0% found this document useful (0 votes)
47 views50 pages

Cyber Security Course: Kali Linux Practices

The document outlines a cyber security course (CCS340) with objectives focused on cybercrime, cyber law, and cyber-attack detection and prevention. It includes practical exercises such as installing Kali Linux, performing open-source intelligence gathering, and using tools like Metasploit and Snort. Successful completion of the course will enable students to understand cyber security fundamentals and apply various tools for intrusion detection and prevention.

Uploaded by

sanjayrao0508
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views50 pages

Cyber Security Course: Kali Linux Practices

The document outlines a cyber security course (CCS340) with objectives focused on cybercrime, cyber law, and cyber-attack detection and prevention. It includes practical exercises such as installing Kali Linux, performing open-source intelligence gathering, and using tools like Metasploit and Snort. Successful completion of the course will enable students to understand cyber security fundamentals and apply various tools for intrusion detection and prevention.

Uploaded by

sanjayrao0508
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CCS340 CYBER SECURITY LTPC

2023
COURSE OBJECTIVES:
• To learn cybercrime and cyberlaw.
• To understand the cyber-attacks and tools for mitigating them.
• To understand information gathering.
• To learn how to detect a cyber-attack.
• To learn how to prevent a cyber-attack.

PRACTICAL EXERCISES:
1. Install Kali Linux on Virtual box
2. Explore Kali Linux and bash scripting
3. Perform open-source intelligence gathering using Netcraft, who is Lookups, DNSReconnaissance,
Harvester and Maltego
4. Understand the nmap command d and scan a target using nmap
5. Install metasploitable2 on the virtual box and search for unpatched vulnerabilities
6. Use Metasploit to exploit an unpatched vulnerability
7. Install Linus server on the virtual box and install ssh
8. Use Fail2banto scan log files and ban Ips that show the malicious signs
9. Launch brute-force attacks on the Linux server using Hydra.
10. Perform real-time network traffic analysis and data pocket logging using Snort

COURSE OUTCOMES:
On successful completion of this course, the student will be able to
CO1: Explain the basics of cyber security, cybercrime and cyber law (K2)
CO2: Classify various types of attacks and learn the tools to launch the attacks (K2)
CO3 Apply various tools to perform information gathering (K3)
CO4: Apply intrusion techniques to detect intrusion (K3)
CO5: Apply intrusion prevention techniques to prevent intrusion (K3)
TOTAL:60 PERIODS
CO’s- PO’s & PSO’s MAPPING
PO’s PSO’s
CO’s 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 1 2 2 - - - 1 1 3 2 1 3 2
2 2 1 2 2 2 - - - 3 2 2 1 1 2 1
3 1 1 1 3 3 - - - 1 2 1 1 3 3 2
4 1 1 1 2 2 - - - 2 3 3 3 3 1 3
5 3 1 3 1 3 - - - 3 1 2 2 2 2 2
AVG 2 1.4 1.6 2 2.4 - - - 2 1.8 2.2 1.8 2 2.2 2
1 - low, 2 - medium, 3 - high, ‘-' - no correlation
[Link]
Install Kali Linux on Virtual box
DATE:

Aim:
To Install Kali Linux on Virtual Box

Procedure:
Step1: Open the Virtual Box website. Goto[Link]
browser. This is the website from which you'll download the Virtual Box setup file.

Step2: Install the Kali Linux ISO file in Google chrome

Step3: Create a New Instances in the Virtual Box


Step4: Select the Kali Linux ISO image files in the Storage

Step5: Select the number of Processors and CPU’s in the Network tab
Step6: Start the Server and Choose the Kali Linux in Virtual Box
Step7: Select a Language as ‘English’ and Click to ‘Continue’

Step8: Enter the Host Name for the System and Click to ‘Continue’ and set username and Password
Step9: Finish the Installation and Click to ‘Continue’

Step10: Finally open the Kali Linux in Virtual Box

Step11: Give User name and Password, click ‘Login


Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75

Result:
Thus, to Install Kali Linux on Virtual Box was Successfully Installed.
[Link]
Explore Kali Linux and bash scripting
DATE:

Aim:
To Explore Kali Linux and Bash Scripting.

Procedure:
Step1: Start the Kali Linux on Virtual Box and open the File

Step2: Create a New File in Terminal and Save it as–‘. /sh’


Step3: Write a Simple program in the Script

Step4: The Script can be Executed using./file_name.sh


Step5: Other Commands which can be used are Ip config–

Used to display information about the system Ls –a –

Used to view the files in the Directory

Mkdir–Used to Create a Directory


Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75

Result:
Thus, to explore Kali Linux and Bash Scripting was Executed Successfully.
[Link]
Look ups, DNS Reconnaissance, Harvester and Maltego
DATE:

Aim:
To Perform open-source intelligence gathering using Netscraft, who is lookups, DNS
Reconnaissance, Harvester and Maltego.

Procedure:
Step1: Netscraft is a tool used for finding what infrastructure and technologies in a site

Step2: The tool can be accessed using Browser and the Infrastructure and technologies of the
website can be accessed by giving the URL of the site.
Step4: Whois is also a tool used to get the all domains and sub domains of a website. The website
can be accessed in [Link] We can enter the name of the website to look for domains.

[Link]
Step5: Perform the DNS Reconnaissance

Step6: Harvester is a tool used in Linux System. This is used to get the IP addresses of the website

The Harvester tool can be used by giving following command: the harvester –d <website_name>
Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75

Result:
Thus, to perform open-source intelligence gathering using Netscraft, Who is lookups, DNS
Reconnaissance, Harvester and Maltego was Successfully Performed.
[Link]
Understand then map command and scan a target using nmap.
DATE:

Aim:
To Understand then map command and Scan a target using nmap.
Procedure:
Step1: Then map command can be used in Kali Linux and Before using then map change the
network adapter to bridged adapter.

Step2: The target can be Scanned using the following command–nmap<IPaddress>and sudo map<IP
address>
Step3: This command will display all the posts which are open in that IP address and these are used
to attack that system

Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75

Result:
Thus, to Understand then map command and scan a target using nmap was executed
Successfully.
[Link]
Install metasploitable2 on the virtual box and search for
DATE: unpatched vulnerabilities

Aim:
ToInstallMetasploitable2ontheVirtualBoxandSearchforUnpatchedVulnerabilities.

Procedure:
Step1: Install virtual box if not installed

Step2: Install Meta sploitable2 using following link


[Link]
Step3: Extract Meta sploitable-linux zip

Step4: Create new instance Click new in virtual box

Step5: Give any name, choose Linux In Type and other linux(64bit) in Version
Step6: Click settings

Step7: Click Storage

Step8: Select Created Instance


Step9: Load Meta sploitable
Step10: Give login and password as msfadmin

Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75

Result:
ThustoInstallMetasploitable2ontheVirtualboxandSearchforunpatchedVulnerabilities was
Successfully Installed and executed.
[Link]
Use Meta Sploit to Exploit an Unpatched Vulnerability
DATE:

Aim:
To use Meta sploit to exploit an Unpatched Vulnerability.

Procedure:
Step1: Login into the meta sploit terminal using the credentials and Open meta sploitable2 and login,
note the ip of the machine

Step2: Now open kali Linux and scan the meta sploitable2 machine for open ports and service
using nmap
Step3:Usingbrowsernavigatetotheipofmetasploitable2
example: [Link]

Step4:Now open inspectelementandmovetonetworktabandreloadthepage,youcanfind the


request and response for the ip
Step5: Move to kali and by using Meta sploit we are going to exploit PHP CGI Argument Injection.

Step6: Set the host IP as out meta sploit able IP

Step7: Exploit
Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75

Result:
Thus, to use meta sploit to exploit an Unpatched Vulnerability was Executed Success
[Link]
Install Linux server on the virtual box and install ssh
DATE:

Aim:
To Install Linux Server on the Virtual Box and Install ssh.

Procedure:
Step1: Download and Install Virtual Box

Step2: Start the Linux shell in the Virtual box and install Linux shell to fill the necessary
instructions displayed on the screen.
Step3:Show the Guided storage Configuration and Click‘Done’

Step4: Set up the Profile and enter your details such as name, service name, user name and
Password
Step5: Installing System
Step6: Enter user name and password and press enter (note: password will not be visibile)

Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75

Result:
Thus, to Install Linux server on the Virtual Box and Install the ssh was installed and
executed Successfully.
[Link]
Use Fail 2 ban to scan log files and ban Ips that show the
DATE: malicious signs

Aim:
ToUseFail2BantoScanlogfilesandbanIPSthatshowthemalicious Signs.

Procedure:
Step1: Change the Network adapter to Bridged Adapter

Step2:Openubuntuserverandinstallfail2banusingthebelowcommand
Step3:[Link]

Step4:[Link],restartthefail2banservice

Step5:Checkthestatusoffail2banservice
Step6: Note the IP of ubuntu server

Step7: Open kali Linux and try brute forcing ssh login of ubuntu server using hydra

Thebruteforceattemptisdetectedbyfail2banandouripis blocked
Step8:Letsdisablefail2banandtrybruteforcing,
Step9: Now we can able to perform brute force successfully.

Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75

Result:
ThustouseFail2bantoscanlogfilesandBanIPSthatshowthemalicioussignswas executed
Successfully.
[Link]: 9
DATE: Launch brute-force attacks on the Linux server using Hydra

Aim:
To Launch the Brute-Force attacks on the Linux Server using Hydra

Procedure:
Step1: In ubuntu server and kali Linux, Check the network settings is configured with bridged
adapter

Step2: In ubuntu server, If open ssh-server is not installed during the time of server installation
then install with apt.
Step3: Now start the ssh service

Step4: Note the IP of ubuntu server

Step5: In kali Linux, create a word list contains passwords


Step6: Use hydra to brute force ssh login of ubuntu server.
$hydra-l<user>-P<wordlist file><IPofubuntuserver>ssh

Arguments

• l–user (user name for login in ubuntu server)


• P–wordlist file (contains passwords)
• ssh– protocol

Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75

Result:
ThustoLaunchBrute-ForceattacksontheLinuxserverusingHydrawasexecuted Successfully.
[Link]: 10
Performreal-time network traffic analysis and data pocket logging
DATE: using Snort

Aim:
To Perform real-time network traffic analysis and data pocket logging using snort.

Procedure:
Step1: Install the Snort tool by using the command

Step2: Note the IP and interface of the ubuntu server

SNIFFERMODE
Step3: To run snort in sniffer mode (capture packets)
Step4: Open kali Linux and ping the ubuntu server

Step5: In ubuntu server we can see the ICMP ECHO messages.


PACKETLOGGERMODE

Step6: Create a directory for logging

Step7: Now run Snort in packet logging mode and store the logs in the create directory

Step8: From kali Linux ping the ubuntu server

Step9: Press CTRL+C in ubuntu server to stop snort packet logger mode and move to log
directory

Step10: Use sudo command to logs in as root and Move to the directory named as IP of
kali Linux
Step11: Use cat command to view the logs of ICMP protocol

IDSMODE
Step12: Move to /etc. /snort

Create new rules file

Write the rule inside the rules file and save and exit (this rule will give alert when there is
a SSH packet is detected)
Come back to the/etc/snort and edit [Link] to add the new. Rules

Add the line to the [Link] file

Start the snort in IDS mode with the [Link] file

Now from kali Linux try to login the ubuntu server using ssh

Alert found in snort console


Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75

Result:
ThustoPerformreal-timenetworktrafficanalysisanddatapocketloggingusingsnort was
executed Successfully.

You might also like