CCS340 CYBER SECURITY LTPC
2023
COURSE OBJECTIVES:
• To learn cybercrime and cyberlaw.
• To understand the cyber-attacks and tools for mitigating them.
• To understand information gathering.
• To learn how to detect a cyber-attack.
• To learn how to prevent a cyber-attack.
PRACTICAL EXERCISES:
1. Install Kali Linux on Virtual box
2. Explore Kali Linux and bash scripting
3. Perform open-source intelligence gathering using Netcraft, who is Lookups, DNSReconnaissance,
Harvester and Maltego
4. Understand the nmap command d and scan a target using nmap
5. Install metasploitable2 on the virtual box and search for unpatched vulnerabilities
6. Use Metasploit to exploit an unpatched vulnerability
7. Install Linus server on the virtual box and install ssh
8. Use Fail2banto scan log files and ban Ips that show the malicious signs
9. Launch brute-force attacks on the Linux server using Hydra.
10. Perform real-time network traffic analysis and data pocket logging using Snort
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
CO1: Explain the basics of cyber security, cybercrime and cyber law (K2)
CO2: Classify various types of attacks and learn the tools to launch the attacks (K2)
CO3 Apply various tools to perform information gathering (K3)
CO4: Apply intrusion techniques to detect intrusion (K3)
CO5: Apply intrusion prevention techniques to prevent intrusion (K3)
TOTAL:60 PERIODS
CO’s- PO’s & PSO’s MAPPING
PO’s PSO’s
CO’s 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 1 2 2 - - - 1 1 3 2 1 3 2
2 2 1 2 2 2 - - - 3 2 2 1 1 2 1
3 1 1 1 3 3 - - - 1 2 1 1 3 3 2
4 1 1 1 2 2 - - - 2 3 3 3 3 1 3
5 3 1 3 1 3 - - - 3 1 2 2 2 2 2
AVG 2 1.4 1.6 2 2.4 - - - 2 1.8 2.2 1.8 2 2.2 2
1 - low, 2 - medium, 3 - high, ‘-' - no correlation
[Link]
Install Kali Linux on Virtual box
DATE:
Aim:
To Install Kali Linux on Virtual Box
Procedure:
Step1: Open the Virtual Box website. Goto[Link]
browser. This is the website from which you'll download the Virtual Box setup file.
Step2: Install the Kali Linux ISO file in Google chrome
Step3: Create a New Instances in the Virtual Box
Step4: Select the Kali Linux ISO image files in the Storage
Step5: Select the number of Processors and CPU’s in the Network tab
Step6: Start the Server and Choose the Kali Linux in Virtual Box
Step7: Select a Language as ‘English’ and Click to ‘Continue’
Step8: Enter the Host Name for the System and Click to ‘Continue’ and set username and Password
Step9: Finish the Installation and Click to ‘Continue’
Step10: Finally open the Kali Linux in Virtual Box
Step11: Give User name and Password, click ‘Login
Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75
Result:
Thus, to Install Kali Linux on Virtual Box was Successfully Installed.
[Link]
Explore Kali Linux and bash scripting
DATE:
Aim:
To Explore Kali Linux and Bash Scripting.
Procedure:
Step1: Start the Kali Linux on Virtual Box and open the File
Step2: Create a New File in Terminal and Save it as–‘. /sh’
Step3: Write a Simple program in the Script
Step4: The Script can be Executed using./file_name.sh
Step5: Other Commands which can be used are Ip config–
Used to display information about the system Ls –a –
Used to view the files in the Directory
Mkdir–Used to Create a Directory
Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75
Result:
Thus, to explore Kali Linux and Bash Scripting was Executed Successfully.
[Link]
Look ups, DNS Reconnaissance, Harvester and Maltego
DATE:
Aim:
To Perform open-source intelligence gathering using Netscraft, who is lookups, DNS
Reconnaissance, Harvester and Maltego.
Procedure:
Step1: Netscraft is a tool used for finding what infrastructure and technologies in a site
Step2: The tool can be accessed using Browser and the Infrastructure and technologies of the
website can be accessed by giving the URL of the site.
Step4: Whois is also a tool used to get the all domains and sub domains of a website. The website
can be accessed in [Link] We can enter the name of the website to look for domains.
[Link]
Step5: Perform the DNS Reconnaissance
Step6: Harvester is a tool used in Linux System. This is used to get the IP addresses of the website
The Harvester tool can be used by giving following command: the harvester –d <website_name>
Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75
Result:
Thus, to perform open-source intelligence gathering using Netscraft, Who is lookups, DNS
Reconnaissance, Harvester and Maltego was Successfully Performed.
[Link]
Understand then map command and scan a target using nmap.
DATE:
Aim:
To Understand then map command and Scan a target using nmap.
Procedure:
Step1: Then map command can be used in Kali Linux and Before using then map change the
network adapter to bridged adapter.
Step2: The target can be Scanned using the following command–nmap<IPaddress>and sudo map<IP
address>
Step3: This command will display all the posts which are open in that IP address and these are used
to attack that system
Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75
Result:
Thus, to Understand then map command and scan a target using nmap was executed
Successfully.
[Link]
Install metasploitable2 on the virtual box and search for
DATE: unpatched vulnerabilities
Aim:
ToInstallMetasploitable2ontheVirtualBoxandSearchforUnpatchedVulnerabilities.
Procedure:
Step1: Install virtual box if not installed
Step2: Install Meta sploitable2 using following link
[Link]
Step3: Extract Meta sploitable-linux zip
Step4: Create new instance Click new in virtual box
Step5: Give any name, choose Linux In Type and other linux(64bit) in Version
Step6: Click settings
Step7: Click Storage
Step8: Select Created Instance
Step9: Load Meta sploitable
Step10: Give login and password as msfadmin
Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75
Result:
ThustoInstallMetasploitable2ontheVirtualboxandSearchforunpatchedVulnerabilities was
Successfully Installed and executed.
[Link]
Use Meta Sploit to Exploit an Unpatched Vulnerability
DATE:
Aim:
To use Meta sploit to exploit an Unpatched Vulnerability.
Procedure:
Step1: Login into the meta sploit terminal using the credentials and Open meta sploitable2 and login,
note the ip of the machine
Step2: Now open kali Linux and scan the meta sploitable2 machine for open ports and service
using nmap
Step3:Usingbrowsernavigatetotheipofmetasploitable2
example: [Link]
Step4:Now open inspectelementandmovetonetworktabandreloadthepage,youcanfind the
request and response for the ip
Step5: Move to kali and by using Meta sploit we are going to exploit PHP CGI Argument Injection.
Step6: Set the host IP as out meta sploit able IP
Step7: Exploit
Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75
Result:
Thus, to use meta sploit to exploit an Unpatched Vulnerability was Executed Success
[Link]
Install Linux server on the virtual box and install ssh
DATE:
Aim:
To Install Linux Server on the Virtual Box and Install ssh.
Procedure:
Step1: Download and Install Virtual Box
Step2: Start the Linux shell in the Virtual box and install Linux shell to fill the necessary
instructions displayed on the screen.
Step3:Show the Guided storage Configuration and Click‘Done’
Step4: Set up the Profile and enter your details such as name, service name, user name and
Password
Step5: Installing System
Step6: Enter user name and password and press enter (note: password will not be visibile)
Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75
Result:
Thus, to Install Linux server on the Virtual Box and Install the ssh was installed and
executed Successfully.
[Link]
Use Fail 2 ban to scan log files and ban Ips that show the
DATE: malicious signs
Aim:
ToUseFail2BantoScanlogfilesandbanIPSthatshowthemalicious Signs.
Procedure:
Step1: Change the Network adapter to Bridged Adapter
Step2:Openubuntuserverandinstallfail2banusingthebelowcommand
Step3:[Link]
Step4:[Link],restartthefail2banservice
Step5:Checkthestatusoffail2banservice
Step6: Note the IP of ubuntu server
Step7: Open kali Linux and try brute forcing ssh login of ubuntu server using hydra
Thebruteforceattemptisdetectedbyfail2banandouripis blocked
Step8:Letsdisablefail2banandtrybruteforcing,
Step9: Now we can able to perform brute force successfully.
Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75
Result:
ThustouseFail2bantoscanlogfilesandBanIPSthatshowthemalicioussignswas executed
Successfully.
[Link]: 9
DATE: Launch brute-force attacks on the Linux server using Hydra
Aim:
To Launch the Brute-Force attacks on the Linux Server using Hydra
Procedure:
Step1: In ubuntu server and kali Linux, Check the network settings is configured with bridged
adapter
Step2: In ubuntu server, If open ssh-server is not installed during the time of server installation
then install with apt.
Step3: Now start the ssh service
Step4: Note the IP of ubuntu server
Step5: In kali Linux, create a word list contains passwords
Step6: Use hydra to brute force ssh login of ubuntu server.
$hydra-l<user>-P<wordlist file><IPofubuntuserver>ssh
Arguments
• l–user (user name for login in ubuntu server)
• P–wordlist file (contains passwords)
• ssh– protocol
Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75
Result:
ThustoLaunchBrute-ForceattacksontheLinuxserverusingHydrawasexecuted Successfully.
[Link]: 10
Performreal-time network traffic analysis and data pocket logging
DATE: using Snort
Aim:
To Perform real-time network traffic analysis and data pocket logging using snort.
Procedure:
Step1: Install the Snort tool by using the command
Step2: Note the IP and interface of the ubuntu server
SNIFFERMODE
Step3: To run snort in sniffer mode (capture packets)
Step4: Open kali Linux and ping the ubuntu server
Step5: In ubuntu server we can see the ICMP ECHO messages.
PACKETLOGGERMODE
Step6: Create a directory for logging
Step7: Now run Snort in packet logging mode and store the logs in the create directory
Step8: From kali Linux ping the ubuntu server
Step9: Press CTRL+C in ubuntu server to stop snort packet logger mode and move to log
directory
Step10: Use sudo command to logs in as root and Move to the directory named as IP of
kali Linux
Step11: Use cat command to view the logs of ICMP protocol
IDSMODE
Step12: Move to /etc. /snort
Create new rules file
Write the rule inside the rules file and save and exit (this rule will give alert when there is
a SSH packet is detected)
Come back to the/etc/snort and edit [Link] to add the new. Rules
Add the line to the [Link] file
Start the snort in IDS mode with the [Link] file
Now from kali Linux try to login the ubuntu server using ssh
Alert found in snort console
Marks Marks
Particular
Allocated Obtained
PERFORMANCE 50
RECORD 15
VIVA 10
TOTAL 75
Result:
ThustoPerformreal-timenetworktrafficanalysisanddatapocketloggingusingsnort was
executed Successfully.