Network Security Lab
Network Security Lab
Security
Lab Manual
ii
Network Security
Lab Manual
CSL383
Dr. Shilpa Mahajan
Department of Computer Science and Engineering
NorthCap University, Gurugram- 122001, India
Session 2020-21
Published by:
School of Engineering and Technology
Department of Computer Science & Engineering
The NorthCap University Gurugram
• Laboratory Manual is for Internal Circulation only
© Copyright Reserved
No part of this Practical Record Book may be
iii
Authors
The NorthCap University
Gurugram, India
iv
CONTENTS
S.N. Details Page No.
Syllabus
1 Introduction
2 Lab Requirement
3 General Instructions
4 List of Experiments
5 Rubrics
6 Annexure 1 (Format of Lab Report)
v
Syllabus
1. Department:
Department of Computer Science and Engineering
8. Frequency of offering (check one): Odd ü Even Either semester Every semester
9. Brief Syllabus:
This course delivers the technical knowledge, insight, and hands-on training students need to identify attacks
on network with confidence. This course covers various aspects of network security including security
issues in different layers of networks, intrusion detection, prevention and defense against cyber-attacks.
Students will be guided through a series of laboratories and experiments in order to understand and analyze
different attack/defend scenarios and determine the effectiveness of particular defense deployments against
attacks
Total lecture, Tutorial and Practical Hours for this course (Take 15 teaching weeks per semester): 90
Practice
Lectures: 30 hours
Tutorials : _0_ hours Lab Work: 60 hours
Understanding security architectures, protocols and services in both wired and wireless
CO 1
networks
Content Summary:
Active and passive Network Reconnaissance-Wireshark, TCPDump , Netdiscover , Shodan ,NESSUS,Hping3 NSE
Scripts- Introduction, How to write and read NSE script, TCP session Hijacking, UDP session Hijacking,HTTP
Session Hijacking, Spoofing basics- IP, DNS and ARP Spoofing, Route Table Modification, How to
add/delete/update routing table, Man in Middle Attacks, Denial of Service Attacks
Content Summary:
IP Security Overview, IPSec Architecture, Authentication Header, Encapsulating Security Payload, Security
Associations and Key Management, VPN Concept and its configuration, AAA Concept, RADIUS, TACACS+
technologies, SSL architecture and protocol, Transport layer security , HTTPS Working
Content Summary:
Wireless networks, WPA Handshaking, Wireless hacking tools, IDPS introduction , Uses of IDPS
Technologies, Key functions of IDPS Technologies , Signature Based Detection , Anomaly Based
Detection, Types of IDPS Technologies. Snort Commands and Rule formation and implementation
.
12. Brief Description of Self-learning components by students (through books/resource material etc.):
https://portswigger.net/burp
https://www.cybersecuritycasestudies.com/
https://www.calyptix.com/top-threats/biggest-cyber-attacks-2017-happened/
2. Ryan Russell, " Hack Proofing your network ", Wiley,2nd Edition,2002
Reference Books:
1. Karen Scarf one, “Guide to Intrusion and prevention System”, NIST Special Publication, 2nd Edition,2007
Reference Websites:
• https://nptel.ac.in/syllabus/syllabus.php?subjectId=106105031
• https://www.cybrary.it/course/security-for-beginners/
• https://www.udemy.com/topic/Network-Security/
• https://www.coursera.org/courses?query=network%20security
• https://www.edx.org/learn/network-security
viii
eBooks:
• https://www.pdfdrive.com/network-security-books.html
• https://www.pdfdrive.com/hacking-exposed-7-network-security-secrets-solutions-seventh-edition-
e37530888.html
• https://www.engineeringbookspdf.com/network-security-tutorial/
ix
1. INTRODUCTION
That ‘learning is a continuous process’ cannot be over emphasized. The theoretical
knowledge gained during lecture sessions need to be strengthened through practical
experimentation. Thus practical makes an integral part of a learning process.
The purpose of conducting these experiments can be stated as follows;
1. To familiarize the students with the concepts, of securing the network and give practical
oriented assignments for better understanding.
2. The lab sessions will be based on exploring the concepts discussed in class.
3. Observing flaws in a network.
4. Reporting and analysing the network related threats using tools.
x
2. LAB REQUIREMENTS
S.No. Requirements Details
1 Software Requirements
Virtual machine, NMAP, NESSUS,
WIRESHARK,NESSUS
2 Operating System
Kali Linux, Ubuntu, Window Xp, Window 10
3 Hardware
Requirements Windows and Linux: Intel 64/32 or AMD Athlon
64/32, or AMD Opteron processor
16 GB RAM
256 GB hard disk space
4 Required Bandwidth
NA
xi
3. GENERAL INSTRUCTIONS
a. General discipline in the lab
• Students must turn up in time and contact concerned faculty for the experiment
they are supposed to perform.
• Students will not be allowed to enter late in the lab.
• Students will not leave the class till the period is over.
• Students should come prepared for their experiment.
• Experimental results should be entered in the lab report format and
certified/signed by concerned faculty/ lab Instructor.
• Students must get the connection of the hardware setup verified before switching
on the power supply.
• Students should maintain silence while performing the experiments. If any
necessity arises for discussion amongst them, they should discuss with a very low
pitch without disturbing the adjacent groups.
• Violating the above code of conduct may attract disciplinary action.
• Damaging lab equipment or removing any component from the lab may invite
penalties and strict disciplinary action.
b. Attendance
• Attendance in the lab class is compulsory.
• Students should not attend a different lab group/section other than the one
assigned at the beginning of the session.
• On account of illness or some family problems, if a student misses his/her lab
classes, he/she may be assigned a different group to make up the losses in
consultation with the concerned faculty / lab instructor. Or he/she may work in
the lab during spare/extra hours to complete the experiment. No attendance
will be granted for such case.
c. Preparation and Performance
• Students should come to the lab thoroughly prepared on the experiments they
are assigned to perform on that day. Brief introduction to each experiment with
information about self study reference is provided on LMS.
• Students must bring the lab report during each practical class with written
records of the last experiments performed complete in all respect.
xii
4. LIST OF EXPERIMENTS
Practical Content
Sr. No. Title of the Experiment Software/Hard Unit Time
ware based covered Required
1. Make a Detailed Report on Network Security Software
Threats covering Structured, Unstructured, Internal Based 1
and External Threats 3 Hours
2. Perform the following Scan using Wireshark and Software
analyze your results Based
2 3 Hours
(a)Analyze TCP session
(b) Perform and analyze these scans
5. To explore Shodan for (a) locating Boats and Ship Software 2 3 Hours
Locations (b) Searching and capturing Live Based
Cameras. (b) To Write a small NSE Script
6. To spoof IP address of your own system using Software 2 3 Hours
Kali Linux Based
7. Software 2 3 Hours
To sniff traffic using ARP Spoofing Based
8. To perform man in middle attack using DNS Software 2 3 Hours
spoofing Based
9. Software 2 2 Hours
To perform UDP session hijacking using Scapy Based
10. Software 2 3 Hours
To perform TCP session hijacking using Shijack. Based
11. Write and execute commands Software 2 3 Hours
• To view routing Table Based
• To view network statistics of a network
• To view all routes
• To update/modify/add/delete routes in a routing
table
12. To Perform HTTP Session Hijacking through Software 2 3 Hours
Cookie stealing Based
13. Configuring IPSec VPN Tunnel Mode using Software 3 3 Hours
Packet Tracer Based
14. Software 3 3 Hours
Decryption SSl/TLS Traffic using Wireshark Based
15. To Configure AAA (TACACS+) on Packet Software 3 3 Hours
Tracer for User Authentication Based
16. User account Using TACACS AND RADIUS Software 3 3 Hours
ON PACKET TRACER Based
17. Configure Numbered ACL for a given Software 3 3 Hours
topology. Based
18. Perform Wireless Hacking using aerodump- Software 4 3 Hours
ng Based
19. Software 4 3 Hours
Defining Snort Rules Based
TYPE OF ALLOT
S. No. PARTICULAR PASS CRITERIA
COURSE TED
xvi
Annexure 1
Network Security
(CSL383)
Lab Practical Report
Faculty name Student name
Roll No.:
Semester:
Group:
Department of Computer Science and Engineering
The NorthCap University, Gurugram- 122001, India
Session 2020-2
xvii
INDEX
S.No Experiment Page Date of Date of Marks Signat
No. Experi Submissio ure
ment n
1
Make a Detailed Report on Network
Security Threats covering Structured,
Unstructured, Internal and External
Threats
2 Perform the following Scan using
Wireshark and analyze your results
(a)Analyze TCP session
(b) Perform and analyze these scans
16
User account Using TACACS AND
RADIUS ON PACKET TRACER
17
To Configure Standard Numbered
ACL for a given topology.
18
To Configure Extended Numbered and
Named ACL in Packet Tracer
19 Perform Wireless Hacking using
aerodump-ng
xx
EXPERIMENT NO. 1
Student Name and Roll Number:
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
To Familiarize students with different types of network security threats
Outcome:
Students will able to understand and differentiate among security threats.
Problem Statement:
Make a report on Network Security Threats covering Structured, Unstructured, Internal and External Threats.
It is mandatory to include real life example of each threat and to discuss its impact.
Background Study:
• Network Security is a set of rules and configurations designed to protect the integrity,
confidentiality and accessibility of computer networks and data using both software and
hardware technologies.
• Different types of threats internal/external or active/passive exist in a network.
• Security issues in OSI layered model should be known.
Output :
xxi
Question Bank
EXPERIMENT NO. 2
Student Name and Roll Number:
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
To familiarize students with the working of Wireshark and how to analyse traffic moving in
and out of the network.
Outcome:
Students will able to analyse TCP sessions and various scans using NMAP and Wireshark.
Students will able to understand the working of NMAP.
Problem Statement:
Perform the following Scan using Wireshark and analyze your results
(a)Analyze TCP session
(b)Perform and analyze these scans
(i) Start a Wireshark capture. Open a Windows-> command window and perform a Host Scan
(using ICMP packets) on a neighbours machine using nmap –sP [neighbors ip address]. Stop the
capture and filter the traffic for ARP and ICMP packets.
(ii)Start a new Wireshark capture, and then perform a host scan (ICMP scan) on a system out with
the subnet, such as nmap –sP scanme.nmap.org.(Stop the capture and filter the traffic for ARP and
ICMP packets and Compare with previous results.
iii) Start a new Wireshark capture, and then perform a complete Port Scan (in this case a TCP SYN
scan) and an Operating System Fingerprint on a neighbours machine using nmap –O [neighbours ip
address] . The –O option should provide the OS running on the scanned machine. Stop the capture
and filter for source address == your machines address if necessary.
xxiii
Background Study:
• Wireshark is a passive reconnaissance tool
• World’s foremost and widely used network protocol analyser.
• Tells what’s happening on your network at a microscopic level
• Standard across many commercial and non-profit enterprises, government agencies, and
educational institutions.
Output (Screenshots)
xxiv
Question Bank
Q3. How to write a Nmap script to scan a target for service detection?
xxvi
EXPERIMENT NO. 3
Student Name and Roll Number:
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
To familiarize students with the working of Wireshark and how to monitor and analyse network
slowdown in an network.
Outcome:
Students will able to analyse TCP and HTTP slowdown in a network. Also, How password sniffing
can be performed using Wireshark on an un secured websites.
Problem Statement:
To Analysis Network using Wireshark for
(a)Traffic Monitoring (TCP slow down and HTTP slow down)
(b) Packet Sniffing
Background Study:
Output (Screenshots)
xxvii
Question Bank
Q5. You are required to monitor and display all incoming packets to a particular system from the
IP address 192.169.3.29. What filter would you use ?
Q6. Which filter would you use to display destination broadcast frames ?
xxix
EXPERIMENT NO. 4
Student Name and Roll Number:
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
To familiarize students with TCPDump and NetDiscover commands and their options
Outcome:
Students will able to scan and analyse network dump in a network. They will also learn to find
active machines and trace their mac address in a network.
Problem Statement:
Explore , execute and analysis traffic using TCP Dump and Net discover tools
Background Study:
Output (Screenshots)
xxx
Question
Q2. Which command to view Hex Dump format of packet in TCP DUMP ?
EXPERIMENT NO. 5
Student Name and Roll Number:
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
Student should able to detect vulnerabilities in SHODAN .
To make students capable of writing and executing a small NSE script.
Outcome:
Students will able explore SHODAN for detecting Vulnerabilities . Students will able to
understand , read and write NSE scripts.
Problem Statement:
1. To Explore Shodan for-
a. Locating Boats and Ship Locations
b. Searching and Capturing Live Camera
Background Study:
• Shodan: It is a search engine that lets the user find specific types of computers (webcams,
routers, servers, etc.) connected to the internet using a variety of filters.
• Filters should be known
• NSE: The Nmap Scripting Engine (NSE) is one of Nmap's most powerful and flexible features.
It allows users to write (and share) simple scripts to automate a wide variety of networking
tasks
• The Knowledge of NMAP is required.
xxxiii
Output (Screenshots)
xxxiv
Questions
xxxv
EXPERIMENT NO. 6
Student Name and Roll Number:
Semester /Section:
Date:
Faculty Signature:
Marks:
Objective:
To make students familiarize with the spoofing concept and to make them aware how IP address
spoofing occurs in a network.
Outcome:
Problem Statement:
Background Study:
• Spoofing is the act of disguising a communication from an unknown source as being
from a known, trusted source
• IP spoofing is the creation of IP packets using somebody else’s IP address as source address of
an IP packet.
• Absence of state information makes IP protocol vulnerable to spoofing. Peer is not
authenticated.
• By spoofing address attacker conceals identity.
Outputs (Screenshots)
xxxvi
Question Bank
Q4. Due to a previous IP spoofing attack, you want to make some changes to the network to prevent
future attacks. Which of following actions should you take?
A. Install antivirus software.
B. Set up IP address filters.
C. Install certificates on clients and servers.
D. Block all ports on the router.
xxxviii
EXPERIMENT NO. 7
Student Name and Roll Number:
Semester /Section:
Date:
Faculty Signature:
Marks:
Objective:
To make students familiarize with the spoofing concept and to make them aware how ARP spoofing
occurs in a network.
Outcome:
Problem Statement:
Question Bank
xl
Q3. What are the tools to be used to avoid ARP Spoofing attack ?
xli
EXPERIMENT NO. 8
Student Name and Roll Number:
Semester /Section:
Date:
Faculty Signature:
Marks:
Objective:
To make students familiarize with the spoofing concept and to make them aware how DNS spoofing
occurs in a network.
Outcome:
Problem Statement:
Background Study:
• Spoofing is the act of disguising a communication from an unknown source as being
from a known, trusted source
• For DNS Spoofing, ARP poisoning Concept should be Known
• Ettercap Configuration and DNS file should be known.
• Actual website page can be spoofed with the fake page.
Outputs (ScreenShots)
xlii
Question Bank:
xliii
EXPERIMENT NO. 9
Student Name and Roll Number:
Semester /Section:
Date:
Faculty Signature:
Marks:
Objective:
To make students familiarize with the session hijacking concept and to make them aware how UDP
session Hijacking occurs in a network.
Outcome:
Background Study:
• Network Level session hijacking concept should be known.
• Knowledge of UDP Protocol is required.
• How session establishment occurs using UDP .
• Knowledge of Scapy tool is required
•
Outputs (ScreenShots)
xlv
Question Bank:
xlvi
xlvii
EXPERIMENT NO. 10
Student Name and Roll Number:
Semester /Section:
Date:
Faculty Signature:
Marks:
Objective:
To make students familiarize with the session hijacking concept and to make them aware how TCP
Session Hijacking occurs in a network.
Outcome:
Background Study:
• Network Level session hijacking concept should be known.
• Knowledge of TCP Protocol and TCP Header is required.
• How three way handshake occurs using TCP .
• Knowledge of Shijack tool is required
•
Outputs (ScreenShots)
xlviii
Question Bank:
EXPERIMENT NO. 11
Student Name and Roll Number:
Semester /Section:
Date:
Faculty Signature:
Marks:
Objective:
To make students familiarize with the Routing Table concept and how to modify Routing table
Outcome:
Background Study:
• Routing table is constructed inside routers.
• Routers used it to find best path for packet forwarding in the network.
• It is a layer three concept.
• Knowledge of gateways, Addresses are required.
Outputs (ScreenShots)
li
Question
EXPERIMENT NO. 12
Student Name and Roll Number:
Semester /Section:
Date:
Faculty Signature:
Marks:
Objective:
To make students familiarize with the Session Hijacking concept and how HTTP session hijacking can
be achieved using Cookies.
Outcome:
Students should able to understand the concept of Cookies and its related concepts
Student should get to know how session created on opening a webpage
Students should also able to learn tools used for Cookie stealing.
Problem Statement:
To Perform HTTP Session Hijacking through Cookie Stealing
Background Study:
• Understanding of HTTP language is required.
• Unique session IDs are created between user and web server on opening any web page
• Wireshark analysis is required to read dump files.
• Concept of session Hijacking should be known
Question Bank:
2. Mention what flaw arises from session tokens having poor randomness across a range of values?
4. What happens if you visit an unsecure website during a man in the middle attack?
lvi
EXPERIMENT NO. 13
Student Name and Roll Number:
Semester /Section:
Date:
Faculty Signature:
Marks:
Objective:
To make students familiarize with the Virtual private Network (VPN) concept and how IPsec protocol is
used to configure VPN in Tunnel Mode
Outcome:
Students should able to understand the concept of VPN
Student should get to know how IPsec Tunnel mode works
Students should also able to learn to configure VPN using Packet Tracer.
Problem Statement:
Configuring IPSec VPN Tunnel Mode using Packet Tracer
Background Study:
• Understanding of IPsec protocol is required.
• How negotiation occurs between machines using IPsec
• How to configure topology in a Packet Tracer.
• Working of VPN and its related concepts
Question Bank:
Q1. What IPSec Mode Is Most Commonly Used To Create Site-To-Site VPNs Between
Locations?
Q2.Which two tools should you use to create, manage, and deploy IPSec policies?
EXPERIMENT NO. 14
Student Name and Roll Number:
Semester /Section:
Date:
Faculty Signature:
Marks:
Objective:
To make students familiarize with the SSL/TLS concept and how TLS protocol is used to configure
Client side traffic
Outcome:
Students should able to understand the concept of SSL
Student should get to know how SSL/TLS Handshaking occurs
Students should also able to learn to configure SSL/TLS Client Side traffic.
Problem Statement:
Decrypting SSL/TLS Client Traffic using Wireshark
Background Study:
• Understanding of SSL/TLS protocol is required.
• How Handshaking occurs between machines using SSL
• Usage of Wireshark is required
Outputs (Screen Shots)
lx
Question Bank:
EXPERIMENT NO. 15
Student Name and Roll Number:
Semester /Section:
Date:
Faculty Signature:
Marks:
Objective:
To make students familiarize with the AAA concept and how RADIUS and TACAS+ protocol is used to
authentic Client
Outcome:
Students should able to understand the concept of AAA
Student should get to know how RADIUS and TACACS+ works
Students should also able to learn to configure AAA concept using Packet Tracer
Problem Statement:
To Configure AAA (RADIUS & TACACS+) on Packet Tracer for User Authentication
Given Topology
Background Study:
• Understanding of AAA concept is required.
• How to configure topology using Packet Tracer
lxiii
Question Bank:
2. Ann has taken over as the new head of the IT department. One of her first assignments was
to implement AAA in preparation for the company’s new telecommuting policy. When she
takes inventory of the organizations existing network infrastructure, she makes note that it is a
mix of several different vendors. Ann knows she needs a method of secure centralized access to
the company’s network resources. Which of the following is the BEST service for Ann to
implement?
EXPERIMENT NO. 17
Student Name and Roll Number:
Semester /Section:
Date:
Faculty Signature:
Marks:
Objective:
To make students familiarize with the ACL concept and how Standard named and
numbered ACL concept can be used to define various security policies
Outcome:
Students should able to understand the concept of ACL
Student should get to know difference between Named and Numbered Standard ACL.
Students should also able to learn to configure Standard ACL using Packet Tracer
Problem Statement:
• Policies to be defined.
• ON R2
• 192.168.11.0/24 network is not allowed access to the Web Server on the
192.168.20.0 network
• All Other Access is permitted
On R3 implement Policies
Background Study:
Question Bank:
EXPERIMENT NO. 18
Student Name and Roll Number:
Semester /Section:
Date:
Faculty Signature:
Marks:
Objective:
To make students familiarize with the ACL concept and how Extended named and
numbered ACL concept can be used to define various security policies
Outcome:
Students should able to understand the concept of ACL
Student should get to know difference between Named and Numbered Standard ACL.
Students should also able to learn to configure Extended ACL using Packet Tracer
Problem Statement:
• Policies to be defined.
• Two employees need services provided by the Company. PC0 need FTP access while
PC1 need web server access.
Background Study:
• Understanding of ACL concept is required.
• How to configure topology using Packet Tracer
• Knowledge of Numbered and Named ACL is required
Outputs (Screen Shots)
lxxii
Question Bank:
2. Which command can you enter to block HTTPS traffic from the whole class A private
network range to a host?
EXPERIMENT NO. 19
Student Name and Roll Number:
Semester /Section:
Date:
Faculty Signature:
Marks:
Objective:
Background Study:
• Understanding of Wireless Coonections
• How to use Aerodump -ng tool on Kali Linux
• Knowledge of WI FI hacking is required
Output
lxxv
Question Bank: