Create README.md
Browse files
README.md
CHANGED
|
@@ -1,3 +1,141 @@
|
|
| 1 |
-
---
|
| 2 |
-
license: mit
|
| 3 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
---
|
| 2 |
+
license: mit
|
| 3 |
+
language:
|
| 4 |
+
- en
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Data and Network Security Virtual Machine Lab Environment
|
| 8 |
+
|
| 9 |
+
This document provides a comprehensive guide for students using the virtual machine (VM) environment designed for the "Data and Network Security" course at UMPSA. This VM contains necessary tools and pre-configured virtual machines to facilitate practical learning of various security concepts and techniques.
|
| 10 |
+
|
| 11 |
+
## Introduction
|
| 12 |
+
|
| 13 |
+
This lab setup is designed to help you gain hands-on experience with data and network security principles. It includes a main Virtual Machine (VM) containing necessary files and a set of pre-configured virtual machines for different operating systems to perform various tasks, including penetration testing, network analysis, and understanding different system vulnerabilities.
|
| 14 |
+
|
| 15 |
+
## Virtual Machine Structure
|
| 16 |
+
|
| 17 |
+
### VirtualBox VMs
|
| 18 |
+
|
| 19 |
+
The main VM is configured to launch VirtualBox, and inside the VirtualBox manager you will find the following pre-configured VMs, which will be used for penetration testing and exploration.
|
| 20 |
+
* **Pentest Machine:**
|
| 21 |
+
* **OS:** Kali Linux 2023
|
| 22 |
+
* **OS:** Windows Pro Attacker
|
| 23 |
+
* **Windows Machine:**
|
| 24 |
+
* **OS:** Windows 7 Pro x64
|
| 25 |
+
|
| 26 |
+
## Lab Instructions and Assignments
|
| 27 |
+
|
| 28 |
+
The tasks that students need to complete for this module have been designed in a comprehensive manner, encompassing various aspects of computer and network security. All the work must be done inside the main VM environment unless instructed otherwise.
|
| 29 |
+
|
| 30 |
+
### Task 1: Cybersecurity Attack Analysis
|
| 31 |
+
|
| 32 |
+
1. **Attack Data Collection**:
|
| 33 |
+
* Find around five significant cybersecurity attacks, whether for a month, a year, or several years of data. Provide a credible source for your attack data.
|
| 34 |
+
* You can find an example inside the task, but it is imperative to find an updated one.
|
| 35 |
+
2. **Data Processing in Microsoft Excel:**
|
| 36 |
+
* Using the data gathered, perform calculations and generate graphs using Microsoft Excel.
|
| 37 |
+
* List total attacks for each category, generate graphs, identify the highest attack, and explain why this attack is most common.
|
| 38 |
+
* Create a public awareness statement on how to prevent such attacks, providing five actions to users.
|
| 39 |
+
3. **Analysis of Computer Crimes Act (CCA):**
|
| 40 |
+
* Explore the Computer Crime Act 1997 from the provided link and identify the number of parts in CCA.
|
| 41 |
+
* List all the offences covered in CCA and identify under which offence does the highest attack you found fall.
|
| 42 |
+
* Provide a justification for your answer based on your findings.
|
| 43 |
+
|
| 44 |
+
### Task 2: Cryptography Ciphers
|
| 45 |
+
|
| 46 |
+
1. **Cipher Implementations**:
|
| 47 |
+
* Encrypt the plaintext "WE LOVE INFORMATION SECURITY" using the following ciphers:
|
| 48 |
+
* Caesar cipher
|
| 49 |
+
* Playfair cipher (key: "BALL")
|
| 50 |
+
* Vigenere cipher (key: "START")
|
| 51 |
+
* Rail fence cipher (key: 4)
|
| 52 |
+
* Transposition cipher (key: 31524)
|
| 53 |
+
* RSA algorithm (p=5, q=11, public key e=7)
|
| 54 |
+
* Diffie-Hellman protocol with monoalphabetic substitution
|
| 55 |
+
2. **Documentation:**
|
| 56 |
+
* Provide the details step by step on how you encrypt and decrypt the provided plaintext.
|
| 57 |
+
3. **Cryptography Code**
|
| 58 |
+
* Implement the encryption and decryption process using any programming language.
|
| 59 |
+
* Include pseudocode, algorithm, and screenshots of the executed code along with the outputs, explaining each step.
|
| 60 |
+
|
| 61 |
+
### Task 3: Malware Analysis
|
| 62 |
+
|
| 63 |
+
1. **Malware Research**:
|
| 64 |
+
* Investigate the following types of malware:
|
| 65 |
+
* Adware
|
| 66 |
+
* Spyware
|
| 67 |
+
* Scareware
|
| 68 |
+
* Crapware
|
| 69 |
+
* Roughware
|
| 70 |
+
2. **Documentation:**
|
| 71 |
+
* Describe each malware type.
|
| 72 |
+
* Explain how you can get it and what it can do to a computer.
|
| 73 |
+
3. **Table Creation**:
|
| 74 |
+
* Create a table including a column with the following elements:
|
| 75 |
+
* Malware
|
| 76 |
+
* Focus of attack
|
| 77 |
+
* Threat agent
|
| 78 |
+
* Symptoms
|
| 79 |
+
* One real attack case (Name, Date, and Other Related Info)
|
| 80 |
+
|
| 81 |
+
### Task 4: Exploitation and Vulnerability Scanning
|
| 82 |
+
|
| 83 |
+
1. **Metasploit Exploitation**:
|
| 84 |
+
* Identify and run three exploits on a Windows 7 VM using Metasploit.
|
| 85 |
+
* Document each step with screenshots and explain the purpose and functionality of each exploit.
|
| 86 |
+
2. **Web Vulnerability Scanning**:
|
| 87 |
+
* Explore Kali Linux and find two suitable tools or scripts for performing vulnerability scans on a web server.
|
| 88 |
+
* Use the XAMPP Web Server within your Windows VM.
|
| 89 |
+
* Document the process, analyze the results, and make a comparison of your tools, including screenshots.
|
| 90 |
+
|
| 91 |
+
### Task 5: Firewall Implementation
|
| 92 |
+
|
| 93 |
+
1. **Third-Party Firewall Setup**:
|
| 94 |
+
* Search the internet for and download any third-party firewall.
|
| 95 |
+
* Install it on your Windows 7 VM, and ensure the built-in Windows Firewall is off.
|
| 96 |
+
2. **Exploit Testing**:
|
| 97 |
+
* Run the three exploits from Task 4 again, verify they succeed without firewall intervention.
|
| 98 |
+
3. **Firewall Configuration**:
|
| 99 |
+
* Configure the third-party firewall to block the exploits from succeeding.
|
| 100 |
+
* Provide screenshots of firewall logs confirming that attacks were stopped.
|
| 101 |
+
|
| 102 |
+
### Task 6: Wireless Network Analysis and Access Point Security
|
| 103 |
+
|
| 104 |
+
1. **Wi-Fi Hotspot Setup**:
|
| 105 |
+
* Create and set up a Wi-Fi hotspot on your computer using a wireless connection.
|
| 106 |
+
* Connect a phone to this Wi-Fi hotspot.
|
| 107 |
+
* Provide step-by-step screenshots showing all configuration settings and network connections.
|
| 108 |
+
2. **Network Analysis with Wireshark**:
|
| 109 |
+
* Run Wireshark on your computer and capture network traffic from the Wi-Fi hotspot.
|
| 110 |
+
* Try to log into the e-banking system, UMPSA’s Kalam website, and http://testphp.vulnweb.com/login.php using your phone.
|
| 111 |
+
* Stop the Wireshark capture and analyze the data.
|
| 112 |
+
* Document all findings, including any clear text transfer of credentials, from your capture.
|
| 113 |
+
3. **Access Point Suggestion**:
|
| 114 |
+
* Recommend a secure wireless access point for a home environment. Justify the choice based on its security features and functionalities.
|
| 115 |
+
* Provide references for your selected device.
|
| 116 |
+
|
| 117 |
+
## VM Access Information
|
| 118 |
+
|
| 119 |
+
* **Windows 7 Attacker VM Password:** `1q2w3e4r5t`
|
| 120 |
+
|
| 121 |
+
## Important Notes
|
| 122 |
+
|
| 123 |
+
* All lab exercises are to be done individually.
|
| 124 |
+
* Ensure you thoroughly document each step, including screenshots and explanations, as required.
|
| 125 |
+
* The lab assignments will be evaluated based on learning outcome of CO2, "Construct and organize attack and defence methods into computer and network environments."
|
| 126 |
+
* Pay attention to the detailed tasks described above, as each one has specific instructions that need to be followed closely.
|
| 127 |
+
* Do all of the work on the main VM (Ubuntu) unless instructed otherwise to complete the tasks.
|
| 128 |
+
* All the reports must be written inside the VM environment using the application installed inside the main VM.
|
| 129 |
+
|
| 130 |
+
## Submission Guidelines
|
| 131 |
+
|
| 132 |
+
* Submit your work in a single PDF file.
|
| 133 |
+
* Ensure your front page contains your name, matrix ID, lecture name, and submission date.
|
| 134 |
+
* Each task should be addressed in the order mentioned above, showing all steps from the beginning until the conclusion.
|
| 135 |
+
* References should be clearly listed at the end of the report.
|
| 136 |
+
* Submit your work within the time limits provided by your lecturer.
|
| 137 |
+
* Make sure to fully understand each task by first reading this document carefully, in order to complete all lab assignments successfully.
|
| 138 |
+
|
| 139 |
+
## License
|
| 140 |
+
|
| 141 |
+
This project is licensed under the MIT License.
|