IRedDragonICY commited on
Commit
5cdfbfe
·
verified ·
1 Parent(s): c0bc1ce

Create README.md

Browse files
Files changed (1) hide show
  1. README.md +141 -3
README.md CHANGED
@@ -1,3 +1,141 @@
1
- ---
2
- license: mit
3
- ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ license: mit
3
+ language:
4
+ - en
5
+ ---
6
+
7
+ # Data and Network Security Virtual Machine Lab Environment
8
+
9
+ This document provides a comprehensive guide for students using the virtual machine (VM) environment designed for the "Data and Network Security" course at UMPSA. This VM contains necessary tools and pre-configured virtual machines to facilitate practical learning of various security concepts and techniques.
10
+
11
+ ## Introduction
12
+
13
+ This lab setup is designed to help you gain hands-on experience with data and network security principles. It includes a main Virtual Machine (VM) containing necessary files and a set of pre-configured virtual machines for different operating systems to perform various tasks, including penetration testing, network analysis, and understanding different system vulnerabilities.
14
+
15
+ ## Virtual Machine Structure
16
+
17
+ ### VirtualBox VMs
18
+
19
+ The main VM is configured to launch VirtualBox, and inside the VirtualBox manager you will find the following pre-configured VMs, which will be used for penetration testing and exploration.
20
+ * **Pentest Machine:**
21
+ * **OS:** Kali Linux 2023
22
+ * **OS:** Windows Pro Attacker
23
+ * **Windows Machine:**
24
+ * **OS:** Windows 7 Pro x64
25
+
26
+ ## Lab Instructions and Assignments
27
+
28
+ The tasks that students need to complete for this module have been designed in a comprehensive manner, encompassing various aspects of computer and network security. All the work must be done inside the main VM environment unless instructed otherwise.
29
+
30
+ ### Task 1: Cybersecurity Attack Analysis
31
+
32
+ 1. **Attack Data Collection**:
33
+ * Find around five significant cybersecurity attacks, whether for a month, a year, or several years of data. Provide a credible source for your attack data.
34
+ * You can find an example inside the task, but it is imperative to find an updated one.
35
+ 2. **Data Processing in Microsoft Excel:**
36
+ * Using the data gathered, perform calculations and generate graphs using Microsoft Excel.
37
+ * List total attacks for each category, generate graphs, identify the highest attack, and explain why this attack is most common.
38
+ * Create a public awareness statement on how to prevent such attacks, providing five actions to users.
39
+ 3. **Analysis of Computer Crimes Act (CCA):**
40
+ * Explore the Computer Crime Act 1997 from the provided link and identify the number of parts in CCA.
41
+ * List all the offences covered in CCA and identify under which offence does the highest attack you found fall.
42
+ * Provide a justification for your answer based on your findings.
43
+
44
+ ### Task 2: Cryptography Ciphers
45
+
46
+ 1. **Cipher Implementations**:
47
+ * Encrypt the plaintext "WE LOVE INFORMATION SECURITY" using the following ciphers:
48
+ * Caesar cipher
49
+ * Playfair cipher (key: "BALL")
50
+ * Vigenere cipher (key: "START")
51
+ * Rail fence cipher (key: 4)
52
+ * Transposition cipher (key: 31524)
53
+ * RSA algorithm (p=5, q=11, public key e=7)
54
+ * Diffie-Hellman protocol with monoalphabetic substitution
55
+ 2. **Documentation:**
56
+ * Provide the details step by step on how you encrypt and decrypt the provided plaintext.
57
+ 3. **Cryptography Code**
58
+ * Implement the encryption and decryption process using any programming language.
59
+ * Include pseudocode, algorithm, and screenshots of the executed code along with the outputs, explaining each step.
60
+
61
+ ### Task 3: Malware Analysis
62
+
63
+ 1. **Malware Research**:
64
+ * Investigate the following types of malware:
65
+ * Adware
66
+ * Spyware
67
+ * Scareware
68
+ * Crapware
69
+ * Roughware
70
+ 2. **Documentation:**
71
+ * Describe each malware type.
72
+ * Explain how you can get it and what it can do to a computer.
73
+ 3. **Table Creation**:
74
+ * Create a table including a column with the following elements:
75
+ * Malware
76
+ * Focus of attack
77
+ * Threat agent
78
+ * Symptoms
79
+ * One real attack case (Name, Date, and Other Related Info)
80
+
81
+ ### Task 4: Exploitation and Vulnerability Scanning
82
+
83
+ 1. **Metasploit Exploitation**:
84
+ * Identify and run three exploits on a Windows 7 VM using Metasploit.
85
+ * Document each step with screenshots and explain the purpose and functionality of each exploit.
86
+ 2. **Web Vulnerability Scanning**:
87
+ * Explore Kali Linux and find two suitable tools or scripts for performing vulnerability scans on a web server.
88
+ * Use the XAMPP Web Server within your Windows VM.
89
+ * Document the process, analyze the results, and make a comparison of your tools, including screenshots.
90
+
91
+ ### Task 5: Firewall Implementation
92
+
93
+ 1. **Third-Party Firewall Setup**:
94
+ * Search the internet for and download any third-party firewall.
95
+ * Install it on your Windows 7 VM, and ensure the built-in Windows Firewall is off.
96
+ 2. **Exploit Testing**:
97
+ * Run the three exploits from Task 4 again, verify they succeed without firewall intervention.
98
+ 3. **Firewall Configuration**:
99
+ * Configure the third-party firewall to block the exploits from succeeding.
100
+ * Provide screenshots of firewall logs confirming that attacks were stopped.
101
+
102
+ ### Task 6: Wireless Network Analysis and Access Point Security
103
+
104
+ 1. **Wi-Fi Hotspot Setup**:
105
+ * Create and set up a Wi-Fi hotspot on your computer using a wireless connection.
106
+ * Connect a phone to this Wi-Fi hotspot.
107
+ * Provide step-by-step screenshots showing all configuration settings and network connections.
108
+ 2. **Network Analysis with Wireshark**:
109
+ * Run Wireshark on your computer and capture network traffic from the Wi-Fi hotspot.
110
+ * Try to log into the e-banking system, UMPSA’s Kalam website, and http://testphp.vulnweb.com/login.php using your phone.
111
+ * Stop the Wireshark capture and analyze the data.
112
+ * Document all findings, including any clear text transfer of credentials, from your capture.
113
+ 3. **Access Point Suggestion**:
114
+ * Recommend a secure wireless access point for a home environment. Justify the choice based on its security features and functionalities.
115
+ * Provide references for your selected device.
116
+
117
+ ## VM Access Information
118
+
119
+ * **Windows 7 Attacker VM Password:** `1q2w3e4r5t`
120
+
121
+ ## Important Notes
122
+
123
+ * All lab exercises are to be done individually.
124
+ * Ensure you thoroughly document each step, including screenshots and explanations, as required.
125
+ * The lab assignments will be evaluated based on learning outcome of CO2, "Construct and organize attack and defence methods into computer and network environments."
126
+ * Pay attention to the detailed tasks described above, as each one has specific instructions that need to be followed closely.
127
+ * Do all of the work on the main VM (Ubuntu) unless instructed otherwise to complete the tasks.
128
+ * All the reports must be written inside the VM environment using the application installed inside the main VM.
129
+
130
+ ## Submission Guidelines
131
+
132
+ * Submit your work in a single PDF file.
133
+ * Ensure your front page contains your name, matrix ID, lecture name, and submission date.
134
+ * Each task should be addressed in the order mentioned above, showing all steps from the beginning until the conclusion.
135
+ * References should be clearly listed at the end of the report.
136
+ * Submit your work within the time limits provided by your lecturer.
137
+ * Make sure to fully understand each task by first reading this document carefully, in order to complete all lab assignments successfully.
138
+
139
+ ## License
140
+
141
+ This project is licensed under the MIT License.