Information and Network Security Lab: Lab Mannual FOR VII SEMESTER Computer Science & Engineering
Information and Network Security Lab: Lab Mannual FOR VII SEMESTER Computer Science & Engineering
By
Mrs. Seema J
Asst. Prof
Dept., of CSE
1. LEARN TO INSTALL WINE / VIRTUAL BOX OR ANY OTHER EQUIVALENT
SOFTWARE ON THE HOST OS.
Download the latest version of Sun Virtual Box from the website.
The installation steps are
1. Double Click on Virtual Box Executable File.
2. Welcome to the Oracle VM appears [Setup Wizard] Click Next.
3. Custom Setup Screen with all the features of VM appears Click Next.
4. Options to create shortcut on Desktop and Quick launch bar Click Next.
5. Ready to Install Click on Install button.
6. Click Finish Start Oracle VM Virtual Box.
And now install any kind of Operating Systems as Guest Operating System.
The Configuration of Guest OS is shown below.
Written by G.RAVINDARKUMAR [APT 365]
EXPERIMENT NO:1
PERFORM AN EXPERIMENT TO GRAB A BANNER WITH TELNET AND
PERFORM THE TASK USING NETCAT UTILITY.
Banner Grabbing is a technique to determine which application or service is running on the
specified port by attempting to make a connection to this host.
1. First Enable the TELNET service on your computer by typing the command given;
Type the command SERVICES.MSC in run command menu, Click on Telnet service and enable
the service, select it automatic and Click Start.
2. Open Command prompt and type the following ;
telnet www.rediff.com 80 (http port) and press enter key twice.
3. Now you can see the rediff website web server’s information.
4. You can also try it on your local machine connecting to your Guest OS like
telnet Guest IP address(example: 192.168.56.101) 80 and press enter twice.
5. The same Banner grabbing can also perform by the NETCAT utility available at
http://netcat.sourceforge.net the compressed file.
6. Extract on your local drive and perform the following in the command prompt;
Netcat www.rediff.com 80 (http port) and press enter twice to see the result.
7. Use the same procedure on Guest Operating System like
But before using netcat command please install the IIS (Internet Information
Server) from Add/Remove components on your Guest OS, then apply this;
Netcat –vv –n guest ip address(example: 192.168.56.101) 80 and press enter
twice to see the result.
-vv=verbose mode , -n=numerical IP address only.
EXPERIMENT NO:2
USING NMAP 1)FIND OPEN PORTS ON A SYSTEM 2) FIND THE MACHINES
WHICH ARE ACTIVE 3)FIND THE VERSION OF REMOTE OS ON OTHER
SYSTEMS 4)FIND THE VERSION OF S/W INSTALLED ON OTHER SYSTEM
1. Download Nmap from www.nmap.org and install the Nmap Software with WinPcap Driver
utility.
2. Execute the Nmap-Zenmap GUI tool from Program Menu or Desktop Icon.
3. Type the Target Machine IP Address(ie.Guest OS or any website Address)
4. Perform the profiles shown in the utility.
EXPERIMENT NO: 3
ERFORMA AN EXPERIMENT TO DEMONSTRATE HOW TO SNIFF FOR
ROUTER TRAFFIC BY USING THE TOOL WIRESHARK.
A packet sniffer, sometimes referred to as a network monitor or network analyzer, can be used
by a network or system administrator to monitor and troubleshoot network traffic. Using the
information captured by the packet sniffer an administrator can identify erroneous packets and
use the data to pinpoint bottlenecks and help maintain efficient network data transmission.
In its simple form a packet sniffer simply captures all of the packets of data that pass through
a given network interface. By placing a packet sniffer on a network in promiscuous mode, a
Malicious intruder can capture and analyze all of the network traffic.
Wireshark is a network packet analyzer. A network packet analyzer will try to capture
network packets and tries to display that packet data as detailed as possible.
2. Select interface: Goto capture option in menu bar and select interface
Start Caputuring
EXPERIMENT NO: 4
PERFORM AN EXPERIMENT HOW TO USE DUMPSEC.
Permission on Shares:
EXPERIMENT NO : 5
PERFORM AN WIRELESS AUDIT OF AN ACCESS POINT / ROUTER
AND DECRYPT WEP AND WPA.
NetStumbler (Network Stumbler) is one of the Wi-Fi hacking tool which only compatible
with windows, this tool also a freeware. With this program, we can search for wireless
network which open and infiltrate the network. Its having some compatibility and
network adapter issues.
This will open the decryption key managment window. As shown in the window you can
select between three decryption modes: None, Wireshark, and Driver:
EXPERIMENT NO: 6
PERFORM AN EXPERIMENT TO SNIFF TRAFFIC USING ARP POISONING.
Address Resolution Protocol (ARP) poisoning is a type of attack where the Media Access
Control [MAC] address by the attacker called spoofing. ARP poison routing uses the stored
cache as a way to reroute or redirect ;packets from a target, to an intermediate machine. Thus
MAN in MIDDLE watch the traffic between Source and Target machines.
To perform this Install CAIN and Abel tool and do the following:
Click on Sniffer menu.
Click on hosts on the button portion window.
Click Start sniffer and APR service from Standard toolbar menu.
Right Click on the hosts window and click on Scan MAC address.
Select all hosts in my subnet or range FROM and TO IP address and Click OK.
Now you view the MAC and IP address of Remote / Local machines.
Click on APR button on toolbar menu.
Left Click on right pane of APR window and then Click on ‘+’ symbol on standard
toolbar.
APR enables you to poison IP traffic between the selected host .
Click on any IP address on the left side list and the other IP selected on the right side.
Left Click on Right side on the IP address and Click OK.
Sniffer modesnort –v Print out the TCP/IP packets header on the screen
Snort –vd show the TCP/IP ICMP header with application data in transit.
Packet Logger mode snort –dev –l c:\log [create this directory in the C drive] and snort will
automatically know to go into packet logger mode, it collects every
packet it sees and places it in log directory.
snort –dev –l c:\log –h ipaddress/24 This rule tells snort that you want to
print out the data link and TCP/IP headers as well as application data
into the log directory.
snort –l c:\log –b This is binary mode logs everything into a single file.
Network Intrusion Detection System mode snort –d c:\log –h ipaddress/24 –c snort.conf This
is a configuration file applies rule to each packet
to decide it an action based upon the rule type in
the file.
Snort –d –h ipaddress/24 –l c:\log –c snort.conf
This will cnfigure snort to run in its most basic
NIDS form, logging packets that trigger rules
specifies in the snort.conf
Download SNORT from snort.org
Install snort with or without database support.
Rootkit is a stealth type of malicious software designed to hide the existence of certain process
from normal methods of detection and enables continued privileged access to a computer.
The Open SSL is command line binary can perform a wide range of cryptographic operation.
Install Open SSL setup file on to the default location.
Perform Full installation and Click Next.
Create Document shortcuts in start menu and Click Next
Complete the installation.
Execute the Open SSL from command prompt available at
C:\ProgramFiles\GnuWin32\OpenSSL\openssl.exe
openssl> (This is the Open SSL prompt)
Now execute the command as follows for password generation.
Passwd –crypt [type your password] This is limited to 8 characters password generator.
Passwd -1 [your password] This allows you to insert password length beyond 8
characters.
Type this command to generate 10-12 characters passwords of TEN numbers.
EXPERIMENT NO: 10
SETUP A HONEY POT AND MONITOR THE HONEYPOT ON NETWORK
Honey Pot is a device placed on Computer Network specifically designed to capture malicious
network traffic.
KF Sensor is the tool to setup as honeypot when KF Sensor is running it places a siren icon in the
windows system tray in the bottom right of the screen. If there are no alerts then green icon is
displayed.
ASYMMETRIC ALGORITHM
o Download Jcrypt tool from Cryptool Website and Install
o Open Jcrypt Software and Click on NEW text editior, type the text information into it.
o Click on the Algorithm menu bar and Select Asymmetric algorithm RSA for encryption.
o Click create a New KeyPair and type in the contact name[xxxxx] and enter the password and
confirm password, then Click finish again.
o The same output bin file to decrypt select RSA Algorithm and Click on Decrypt, Select
keyname you have declared earlier and Click Finish.
o Enter the password to Decrypt and see the output with original Decrypted text on the
Screen.
o SYMMETRIC ALGORITHM
o Click on Algorithm Menu bar Select SymmetricAES and Click on it.
o Click on create a new key, type contact name and enter the password and confirm, Click finish
Click finish again.
o Enter the password to open the output file.
o To Decrypt Select Algorithms SymmetricSelect the key which you have created and Click
Finish.
o Enter the password and see the result in output bin file with hexadecimal values and plain text.
HASH GENERATION
o Click on Algorithms, Click on HashSelect MD5Click Finish.
o Now view the output bin file HASH generated.
o Practice using SHA and SHA3 and verify the result on the screen.
DIGITAL SIGNATURE
o Click on algorithms, Click on Signature, Select DSA and Click on it.
o Select sign operation and Click on create a new key.
o Enter the password and save the file and Click finish.
o To verify Click on Algorithm, Click on Signature and Click DSA.
o Select verify operation, Click open and type the password and Click finish.
o The Signature file is opened and verified.
o IPCOP Linux is a complete Linux distribution. Its sole purpose is to protect the network. Its main
features are: IP table network filter, All types of Drive Support and Quad Network support such as
GREEN(Internal Trusted Network), BLUE(Wireless Semi-Trusted Network,
ORANGE(Demilitarized Zone for internet Access Servers, RED(The Internet)
o Installation Procedure as follows:
o Download IPCOP 2.0.2.iso from www.ipcop.org.
o Run Virtual Box on Host PC and add IPCOP.ISO file and Start the Installation.
The Bootup Screen appears hit enter key.
o Select Default English Language and Press Enter-Key
Select default US layout Keyboard and Press Enter-Key.
Select Asia/Calcutta and Press OK to proceed.
o Change the Date and Time if required and Press OK.
Select the disk installation default HDD and Press OK.
o Skip the restore windows by pressing skip option button.
o Now Disk installation is complete press on congratulation button.
Enter HOST name ipcop and Press OK.
o Domain Name local domain and Press OK.
o Select DHCP by pressing space bar key and Press OK.
o Select card assignment first as GREEN and second as RED and Press DONE.
]
o Press OK on DHCP server by Default.