List of Figures

3.1 Steps for adding base.vbox to VirtualBox
3.2 virtnet Topology 1
3.3 virtnet Topology 3
3.4 virtnet Topology 5
3.5 Example of three nodes created as displayed in VirtualBox
3.6 Start a node in VirtualBox
3.7 Steps for deploying nodes in VirtualBox
3.8 Delete nodes by selecting them then right-click and Remove
3.9 Remove all files to avoid conflicts for future topology creation
3.10 Connect from Windows host to virtnet node1 with FileZilla
3.11 Connect from Windows host to virtnet node1 with WinSCP
3.12 Firefox proxy settings to tunnel to virtual guest
7.1 Example of Linux permissions shown by ls
9.1 VirtualBox network adapter options
10.1 Comparison of Router and Host
10.2 virtnet Topology 5
11.1 Capturing packets in the Operating System
11.2 Main window of Wireshark
13.1 An organisation views their network as inside, and all other networks as outside
13.2 Chains in iptables
13.3 Example network for demonstrating iptables
13.4 Host-based firewall running on 1.1.1.12
13.5 Host-based firewall running on router Ra
16.1 virtnet topology used for web attack demos
17.1 Network topology for testing address spoofing
17.2 Ping Exchange: Normal Case
17.3 Ping Exchange: Fake source of 192.168.1.66
17.4 Ping Exchange: Fake source of 192.168.1.13
17.5 Network topology for Ping flooding attack
17.6 IPTraf Menu
17.7 IPTraf general statistics
19.1 Socket communications
20.1 2.4 GHz Wi-Fi channels (802.11b,g WLAN)
20.2 Wireshark interface for setting PSK for decrypting WiFi packets
A.1 IP Datagram Format
A.2 TCP Segment Format
A.3 UDP Datagram Format
A.4 Ethernet Frame Format