Logins with SSH: Difference between revisions

From ITCwiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 163: Line 163:




==Examining Capture Data==
==SSH Through Putty==
In this section we will be showing you how to capture protocols and where to locate the important values given by the use of wireshark.
 
===Color Code===
*YELLOW:  Indicates the MAC Address of both the destination and source.
*GREEN:  Indicates the NIC Manufacturer of both the destination and source.
*RED:  Indicates the NIC Serial Number of both the destination and source.
*BLUE:  Indicates the Frame Type of the packet.
*PINK:  Indicates the IPv4 of both the destination and source.
*'''NOTE''':  The the '''Preamble''' and the '''FCS''' are '''NOT''' shown on wireshark.
 
===FTP===
 
 
 
[[File:Wireshark.ftp..jpg|800px]]
 
 
 
===HTTP===
 
 
 
[[File:Wireshark.http.jpg|800px]]
 
 
 
===ARP===
 
 
 
[[File:Wireshark.arp.jpg|800px]]
 
 
 
===DNS===
 
 
 
[[File:Wireshark.dns.jpg|800px]]
 
 
 
===ICMP===
 
 
 
[[File:Wireshark.icmp.JPG|800px]]
 
 
 
==Creating a Shortcut to Auto Run Wireshark==
In this section we will be showing you how to create a new desktop icon to auto start your wireshark and have it select the correct network adapter and start capturing by simply double clicking the new icon.
 
*Step 1
*Step 1
Right click the Wireshark icon and click copy.
You will login using the IP of the router you are connecting to.
 




[[File:Wireshark.copy.JPG|800px]]
[[File:Wireshark.33.jpg|800px]]






*Step 2
*Step 2
Right click on the desktop and click paste.
Login using the user name and password created previously.


*Step 3
Right click the new icon and rename "Wireshark Auto Start"




[[File:Wireshark.33.jpg|800px]]


[[File:Wireshark.new.JPG|800px]]




 
*Step 3
*Step 4
Go to enable mode and enter your password.  You are now using secure SSH.
Open Wireshark and click on the Capture Options go to the pull down as previously mentioned and select the VMware network adapter, open the window fully to see the path and select everything after the after the : you should have this selected '''\Device\NPF_{numbers}''' as seen in the picture.
 
 
 
[[File:Wireshark.loctarget.JPG|800px]]
 
 
 
*Step 5
Right click and click properties on the NEW Wireshark icon, and add this to the end of the target line -k -i
*'''NOTE''': You need to have a space before the -k and after the -i.
 
 
 
[[File:Wireshark.shortcutcmd.JPG|800px]]
 
 
 
*Step 6
Now after the -i "and the space" paste the \Device\NPF_[numbers} to the target line as shown in the picture.






[[File:Wireshark.paste.JPG|800px]]
[[File:Wireshark.33.jpg|800px]]






*Step 7
Click on the Ok button and now you can simply double click the new icon to start Wireshark and select your network adapter and begin capture with one click of the button.  Enjoy!!!


==External links==
==External links==

Revision as of 17:01, 4 May 2010

Securing Router Logins with SSHThis is a walk through to help new students learn how to configure a more secure login with a router and utilize SSH.

Checking Router Bin file

This is a check to ensure that the router you are using is going to run SSH.

  • Step 1

Issue the command show flash, to check and see if K9 is in the bin file


Wireshark.29.jpg



Router Configuration

This will cover the commands needed to setup the router logins and SSH.

  • Step 1

enaable


Wireshark.29.jpg


  • Step 2

config t


Wireshark.30.jpg


  • Step 3

hostname (name)


Wireshark.31.jpg


  • Step 4

security passwords min-length (number), we used 10 for a password length of 10 characters.


Wireshark.32.jpg


  • Step 5

eable secret (password)


Wireshark.33.jpg


  • Step 6

no enable password to clear passwords that may already be set.


Wireshark.32.jpg


  • Step 7

user (name) secret (password) this will be your user name and password for loging in to the router and SSH.


Wireshark.33.jpg


  • Step 8

line console 0


login local


Wireshark.32.jpg


  • Step 9

line aux 0


no password


login local


Wireshark.33.jpg


  • Step 10

line vty 0 4


login local


transport input ssh this last command is to use ssh and not telnet.


Wireshark.32.jpg


  • Step 11

ip domain-name (domain name)


Wireshark.33.jpg


  • Step 12

cry key generate rsa


(360-2048) you will use this to set the size of the key the larger the more secure.


Wireshark.32.jpg


  • Step 13

ip ssh time-out (number)


ip ssh authentication-retries (number)


Wireshark.33.jpg


SSH Through Putty

  • Step 1

You will login using the IP of the router you are connecting to.


Wireshark.33.jpg


  • Step 2

Login using the user name and password created previously.


Wireshark.33.jpg


  • Step 3

Go to enable mode and enter your password. You are now using secure SSH.


Wireshark.33.jpg



External links