distributed computer systems

Teaching

 

News:

Die Vorlesung wird über das OLAT organisiert.
OLAT-Link zum Kurs: https://olat.vcrp.de/url/RepositoryEntry/3699836241
OLAT-Kurs-Zugangscode: double

Vorlesung:

Montag, 16:00 - 17:30, 46-210

Übungen:

<Werden über das OLAT organisiert>

Klausur:

TBA

Kontakt:

Prof. Dr.-Ing. Jens Schmitt
Dr. Thomas Kuhn (Dozierender)
M.Sc. Eric Jedermann
oder folgt uns auf Twitter

Vorlesungsübersicht

Diese Vorlesung soll die Aufgaben, der Aufbau und die Arbeitsweise moderner Kommunikationssysteme näher bringen. Insbesondere liegt dabei der Fokus auf der Architektur und den Protokollen, welche heute vor allem im Internet im Einsatz sind. Anhand eines Schichtenmodells, werden von  Grundlagen der Datenübertragung (z.B. Signalverarbeitung, Kodierungstheorie) bis zu Anwendungsprotokollen (z.B. HTTP, FTP, SMTP, ...) viele Aspekte vernetzter Systeme behandelt.

Der Vorlesungsaufbau ist dabei wie folgt:

  1. Physikalische Schicht: Theoretische Grundlagen der Datenübertragung, Übertragungsmedien, Kodierungstechniken
  2. Sicherungsschicht: Fehlererkennung & -korrektur, Mehrfachzugriff, Ethernet
  3. Vermittlungsschicht: IP, Routing, Forwarding
  4. Transportschicht: Multiplexing, UDP, TCP, TLS
  5. Anwendungsschicht: Softwarearchitektur, Web, CDN, DNS, Peer-to-peer Anwendungen

 

Zusatzunterlagen

Weitere Unterlagen um den Stoff er Vorlesung zu Vertiefen sind:

  • James F. Kurose and Keith W. Ross. Computer Networking – A Top Down Approach. Pearson/Addison-Wesley, 6th Edition, 2012.
    Das engeliche original kann hier online als e-book gelesen werden.
    Für dieses Buch gibt es eine deutsche Übersetzung, die hier (aus dem Uni-Netz) heruntergeladen werden kann.
  • Andrew S. Tanenbaum. Computer Networks. Prentice Hall, 4th Edition, 2003.
  • Larry L. Peterson and Bruce S. Davie. Computer Networks – A Systems Approach. Morgan Kaufmann, 3rd Edition , 2003.

 

 

 

News:

Die Vorlesung wird über das OLAT organisiert.
OLAT-Link zum Kurs: https://olat.vcrp.de/url/RepositoryEntry/4115300543
OLAT-Kurs-Zugangscode: Byte

Vorlesung:

Montag, 15:30 - 17:00, 46-210

Übungen:

<Werden über das OLAT organisiert>

Klausur:

TBA

Kontakt:

Prof. Dr.-Ing. Jens Schmitt
M.Sc. Eric Jedermann
oder folgt uns auf Twitter

Vorlesungsübersicht

Diese Vorlesung soll die Aufgaben, der Aufbau und die Arbeitsweise moderner Kommunikationssysteme näher bringen. Insbesondere liegt dabei der Fokus auf der Architektur und den Protokollen, welche heute vor allem im Internet im Einsatz sind. Anhand eines Schichtenmodells, werden von  Grundlagen der Datenübertragung (z.B. Signalverarbeitung, Kodierungstheorie) bis zu Anwendungsprotokollen (z.B. HTTP, FTP, SMTP, ...) viele Aspekte vernetzter Systeme behandelt.

Der Vorlesungsaufbau ist dabei wie folgt:

  1. Physikalische Schicht: Theoretische Grundlagen der Datenübertragung, Übertragungsmedien, Kodierungstechniken
  2. Sicherungsschicht: Fehlererkennung & -korrektur, Mehrfachzugriff, Ethernet
  3. Vermittlungsschicht: IP, Routing, Forwarding
  4. Transportschicht: Multiplexing, UDP, TCP, TLS
  5. Anwendungsschicht: Softwarearchitektur, Web, CDN, DNS, Peer-to-peer Anwendungen

 

Zusatzunterlagen

Weitere Unterlagen um den Stoff er Vorlesung zu Vertiefen sind:

  • James F. Kurose and Keith W. Ross. Computer Networking – A Top Down Approach. Pearson/Addison-Wesley, 6th Edition, 2012.
    Das engeliche original kann hier online als e-book gelesen werden.
    Für dieses Buch gibt es eine deutsche Übersetzung, die hier (aus dem Uni-Netz) heruntergeladen werden kann.
  • Andrew S. Tanenbaum. Computer Networks. Prentice Hall, 4th Edition, 2003.
  • Larry L. Peterson and Bruce S. Davie. Computer Networks – A Systems Approach. Morgan Kaufmann, 3rd Edition , 2003.

 

 

Background

The exam for the Network Security lecture is approaching and by oberhearing a conversation with Matthias and his teaching assistant Yasmina, you learned that the exam is on a private web server in the DISCO network which is only accessible via a secret URL. Since you are secretly the infamous hacker H4X0R, you managed to trick Matthias into revealing his password for an SSH server in his lab by using evil social engineering techniques. Unfortunately, Matthias does not use this password for his personal computer, which is the actual target since the secret URL for the exam is only stored in Matthias' browser. The only things you know is that the web server hosting the exam and Matthias' personal computer are in the same local network as the compromised SSH server and that Matthias is a control freak and is checking the exam for updates on a very regular basis.

Hack Challenge

Since you are too lazy to study properly for the exam, you are desperately trying to get the exam from the web server. Therefore, the first steps of this hack challenge are:

  • Break into the private DISCO network using the stolen password.
  • Find Matthias' personal computer.
  • Eavesdrop on Matthias' communication with the web server.
  • Steal the secret URL and download the exam.

While you were stealing the exam, you figured out that the webserver's configuration is really bad and allows certain denial of service attacks. Since you are an evil master mind and like to troll people, you decide to launch a denial of service attack to prevent Matthias from checking the exam. The final step of this hack challenge is:

  • Launch a denial of service attack on the web server and prevent Matthias from checking the exam for at least 1 minute (will be detected by our IDS). You can check if it works by simply trying to access the webserver yourself (with your browser).

Since H4X0R is a poser and wants to show off with what he has achieved, send an email to the teaching assistant This email address is being protected from spambots. You need JavaScript enabled to view it. with the secret exam attached (do not change the filename!) and the time when you launched the denial of service attack. Also mention the IP addresses of Matthias' PC and the Webserver in the mail.

Organization

You can still work in the same group as for the PhyLiSec workshop. To make sure that groups do not interfere with each other while hacking on the server, we have to make sure that only one group is working on it at a time. Therefore, we have randomly assigned four 1h timeslots to your group over the next 3 weeks. You should receive an email with the timeslots upfront.

Note that it is your responsibility to organize your group to work on the challenge during your timeslots. If you need more time after these four slots, please contact This email address is being protected from spambots. You need JavaScript enabled to view it.. You will receive further information, the IP of the target, and the credentials for your timeslot via email when your session starts.

Once you finished the challenge, one of your group must send an email to This email address is being protected from spambots. You need JavaScript enabled to view it. as a proof of success. The email must contain the names of your group mates, the stolen PDF, the date and time when you launched the DoS attack, and the IP addresses of Matthias' PC and the secret URL. When we received this email and verified your success, you passed this part of the Network Security exercise and you are one step closer to the exam.

If you encounter any problems or if you get stuck, first check the Network Security slides and try using Google. Only if you really tried solving the problem yourself without success, ask Yasmina. She can give you hints or (if necessary) meet with you and assist you in solving the challenge.

Tools

To provide you a starting point, here is a list of linux commands and tools installed on the compromised server:

  • ifconfig: network configuration
  • hping3: send (almost) arbitrary TCP/IP packets to network hosts
  • ettercap: multipurpose sniffer/content filter for man in the middle attacks
  • slowhttptest: HTTP Denial Of Service attacks simulator
  • nmap: Network exploration tool and security / port scanner
  • arp: manage ARP cache
  • tshark: command-line version of Wireshark (supports filtered output, e.g. tshark "not port 22" for filtering SSH traffic generated by you)

If you want to know how these tools work, enter "man COMMAND" or use Google. There is plenty of good documentation around! Also "COMMAND --help" usually gives you a good overview of the respective tool.

Background

The exam for the Network Security lecture is approaching and by oberhearing a conversation with Matthias and his teaching assistant Yasmina, you learned that the exam is on a private web server in the DISCO network which is only accessible via a secret URL. Since you are secretly the infamous hacker H4X0R, you managed to trick Matthias into revealing his password for an SSH server in his lab by using evil social engineering techniques. Unfortunately, Matthias does not use this password for his personal computer, which is the actual target since the secret URL for the exam is only stored in Matthias' browser. The only things you know is that the web server hosting the exam and Matthias' personal computer are in the same local network as the compromised SSH server and that Matthias is a control freak and is checking the exam for updates on a very regular basis.

Hack Challenge

Since you are too lazy to study properly for the exam, you are desperately trying to get the exam from the web server. Therefore, the first steps of this hack challenge are:

  • Break into the private DISCO network using the stolen password.
  • Find Matthias' personal computer.
  • Eavesdrop on Matthias' communication with the web server.
  • Steal the secret URL and download the exam.

While you were stealing the exam, you figured out that the webserver's configuration is really bad and allows certain denial of service attacks. Since you are an evil master mind and like to troll people, you decide to launch a denial of service attack to prevent Matthias from checking the exam. The final step of this hack challenge is:

  • Launch a denial of service attack on the web server and prevent Matthias from checking the exam for at least 1 minute (will be detected by our IDS). You can check if it works by simply trying to access the webserver yourself (with your browser).

Since H4X0R is a poser and wants to show off with what he has achieved, send an email to the teaching assistant This email address is being protected from spambots. You need JavaScript enabled to view it. with the secret exam attached (do not change the filename!) and the time when you launched the denial of service attack. Also mention the IP addresses of Matthias' PC and the Webserver in the mail.

Organization

You can still work in the same group as for the PhyLiSec workshop. To make sure that groups do not interfere with each other while hacking on the server, we have to make sure that only one group is working on it at a time. Therefore, we have randomly assigned four 1h timeslots to your group over the next 3 weeks. You should receive an email with the timeslots upfront.

Note that it is your responsibility to organize your group to work on the challenge during your timeslots. If you need more time after these four slots, please contact This email address is being protected from spambots. You need JavaScript enabled to view it.. You will receive further information, the IP of the target, and the credentials for your timeslot via email when your session starts.

Once you finished the challenge, one of your group must send an email to This email address is being protected from spambots. You need JavaScript enabled to view it. as a proof of success. The email must contain the names of your group mates, the stolen PDF, the date and time when you launched the DoS attack, and the IP addresses of Matthias' PC and the secret URL. When we received this email and verified your success, you passed this part of the Network Security exercise and you are one step closer to the exam.

If you encounter any problems or if you get stuck, first check the Network Security slides and try using Google. Only if you really tried solving the problem yourself without success, ask Yasmina. She can give you hints or (if necessary) meet with you and assist you in solving the challenge.

Tools

To provide you a starting point, here is a list of linux commands and tools installed on the compromised server:

  • ifconfig: network configuration
  • hping3: send (almost) arbitrary TCP/IP packets to network hosts
  • ettercap: multipurpose sniffer/content filter for man in the middle attacks
  • slowhttptest: HTTP Denial Of Service attacks simulator
  • nmap: Network exploration tool and security / port scanner
  • arp: manage ARP cache
  • tshark: command-line version of Wireshark (supports filtered output, e.g. tshark "not port 22" for filtering SSH traffic generated by you)

If you want to know how these tools work, enter "man COMMAND" or use Google. There is plenty of good documentation around! Also "COMMAND --help" usually gives you a good overview of the respective tool.

Background

The exam for the Network Security lecture is approaching and by oberhearing a conversation with Matthias and his teaching assistant Lukas, you learned that the exam is on a private web server in the DISCO network which is only accessible via a secret URL. Since you are secretly the infamous hacker H4X0R, you managed to trick Matthias into revealing his password for an SSH server in his lab by using evil social engineering techniques. Unfortunately, Matthias does not use this password for his personal computer, which is the actual target since the secret URL for the exam is only stored in Matthias' browser. The only things you know is that the web server hosting the exam and Matthias' personal computer are in the same local network as the compromised SSH server and that Matthias is a control freak and is checking the exam for updates on a very regular basis.

Hack Challenge

Since you are too lazy to study properly for the exam, you are desperately trying to get the exam from the web server. Therefore, the first steps of this hack challenge are:

  • Break into the private DISCO network using the stolen password.
  • Find Matthias' personal computer.
  • Eavesdrop on Matthias' communication with the web server.
  • Steal the secret URL and download the exam.

While you were stealing the exam, you figured out that the webserver's configuration is really bad and allows certain denial of service attacks. Since you are an evil master mind and like to troll people, you decide to launch a denial of service attack to prevent Matthias from checking the exam. The final step of this hack challenge is:

  • Launch a denial of service attack on the web server and prevent Matthias from checking the exam for at least 1 minute (will be detected by our IDS). You can check if it works by simply trying to access the webserver yourself (with your browser).

Since H4X0R is a poser and wants to show off with what he has achieved, send an email to the teaching assistant This email address is being protected from spambots. You need JavaScript enabled to view it. with the secret exam attached (do not change the filename!) and the time when you launched the denial of service attack. Also mention the IP addresses of Matthias' PC and the webserver in the mail.

Organization

You can still work in the same group as for the PhyLiSec workshop. To make sure that groups do not interfere with each other while hacking on the server, we have to make sure that only one group is working on it at a time. Therefore, we have randomly assigned four 1h timeslots to your group over the next 3 weeks. You should receive an email with the timeslots upfront.

Note that it is your responsibility to organize your group to work on the challenge during your timeslots. If you need more time after these four slots, please contact This email address is being protected from spambots. You need JavaScript enabled to view it.. You will receive further information, the IP of the target, and the credentials for your timeslot via email when your session starts.

Once you finished the challenge, one of your group must send an email to This email address is being protected from spambots. You need JavaScript enabled to view it. as a proof of success. The email must contain the names of your group mates, the stolen PDF, the date and time when you launched the DoS attack, and the IP addresses of Matthias' PC and the secret URL. When we received this email and verified your success, you passed this part of the Network Security exercise and you are one step closer to the exam.

If you encounter any problems or if you get stuck, first check the Network Security slides and try using Google. Only if you really tried solving the problem yourself without success, ask Lukas. He can give you hints or (if necessary) meet with you and assist you in solving the challenge.

Tools

To provide you a starting point, here is a list of linux commands and tools installed on the compromised server:

  • ifconfig: network configuration
  • hping3: send (almost) arbitrary TCP/IP packets to network hosts
  • ettercap: multipurpose sniffer/content filter for man in the middle attacks
  • slowhttptest: HTTP Denial Of Service attacks simulator
  • nmap: Network exploration tool and security / port scanner
  • arp: manage ARP cache
  • tshark: command-line version of Wireshark (supports filtered output, e.g. tshark "not port 22" for filtering SSH traffic generated by you)

If you want to know how these tools work, enter "man COMMAND" or use Google. There is plenty of good documentation around! Also "COMMAND --help" usually gives you a good overview of the respective tool.

University of Kaiserslautern

Write your thesis with a disco advisor

We offer a variety of bachelor and master theses at any point in the academic year. Also check out some of our completed theses. Read more...

Go to top