Lab Project Portfolio Report
Lab Project Portfolio Report
Lab Project Portfolio Report
April 2015
Table of Contents
1. Project 1-1: Automatically Receive the Latest Security Information
5
2. Project 1-2: Detect and Install Software Updates Using Secunia
Personal Software Inspector (PSI)......................................................5
3. Project 1-3: Use an EULA Analyzer.................................................6
4. PC Tab Alarm Team System:...........................................................6
5. HDD wipe software:........................................................................7
6. Project 2-1: Block a USB Drive.......................................................7
7. Project 2-3: Use a Software Key logger..........................................8
8. Windows File backup:.....................................................................8
9. aeCERT Services:............................................................................9
10.Internet Explorer Security Zones:.................................................9
11.Project 3-2: Set Web Browser Security........................................10
12.Project 3-4: ARP Poisoning..........................................................11
13.Project 3-5: Create an HTTP Header............................................12
14.Project 3-5: Manage Flash Cookies.............................................13
15.Stealth Signal Transmitter software:...........................................13
16.Spy& Sniffer Software:................................................................13
17.Project 5-1: Setting Windows 7 Local Security Policy:.................14
18.Project 5-2: Viewing Windows 7 Firewall Settings.......................15
19.Project 5-3: Viewing Logs using the Microsoft Windows Event
Viewer..............................................................................................15
20.Project 5-4: Creating a Custom View in Microsoft Windows Event
Viewer..............................................................................................16
21.Project 6-2: Using an Internet Content Filter...............................16
22.Project 10-1: Download and Install a Password Management
Application.......................................................................................17
23.Project 10-2: Download and Install a Browser-Based Password
Management Application.................................................................17
24.Project 10-3: Using a Browser-Based Password Management
Application.......................................................................................18
25.Project 10-4: Use Cognitive Biometrics.......................................18
26.Project 10-5& 10-6: Creating and Using OpenID Account...........18
27.Project 11-4: Using Microsoft Encrypting File System (EFS)........19
28.Project 11-5: Using TrueCrypt.....................................................19
Table of Figures
Figure 1-1: Google Reader discontinued...................................................5
Figure 1-2: RSS feed viewed in MS Outlook..............................................5
Figure 2-1: Secunia PSI update scanning report........................................5
Figure 3-1: Windows 8.1 Pro license analysis............................................6
Figure 6-1: thumbscrew system tray (USB writing blocked)......................7
Figure 6-2: Windows 8 Local group policy (Removable Storage Access). .7
Figure 7-1: Kaspersky Endpoint Protection stopped downloading the exe
file............................................................................................................... 8
Figure 8-1: Windows backup Utility turned-on..........................................8
Figure 8-2 : windows backup events in event viewer................................8
Figure 8-3: advanced setting for windows backup utility..........................8
Figure 10-1: Internet Explorer Security Zones........................................10
Figure 11-1: Specific (Skype) IE Add-on information...............................10
Figure 11-2: Delete browsing history in IE..............................................10
Figure 11-3: bad.com before restricting it in IE.......................................11
Figure 11-4: IE Privacy levels..................................................................11
Figure 11-5: bad.com after restricting it in IE.........................................11
Figure 11-6: IE history files and last checked state................................11
Figure 12-1: arp-a command to state ARP table.....................................11
Figure 12-2: Default gateway IP address.................................................11
Figure 12-3: Deleting ARP entry by ARP d command............................12
Figure 12-4: running cmd console under UAC (windows8.1)...................12
Figure 13-1: Generated HTTP header and response................................12
Figure 13-2: Error retuned with httpdebugger.com.................................12
Figure 14-1: Global Privacy Settings panel..............................................13
Figure 16-1: WebWatcher website..........................................................14
Figure 16-1: Local Security Policy MMC...................................................14
Figure 18-1: new access rule created n windows firewall console...........15
Figure 19-1: DHCP event incident...........................................................15
Figure 19-2: Windows 8.1 Event Viewer summary page.........................15
Figure 20-1: Event Viewer custom view..................................................16
Figure 21-1: google.com had been blocked by K9 web protection..........16
Figure 22-1: Keepass used to open saved URL and copy password
without memorizing it...............................................................................17
Figure 23-1: Exploring LastPass Videos...................................................17
Figure 23-2: LastPass Vault.....................................................................17
Figure 24-1: passfaces.com demo completed.........................................18
Figure 25-1: OpenID created...................................................................18
Figure 26-2: OpenID used to access scribblelive.com, (Unsuccessful)....18
Figure 26-3: OpenID accessed livejournal.com.......................................18
Figure 27-1: Encrypted and unencrypted word documents.....................19
Figure 28-1: TruCrypt end of life..............................................................19
Figure 29-1: BitLocker recovery key........................................................20
Figure 29-2: BitLocker encryption...........................................................20
Figure 30-1: Ultimate Zip Cracker, installed............................................20
Figure 31-1: Microsoft Office (word) Trust Center....................................20
Figure 32-1: Microsoft Office (word) Trust Center....................................21
Figure 34-1: Hushmail sent inbox............................................................21
Figure 34-2: ZUmail inbox from Hushmail...............................................21
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
2.
9.aeCERT Services:
According
website, their services are (aeCERT Services, 2015):
to
aeCERT
Trusted
sites
zone. The
Trusted sites zone can include
all Internet sites that you know
are trusted. For example, the
Trusted
sites
zone
might
contain corporate subsidiaries'
sites or the site of a trusted
.business partner
Internet
zone. The
Internet
Figure 101: Internet Explorer Security Zones. zone includes all sites on the
that
Worth to
mention
these
15.
22.
P
r
o
j
e
c
t
Figure 221: Keepass used to open saved URL and copy password without memorizing it
23. Project 10-2: Download and Install a BrowserBased Password Management Application
Basics of using LastPass had had been explored along with
How to Automatically Fill Webpage Forms with 1 Click videos.
The main objective is to eliminate security risk of opening password
management program and use automatic option of retrieving
passwords from web browser based password managers.
26.
10-
Project 10-5&
6: Creating and
Using OpenID
Account
"TrueCrypt is a discontinued
source-available freeware utility used
for on-the-fly encryption (OTFE). It can
create a virtual encrypted disk within a
file or encrypt a partition or (under
Microsoft Windows except Windows 8
with GPT) the entire storage device."
(Wikipedia: TrueCrypt, 2015) TrueCrypt
is alternative to Windows EFS for
protecting user files (Ciampa, 2012).
TrueCrypt is longer supported since May Figure 281: TruCrypt end of life
2014 also TrueCrypt was no longer secure (TrueCrypt, 2015). For the
previous reasons I chose to do Project 11-5 and do Bit Locker exercise
e instead, project 11-6.
30.
Ultimate Zip Cracker:
I will skip this exercise even I tried working with the software,
which I installed.
34. Hushmail:
Created email successfully but I was tried it. Unfortunately,
the results was not the same as mention from supplementary
document. The received message to ZU Mail with fully readable and
there is no way to confirm the encryption rather than trust the site
itself.
35.
35.
35.
PGP:
Simply, did work with newer version of windows. In addition, I
did not get time to start with Dr. Maurice recommendation or
use virtual PC edition.
37.Verisign:
VeriSign Authentication
Services, now part of Symantec Corp.
(NASDAQ: SYMC), provides solutions
that allow companies and consumers
to engage in communications and
commerce online with confidence.
(Verisign, 2015)
39.
o
c
Pr
je
t
12-2: Viewing
Digital Certificates Revocation Lists (CRL) and
Untrusted Certificates
40.
Project 123:
Figure 392: CRL Certificate
Downloading and Installing Digital Certificate
Figure 391: untrusted certificate
FigureFigure
413: using
to sign email
outgoing email
411private
: sealedkey
incoming
Figure 412: extra information for my email receiver
References
aeCERT Services. (2015). Retrieved from Computer Emergency
Response Team: http://aecert.ae/en/section/services
BioID. (2015, May 4). Retrieved from BioID: https://www.bioid.com/
BIO-key. (2015, May 4). Retrieved from BIO-key: http://www.biokey.com/
Biotacker. (2015, May 4). Retrieved from Plurilock:
https://www.plurilock.com/products/biotracker/
Brad, C. (2012, Septemper 3). How to securely erase your hard
drive. Retrieved from PC world:
http://www.pcworld.com/article/261702/how_to_securely_eras
e_your_hard_drive.html
Ciampa, M. (2012). Malware And Social Engineering Attacks. In M.
Ciampa, Security+ Guide to Network Security Fundamentals
(p. 48). Course Technology.
Free computer security. (2015). Retrieved from Secunia:
http://secunia.com/vulnerability_scanning/personal/
Microsoft Internet Explorer 6 Resource Kit. (2015). Retrieved from
Chapter 4 - Security Zones: https://technet.microsoft.com/enus/library/dd361896.aspx
PC Tab Alarm System. (2015). Retrieved from Computer Security:
http://www.computersecurity.com/pctab/
Rouse, M. (2015, April 23). Sniffer. Retrieved from TechTarget:
http://searchnetworking.techtarget.com/definition/sniffer
Spy Software. (2015, April 23). Retrieved from Employe Monitor
System: http://hidetools.com/spy_software.html
Stealth Signal Asset Recovery. (2006, June 7). Retrieved from
Computer Security Products, Inc.:
https://www.computersecurity.com/pdf/Stealth_Signal.pdf
Stealth Signal for Mac OS & Mac OS X. (2015, April 23). Retrieved
from Macintosh Security Site:
https://www.securemac.com/stealthsignalservice.php
Technet. (2014, Septemper 17). Trust Center settings for Office
2013. Retrieved from Microsoft Technet:
https://technet.microsoft.com/en-us/library/dn166703.aspx
TrueCrypt. (2015, May 3). Retrieved from TrueCrypt:
http://truecrypt.sourceforge.net/