This repository contains source code for the Network and Computer Security (SIRS) project.
This document presents installation and demonstration instructions.
To see the project in action, it is necessary to setup a virtual environment, with 2 networks and 4 machines.
The following diagram shows the environment topology:
All the virtual machines are based on: Linux 64-bit, Kali 2024.4
Download and install a virtual machine of Kali Linux 2024.4.
Clone the base machine to create the other machines.
On a base machine use Git to obtain a copy of all the scripts and code.
$ git clone https://github.com/tecnico-sec/a07-messagIST.git
On the directory setup_scripts
there is an initialization script with the machine name, with prefix init-
and suffix .sh
, that installs all the necessary packages and makes all required configurations in the a clean machine.
There's also a pre-init
that should be runned from this directory on the base machine to download the project dependencies on the Kali repositories.
Afterward, create a linked clone for each machine listed in the network diagram above. For each of these machines, configure the network adapters according to the diagram by following these steps:
Next we have custom instructions for each machine.
This machine runs our TUI client application in Rust 1.83.
To setup run this command on the setup_scripts
directory:
$ ./init-alice.sh
The expected result is that you should have an executable file named client
in the ./target/debug
directory.
Now, run the executable file, and in the UI field that asks for the server IP, insert 192.168.0.3:8000
.
This machine runs our TUI client application in Rust 1.83.
To setup run this command on the setup_scripts
directory:
$ ./init-bob.sh
The expected result is that you should have an executable file named client
in the ./target/debug
directory.
Now, run the executable file, and in the UI field that asks for the server IP, insert 192.168.0.3:8000
.
This machine runs our server application in Rust 1.83.
To setup run this command on the setup_scripts
directory:
$ ./init-server.sh
The expected result is that you should have an executable file named server
in the ./target/debug
directory.
Once you have the executable ready to run, execute the following command. It contains the necessary flags to connect to the database using its IP address and password:
$ PGHOST=192.168.1.2 PGPASSWORD=2Rk4M4LQGbrZB2j ./server
This machine runs a database server with PostgreSQL 17.2
To setup run this command on the setup_scripts
directory:
$ sudo ./init-database.sh
To test:
$ systemctl status postgresql
After the setup and then the test command you should see something like the following print that shows the database PostgreSQL service running.
Now with all the machines running you can make use of all the features that our application provides, such as:
Now to run the demo, once all the networks and machines are up and running, on Bob's machine, turn off the TUI Bob client and run the test_client
executable located in the ./target/debug directory
using the following command:
$ ./test-client 192.168.0.3:8000
This client emulates potential attacks such as out-of-order messages, missing messages, and tampered messages.
It is important to note that by pressing F10
on the client UI, you can access the client logs as shown in the following image:
As you perform operations on the UI, these logs display the message payloads containing encrypted data, relevant messages about system operations, and warnings about detected attacks, including those performed by the test client.
Additionally, the following screenshots shows:
-
The TLS connections between the server and the clients, and the server and the database, as well as the encrypted payloads, are visible on the hex editor on Wireshark.
- Rust 1.83
- PostgreSQL 17.2
- KALI 2024.4
- SQLite
- SQLCipher
- SSL/TLS
- WebSocket
- Ratatui
- Rocket
- OpenSSL
- Reqwest
- iptables
- Rust Crypto
We use SemVer for versioning.
This project is licensed under the MIT License - see the LICENSE.txt for details.