cybersecurity lab
cybersecurity lab
Description:
Determine if you want all network devices to have internet access. If you want
all of the connected devices to have access to the internet, you'll need a router to
handle the connections. If you don't need the devices to have a network connection,
you can just use a network switch
Measure the distances for all hardwired devices. This isn't much of an issue in
most homes, but network cables cannot run longer than 100m (328 ft). If you have
to run cable farther than this, you'll need switches in between.
Consider your future needs. If you're filling all of the ports on your hardware,
consider future-proofing to allow for more devices in the future.
Connect your switch to your router (if necessary). If you're using a switch to
expand the number of ports available on the router, plug an Ethernet cable into any
LAN port on the router and any LAN port on the switch. This will expand the
network to the rest of the LAN ports on the switch.
Connect your computers to open LAN ports. Use Ethernet cables to connect
each computer to an open LAN port on your switch. It doesn't matter what order
the ports are connected in.
Ethernet cables cannot reliably transfer data at lengths larger than 100m (328 ft).
Setup one PC as a DHCP server if you're just using a switch. If you're only
using a switch as your network hub, setting up one computer as a DHCP (Dynamic
Host Configuration Protocol) server will allow all of the connected computers to
easily obtain IP addresses.
You can quickly create a DHCP server on one of your computers
by installing a third-party utility.
Verify the network connection on each computer. After each computer obtains
an IP address, they'll be able to talk to each other on the network. If you're using a
router to share your internet connection, each computer will be able to access the
internet.
Set up file and printer sharing. Once your network is up, you won't see anything
on other computers unless that computer has shared files. You can designate files,
folders, drives, printers, and other devices as shared so that anyone on the network,
or just specific users, can access them
Description:
3. Configure the router's settings: Access the router's web interface by typing
the router's IP address into a web browser. You will be prompted to enter a
username and password to access the router's settings. Once logged in,
configure the router's settings such as IP address, DHCP, and wireless
settings.
4. Configure the LAN server: Configure the LAN server's settings such as IP
address, DHCP, and DNS. Make sure the IP address of the LAN server is in
the same subnet as the router's IP address.
5. Test the connection: Once the router and LAN server are configured, test the
connection by accessing the LAN server from a device connected to the
LAN.
6. (Optional) Enable port forwarding: If you want to access the LAN server
from outside of your LAN, you will need to configure port forwarding on
your router. This allows incoming traffic to be directed to a specific device
on your LAN. You will need to specify the IP address of the LAN server and
the ports that should be forwarded to it.
This window will allow you to choose the port through which you can
communicate with the sever, and a password which is used to connect to victims
machine. And there are many options that can be used to keep the server invisible
on victim's machine and hidden from the task manager . In this case leave these
data as they are and click on the button Bind with file.
Step 4 : Bind With file
The facility Bind with file will allow you to bind the server with a file that the
victim sees as a useful file such as a setup file or another file. Select the checkbox
and Select a file by clicking on the button to be bound with the server.(I use a setup
file).
Step 5 : Server extentions
Then click on the button Server Extensions on the left and you will see as the
following. You can choose the final extension of your server file. Since I hope to
create a trojan horse as a setup file I choose this as EXE.
Step 6 : Choose a server icon
As the final step of creating the server, you can choose an icon for the server from
the list or browse for an icon. You can use an attractive icon that the server can
disguise.
Finally click on the Create Server button to create the server file which is bound
with the file you chose at step 5. You will be asked a question as follows. Click
Yes and continue.(This message is because we use a local connection for testing
purpose)
Step 7 : Simulate the server (Trojan horse)
Start your windows xp virtual machine and copy the created file into that. Then run
the infected setup file as a normal setup file. You may not notice any difference
and the setup program will launch without any problem. But, when you run the
infected setup file, prorat server will be installed in the background without giving
any suspicious behavior.
Now go to your real machine and go to the ProRat user interface.
You'll see a box to fill and IP address, which is the IP address of the victim. Go to
your virtual machine and get the ip address of the virtual network adapter and fill it
in here. (You must make sure you can communicate with the virtual machine
across the virtual network. Make the both ip addresses mentioned in this post are
in the same network). And click Connect.
If all are ok, your computer will be connected to the victim's machine (here, virtual
machine).
Now look at the options at the left in the ProRat window. Let's send a message to
the victim.
Click on the button Messege.
Now type a message and click Send. Now look at the victim's machine.
Pragati Women’s Degree College Page 4
Cyber Security And Malware Analysis Lab
Objects feature. Go to File > Export Objects and choose the protocol that contains
the objects you want to export. For example, if you want to export images from
HTTP packets, choose HTTP. A window will pop up with a list of objects found in
your packets, and you can select which ones to save or view.
Step 5: Export statistics and graphs
Wireshark can also generate various statistics and graphs based on your network
analysis, such as endpoints, conversations, packet lengths, throughput, and more.
To access these statistics and graphs, go to Statistics or Analyze in the menu bar,
and choose the option that interests you. You can then export the statistics or
graphs as CSV, XML, PNG, or PDF files, depending on the option.
Step 6: Share your results online
Finally, you may want to share your network analysis results online, with your
colleagues, clients, or peers. One way to do that is to use CloudShark, a web-based
service that allows you to upload, view, and share your capture files online. To use
CloudShark, you need to create an account and get an API token. Then, you can go
to File > Export to CloudShark in Wireshark, and enter your API token and a
comment for your capture file. Wireshark will upload your file to CloudShark and
give you a URL that you can share with others.
5. Perform the task of creating mail messages by using fake mail id by using
the "fake mailer" website ( https://emkei.cz)
AIM: To Create mail messages by using fake mail id by using fake mailer.
Description:
Installation :
Step 1: Open your kali linux operating system terminal and use the following
command to install the tool.
git clone https://github.com/htr-tech/fake-mailer
cd fake-mailer
Step 2: Now you are in the directory of Fakemailer tool. Now use the following
command to run the tool.
python2 mailer.py
Description:
using Tracert/Traceroute
To use Traceroute via the Network Utility, you must be running Apple Mac OS
X.
1. Open the Network Utility
Open Spotlight (Left Cmd + Spacebar or Click the Magnifying Glass on
the right of the Menu Bar). Type Network Utility and press Enter.
In Network Utility, choose Traceroute. Enter a destination into the box,
either an IP Address or a Domain Name, and click Trace.
e.g. google.co.nz
OR 216.58.196.131
Pragati Women’s Degree College Page 9
Cyber Security And Malware Analysis Lab
The results will be printed in the window. You may have to scroll down to
see all results (by mousing over the white window and scrolling.)
USING ARP:
Connect two PC, say A and B with a cross cable. Now you can see the working
of ARP by typing these commands:
1. A > arp -a
There will be no entry at the table because they never communicated with each
other.
Now, entries of the ARP table can be seen by typing the command. This is what
the ARP table looks like:
Description:
Nmap is a security auditing tool used in the security field to actively enumerate a
target system/network. It is one of the most extensively used tools by network
administrators and conversely attackers for reconnaissance (enumeration), the first
step in the 5 phases of hacking. Nmap is used to actively probe the target network
for active hosts(host discovery), port scanning, OS detection, version details, and
active services running on the hosts that are up. For this, Nmap uses the technique
of sending packets and analyzing the responses.
First, fire up your command line or GUI. Typing scanme.nmap.org will perform a
default scan for open ports on the domain name scanme.nmap.org. Nmap provides
this server to test out different scans.
If you want to scan something else, type in the device’s DNS name or IP address.
You can even combine most flags, but scan type flags only allow mixing TCP and
UDP types. That would be something like nmap -sS -SU scanme.nmap.org
Let’s say you want to just check if SSH (port 22) is open on your firewall. Add the
-p (for port) and give it the port number to check: nmap -sS -p 22 scanme.nmap.org
AIM: To Perform an SQL Injection attack and its preventive measure to avoid
Injection attack
Description:
SQL injection is a technique used to extract user data by injecting web page inputs
as statements through SQL commands. Basically, malicious users can use these
instructions to manipulate the application’s web server.
3. SQL injection is the injection of malicious code into SQL statements via
web page input.
Now, this 1=1 will return all records for which this holds true. So basically, all
the student data is compromised. Now the malicious user can also delete the
student records in a similar fashion. Consider the following SQL query.
Query:
SELECT * from USER where
USERNAME = “” and PASSWORD=””
Now the malicious can use the ‘=’ operator in a clever manner to retrieve
private and secure user information. So instead of the above-mentioned query
the following query when executed retrieves protected data, not intended to be
shown to users.
Query:
Select * from User where
(Username = “” or 1=1) AND
(Password=”” or 1=1).
Preventing SQL Injection
User Authentication: Validating input from the user by pre-defining length,
type of input, of the input field and authenticating the user.
Restricting access privileges of users and defining how much amount of
data any outsider can access from the database. Basically, users should not
be granted permission to access everything in the database.
Do not use system administrator accounts.
Choose your password reset disk from the dropdown list and click Next.
Enter the new password (if any) or leave the fields blank if you do not want to set
any password. Click Next.
Set your bootable device on priority, and press F10 to save changes.
When the PC restarts, it will launch the PassFab’s interface. Choose the
Windows system. Click Next.
Choose the user account and Reset Account Password from the option list.
Click Next.
Enter the new password. Click Reset and then reboot.
Your PC has been unlocked without a password successfully. Use the new
password to log into it.
Restart your computer while holding the Shift key from the login screen.
From Advanced Boot Options, choose Troubleshoot and press Enter.
Select Advanced Options.
Select Startup Settings.
Press 6 or F6 to boot your computer in Safe mode with Command Prompt.
When you see the Command Prompt window, type “net user” to view a list
of all the users on this PC.
Type “net user [username] [new_password]” and hit Enter.