Cybersecurity for IT Professionals 2019
with Malcolm Shore
Preconfiguration File
This file contains details of the software and virtual machine configuration changes required to support the Cybersecurity for IT Professionals
course. Each requirement is noted in the relevant course module, but you may wish to preload the software to avoid having to wait when working
through each video.
06_01
Preparing
Item Details
Nessus to
do scanning
Virtual Box Download the Windows software for VirtualBox from https://www.virtualbox.org/wiki/Downloads and install it.
07_02 Run- Download the IE/Windows 7 for the VirtualBox Platform from https://developer.microsoft.com/en- us/microsoft-edge/
ning an SQL Windows 7
tools/vms/ and install it into VirtualBox as an appliance.
injection
attack Download the Ubuntu VirtualBox appliance from https://www.osboxes.org/ubuntu/. Install it and name it Scorpio,
Ubuntu
and then duplicate it and name it Hydra.
Check out my course on learning Kali Linux for a full run-through of setting up a VirtualBox lab.
07_04
Installing a ZedLan Download and install ZedLan from http://www.zedlan.com/win_firewall_log_analyser.php.
web scanner
04_01 Get-
Download and install Nmap on Windows 7 from https://nmap.org/download.html. Install Nmap on Scorpio and Hydra
ting started Nmap
using the command: sudo apt-get install nmap.
with Nmap
04_03 GUI
scanning Zenmap Install Zenmap on Hydra with the command: sudo apt-get install zenmap.
with nmap
Cybersecurity for IT Professionals with Malcolm Shore 1 of 2
06_01
Preparing
Nessus Download and install Nessus from https://www.tenable.com/downloads/nessus.
Nessus to do
scanning
import sys
import mysql.connector
if len(sys.argv)<>2:
07_02 Run-
print(‘Syntax: python sqltest.py <userid>’)
ning an SQL
sqltest.py else: mydb=mysql.connector.connect(user=’root’,password=’root’,host=’127.0.0.1’,data-
injection
base=’PiDB’) mycursor=mydb.cursor()
attack
get_data=’SELECT * FROM Customers WHERE userid=”%s”’ % (sys.argv[1]) multicur=my-
cursor.execute(get_data, multi=True)
print(‘Your query:’+get_data) print(‘Results:\n’)
for cur in multicur: results=cur.fetchall() for row in results:
if cur.with_rows:
if len(cur.description)==4:
print ‘[‘+row[3]+’]’,row[0]+’/’+row[1],row[2] else:
print row[0]
print ‘------------------------------’
mydb.close()
Note: You will need to load MySQL onto Hydra together with the Python connector as shown at https://support.rack-
MySQL space.com/how-to/installing-mysql-server-on-ubuntu/
and use root/root as the credentials.
Create a database called PiDB , with a table called Customers, with four fields called userid, password, name, account
number. Add a number of records using your own data, but make sure you include one with a name “akhtart”.
07_04
On Hydra, issue the following commands:
Installing a Vega
sudo apt install libwebkitgtk-1.0 default-jdk unzip
web scanner
Cybersecurity for IT Professionals with Malcolm Shore 2 of 2