--- license: mit language: - en --- # Data and Network Security Virtual Machine Lab Environment This document provides a comprehensive guide for students using the virtual machine (VM) environment designed for the "Data and Network Security" course at UMPSA. This VM contains necessary tools and pre-configured virtual machines to facilitate practical learning of various security concepts and techniques. ## Introduction This lab setup is designed to help you gain hands-on experience with data and network security principles. It includes a main Virtual Machine (VM) containing necessary files and a set of pre-configured virtual machines for different operating systems to perform various tasks, including penetration testing, network analysis, and understanding different system vulnerabilities. ## Virtual Machine Structure ### VirtualBox VMs The main VM is configured to launch VirtualBox, and inside the VirtualBox manager you will find the following pre-configured VMs, which will be used for penetration testing and exploration. * **Pentest Machine:** * **OS:** Kali Linux 2023 * **OS:** Windows Pro Attacker * **Windows Machine:** * **OS:** Windows 7 Pro x64 ## Lab Instructions and Assignments The tasks that students need to complete for this module have been designed in a comprehensive manner, encompassing various aspects of computer and network security. All the work must be done inside the main VM environment unless instructed otherwise. **Lecture Name:** Mr. Syahrizal Azmir Bin Md. Sharif ### Task 1: Cybersecurity Attack Analysis 1. **Attack Data Collection**: * Find around five significant cybersecurity attacks, whether for a month, a year, or several years of data. Provide a credible source for your attack data. * You can find an example inside the task, but it is imperative to find an updated one. 2. **Data Processing in Microsoft Excel:** * Using the data gathered, perform calculations and generate graphs using Microsoft Excel. * List total attacks for each category, generate graphs, identify the highest attack, and explain why this attack is most common. * Create a public awareness statement on how to prevent such attacks, providing five actions to users. 3. **Analysis of Computer Crimes Act (CCA):** * Explore the Computer Crime Act 1997 from the provided link and identify the number of parts in CCA. * List all the offences covered in CCA and identify under which offence does the highest attack you found fall. * Provide a justification for your answer based on your findings. ### Task 2: Cryptography Ciphers 1. **Cipher Implementations**: * Encrypt the plaintext "WE LOVE INFORMATION SECURITY" using the following ciphers: * Caesar cipher * Playfair cipher (key: "BALL") * Vigenere cipher (key: "START") * Rail fence cipher (key: 4) * Transposition cipher (key: 31524) * RSA algorithm (p=5, q=11, public key e=7) * Diffie-Hellman protocol with monoalphabetic substitution 2. **Documentation:** * Provide the details step by step on how you encrypt and decrypt the provided plaintext. 3. **Cryptography Code** * Implement the encryption and decryption process using any programming language. * Include pseudocode, algorithm, and screenshots of the executed code along with the outputs, explaining each step. ### Task 3: Malware Analysis 1. **Malware Research**: * Investigate the following types of malware: * Adware * Spyware * Scareware * Crapware * Roughware 2. **Documentation:** * Describe each malware type. * Explain how you can get it and what it can do to a computer. 3. **Table Creation**: * Create a table including a column with the following elements: * Malware * Focus of attack * Threat agent * Symptoms * One real attack case (Name, Date, and Other Related Info) ### Task 4: Exploitation and Vulnerability Scanning 1. **Metasploit Exploitation**: * Identify and run three exploits on a Windows 7 VM using Metasploit. * Document each step with screenshots and explain the purpose and functionality of each exploit. 2. **Web Vulnerability Scanning**: * Explore Kali Linux and find two suitable tools or scripts for performing vulnerability scans on a web server. * Use the XAMPP Web Server within your Windows VM. * Document the process, analyze the results, and make a comparison of your tools, including screenshots. ### Task 5: Firewall Implementation 1. **Third-Party Firewall Setup**: * Search the internet for and download any third-party firewall. * Install it on your Windows 7 VM, and ensure the built-in Windows Firewall is off. 2. **Exploit Testing**: * Run the three exploits from Task 4 again, verify they succeed without firewall intervention. 3. **Firewall Configuration**: * Configure the third-party firewall to block the exploits from succeeding. * Provide screenshots of firewall logs confirming that attacks were stopped. ### Task 6: Wireless Network Analysis and Access Point Security 1. **Wi-Fi Hotspot Setup**: * Create and set up a Wi-Fi hotspot on your computer using a wireless connection. * Connect a phone to this Wi-Fi hotspot. * Provide step-by-step screenshots showing all configuration settings and network connections. 2. **Network Analysis with Wireshark**: * Run Wireshark on your computer and capture network traffic from the Wi-Fi hotspot. * Try to log into the e-banking system, UMPSA’s Kalam website, and http://testphp.vulnweb.com/login.php using your phone. * Stop the Wireshark capture and analyze the data. * Document all findings, including any clear text transfer of credentials, from your capture. 3. **Access Point Suggestion**: * Recommend a secure wireless access point for a home environment. Justify the choice based on its security features and functionalities. * Provide references for your selected device. ## VM Access Information * **Windows 7 Attacker VM Password:** `1q2w3e4r5t` ## Important Notes * All lab exercises are to be done individually. * Ensure you thoroughly document each step, including screenshots and explanations, as required. * The lab assignments will be evaluated based on learning outcome of CO2, "Construct and organize attack and defence methods into computer and network environments." * Pay attention to the detailed tasks described above, as each one has specific instructions that need to be followed closely. * Do all of the work on the main VM (Ubuntu) unless instructed otherwise to complete the tasks. * All the reports must be written inside the VM environment using the application installed inside the main VM. ## Submission Guidelines * Submit your work in a single PDF file. * Ensure your front page contains your name, matrix ID, lecture name (**Mr. Syahrizal Azmir Bin Md. Sharif**), and submission date. * Each task should be addressed in the order mentioned above, showing all steps from the beginning until the conclusion. * References should be clearly listed at the end of the report. * Submit your work within the time limits provided by your lecturer. * Make sure to fully understand each task by first reading this document carefully, in order to complete all lab assignments successfully. ## License This project is licensed under the MIT License.