Skip to content

mkuritsu/MessagIST

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

MessagIST Project Read Me

Contents

This repository contains source code for the Network and Computer Security (SIRS) project.

This document presents installation and demonstration instructions.

Installation

To see the project in action, it is necessary to setup a virtual environment, with 2 networks and 4 machines.

The following diagram shows the environment topology:

Network Diagram

Prerequisites

All the virtual machines are based on: Linux 64-bit, Kali 2024.4

Download and install a virtual machine of Kali Linux 2024.4.
Clone the base machine to create the other machines.

Machine configurations

On a base machine use Git to obtain a copy of all the scripts and code.

$ git clone https://github.com/tecnico-sec/a07-messagIST.git

On the directory setup_scripts there is an initialization script with the machine name, with prefix init- and suffix .sh, that installs all the necessary packages and makes all required configurations in the a clean machine.

There's also a pre-init that should be runned from this directory on the base machine to download the project dependencies on the Kali repositories.

Afterward, create a linked clone for each machine listed in the network diagram above. For each of these machines, configure the network adapters according to the diagram by following these steps:

setup adapters

Next we have custom instructions for each machine.


Machine Client 1: Alice

This machine runs our TUI client application in Rust 1.83.

To setup run this command on the setup_scripts directory:

$ ./init-alice.sh

The expected result is that you should have an executable file named client in the ./target/debug directory.

Now, run the executable file, and in the UI field that asks for the server IP, insert 192.168.0.3:8000.


Machine Client 2: Bob

This machine runs our TUI client application in Rust 1.83.

To setup run this command on the setup_scripts directory:

$ ./init-bob.sh

The expected result is that you should have an executable file named client in the ./target/debug directory.

Now, run the executable file, and in the UI field that asks for the server IP, insert 192.168.0.3:8000.


Machine Server

This machine runs our server application in Rust 1.83.

To setup run this command on the setup_scripts directory:

$ ./init-server.sh

The expected result is that you should have an executable file named server in the ./target/debug directory.

Once you have the executable ready to run, execute the following command. It contains the necessary flags to connect to the database using its IP address and password:

$ PGHOST=192.168.1.2 PGPASSWORD=2Rk4M4LQGbrZB2j ./server

Machine Database

This machine runs a database server with PostgreSQL 17.2

To setup run this command on the setup_scripts directory:

$ sudo ./init-database.sh

To test:

$ systemctl status postgresql

After the setup and then the test command you should see something like the following print that shows the database PostgreSQL service running.

verify db

Demonstration

Now with all the machines running you can make use of all the features that our application provides, such as:

  • Register register

  • Login login

  • Add a contact by searching the id or manually using the receiver's public key add_contact

  • See a contact contact

  • See the own profile profile

  • Chat with friends chat


Now to run the demo, once all the networks and machines are up and running, on Bob's machine, turn off the TUI Bob client and run the test_client executable located in the ./target/debug directory using the following command:

$ ./test-client 192.168.0.3:8000

This client emulates potential attacks such as out-of-order messages, missing messages, and tampered messages.

It is important to note that by pressing F10 on the client UI, you can access the client logs as shown in the following image:

logs

As you perform operations on the UI, these logs display the message payloads containing encrypted data, relevant messages about system operations, and warnings about detected attacks, including those performed by the test client.

Additionally, the following screenshots shows:

  • The hashes of the passwords on the database select_db

  • The TLS connections between the server and the clients, and the server and the database, as well as the encrypted payloads, are visible on the hex editor on Wireshark. wire sv cli wire sv db

  • The encrypted file of the local database payload

Additional Information

Links to Used Tools and Libraries

Versioning

We use SemVer for versioning.

License

This project is licensed under the MIT License - see the LICENSE.txt for details.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published