0% found this document useful (0 votes)
187 views16 pages

Cyber Security Lab Manual for BE Students

Computer science lab manual

Uploaded by

maskb228
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Topics covered

  • Design Solutions,
  • Spoofing Tools,
  • Communication in Engineering,
  • Experiment Guidelines,
  • ZAP Proxy,
  • Ethics in Engineering,
  • Engineering Knowledge,
  • p0f,
  • SQL Injection,
  • Environmental Impact
0% found this document useful (0 votes)
187 views16 pages

Cyber Security Lab Manual for BE Students

Computer science lab manual

Uploaded by

maskb228
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Topics covered

  • Design Solutions,
  • Spoofing Tools,
  • Communication in Engineering,
  • Experiment Guidelines,
  • ZAP Proxy,
  • Ethics in Engineering,
  • Engineering Knowledge,
  • p0f,
  • SQL Injection,
  • Environmental Impact

Shram Sadhana Bombay Trust’s

COLLEGE OF ENGINEERING AND TECHNOLOGY,


BAMBHORI POST BOX NO. 94, JALGAON – 425001. (M.S.)
Included under section 2 (f) & 12 (B) of the UGC Act, 1956
ISO 9001: 2008 certified
Phone No. (0257) 2258393, Fax No. (0257) 2258392
Website- [Link]
Email: sscoetjal@[Link]

ISO 9001:2008

DEPARTMENT OF COMPUTER ENGINEERING

Laboratory Manual

Class: B.E. Computer

Subject: Cyber Security Lab

Academic Year: 2023-24 Semester: VIII


DEPARTMENT OF COMPUTER ENGINEERING

Vision of the Department

To emerge as the leading Computer Engineering department for

inclusive development of students.

Mission of the Department

To provide student-centered conducive environment for preparing

knowledgeable, competent and value-added computer engineers.


DEPARTMENT OF COMPUTER ENGINEERING

Program Educational Objectives (PEOs)

PEO 1. Core Knowledge


Computer engineering graduates will have the knowledge of basic science
and Engineering skills, Humanities, social science, management and
conceptual and practical understanding of core computer engineering area
with project development.

PEO 2. Employment
Computer engineering graduates will have the knowledge of Industry-based
technical skills to succeed in entry level engineering position at various
industries as well as in academics.

PEO 3. Professional Competency


Computer engineering graduates will have the ability to communicate
effectively in English, to accumulate and disseminate the knowledge and to
work effectively in a team with a sense of social awareness.
DEPARTMENT OF COMPUTER ENGINEERING
Program Outcomes (POs)
Engineering Graduates will be able to:
1. Engineering knowledge: Apply the knowledge of mathematics, science, engineering
fundamentals, and an engineering specialization to the solution of complex engineering
problems.
2. Problem analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles of
mathematics, natural sciences, and engineering sciences.
3. Design/development of solutions: Design solutions for complex engineering problems
and design system components or processes that meet the specified needs with appropriate
consideration for the public health and safety, and the cultural, societal, and environmental
considerations.
4. Conduct investigations of complex problems: Use research-based knowledge and
research methods including design of experiments, analysis and interpretation of data, and
synthesis of the information to provide valid conclusions.
5. Modern tool usage: Create, select, and apply appropriate techniques, resources, and
modern engineering and IT tools including prediction and modeling to complex
engineering activities with an understanding of the limitations.
6. The engineer and society: Apply reasoning informed by the contextual knowledge to
assess societal, health, safety, legal and cultural issues and the consequent responsibilities
relevant to the professional engineering practice.
7. Environment and sustainability: Understand the impact of the professional engineering
solutions in societal and environmental contexts, and demonstrate the knowledge of, and
need for sustainable development.
8. Ethics: Apply ethical principles and commit to professional ethics and responsibilities and
norms of the engineering practice.
9. Individual and team work: Function effectively as an individual, and as a member or
leader in diverse teams, and in multidisciplinary settings.
10. Communication: Communicate effectively on complex engineering activities with the
engineering community and with society at large, such as, being able to comprehend and
write effective reports and design documentation, make effective presentations, and give
and receive clear instructions.
11. Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s own work, as a member
and leader in a team, to manage projects and in multidisciplinary environments.
12. Life-long learning: Recognize the need for, and have the preparation and ability to
engage in independent and life-long learning in the broadest context of technological
change
DEPARTMENT OF COMPUTER ENGINEERING

Program Specific Outcomes (PSOs)

Computer Engineering Graduates will be able to:

1. Software Systems Development: Apply the theoretical concepts of


computer engineering and practical knowledge in analysis, design and
development of software systems.

2. Open Source Software: Demonstrate familiarity and practical


competence with a broad range of programming languages and open
source platforms.

3. Computer Proficiency: Exhibit proficiency through latest


technologies in demonstrating the ability for work efficacy to the
industry &society.
DEPARTMENT OF COMPUTER ENGINEERING

Course Objectives for Cyber Security Lab

1. To learn Information Technology Act of India


2. To understand the importance of Cyber Security
3. To learn Offensive Cyber Security Tools
4. To learn Defensive Cyber Security Tools
5. To learn Security Testing Tools for Web Applications
DEPARTMENT OF COMPUTER ENGINEERING

Course Outcomes (CO) for Cyber Security Lab

1. To describe Information Technology Act of India


2. Describe Cyber Security
3. Demonstrate Offensive Cyber Security Tools
4. Demonstrate Defensive Cyber Security Tools
5. Demonstrate Security Testing Tools for Web Applications
DEPARTMENT OF COMPUTER ENGINEERING

Cyber Security Lab


Mapping of CO to PO

CO PO PO PO PO PO PO PO PO PO PO PO PO
1 2 3 4 5 6 7 8 9 10 11 12
To describe Information Technology Act of India 2 3 3 3 3 3 3
Describe Cyber Security 3 2 3 3 3 3 3 3 3
Demonstrate Offensive Cyber Security Tools 3 2 3 3 3 3 3 3 3
Demonstrate Defensive Cyber Security Tools 1 1 1 1 3 3 3 3
Demonstrate Security Testing Tools for Web
3 2 3 3 3 3 3 3 3
Applications
Average 2.5 1.8 2.6 2.6 3 3 3 3 3

Mapping of CO to PSO

CO PSO PSO PSO


1 2 3
To describe Information Technology Act of India 3
Describe Cyber Security 3 3 3
Demonstrate Offensive Cyber Security Tools 3 3 3
Demonstrate Defensive Cyber Security Tools 3 2 2
Demonstrate Security Testing Tools for Web Applications 3 3 3
Average 3 2.75 2.75
DEPARTMENT OF COMPUTER ENGINEERING

Cyber Security Lab

List of Experiments

Experiment
Title of Experiment
No.
1 Study of Information Technology Act–Indian Perspective

2 Study of recent cyber incidents/ vulnerability

3 Study of information gathering tools in Kali Linux

4 Study of vulnerability analysis tools in Kali Linux

5 Study of web application analysis tools in Kali Linux

6 Study of database assessment tools in Kali Linux

7 Study of sniffing and spoofing tools in Kali Linux

8 Study of forensics tools in Kali Linux

9 Study of reporting tools in Kali Linux


Cyber Security Lab
Guidelines: Students should prepare web pages (computer typed document) for following
Lab experiments in their own English language based on their understanding of the topics.

EXPERIMENT NUMBER – 1

Aim: Study of Information Technology Act – Indian Perspective.

References:
1. Section 65 to Section 78, CHAPTER XI, OFFENCES, Page Number 25 - 31
[Link]
0Act%2C%202000%283%[Link]

2. Acts/Rules/Regulations
[Link]
a. Information Technology Act 2000, Section 65 to Section 78, CHAPTER XI,
OFFENCES, Page Number 19 - 21
[Link]

b. Information Technology (Amendment) Act 2008, Section 65 to Section 78 , Page


Number 9 - 15
[Link]

Description: Write Section 65 to Section 78 with description of the offence and its penalties
as per Information Technology Act 2000. Write only the amendments of respective sections
as per Information Technology (Amendment) Act 2008.

EXPERIMENT NUMBER – 2

Aim: Study of recent Cyber Incidents / Vulnerability.

References:
1. Latest Security Alerts, Virus Alerts in the Home Page
[Link]
2. VULNERABILITY NOTES (Vulnerability Notes of the year 2021, 2020, 2019)
[Link]
3. Reporting of Security Incident and Vulnerability
[Link]
4. National Cyber Crime Reporting Portal
[Link]

Description: Write at least FIVE recent Security Alerts and Vulnerability Notes each of the
year 2021, 2020 & 2019. Write at least THREE recent Virus Alerts. Write about how to
report Security Incident and Vulnerability. Write about Filing a Complaint on National Cyber
Crime Reporting Portal.

Girish Kumar Patnaik Page 1


EXPERIMENT NUMBER – 3

Aim: Study of Information Gathering Tools in Kali Linux

Live host identification: Hping3


Hping3 is nearly similar to ping tools but is more advanced, as it can bypass the firewall filter
and use TCP, UDP, ICMP and RAW-IP protocols. It has a traceroute mode.
hping3 [Link]
hping3 --scan 1-30,70-90 -S [Link]

References:
1. [Link]
2. [Link]
3. [Link]
4. [Link]

Network and Port Scanner: NMAP


NMAP uses raw IP packets in novel ways to determine which hosts are available on the
network, what services (application name and version) those hosts are offering, which
operating systems (and OS versions) they are running, what type of packet filters/firewalls
are in use, etc.
Step 1 − To open, go to Applications → 01-Information Gathering → nmap or zenmap.
Step 2 − The next step is to detect the OS type/version of the target host. Based on the help
indicated by NMAP, the parameter of OS type/version detection is variable “-O”.
nmap -O [Link]
nmap -O [Link]
Step 3 − Next, open the TCP and UDP ports. To scan all the TCP ports based on NMAP, use
the following command −
nmap -p 1-65535 -T4 [Link]
Where the parameter “–p” indicates all the TCP ports that have to be scanned. In this case,
we are scanning all the ports and “-T4” is the speed of scanning at which NMAP has to run.

References:
1. [Link]
2. [Link]
3. [Link]

NMAP Stealth Scan


Stealth scan or SYN is also known as half-open scan, as it doesn’t complete the TCP three-
way handshake. A hacker sends a SYN packet to the target; if a SYN/ACK frame is received
back, then it’s assumed the target would complete the connect and the port is listening. If an
RST is received back from the target, then it is assumed the port isn’t active or is closed.
nmap -sS [Link]
nmap -sS -T4 [Link]

References:
1. [Link]
2. [Link]

Girish Kumar Patnaik Page 2


DNS Analysis: dnsenum
Dnsenum helps to get MX, A, and other records connect to a domain.
dnsenum [Link]

References:
1. [Link]
2. [Link]
3. [Link]

SSL Analysis: tlssled


TLSSLed is a Linux shell script used to evaluate the security of a target SSL/TLS (HTTPS)
web server implementation. The current tests include checking if the target supports the
SSLv2 protocol, the NULL cipher, weak ciphers based on their key length (40 or 56 bits),
the availability of strong ciphers (like AES), if the digital certificate is MD5 signed, and the
current SSL/TLS renegotiation capabilities.
To start testing, open a terminal and type “tlssled URL port“. It will start to test the
certificate to find data, where the port is 443.
tlssled [Link] 443

References:
1. [Link]
2. [Link]
3. [Link]

Dmitry:
Perform a whois lookup on the IP address or domain name of a host. It also searches for
possible subdomains.
dmitry -w [Link]
References:
1. [Link]
2. [Link]
3. [Link]

p0f:
p0f is a tool that can identify the operating system of a target host simply by examining
captured packets even when the device in question is behind a packet firewall.
Type the command: “p0f –i eth0 –p -o filename”.
Where the parameter "-i" is the interface name as shown above. "-p" means it is in
promiscuous mode. "-o" means the output will be saved in a file.
Open a webpage with the address [Link]
From the results, you can observe that the Webserver is using apache version and the OS.
p0f -i eth0 -p -o abc

References:
1. [Link]
2. [Link]
3. [Link]

Girish Kumar Patnaik Page 3


EXPERIMENT NUMBER – 4

Aim: Study of Vulnerability Analysis Tools in Kali Linux

Fuzzing Tools: BED


BED is a program designed to check daemons for potential buffer overflows, format strings,
et. al.
bed -s HTTP -t [Link]

References:
1. [Link]
2. [Link]
3. [Link]
4. [Link]

EXPERIMENT NUMBER – 5

Aim: Study of Web Application Analysis Tools in Kali Linux

Web Application Proxies: Burpsuite


Burpsuite can be used as a sniffing tool between your browser and the web servers to find
the parameters that the web application uses.
To open Burpsuite, go to Applications → Web Application Analysis → burpsuite.
To make the setup of sniffing, configure burpsuite to behave as a proxy. Go to Proxy →
Options; Check the box under Running for interface [Link].
In this case, the proxy IP will be [Link] with port 8080.
Then configure the browser proxy which is the IP of burpsuite machine and the port.
To start interception, in Burpsuite go to Proxy → Intercept → click “Intercept is on”.
Continue to navigate on the webpage that you want to find the parameter to test for
vulnerabilities.
In Burpsuite, Go to “HTTP History”. The line marked in red arrow shows the last request. In
Raw and the hidden parameter such as the Session ID and other parameter such as user
name and password has been underlined in red.

References:
1. [Link]
setup/browser
2. [Link]
3. [Link]
4. [Link]

ZapProxy
ZAP-OWASP Zed Attack Proxy is an easy-to-use integrated penetration testing tool for
finding vulnerabilities in web applications. It is a Java interface.
Step 1 − To open ZapProxy, go to Applications → 03-Web Application Analysis → ZAP.
Step 2 − Click “Accept”.
ZAP will start to load.
Step 3 − Choose one of the Options and click “Start”..
Preferably select “No, I do not want to persist this session at this moment in time”

Girish Kumar Patnaik Page 4


Step 4 − Enter URL of the testing web at “URL to attack” → click “Attack”.
After the scan is completed, on the top left panel you will see all the crawled sites.
In the left panel “Alerts”, you will see all the findings along with the description.
Step 5 − Click “Spider” and you will see all the links scanned.

References:
1. [Link]
2. [Link]
3. [Link]

EXPERIMENT NUMBER – 6

Aim: Study of Database Assessment Tools in Kali Linux

Sqlmap
Sqlmap automates the process of detecting and exploiting SQL injection flaws and taking
over of database servers. It comes with a powerful detection engine lasting from database
fingerprinting, over data fetching from the database, to accessing the underlying file system
and executing commands on the operating system via out-of-band connections.
Step 1 − To open sqlmap, go to Applications → 04-Database Assessment → sqlmap.
Step 2 − To start the sql injection testing, type “sqlmap – u URL of victim”
Step 3 − From the results, you will see that some variable are vulnerable.
sqlmap -u [Link]

References:
1. [Link]
2. [Link]
3. [Link]
4. [Link] linux/[Link]

EXPERIMENT NUMBER – 7

Aim: Study of Sniffing and Spoofing Tools in Kali Linux

wireshark
Wireshark analyzes deeply the packets in frame level. In Kali, it is found using the following
path - Applications → Sniffing & Spoofing → wireshark.
Under Capture menu, Click “Start” and the packet capturing will start

References:
1. [Link]
2. [Link]
3. [Link]
4. [Link]
5. [Link]

Girish Kumar Patnaik Page 5


EXPERIMENT NUMBER – 8

Aim: Study of Forensics Tools in Kali Linux

Forensic image tools: ddrescue


It copies data from one file or block device (hard disc, cdrom, etc.) to another, trying to
rescue the good parts first in case of read errors.
The basic operation of ddrescue is fully automatic. That is, you don't have to wait for an
error, stop the program, restart it from a new position, etc.
If you use the mapfile feature of ddrescue, the data is rescued very efficiently (only the
needed blocks are read). Also, you can interrupt the rescue at any time and resume it later at
the same point. The mapfile is an essential part of ddrescue's effectiveness.
dd_rescue infilepath outfilepath

References:
1. [Link]
2. [Link]
3. [Link]
4. [Link]
5. [Link]
6. [Link]

PDF Forensics Tools: pdf-parser


pdf-parser is a tool that parses a PDF document to identify the fundamental elements used in
the analyzed pdf file.
Generally, this is used for pdf files that you suspect has a script embedded in it.
pdf-parser -o 10 filepath
where "-o" is the number of objects.

References:
1. [Link]
2. [Link]
3. [Link]
4. [Link]

EXPERIMENT NUMBER – 9

Aim: Study of Reporting Tools in Kali Linux

Dradis framework
Step 1 − To start Dradis, type “service dradis start”.in terminal
Step 2 − To open, go to Applications → Reporting Tools → dradis.
The web URL will open. Anybody in LAN can open it in the following URL [Link] of
kali machine:3004 (check the port number)
Log in with the username and password that was used for the first time.
Step 3 − After logging in, you can import files from NMAP, NESSUS, NEXPOSE. To do so,
go to “Import from file” → click “new importer(with real-time feedback)”.
Step 4 − Select the file type that you want to upload. In this case, it is “Nessus scan” → click
“Browse”.

Girish Kumar Patnaik Page 6


If you go to the home page now, on the left panel you will see that the imported scans have
are in a folder with their host and port details.

References:
1. [Link]
2. [Link]
3. [Link]
4. [Link]
5. [Link]

Girish Kumar Patnaik Page 7

Common questions

Powered by AI

The Cyber Security Lab fosters students' abilities to handle vulnerability analysis and penetration testing by offering hands-on experience with tools and methods for identifying and addressing security weaknesses. Students learn to use tools like NMAP for network scanning, Burp Suite for web vulnerability testing, and Sqlmap for SQL injection testing. The curriculum includes experiments that mimic real-world cyber threats, allowing students to practice and develop their skills in identifying vulnerabilities and preventing potential security breaches .

Understanding the Information Technology Act significantly influences cybersecurity practices by providing a legal framework that guides ethical and lawful behavior in digital environments. In the Cyber Security Lab, this understanding ensures that students are aware of the legal implications of cybersecurity actions, protecting against overstepping legal boundaries. It emphasizes the importance of ethical hacking and the protection of data privacy and integrity under the law. This legal knowledge shapes responsible cybersecurity practices, fostering an awareness of legal consequences and promoting adherence to both national and international security standards .

The Cyber Security Lab integrates both offensive and defensive cybersecurity strategies by including experiments and tools that cater to both aspects. For offensive strategies, students are trained in using tools such as Hping3 and NMAP for network scanning and vulnerability detection, simulating attacks to understand potential entry points. For defensive strategies, the curriculum introduces students to applications like Wireshark for network analysis and Burp Suite for web application security, promoting an understanding of securing systems against threats. This dual approach ensures that students can both anticipate attacks and fortify systems against them .

The learning activities in the Cyber Security Lab are carefully mapped onto the Program Outcomes (POs) and Program Specific Outcomes (PSOs) to ensure alignment with broader educational goals. For instance, activities like the study of the Information Technology Act and the use of defensive and offensive tools are mapped to outcomes like PO 2, PO 3, and PO 4, which include skills in problem-solving, design, and investigation of engineering challenges. Similarly, learning of open-source tools and software systems directly supports PSO 2 and PSO 3 by developing students' competencies in handling diverse software technologies and systems proficiently. This mapping ensures that the lab exercises support students' overall educational objectives comprehensively .

The Cyber Security Lab emphasizes tools like NMAP, Sqlmap, and Wireshark for detecting system vulnerabilities. NMAP is crucial for its comprehensive network scanning capabilities, allowing users to detect open ports and identify potential security weaknesses. Sqlmap automates the detection of SQL injection vulnerabilities, which are common and potentially severe system flaws. Wireshark provides deep packet analysis, essential for identifying data leaks or suspicious network activity. These tools are crucial because they provide the foundational capabilities needed for thorough vulnerability assessment and proactive security management .

Courses like the Cyber Security Lab play a significant role in promoting lifelong learning among engineering graduates by instilling a mindset of continuous improvement and adaptability. Students engage with rapidly evolving cybersecurity tools and techniques, learning to adapt to new challenges and technologies. The course encourages students to stay updated with the latest trends and security threats, fostering an attitude of ongoing learning and evolution in their professional skills, which aligns with the lifelong learning goal articulated in PO 12 .

The Cyber Security Lab's curriculum is designed to equip students with both theoretical knowledge and practical skills necessary for real-world challenges by focusing on the Information Technology Act, important cyber security concepts, and the use of both offensive and defensive cyber security tools. Students participate in experiments involving recent cyber incidents and use popular tools like Kali Linux and NMAP for information gathering, vulnerability analysis, and security testing. This comprehensive approach ensures that students receive hands-on experience in tackling contemporary cyber security issues .

The Program Outcomes (POs) address sustainable development through specific outcomes that emphasize understanding the societal and environmental impacts of engineering solutions. PO 7, in particular, is focused on understanding the need for sustainable development, ensuring students are taught to consider long-term impacts and ethical responsibilities in their engineering practices. By integrating sustainability into the curriculum, the POs ensure that students are prepared to develop solutions that are environmentally conscious and socially responsible, which aligns with the broader institutional goals of promoting sustainable development .

The vision of the Department of Computer Engineering is to emerge as a leading department for the inclusive development of students. This broad goal influences its educational objectives by ensuring they align with the overarching aim of developing knowledgeable, competent, and value-added engineers. Specifically, the mission focuses on a student-centered environment conducive to learning, reflected in the Program Educational Objectives (PEOs) such as providing core knowledge, industry-specific employment skills, and professional competency. The PEOs, therefore, are structured to ensure students not only acquire technical skills but also understand broader societal and ethical contexts, promoting inclusive development .

The Program Specific Outcomes (PSOs) emphasize skills in software systems development, open-source platforms, and computer proficiency. PSO 1 emphasizes the application of theoretical and practical engineering concepts in software development, essential for creating robust software systems. PSO 2 focuses on open-source software, promoting adaptability and innovation in the use of diverse programming languages and platforms. PSO 3 nurtures proficiency in current technologies, critical for ensuring graduates can effectively meet industry and societal needs. These skills are important as they prepare graduates for the rapid technological changes and demands of the digital industry .

You might also like