Network Security LAB Manual For Diploma
Network Security LAB Manual For Diploma
Author
Mr. IRSHAD AHMED GORIKHAN M.TECH
LECTURER OF COMPUTER SCIENCE DEPARTMENT
OXFORD POLYTECHNIC SHEREWAD HUBLI
Download the latest version of Sun Virtual Box from the website.
The installation steps are
1. Double Click on Virtual Box Executable File.
2. Welcome to the Oracle VM appears [Setup Wizard] Click Next.
3. Custom Setup Screen with all the features of VM appears Click Next.
4. Options to create shortcut on Desktop and Quick launch bar Click Next.
5. Ready to Install Click on Install button.
6. Click Finish Start Oracle VM Virtual Box.
And now install any kind of Operating Systems as Guest Operating System.
The Configuration of Guest OS is shown below.
1. First Enable the TELNET service on your computer by typing the command given;
Type the command SERVICES.MSC in run command menu, Click on Telnet service and
enable the service, select it automatic and Click Start.
2. Open Command prompt and type the following ;
telnet www.rediff.com 80 (http port) and press enter key twice.
3. Now you can see the rediff website web server’s information.
4. You can also try it on your local machine connecting to your Guest OS like telnet
Guest IP address(example: 192.168.56.101) 80 and press enter twice.
5. The same Banner grabbing can also perform by the NETCAT utility available at
http://netcat.sourceforge.net the compressed file.
6. Extract on your local drive and perform the following in the command prompt;
Netcat www.rediff.com 80 (http port) and press enter twice to see the result.
7. Use the same procedure on Guest Operating System like
But before using netcat command please install the IIS (Internet
Information Server) from Add/Remove components on your Guest OS, then
apply this; Netcat –vv –n guest ip address(example: 192.168.56.101) 80 and
press enter twice to see the result.
-vv=verbose mode , -n=numerical IP address only.
1. Download Nmap from www.nmap.org and install the Nmap Software with WinPcap Driver
utility.
2. Execute the Nmap-Zenmap GUI tool from Program Menu or Desktop Icon.
3. Type the Target Machine IP Address(ie.Guest OS or any website Address)
4. Perform the profiles shown in the utility.
Using Nmap : Nmap is a port scanning tool that can be used for active stack OS fingerprinting.
Syntax: nmap -O IP_address
Example: nmap –O 192.168.56.101
Passive Fingerprinting involves examining traffic on network to determine the operating system.
There is no guarantee that the fingerprint will be accurate but usually they are accurate. It
generally means sniffing traffic rather than making actual contact and thus this method is
stealthier and usually goes undetected.
Wireshark is a network packet analyzer. A network packet analyzer will try to capture
network packets and tries to display that packet data as detailed as possible.
Download and install wireshark network analyzer.
Steps to capture traffic:
2. Select interface: Goto capture option in menu bar and select interface
Start Caputuring
SomarSoft's DumpSec is a (free) security auditing program for Microsoft Windows NT/2000. It
dumps the permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers
and shares in a concise, readable format, so that holes in system security are readily apparent.
DumpSec also dumps user, group and replication information. DumpSec is a must have product
for Windows NT systems administrators and computer security auditors.
1. Download & install dumpsec.
2. Open dumpsec and select computer
2. Now select report => dump users as table and click ok.
Permission on Shares:
NetStumbler (Network Stumbler) is one of the Wi-Fi hacking tool which only compatible with
windows, this tool also a freeware. With this program, we can search for wireless network
which open and infiltrate the network. Its having some compatibility and network adapter
issues.
This will open the decryption key managment window. As shown in the window you can select
between three decryption modes: None, Wireshark, and Driver:
To perform this Install CAIN and Abel tool and do the following:
• Click on Sniffer menu.
• Click on hosts on the button portion window.
• Click Start sniffer and APR service from Standard toolbar menu.
Right Click on the hosts window and click on Scan MAC address.
o Select all hosts in my subnet or range FROM and TO IP address and Click OK.
o Now you view the MAC and IP address of Remote / Local machines.
o Click on APR button on toolbar menu.
o Left Click on right pane of APR window and then Click on ‘+’ symbol on
standard toolbar.
o APR enables you to poison IP traffic between the selected host .
o Click on any IP address on the left side list and the other IP selected on the right
side.
Left Click on Right side on the IP address and Click OK.
o Watch the poisoning effect FROM and TO IP address.
The analysis of this traffic can also be performed by other tool called ETHEREAL.
• ABEL is the second part of program composed by two files able.exe and abel.dll. The
service can be installed with Administrative Priviledges on the Target Machine.
• Execute Abel.exe from ProgramFiles Folder.
• Expand Microsoft windows Network and Click on all Computers.
• Right Click on Computer and Connect as Administrative Credentials.
• Once connected Right Click on services icon and select install Abel, the two files abe.exe
and abel.dll will be copied on to connected Computer.
• Now bring up a console prompt on the connected Computer examine the password hashes.
11. INSTALL JCRYPT TOOL (OR ANY OTHER EQUIVALENT) AND DEMONSTRATE
ASYMMETRIC, SYMMETRIC CRYPTO ALGORITHM, HASH AND DIGITAL/PKI
SIGNATURES
ASYMMETRIC ALGORITHM
o Download Jcrypt tool from Cryptool Website and Install
o Open Jcrypt Software and Click on NEW text editior, type the text information into it.
o Click on the Algorithm menu bar and Select Asymmetric algorithm RSA for encryption.
o Click create a New KeyPair and type in the contact name[#####] and enter the password
and confirm password, then Click finish again.
o The same output bin file to decrypt select RSA Algorithm and Click on Decrypt,
Select key name you have declared earlier and Click Finish.
o Enter the password to Decrypt and see the output with original Decrypted text on
the Screen.
SYMMETRIC ALGORITHM
→
o Click on Algorithm Menu bar Select Symmetric AES and Click on it.
→
o Click on create a new key, type contact name and enter the password and confirm, Click finish
Click finish again.
o Enter the password to open the output file.
→ →
o To Decrypt Select Algorithms Symmetric Select the key which you have created and Click
Finish.
o Enter the password and see the result in output bin file with hexadecimal values and
plain text.
HASH GENERATION
→ →
o Click on Algorithms, Click on Hash Select MD5 Click Finish. o Now
view the output bin file HASH generated.
o Practice using SHA and SHA3 and verify the result on the screen.
DIGITAL SIGNATURE
o Click on algorithms, Click on Signature, Select DSA and Click on it.
o Select sign operation and Click on create a new key.
o Enter the password and save the file and Click finish.
o To verify Click on Algorithm, Click on Signature and Click DSA.
o Select verify operation, Click open and type the password and Click finish.
o The Signature file is opened and verified.
Rootkit is a stealth type of malicious software designed to hide the existence of certain process
from normal methods of detection and enables continued privileged access to a computer.
The Open SSL is command line binary can perform a wide range of cryptographic operation.
o Install Open SSL setup file on to the default location.
o Perform Full installation and Click Next.
o Create Document shortcuts in start menu and
Click Next Complete the installation.
o Execute the Open SSL from command prompt
available at
C:\ProgramFiles\GnuWin32\OpenSSL\openssl.exe
openssl> (This is the Open SSL prompt)
o Now execute the command as follows for password generation.
o Passwd –crypt [type your password] This is limited to 8 characters password
generator. Passwd -1 [your password] This allows you to insert password
length beyond 8 characters.
Type this command to generate 10-12 characters passwords of TEN numbers.
KF Sensor is the tool to setup as honey pot when KF Sensor is running it places a siren icon in
the windows system tray in the bottom right of the screen. If there are no alerts then green icon is
displayed.