Developing A Penetration Testing Laboratory As A Basis For Network Security
Developing A Penetration Testing Laboratory As A Basis For Network Security
NETWORK SECURITY
A Research
Presented to the
Computer Engineering Department
College of Engineering and Architecture
Pangasinan State University
Urdaneta City
In Partial Fulfilment
of the Requirements for the Degree
Bachelor of Science in Computer Engineering
Major in System and Network Administration
ELLYSA BALANZA
JAE ANNE V. EBORA
CLARK JR. P. NONES
JUNE 2022
APPROVAL SHEET
ii
ACKNOWLEDGMENT
First and above all, from the bottom of our hearts, we would like to thank
God Almighty for the courage, strength, guidance, knowledge, opportunity, and
This project thesis would not have been possible without the help of some
support and assistance of the following people who assisted and supported us in
adviser, Dr. Kenneth Oliver S. Lopez, for the never-ending support, patience,
motivation, and guidance in finishing this research study. His utmost knowledge
Canuel, Engr. Jay-Ar Pentecostes, and Engr. Khayzelle C. Cayabyab for giving
their insights on improving this study, understanding us (the researchers) and our
research study, and for the patience in giving us time to share our knowledge and
We would also like to express our gratitude to the rest of the Computer
through this phase. Engr. Rex B. Basuel, the Dean of the College of Engineering
iii
ACKNOWLEDGEMENT
and Architecture, thank you for the knowledge he lends us and for his favorable
To our families and friends, we express our sincerest gratitude and heartfelt
"Thank You" for giving us motivation, patience, financial needs, and extra push
Technology (DOST) to all their staff for the financial support throughout our
college life. We would not be able to get to where we are right now without their
help. We will never forget that we are the 'Scholars for the Nation.'
Lastly, gratitude and appreciation should also go to us, the researchers, for
giving the best in this study. We hope you appreciated the outcome of our hard
work, hopes, dreams, sleepless nights, blood, sweat, and tears. Thank you for not
giving up.
iv
TABLE OF CONTENTS
DEDICATION
This study is wholeheartedly dedicated to our Almighty Father, for the courage,
To our beloved family and friends, who have been our source of inspiration
And to the faculty of the Computer Engineering Department for giving their time,
Ellysa Balanza
v
TABLE OF CONTENTS
TABLE OF CONTENTS
Page
ACKNOWLEDGMENT ……………………………………………………......iii
DEDICATION ………………………………….…….……….………………v
CHAPTER 1: INTRODUCTION
Related Literature
vi
TABLE OF CONTENTS
Related Studies
Ethical Hacking.…………………………………………………… 32
CHAPTER 3: METHODOLOGY
Data Collection
Observation …………………………………………………….. 43
Testing ……………………………………………………………. 45
Recon-ng .……………………………………………………… 52
vii
TABLE OF CONTENTS
theHarvester ...………………………………………………… 55
Nmap ……………………………………………………...…….. 57
Nikto ……………………………………………………………… 64
Wireshark .……………………………………………………. 68
TCPDump ..…………………………………………………….. 71
ExploitDB ..…………………………………………………….. 73
Metasploit .………………………………………………..……. 75
Brutespray ..…………………………………………………….. 78
THC-Hydra ..…………………………………………………….. 83
John-the-Ripper ..……………………………………………. 86
Burpsuite .………………………………………………...… 89
Sqlmap .…………………………………………………… 95
viii
TABLE OF CONTENTS
APPENDICES
ix
TABLE OF CONTENTS
x
LIST OF TABLES
LIST OF TABLES
TABLES PAGE
xi
LIST OF TABLES
TABLES PAGE
xii
LIST OF FIGURES
LIST OF FIGURES
FIGURE # PAGE
xiii
LIST OF FIGURES
FIGURE # PAGE
xiv
LIST OF FIGURES
FIGURE # PAGE
36.1 Cloned Google Login Page and the Captured Credentials 115
36.2 Cloned Google Login Page and the Captured Credentials 115
xv
ABSTRACT
ABSTRACT
and safe for penetration testing. Furthermore, nineteen (19) penetration testing
tools were tested and evaluated and were utilized in the laboratory. The
effectiveness of these tools was assessed in terms of speed and coverage. The
laboratory was divided into two (2) different sides, attacker and target. Some of the
device(s) acted as the attacker, and the other equipment operated as the targets.
The researchers simulated nineteen (19) penetration testing tools installed in the
attacker.
xvi
ABSTRACT
The developed penetration testing laboratory was tested on the thirty (30)
the reliability of the said developed laboratory in terms of the following dimensions:
Usefulness; Ease of Use; Ease of Learning; and Satisfaction. Moreover, the only
restraint in the penetration testing laboratory was three (3) of the tools did not work
successfully due to hardware constraints. On the other hand, the sixteen (16)
penetration testing tools presented could be replaced with other tools. Also, the
attacker machine could be replaced with laptops or desktops that could be installed
with different tools. In addition, some attacks performed were limited due to the
targets deployed. Thus, it is also recommended to add or change targets that were
performed to challenge things, whereas two teams could be created, Red Team
xvii
CHAPTER 1
INTRODUCTION
revolutionized every facet of our society at all levels, thus becoming more
dependent on these services irrespective of size and volume or use and purpose.
The numerous advantages of these evolutions come with the rapid increase of
users and their data. According to Statista, as of April 2022, five (5) billion people,
or sixty-three (63) percent of the world's population, use the Internet (Johnson,
2022). With that, the predicted number of datasphere of the International Data
Corporation (IDC) that will be on the Internet by 2025 is one hundred seventy-five
headlines from various media platforms, from personal to corporate security, and
data breaches, phishing scams, malicious software, identity theft, voyeurism, and
are all vulnerable in the face of cyber-related crimes (Interpol, 2020). That being
1
CHAPTER I: INTRODUCTION
Despite the infallible laws and policies implemented, there has always been
from a set of tools to mitigate and identify these threats using security software
provided by a variety of vendors to limit the chance of mishaps and data loss. In
Philippines, Secuna (2022), to diminish these risks, one must venture into how
these black hat hackers think, plan and operate. These organizations would be
better positioned to discover and identify security issues, patch their systems, and
devise strategies and solutions to avoid illegal digital intrusion if they did so (MB
Technews, 2022).
Philippines are insecure and vulnerable, which makes them susceptible to hacking.
has been a rampage of incidents wherein groups of gray hat hackers in the
of the Philippines (PUP), Far Eastern University (FEU), Fatima School Bacood,
and many more. Unlike the black hat hackers, gray hat hackers have the intention
2
CHAPTER I: INTRODUCTION
Compared to black hat and gray hat hackers, white hat hackers have the
and immediately fix them. In addition, they can also be called pentester, a shorter
term for penetration testers. However, ethical hacking is not a skill that can be
learned and mastered in just months; it takes time and effort. Thus, creating a
personal lab would be very useful to simulate the penetration testing tools that are
readily available online. You do not want to test the devices on your network,
especially when you do not have permission from the owners. On the other hand,
this setup will not be ideal since the guest hosts would take other computer
resources, especially when the host has a low-level or even mid-level system. But,
with a laboratory, penetration testers could legally customize and control the
environment that will suit their needs, without defacing websites or illegally
as a Basis for Network Security” was conducted to establish a laboratory that could
Urdaneta City Campus (PSU – UCC). Furthermore, the researchers used different
effectiveness was taken on the premise of response or speed, which refers to the
3
CHAPTER I: INTRODUCTION
amount of time needed to complete a specific task. On the other hand, coverage
was defined as the ability of these particular tools to pass through the first three
Urdaneta Campus (PSU – UCC) and determine the effectiveness of the different
A. Information Gathering
a) Recon-ng; and
b) theHarvester
B. Scanning Vulnerabilities
a) Nmap;
b) Nikto;
c) Wireshark;
4
CHAPTER I: INTRODUCTION
d) TCPDump; and
e) ExploitDB
C. Gaining Access
a) Metasploit;
b) Brutespray;
c) THC-Hydra;
d) John-the-Ripper;
e) BurpSuite;
f) Sqlmap;
g) Cisco-Global-Exploiter;
h) Yersinia;
i) Aircrack-ng;
j) Fern-WiF-Cracker;
k) Karmetasploit; and
3. What is the reliability and acceptability (to the students) of the developed
5
CHAPTER I: INTRODUCTION
laboratory manual that could be used by the Computer Engineering students in the
penetration testing tools and methods were used to simulate the actual laboratory.
where this research would educate students that would be interested in the
cybersecurity field; equipping them with the right tools, let them hone their skills in
penetration testing tools, their effectiveness, and how to utilize them to their
advantage.
hackers, they are always bound to exploit these vulnerabilities, stealing data and
even money. It would be great to have a trained penetration tester to prevent such
unfortunate cases.
hackers, especially hacktivists; there have been many cases and records about
defacing websites and data leakage from different organizations. The penetration
6
CHAPTER I: INTRODUCTION
The Researchers – With this study, it will be beneficial for the researchers
tools to practice and apply what they have learned. They can use this
as a future reference for more studies or to further improve this study as the
technologies for both hardware and software are constantly being developed.
Campus for the 2nd Semester of the Academic Year 2021 – 2022 and then testing
Random-Access Memory (RAM) with 32GB microSD storage, which was installed
with Kali Linux as its operating system, and it functioned as the attacker. The
researchers' used Raspberry Pi 4 Model B; others could use various devices such
as Desktop computers, laptops, and many more. It would particularly simulate the
basic features and functions of nineteen (19) different penetration testing tools
7
CHAPTER I: INTRODUCTION
Social Engineering Toolkit. The testing method was under gray box testing,
wherein the tester has partial knowledge of the internal infrastructure of the
laboratory setup. Also, the tools, Recon-ng, and theHarvester, were connected to
RAM with 16GB microSD storage was used as the target desktop and a web
access point for the wireless network. Other components that the researchers
included were one (1) Cisco Catalyst 3750 switch and two (2) Cisco Catalyst 2811
routers. They were used to simulate a different network, one of which was used as
Furthermore, this laboratory was designed for internal testing only. This
means that all the penetration testing tools performed were on the researchers'
network and infrastructure alone, and they were not simulated on any device or
reconnaissance was performed to not directly to engage in the target system. The
access point's Broadcast Service Set Identifier (SSID) was "TP-Link Pentesters".
Moreover, for the Social Engineering Toolkit, only one feature was used since most
8
CHAPTER I: INTRODUCTION
Pangasinan State University – Urdaneta Campus (PSU-UCC) that tested and used
the penetration testing laboratory and the laboratory manual for guidance.
Furthermore, a survey questionnaire was used for data gathering regarding the
identify and verify a user or an application. API Keys are available on various
Black Hat Hacker – unlike the white hat hackers, they do not have
or mixes a variety of usernames and passwords until the precise and right login
9
CHAPTER I: INTRODUCTION
Coverage – the ability of these particular tools to pass through the first three
Cybercrime – crimes about the use of a computer and the Internet (e.g.,
Dictionary)
guess the password using a list of words. Those words and phrases can potentially
penetration tester has limited information regarding its target. (Imperva, 2021)
Gray Hat Hacker – individuals who use hacking for offensive and defensive
Internal testing – the penetration testing tools are limited to the researcher's
network and infrastructure. They will not simulate them on any device or network
for which the researchers have no permission. No one will test on other networks,
10
CHAPTER I: INTRODUCTION
without engaging them directly. It is not directly interacting with the target system
by not sending any request to the target. Therefore, the target has no means of
establishes a connection with the target machine and then acquires access, which
it can exploit to steal data or carry out other malicious operations. (Kaspersky,
2022)
11
CHAPTER I: INTRODUCTION
numbers, wherein the website server sends it to a browser, which then helps web
Speed – the time it takes a penetration testing tool to finish a given task.
White Hat Hackers – also known as Ethical Hackers, have the authorization
to exploit a system or network legally. The information they gathered will be used
12
CHAPTER 2
research. These give researchers an idea and particular insights into the
Ethical Hacking
human in many different aspects of daily life. However, the Internet has its dark
sides where criminals linger. Therefore, knowing how the users can protect the
network is vital. According to Neeraj Rathore (2015), the practice of ethical hacking
is breaking inside a computer's system without any malicious intent. Its goal is to
identify security risks and report them to the users or the people who are at risk of
cyber-attacks. Ethical hackers are the security experts who hack for defensive and
13
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
expertise. In 2017, the Philippines spent only 0.04 percent of its GDP on
cybersecurity, whereas other ASEAN countries spent 0.07 percent. Because of the
China and Russia, the government established the Department of Information and
the field of ICT. Secretary Gregorio Honasan Jr., the head of DICT, has three areas
to prioritize: a) provide access for every Filipino; b) adopt more vital ICT
Kali Linux
some of the frequent uses of Kali Linux. It offers more than three-hundred (300)
spoofing, password cracking, maintaining access, reporting tools, and many more.
are known tools in this distribution. Kali Linux is a product of Offensive Security.
(Ben, 2021)
14
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
Penetration Testing
the penetration testing process has five (5) stages, namely: reconnaissance,
scanning, gaining access, maintaining access, and analysis and web application
systems that will investigate, the testing methods utilized in this situation, and
gathering information about the target (e.g., domain names, mail servers.) The
scanning stage is knowing how some intrusions will be handled by the target.
Gaining access uses attacks (web attacks) to identify the target's weaknesses or
vulnerabilities. The ethical hackers will then try to exploit these vulnerabilities found
either by stealing data, intercepting the traffic and many more, to understand the
sensitive data. The final phase is analysis, which involves compiling the test
results. Then, the pentesters will report to the security personnel, which will create
solutions to protect the network and even data against possible attacks. (Imperva,
2021)
15
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
Reconnaissance Tools
information, (b) deciding the network’s range, (c) recognizing all active machines,
(d) obtaining an operating system in use, (e) identify operational framework, (f)
show services used on each port, and (g) understanding network map.
Recon-ng is among the numerous tools available for the first penetration
installed in Kali Linux, operated on a command-line interface (CLI) with the same
the Metasploit Frameworks that can exploit a particular machine or system, recon-
with command completion and contextual assistance. Overall, Recon-ng has one
marketplace inside the Recon-ng. They also categorized them according to their
16
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
Another tool for the first phase of penetration testing is the theHarvester.
This package contains tools for gathering information. It gathers information like e-
mail addresses, virtual hosts, subdomain names, open ports or banners, and
employee names from different public sources like search engines (Kumar, 2022).
TheHarvester has almost the same features as the Recon-ng, which was also
where the theHarvester has only thirty-eight (38) modules to choose from, and
fourteen (14) require API keys. Furthermore, the modules do not require
installation since they are already available in the theHarvester. (Kumar, 2022)
Scanning tools are software tools that examine a network for existing
(Pedamkar, 2020). According to Pedamkar (2020), seven (7) popular tools are
displays operating systems (OS), and displays the firewalls used and available on
17
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
different OS. It is considered one of the most popular tools for pentesters and
system and network administrators, and because of it, it garnered many awards
relating to security. Like the other tools, it is open-source and controlled using the
Another tool is the Nikto, a pluggable web server and common gateway
reports are in plain text or HTML, and there are also HTTP versions available,
cookies support, and many more. Nikto is a web server as well as a web application
analysis tool, both free and open source. Moreover, it is a straightforward and
programs, insecure and outdated servers, and/or programs. Nikto quickly tests a
web server, and the results can be found visibly in the log files or an Intrusion
It focuses on network protocols going in and out of the network. Similar to Nmap,
(GUI) feature to capture packets and network protocols from a network. Each
packet contains sensitive data and information that, later on, will be used for the
next phase of penetration testing. Wireshark can even decode data payloads
18
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
depending on its protocols (e.g., HTTP). Each captured packet using Wireshark
contained the following details: the time taken to capture the packet, the source
and destination IP address, the protocol used, the length, and some packet
passwords if the protocol used in any webpage or web application is not encrypted
network activities, for it can be able to examine packets such as Internet Protocol
(DVMRP), Andrew File System (AFS), Server Message Block (SMB), Open
Shortest Path First (OSPF), Network File System (NFS), and many more. (Gerardi,
2020)
repository of exploits for public security and explains inside that specific database.
Its goal is to give a complete and extensive collection of exploits in a free and easy-
19
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
to-use database through mailing lists, direct submissions, and other public
weaknesses in a specific network and stays up to date on current attacks that are
applications that can be searchable and downloadable, then used for exploitation.
repository of publicly accessible exploits and the susceptible software they relate
to. Its goal is to compile the complete collection of exploits, shellcode, and papers
available, acquired via direct contributions, mailing groups, and other publicly
a command-line search and query tool for ExploitDB that allows searching for any
However, some tools still need other tools (from the earlier phases of ethical
Among the plethora of tools that can be used in gaining access, one of which is
the Metasploit. This is a free and open-source penetrating framework tool. There
20
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
are numerous modules in Metasploit that allow configuring an exploit module. After
configuring, just pair it with a payload, then target a victim, and finally attack against
the target machine. According to Said (2020), one of the most popular penetration
testing tools under Kali Linux is Metasploit. It is commonly known for attacking
systems to test security exploits. There are five (5) modules which are the payload,
appropriate exploit or/and payload for the exploitation of the machine. After that,
the chosen payload is executed at the target, and the ethical hacker is given a shell
to be able to connect with the payload once the exploit is successful. It provides
Ottawa (2022) highlighted two (2) steps in this phase, gaining access, in
username or email address). THC-Hydra and John-the-Ripper are two of the most
21
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
widely used password attack tools in Kali Linux, according to Carson (2020), a
penetration testing that performs port scanning. From the name itself, once it is
network using Nmap, one of the tools under the reconnaissance phase, to check
the open ports and other services. After the scan, the data and information
scanned were saved in a GNMAP/XML format. The output file is used by the pen-
testers to perform brute force attacks against the open port services of the target
THC-Hydra is one of the most popular brute force password cracking tools.
Similar to the Brutespray, THC-Hydra performs and uses both dictionary and brute-
force attacks, which can be both operated on a GUI feature of the Graphical User
Interface, and the command-line interface or CLI. It also allows various operating
systems like all Unix platforms such as Linux, Solaris, etc., or MacOS and
Telnet, and many more. Hydra is capable of working online and needs to use the
initially designed for Unix-based computers but now works on various platforms.
The three (3) main password-cracking techniques used by John-the-Ripper are (a)
22
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
single crack mode, which is the quickest and best option if the entire password file
to crack is provided; (b) wordlist mode, which compares the hash to a database of
potential password matches; and (c) incremental mode, which is the most potent
because it employs brute force to try every possible combination until it produces
One of the online application testing methods used during the obtaining
access phase is called Sqlmap, which looks for and exploits vulnerabilities in web
applications' use of structured query language (SQL) injection. On the target host,
it allegedly finds one or more SQL injections. There are now a variety of choices
management system. In addition, it retrieves the session user and database for
hashes, privileges, and databases. SQL dumps the entire or user-specific DBMS
particular files on the file system, among other things. Also, Sqlmap is utilized on
the command-line interface (CLI) and is open-source and free. MySQL, Oracle,
fully supported. It also supports a variety of SQL injection techniques that are both
interface, often known as Burp Suite (GUI). The most common users of Burp are
the expert web app security researchers and bug bounty hunters. A free
23
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
Community Edition, a Professional Edition, and an Enterprise Edition are the three
editions of the tool that are offered. There are far fewer features in the Community
Edition. To offer a complete security solution for online applications is its objective,
a web application mapping spider used to map target websites and a repeater that
useful for searching for data chunks in headers, parameter values, etc. In addition,
a comparer function analyzes the two (2) pieces of data to spot visual differences,
into the tools to expand their functionality. The tool's more intricate capabilities
tokens created by the web server are indeed random. On the other hand, proxy
server and intruder are essential tools one can practice, which was used in this
Network Infrastructure Tests, on the other hand, are defined as, "Testing
or more layers that define an Ethernet/IP network" Payerle (2016). One of which
is the Yersinia, a framework for performing layer two attacks. It takes advantage
(ISL), VLAN Trunking Protocol (VTP), and many more. (Bisson, M. n.d.)
24
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
On the other hand, Cisco Global Exploiter or CGE is an advanced and fast
yet straightforward security testing tool that can exploit the most dangerous
simple parameters (e.g., target and the vulnerability to exploit), CGE has an
intuitive and straightforward user interface executable from the command line. To
be more specific, the fourteen (14) vulnerabilities in Cisco switches and routers are
namely: (1) Cisco 677/678 Telnet Buffer Overflow Vulnerability, (2) Cisco IOS
Router Denial of Service Vulnerability, (3) Cisco IOS HTTP Auth Vulnerability, (4)
Cisco Catalyst SSH Protocol Mismatch Denial of Service Vulnerability, (6) Cisco
675 Web Administration Denial of Service Vulnerability, (7) Cisco Catalyst 3500
Request Denial of Service Vulnerability, (9) Cisco 514 UDP Flood Denial of Service
Vulnerability, (11) Cisco Catalyst Memory Leak Vulnerability, (12) Cisco CatOS
Bypass Vulnerability (UTF), and (14) Cisco IOS HTTP Denial of Service
The main goal of the wireless network test is to identify Wi-Fi networks (e.g.,
fingerprinting, information leakage, and signal leakage), and then determines the
25
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
the users' credentials in accessing their networks. One of the tools in this phase is
monitoring, capturing of packets, and the exporting of data to text files for in-depth
processing by third-party tools. Furthermore, this can test or check Wi-Fi cards and
testing tool under the gaining access phase with the same goal as other wireless
can also recover those keys. Fern Wi-Fi Cracker is operated in a graphical user
interface feature. Furthermore, some of the features of Fern Wi-Fi Cracker include
passwords, collect information, and perform web browser attacks (by faking these)
pentester. The only requirement is the user should connect to the created fake
From Domain Name Server (DNS), Post Office Protocol 3 (POP3), Internet
26
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
servers, there is already a broad net cast to gather several types of information.
Last is the social engineering test, Allen (2021) defined social engineering
Furthermore, the social engineering test aims to point out a person's weaknesses
and even a group of people. As RS Security (2018) said, "The most easily
is a penetration testing tool for social engineering, free and open-source, created
attacks such as phishing, cloning websites, sending SMS, and many more.
(Borges, 2020)
In the book of Wylie, P., & Crawley, K. (2021) entitled "In the Pentester
They called the first approach a Minimalist. The minimalist approach was the
easiest to set up for it only consists of one laptop running a hypervisor, making it
portable and capable of being run almost everywhere. However, one of the
disadvantages of this setup is the need for dongles or an adapter. Tools like
Machine network adapters do not have that kind of feature. The following approach
27
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
is the Dedicated Lab, which uses actual computers instead of Virtual Machines.
Also, they added that, if possible, the internet is needed so that remote access will
be possible. Lastly is the Advanced Lab, this approach follows the previous
laboratory, but network devices are now present. These network devices include
A virtual and real environment both have merits and drawbacks. The key
the other hand, virtual machines may not always perfectly replicate the functionality
of physical computers; therefore, approaches that work on a real machine may not
penetration testing laboratory and provides realistic situations. The book highlights
that there is a general approach to setting up this kind of laboratory. Those steps
will help you build a functional and essential penetration testing laboratory. The
first step is determining the objectives, which is vital for building a lab. The second
step is to design your lab's architecture or another way around. The design should
accurately represent your objective. The author highlighted that to test wireless
attacks, you should include these: wireless access points, a wireless and wired
28
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
client machine, and an attack machine as an element of the lab. After building
those essential elements is the time when you would decide what operating system
you will be using and the brands and models of the equipment. Also, one crucial
reminder must keep in mind is to isolate your lab from any network, for it can cause
problems for other networks. It is also essential to list the reports and findings after
the testing.
There are also five types of penetration testing mentioned in this book, first
is the virtual penetration test lab, the second is the internal penetration test lab, the
third is the external penetration test lab, the fourth is the project-specific
penetration test lab, and the fifth is the ad hoc lab. The virtual penetration lab is
the simplest with only having one virtual software system with multiple operating
systems. The internal penetration lab consists of two systems (one system is the
target, and another is the tester's machine) connected to a router where it provides
services like DNS and DHCP. The objective of this laboratory is to see the existing
objective, on the other hand, helps to ensure if there is a way to gain access to the
network or system, given the fact that defense tools or software are present.
creates a replica of the target system or network. There is a need for the same
equipment used in real life. However, they are rarely built because the equipment
is expensive. The last one is the ad hoc lab which is only used to test a server,
29
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
The third step is to build the lab where physical work is already associated.
Choosing the right hardware equipment concerning your budget is very vital.
Moreover, the last approach is to run the lab. This step is not just for installing the
software, operating system, and other tools to be used and testing. This step also
involves documenting the process of building the lab and writing the results
(Faircloth, 2017).
hardware and software components, according to Lunetta (1998) and Hofstein &
of the goals includes developing practical skills for the students wherein students
may learn to use the tools or develop any skills regarding the equipment used
correctly and safely. Students can make observations also, take measurements,
and carry out well-defined procedures. Thus, students played a vital role in
assessing the subjective usability of the laboratory. This assessment will examine
the four (4) dimensions of usability which are usefulness, ease of use, ease of
consumer items. This USE questionnaire[1] is designed where users are asked to
grade agreement with the assertions, ranging from "strongly disagree" to "strongly
agree." Lund (2001) created a brief questionnaire that could assess the usability
[1]
See Appendix T for the USE questionnaire
30
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
would have some faith in the goods' appearance. It would be feasible to envision
the design elements that might affect how things are rated. Although usability
the USE has been reported in a little amount of published research. One study
seeks to address the problem by examining the psychometric features of the USE,
and 151 Mechanical Turk (MTurk) users rated Amazon.com and Microsoft Word
using the USE and the System Usability Scale (SUS, Brooke, 1996). The study's
conclusion states that the USE is a valid and trustworthy instrument that still
requires improvement. Various studies also concluded that the USE questionnaire
proved to be the right choice for their study. USE questionnaire provides
information by the data gathered about which aspects of the system or the product
could improve. Furthermore, the analysis's conclusion revealed that the USE
Questionnaire was a legitimate and trustworthy tool for evaluating the system or
31
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
RELATED STUDIES
Ethical Hacking
which is the same as what Logan and Clarkson (2005) found out. According to
them, teaching ethical hacking should take the form of hands-on experience rather
than a textbook and lecture format. The study also stressed the necessity of soft
skills in ethical hacking. Soft skills pertain to how a person works. The skills
included were primarily social. In Trabelsi and McCoey's (2016) study, they listed
soft skills, specifically social engineering, as one of the skills needed by students.
The others were understanding of security and understanding how hackers work
32
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
using Linux Tools: Attacks and Defense Strategies," they used Kali Linux to
conduct their penetration testing. The study's objective was to investigate a range
of tools that will suit their needs. They also demonstrated basic penetration testing
and explained how to defend against such attacks. There are four steps in their
2016)
Kali is one of the most popular operating systems for hackers. It offers many
tools that are already pre-installed in it. In a recent study, He-Jun Lu and Yang Yu
(2021) used Kali Linux and the available tools for penetration testing of a wireless
network. They followed four steps in conducting their penetration testing. First is
the preparation, next is information collection, then the simulation attack, and lastly
is the reporting. Some other methods were used also like scanning, monitoring,
demonstrated that Kali Linux had a positive impact on enhancing wireless network
Another study on using Kali Linux was conducted by Denis et al. (2016).
They mainly used tools already packaged in Kali Linux for penetration testing. The
33
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
remote personal computers or PCs as well as the phone’s bluetooth. (Denis et al.,
2016)
give the default settings of SOHO routers to their customers, this study uses a Kali
authentication, dictionary and brute-forcing attacks, and many more are the kinds
of attacks used to discover risks that could damage the network. (Blancaflor et al.,
2016)
34
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
attacker to find weaknesses in a system that could be used for malicious ends.
The research study also provides an outline of penetration testing and specifies
the factors considered in selecting the most appropriate tools for the task.
According to the role each tool serves, their study divided them into three
Datagram Protocol (UDP) ports, the first category of operations is port scanning.
harm the network. The last category is vulnerability exploitation. Nmap was one of
the tools mentioned in this story, alongside the other tools like Dmitry, Hping3, and
Unicornscan. Their evaluation criteria include how many ports each tool scanned,
the number of open ports found, the types of ports scanned, the scan time or the
time taken by the tool to perform the whole scanning, and Operating System (OS)
Zealand conducted a research study entitled "A Study of Penetration Testing Tools
the different penetration testing tools in terms of response time and coverage. The
35
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
vulnerabilities that the tools detect. The collected data is combined and compared
to determine which is more effective. Furthermore, the use of attack tree model is
used in this study. This attack tree helped the researchers to determine which
attacks on the target machines are the most effective. In addition, the attack tree
penetration testing tools in a Kali Linux system to determine the most efficient one.
Different types of penetration testing are mentioned, these are network penetration
physical security tests, client-side penetration tests, wireless penetration tests, and
social engineering tests. Furthermore, the attack tree model for penetration testing
is highlighted in this study, which serves as the visual aid for weighing multiple
attacks on a system. The penetration testing process is also included in this study,
tracks, analysis, and reporting, respectively, are the phases of penetration testing
mentioned in this study. The penetration testing tools were divided depending on
the attack category. The network scanning tools used are Nmap, OpenVas, Dmitry,
36
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
ManageEngine OpUtils. The tools used for the password cracking attack were
John-the-Ripper, IMP 2.0, L0pht Crack, Crack 5, and Cain and Abel. The tools for
The researcher further discusses each tool mentioned in her research paper
Another study about penetration testing by Bacudio, Xiaohong, Bei & Jones
strategies, and methodology for penetration testing. They said that penetration
testing has three phases. First is the test preparation phase, which follows specific
steps: the information gathering, the vulnerability analysis, and the vulnerability
exploit. They conducted a penetration testing process during the test phase, and
various penetration tools were used, described, and analyzed. The Nmap and
Metasploit frameworks are the two of them. There is a particular part of their study
wherein they listed three strategies for penetration testing namely the black box,
white box, and gray box. The testers in the black box do not know the target. They
need to figure out the system's flaws, for they have no prior knowledge of the target
victim. Contrary to the white box wherein the pentesters know the target and are
given all relevant info on the target. On the other hand, they defined the gray box
37
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
testing strategy they mentioned is external and internal testing. The term "external
testing" refers to an attack on the test target using techniques from outside the
ascertain whether an outside attacker can gain access and how far he may
advance once he does. Internal testing, on the other hand, comes from the
company that controls the test target. Internal testing is concerned with figuring out
what would occur if a legitimate user with standard access privileges managed to
exploitation, and report generation. They employed Nmap, a network mapper, and
Metasploit's auxiliary/ scanner for their scanning phase to determine the type of
services running on the webserver, their versions, the port on which they are
running, and the services that are running on the operating system. One of the
tools they used for the exploitation phase is John-the-Ripper, alongside the
38
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
RESEARCH PARADIGM
Action Research
Design Science
This research paradigm shown in figure 1 was adapted from Dr. Napoleon
former Dean of PSU – Graduate Studies. Dr. Kenneth Oliver S. Lopez then revised
this paradigm to fit the needs of the Bachelor of Science in Computer Engineering's
research paradigm. Together with their adviser, the researchers think of a problem
that could address through this research. One problem they have thought about is
that having a penetration testing laboratory in a hypervisor could limit the students,
especially when their devices have low CPU processing speed and slow RAM.
laboratory. Design Science, the developed penetration testing laboratory will aid
Campus (PSU-UC) in learning ethical hacking. Action Research, the data collected
were speed and coverage for the penetration testing tools and reliability of the
39
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
low CPU speed and slow RAM. Systems Development, the developed laboratory
consists of one (1) Raspberry Pi 4 Model B as attacker machine; two (2) Raspberry
3 Model B+ as target server and target desktop; two (2) Cisco 2811 routers wherein
one (1) was the target router; two (2) Cisco Catalyst 3750 switch; and a TP-Link
CONCEPTUAL FRAMEWORK
Figure 2 shows the conceptual framework of the study. The study has three
phases: input, process, and output. The input phase will be composed of all the
penetration testing tool software and hardware equipment used in the study. The
process phase will be the integration. Hence, the researcher will develop a
penetration testing tools and the future consumption of the Computer Engineering
students of PSU-UCC.
40
CHAPTER II: REVIEW OF RELATED LITERATURE AND STUDIES
41
CHAPTER 3
METHODOLOGY
study, including the detail of the tools used for analysis and the method of research
RESEARCH DESIGN
Construction
Design Testing
Requirements Deployment
Feedback
Figure 3 shows the agile process model used throughout the study (Isaac
phase includes the design. These hardware components were arranged according
to how these devices functioned later. The laboratory was divided into two (2)
terminals; some of the devices served as the attacker, and the others were
operated as the targets. The third phase, construction, was where the researchers
42
CHAPTER III: METHODOLOGY
hostnames, usernames, and passwords. During the testing, nineteen (19) different
penetration testing tools were simulated in the laboratory through the attacker. The
manual. After testing, the laboratory equipment, and manual were deployed to the
UCC) for evaluation of the reliability and acceptability of the developed laboratory.
Lastly, the researchers received feedback about the developed penetration testing
DATA COLLECTION
Observation
For this part, the main focus was on the penetration testing tools. Speed
and coverage of the tools were observed. Most of the penetration testing tools do
not display the time it took to generate a result, therefore the researchers used a
device to measure or monitor the speed of the penetration testing tools. The
researchers relied on the time (in seconds or minutes) it takes the tool to finish a
43
CHAPTER III: METHODOLOGY
task. While the coverage is taken on the premise of the tools' ability to pass through
gaining access.
Data Gathering
The first data to be collected in the study was the speed of the penetration
testing tools to process a task and to determine if some variables affect the results
generation. In addition, the researchers also collected data on whether these tools
can operate in their designated penetration testing phase and whether these tools
using the Likert Scale was used to gather data for the reliability of the penetration
testing laboratory. There were thirty (30) respondents, whereas all of them were
UCC).
As already discussed in the preceding chapter, there are five (5) stages of
ethical hacking (Imperva, 2021). In this study, the researchers will only apply the
first three (3) phases of penetration testing: information gathering, scanning, and
gaining access. Each phase corresponds to specific penetration testing tools used
44
CHAPTER III: METHODOLOGY
in the study. For reconnaissance, the tools Recon-ng and theHarvester were used.
However, these tools could be unnecessary since both tools' purpose was to
search for domains and emails available on the target. The researchers included
these tools so the readers would have specific knowledge on using these tools.
For the scanning phase, the tools used are NMap, Nikto, Wireshark, TCPDump,
and ExploitDB.
access, the tool used was Metasploit which was used for automated exploitation.
password cracking. BurpSuite and Sqlmap were used for Web Application Testing.
Social Engineering Toolkit (SEToolkit) was used for Social Engineering Testing.
Testing
In the testing phase, penetration testing tools were used in the developed
penetration testing laboratory. For the reconnaissance phase, the laboratory was
connected to the Internet and using passive reconnaissance; thus, the researchers
did not directly engage in the target system, Google (google.com). Next, in the
scanning phase, the target could be any device within the target-side portion of the
45
CHAPTER III: METHODOLOGY
laboratory structure. The goal for this phase was to find vulnerabilities, such as
open ports, outdated software, and other existing vulnerabilities that could be
available. The third phase is gaining access. In this phase, scanned vulnerabilities
from the previous phase were used to gain access to each possible device.
Statistical Treatment
The third specific statement of the problem was to determine the reliability
and acceptability of the penetration testing laboratory to the students. The average
X= ∑𝑿/𝑵
Scale was composed of a series of three (3) or more Likert-type items represented
in similar questions combined into a single variable. Their answers were given a
46
CHAPTER III: METHODOLOGY
47
CHAPTER 4
figure 4 is the design of the laboratory setup configured in Packet Tracer for the
visual representation of the actual laboratory structure [2]. Wherein they are divided
into two (2) terminals. One will function as the attacker during the simulation, and
the other one will act as the target. This topology is flexible for re-arrangements
and modifications, but for this study, this was established and designed to be
tested only in internal testing, not to cause harm or damage outside the network.
[2]
See Appendix A see the actual laboratory setup 48
CHAPTER IV: PRESENTATION AND DISCUSSIONS
Presented in figure 4, the researchers used two (2) Cisco Catalyst 2811
routers[3]. The routers were named RedTeam and BlueTeam. Both were equipped
with a 1-port Serial WAN interface card (WIC-1T) capable of serial connection.
Furthermore, they were connected with a DTE-DCE serial cable[4] for Wide Area
connection with different networks. Both of the routers’ Serial0/3/0 interfaces have
a network of 10.0.0.0 with a subnet mask of 255.0.0.0. On the other hand, the
255.255.255.0.
connected to the routers. Both routers were connected to the fastEthernet0/13 and
fastEthernet0/14 of the switch. Moreover, aside from the routers, connected with
microSD storage[8], installed with Kali Linux version 2022.2 as its operating system
(OS); it was particularly simulating the different tools for penetration testing,
a target web server was used. Connected to the access point, a target desktop
was also displayed. The researchers used the model TP-Link TL-WR840N for the
access point[9] and two (2) Raspberry Pi 3 Model B+[10] with 16 GB microSD
storage[11] for the target desktop and web server. They are configured to have a
Table 2 displays the overview of basic configurations made for all devices:
IP addresses and subnet masks were identified with each corresponding interface.
On top of that, the routers have their security configured, such as Secure Shell
Dynamic Host Configuration Protocol (DHCP)[15] server for the access point to
obtain its configurations automatically. On the contrary, the switch also has a
[9]
See Appendix H for the full technical specifications of TP-Link TL-WR840N 50
[10]
See Appendix I for the full technical specifications of Raspberry Pi 3 Model B+
[11]
See Appendix J for the full technical specifications of a 16 GB microSD card
[12]
See Appendix K for the ports, and network configurations
[13]
See Appendix L for the SSH and Telnet configurations
[14]
See Appendix M for the routing protocols configurations
[15]
See Appendix N for the DHCP configurations
CHAPTER IV: PRESENTATION AND DISCUSSIONS
Virtual Local Area Network (VLAN)[16] configured. It was done to break the physical
switch into mini virtual switches. Therefore, any hosts connected to separate
VLANs will act independently, thus represented using two (2) switches. They are
logically divided, or each device's network is segmented at the data link layer 2
(OSI Layer 2). Moreover, the access point’s Service Set Identifier (SSID) and
password[17] were also set up for the WLAN connection of the target desktop.
in the laboratory. These were divided into various stages of penetration testing but
would only utilize three (3) phases: the first phase would be reconnaissance or
the third would be gaining access. The tools used for the first phase were Recon-
ng and theHarvester. Nmap, Nikto, Wireshark, TCPDump, and ExploitDB for the
second phase. And the third phase was further sub-categorized on how they were
being practiced. With that being said, for the automated exploitation, Metasploit
was used. On the other hand, Brutespray, THC-Hydra, and John-the-Ripper were
exercised for brute-forcing and password cracking. However, for the Web
and Yersinia are the tools for Network Infrastructure. Additionally, Aircrack-ng,
Infrastracture.
[16]
See Appendix O for the VLAN management configuration 51
[17]
See Appendix P for the access point configuration
CHAPTER IV: PRESENTATION AND DISCUSSIONS
Lastly, the Social Engineering Toolkit was used for social engineering testing.
Recon-ng
Recon-ng[18] is among the numerous tools available for the first penetration
Overall, Recon-ng has one hundred fourteen (114) available modules, which can
be installed on the marketplace inside the Recon-ng. They also categorized them
It was not engaging directly in the target but mainly relying on the publicly available
information, which is called Open Source Intelligence (OSINT). The target was
Google (google.com), which required an Internet connection. With that being said,
records, etcetera, will be collected without the target system knowing. However, in
this study, it was specifically tasked to find contacts and hosts inside the domain,
[18]
See Appendix Q for the laboratory manual 52
[18]
Pence, N. (2020). Recon-ng: An Open Source Reconnaissance Tool. Security Trails. Retrieved
from https://securitytrails.com/blog/recon-ng
CHAPTER IV: PRESENTATION AND DISCUSSIONS
The commands presented above were the steps to configure and run the
module. The first line was done to load the module whois_pocs. The second line
was used to identify the target using the options set source <target domain>.
Lastly, the command run was for execution. Depicted figure 5 shows the result for
the whois_pocs module. The researchers were prompted with seventy-six (76)
contact information. Since Recon-ng was not showing how many seconds it took
to generate a result, the researchers used a device to monitor the time taken, and
it showed that within forty-seven (47) seconds, it was able to prompt the result. It
was noticeable that the Internet connection and the speed of the generation of
Uniform Resource Locators (URL), country name, email address, first name, last
53
CHAPTER IV: PRESENTATION AND DISCUSSIONS
For the hackertarget module, the commands above were the configuration
method used. Changing the module name and running it to execute does not differ
from how it was done in the previous module. Using the command modules load
<module name>, which was hackertarget. Likewise, in the previous section, the
target source was google.com, and run for the execution. For the result of the
module hackertarget, reflected in figure 6, the scanned hosts were five hundred
one (501) in twelve (12) seconds. Again, with the previous result, it is presented
according to their: country name, host, IP address, latitude, longitude, notes, and
region. Recon-ng consistently provided and enumerated results that were easy to
understand.
54
CHAPTER IV: PRESENTATION AND DISCUSSIONS
theHarvester
Another tool for the first phase of penetration testing is the theHarvester [19].
TheHarvester has almost the same features as the Recon-ng, wherein it was also
modules where the theHarvester has only thirty-eight (38) modules to choose from,
and fourteen (14) of them require API keys. Furthermore, the modules do not
reconnaissance like the Recon-ng. The target was google.com (Google) which
also requires an Internet connection. It was expected that the collected information
from that domain would be the IP addresses, domain names, hostnames, and any
available public data. The only module used in this tool was the hackertarget which
The command given above means that the domain -d researchers used
was google.com, and the source module used -b was the hackertarget. Likewise,
with Recon-ng, theHarvester was not showing the measured time it was taken to
produce results. After the execution, figure 7 shows the result wherein it was
detected that there were six hundred ninety-five (695) hosts found in six (6)
were listed together with their corresponding IP addresses in the result given.
[19]
See Appendix Q for the sample laboratory manual 55
[19]
Kumar, V. (2022). Theharvester in Kali Linux. Retrieved from https://www.cyberpratibha.com/blog/kali-linux-
theharvester-an-email-harvester/
CHAPTER IV: PRESENTATION AND DISCUSSIONS
[20]
See Appendix Q for the sample laboratory manual.
56
[20]
Simplilearn (2019). What Is Nmap? A Comprehensive Tutorial For Network Mapping. Retrieved from
https://www.simplilearn.com/tutorials/cyber-security-tutorial/what-is-nmap
CHAPTER IV: PRESENTATION AND DISCUSSIONS
Nmap
Nmap or network mapper[20] was one of the tools used for scanning the
using the command-line interface (CLI) as some of the tools under this phase.
Nmap provides precise, real-time information on a network and the devices linked
network, running services, open ports, operating systems (OS) with their version,
information depending on the used keys and options of the scanned targets.
In this study, the target router, the target server, and the target desktop were
used as the targets. It was assumed that the researchers did not know the exact
IP address of the target has, but knew its network. The command nmap –sn
address. The network 192.168.2.0 was used for it was the network for the target
machines.
[20]
See Appendix Q for the sample laboratory manual.
57
[20]
Simplilearn (2019). What Is Nmap? A Comprehensive Tutorial For Network Mapping. Retrieved from
https://www.simplilearn.com/tutorials/cyber-security-tutorial/what-is-nmap
CHAPTER IV: PRESENTATION AND DISCUSSIONS
Figure 8.1 shows the result of the scan made on Nmap; it was scanned
within twenty-seven (27) seconds and prompted with different IP addresses with
each corresponding device. On the other hand, it is noticeable that with the set
parameters in Nmap in figure 8.2, the result was quicker than scanning the network
without range. Scanning with the range as a parameter took sixteen (16) seconds.
This scan has discovered that within the network, the targets available were hosts
58
CHAPTER IV: PRESENTATION AND DISCUSSIONS
Aside from scanning the IP addresses of the target hosts, Nmap was also
designed to scan open ports in the target hosts. The command nmap –Pn <IP
address #1> <IP address #2> <IP address #3> <IP address #4> was used. The –
Pn option is also called the default scan, which treats all IP addresses in the range
to be active; thus, using the range was discouraged. With that, it is best to specify
Represented in figure 9 was the generated result from scanning open ports
in the discovered targets based on figure 8.1. For the target router, which has an
IP address of 192.168.2.1, port 22 or the Secure Shell (SSH) and port 23 or the
Telnet were open. Moreover, the access point, which has an IP address of
192.168.2.105, has four (4) open ports: port 22 or SSH, port 53 for the Domain
Name Service (DNS), port 80 or HTTP, and 1900 for UPnP. Next, the
192.168.2.200 IP address of the target server also has three (3) open ports: port
22 or SSH, port 80 for the HTTP, and port 445 or Service Message Block (SMB).
Lastly, the target desktop with an IP address of 192.168.2.201 has two (2) open
ports, namely: port 22 or SSH and port 5900 or VNC. Scanning for these open
ports took twenty-six (26) seconds. Therefore, with these open ports, the attacker
59
CHAPTER IV: PRESENTATION AND DISCUSSIONS
called vulscan. Vulscan includes a .csv file for each vulnerability documented by
60
CHAPTER IV: PRESENTATION AND DISCUSSIONS
figure 10, the target web server was used as the target for scanning. But the whole
network of the targets is scanned for scanning the number of hosts. In the number
vulscan, has detected fifteen (15) possible vulnerabilities for OpenSSH 8.2p1
service and forty-nine (49) vulnerabilities for Apache HTTP 2.4.41. And, scanning
61
CHAPTER IV: PRESENTATION AND DISCUSSIONS
used another script in the Nmap entitled ssh-brute. nse, which was used to brute
method is under the gaining access phase, which makes Nmap a tool also under
gaining access due to the usage of this script. However, unlike the brute-forcing
tools that were used, this Nmap script took longer to brute-force the target. The
method of brute-forcing this script is that each entry on the userlist and passlist
was paired with each other. The first username was paired with the first password.
Then after every username was paired, the first username was paired to the
second entry on the password list. This method would take hours; thus, to hasten,
the userlist.txt used only includes the target's username. Unlike in the previous
commands of Nmap that generated the time it took alongside its results, for this
one it did not. Thus, the researchers used a stopwatch to monitor the time. With
that, the brute-forcing for the target server took one hundred (100) seconds, and
the credentials of the target server were ubuntu:serveradmin, as seen from figure
11.2.
62
CHAPTER IV: PRESENTATION AND DISCUSSIONS
Figures 11.1 and 11.2. Brute-forced Target Server Using Nmap and the Result
63
CHAPTER IV: PRESENTATION AND DISCUSSIONS
Nikto
was used; this is a web server and web application analysis tool that is free and
a web server for potential security vulnerabilities, such as server and software
misconfigurations, default files and programs, insecure files and programs, out-of-
date servers and programs, and a pointer to direct a human tester to better manual
testing. It also looks for server configuration elements like multiple index files and
installed web servers and applications. On the other hand, Nikto is not intended to
be a discreet tool. It will quickly test a web server, and the results will be visible in
A reference from Nmap's figure 9 is the result of the scanned open ports;
the target web server has port 80 opened. Using the Damn Vulnerable Web
Application (DVWA) being hosted by the target server as a target, the researchers
used this to scan for any vulnerabilities. Basic domain scanning and tuning with
SQL injection were performed for testing on Nikto. The researchers performed
basic scanning on the specified host. The command nikto –h <IP address of the
target> or <URL of the website> was used. By default, it scanned port 80 or the
port for the HTTP, since it was not stated, port 443 can also be used to scan the
[21]
See Appendix Q for a sample of the laboratory manual 64
Shivanandhan, M. (2021). Web Server Scanning With Nikto – A Beginner's Guide. freeCodeCamp. Retrieved
[21]
from https://www.freecodecamp.org/news/an-introduction-to-web-server-scanning-with-nikto/.
CHAPTER IV: PRESENTATION AND DISCUSSIONS
HTTPS address. The IP address of the target is 192.168.2.200. Figure 12.1 shows
the result for the basic domain scanning in Nikto. Scanning vulnerabilities on the
target web server, DVWA, took almost two (2) minutes or one hundred (100)
seconds to accomplish. In the result, the researchers were presented with what
server currently runs on the target, cookies session ID, and the Open Source
vulnerabilities. The downside was that they were no longer actively making this
database because they shut it down in 2016 due to a lack of funding. Although the
OSVDB website was available on the Wayback Machine, the OSVDB listed on the
Nikto scan was not found because some of the pages were missing or not saved.
65
CHAPTER IV: PRESENTATION AND DISCUSSIONS
The researchers used option -T, which is called the Tuning option in Nikto.
There are thirteen (13) options, one of which was to scan if the target server is
vulnerable to SQL injection; it was identified as the 9th option. The result of the
command presented above is shown in figure 12.2 below. The target server
hosting the DVWA was used as the host to scan for SQL injection vulnerabilities.
It showed a lot more vulnerabilities with some details like the PHPSESSID and
security cookie was created without the HTTP only flag, which is prone to cross-
site scripting, and some potential interesting archive was also detected.
OSVDB-35876, and OSVDB-36894 which stated that the target server contains
command, scanning the domain, generated the time it took to prompt the results,
however for this one it did not. With that, the researchers used a device to measure
the time, and the scanning for this option took thirteen (13) seconds.
66
CHAPTER IV: PRESENTATION AND DISCUSSIONS
67
CHAPTER IV: PRESENTATION AND DISCUSSIONS
Wireshark
testing is the Wireshark[22], which provides a graphical user interface (GUI) feature
to capture packets and network protocols from a network. Each packet contains
sensitive data and information that, later on, will be used for the next phase of
penetration testing. Wireshark can even decode data payloads depending on its
protocols (e.g., HTTP). Each captured packet using Wireshark contained the
following details: the time taken to capture the packet, the source IP address, the
destination IP address, the protocol used, the length, and some of the packet
passwords if the protocol used in any webpage or web application is not encrypted
(e.g., HTTP). This attack, password sniffing, could be categorized under gaining
access which makes Wireshark a tool in scanning for vulnerabilities and gaining
access phase.
For password sniffing on the Wireshark tool, the researchers used the
Damn Vulnerable Web Application as the target website. The web application is
vulnerable and uses HTTP as a protocol. The website was accessed by entering
http://192.168.2.200 in the browser URL tab, and then the researchers were
directed to the login page. Whatever credential or string was entered in the
username and password field, the Wireshark captured it. From the Wireshark, the
filter was set to HTTP to capture only HTTP packets which are shown in Figure
[22]
See Appendix Q for the sample laboratory manual 68
[22]
Comptia, n.d. What Is Wireshark and How Is It Used? Retrieved from
https://www.comptia.org/content/articles/what-is-wireshark-and-how-to-use-it
CHAPTER IV: PRESENTATION AND DISCUSSIONS
the user was redirected to the login page again, represented by the GET /login.php
HTTP/1.1 from the Info column, which might indicate that the login attempt was
unsuccessful. Also, in Figure 13.2, the user has entered credentials username and
password as “admin”. Compared to Figure 14.1, the user was then redirected to
index.php, indicating that the login attempt was successful. Which also shows that
was an unnecessary factor for the tool Wireshark since the goal of the tool was to
speed of capturing packets, the researchers set a time limit of sixty (60) seconds
for every three (3) trials and determined the number of packets captured within the
time frame. The trial result showed that the Wireshark captured only two (2)
69
CHAPTER IV: PRESENTATION AND DISCUSSIONS
packets and protocols were found. However, the packets DHCP and CDP were
selected. These two (2) packets were used later on for attacks. Figure 15.1 shows
the discovered DHCP packets. On the other hand, figure 15.2 displays the CDP
packets captured.
Figure 15.1 and Figure 15.2. Discovered DHCP and CDP Packets
70
CHAPTER IV: PRESENTATION AND DISCUSSIONS
TCPDump
Another tool for the scanning vulnerability phase is the TCPDump[23] which
is almost the same as the Wireshark tool but differs in some features, such as
Wireshark, captured packets using TCPDump contained the following details: the
time taken in capturing the packet, the source IP address, the destination IP
address, the protocol used, the length, and some of the information of the packet.
TCPDump, although simple, can be powerful when combined with different filters.
Like Wireshark, it also captured the credentials from the website DVWA’s login
page. Thus, making TCPDump also a tool for scanning for vulnerabilities and
gaining access.
In the command above, the researchers aimed to capture all traffic from the
eth0 interface of the attacker. Also, verbosity was set to inspect all packets live.
Since "HTTP" or "HTTPS" terms cannot be used as a filter, the researchers just
captured all packets. When a user accesses the website of DVWA, an HTTP-GET
method will be prompted in the terminal. Also, several protocols were seen, such
Protocol (CDP), Dynamic Host Configuration Protocol (DHCP), and Spanning Tree
Protocol (STP). With the number of protocols discovered, a ton of information was
[23]
71
See Appendix Q for the sample laboratory manual
[23]
Gerardi, R. (2020). An Introduction To Using Tcpdump At The Linux Command Line. OpenSource.
Retrieved from https://opensource.com/article/18/10/introduction-tcpdump
CHAPTER IV: PRESENTATION AND DISCUSSIONS
also prompted in the terminal every second. This can be frustrating, especially to
beginners. But once the user has entered credentials, the HTTP-POST method
was prompted. In figure 16, it can be seen that the user has entered the credential
username as admin, and password as the password. This also proves that
TCPDump has managed to capture credentials. And again, like the previous tool
Wireshark, the researchers conducted three (3) trials to determine the number of
packets captured within sixty (60) seconds. The number of packets captured was
the following: for the first trial, twenty (23) packets; for the second trial, two (2)
72
CHAPTER IV: PRESENTATION AND DISCUSSIONS
ExploitDB
Exploit Database or ExploitDB[24] is another tool for scanning the
can be searchable and downloadable, then used for exploitation. The Exploit
they relate to, created for penetration testers and vulnerability researchers. Its goal
acquired via direct contributions, mailing groups, and other publicly available
command-line search and query tool for ExploitDB that allows searching for any
exploits locally. Referring to figure 9, wherein Nmap scanned open ports for each
target were discovered, the researchers used the searchploit to search exploits for
the other three (3) ports in the laboratory, namely: port 23 (Telnet), port 445
(Samba), and port 5900 (VNC) since ExploitDB’s discussed function was to search
for available exploits to certain services, determining the speed in whatever aspect
was irrelevant.
[24]
See Appendix Q for the sample laboratory manual 73
[24]
Offensive Security, n.d. Exploit Database (EDB). Retrieved from
https://www.cybersecurityintelligence.com/exploit-database-edb-515.html
CHAPTER IV: PRESENTATION AND DISCUSSIONS
Shown in figure 17.1 is the generated result for the command searchsploit
samba linux. It is prompted with the possible exploits specifically for samba. On
the left side is the exploit title, and its path on the right side. To further specify the
result, another round of searching was conducted. This time, the term metasploit
was added so that the result will only show the exploits that were available in the
tool Metasploit, which was later on used. Figure 17.2 shows that from the previous
twenty-nine (29) result in figure 17.1, nine (9) exploits were available in Metasploit.
With that being said, the same procedure was also done for the following ports to
be assessed: port 22 or SSH, port 23 or Telnet, port 80 or HTTP, and port 5900
VNC.
74
CHAPTER IV: PRESENTATION AND DISCUSSIONS
Metasploit
In the third phase of the penetration testing, gaining access, several tools
penetrating framework tool. There are numerous modules in Metasploit that allow
to configure an exploit module, pair it with a payload, target a victim, and launch it
against the target machine. Before Metasploit begins, many information gathering
tests are improved, and it combines with numerous reconnaissance tools such as
Nmap and ExploitDB to locate the susceptible point in the system. Once the
weakness has been identified, select an exploit and payload for the exploitation.
The payload is then executed at the target and the user is given a shell to interact
with the payload once the exploit is successful. It provides the penetration tester
many more.
in knowing and exploring Metasploit, like searching for auxiliaries, exploits, and
results, the researchers used a stopwatch, since it was not present in their display.
One auxiliary that the researchers tried was the port scan module. It performs the
same operation as what Nmap did. But, the researchers only scanned the target
server instead of a group of targets. Like Nmap from figure 9, Metasploit’s port
[25]
See Appendix Q for the sample laboratory manual 75
[25]
Petters, J. (2020). What is Metasploit? The Beginner's Guide. Varonis. Retrieved from
https://www.varonis.com/blog/what-is-metasploit
CHAPTER IV: PRESENTATION AND DISCUSSIONS
scan module also detects the three ports, 22, 80, and 445, to be open. This process
took only twelve (12) seconds. Furthermore, one (1) exploitation module and
custom payloads were done for the target server. For the exploitation, the target
was the Server Message Block (SMB) service CVE-2017-7449, also known as
SambaCry, which was discovered from the Nmap scan performed in the target
legitimate write access to a file share to upload and run an arbitrary file with Samba
permissions. Additionally, this exploit runs in the version 3.5.0 to 4.4.14, 4.5.10,
and 4.6.4. For the payloads, the researchers created a simple python payload and
a payload for Linux operating systems. Finally, measuring the speed for these
The command search <exploit module name> was used to search for
specific exploit modules. From the previous tool ExploitDB, SMB service was
subjected to searching vulnerability. It showed from figure 17.2 that there were
nine (9) exploits available in Metasploit. With that, samba was declared to search
for the exploit service called samba. It is an application that operates the SMB
use the SMB protocol for client-server networking. It also enables the
with the list of exploit modules that were related to samba. Either use <exploit
number> or use <name of the exploit module> to load these modules. Within the
index, exploit number fourteen (14) indicated that the exploit module used was the
the exploit module can be seen. The exploit module has only one (1) existing
payload, the cmd/unix/interact. Moving forward, the next line was used to set the
IP address of the target to implement the said payload, set rhosts <target’s IP
address>, using the target server with an IP address of 192.168.2.200. The exploit
commands begin the operation of exploiting the target server. However, the result
77
CHAPTER IV: PRESENTATION AND DISCUSSIONS
Brutespray
of penetration testing that performs brute force attacks depending on the target’s
services. Although it supports services other than SSH, the researchers only
focused on brute forcing the target machines' SSH service. The implementation of
this attack started by scanning the target’s website or internal network using Nmap,
one of the tools under the scanning vulnerabilities phase, to check the open ports
and other services. From figure 9 of the tool Nmap, one of the open ports
discovered to the targets was port 22 or SSH. With this, tools for brute forcing can
be used, such as Brutespray. After the scan, the data and information scanned
were saved in a GNMAP/XML format as the output file. The output file is used in
performing brute force attacks against the open port services of the target with
In this study, the attacker used brute force attacks to get the credentials of
the target machines. Specifically, the username was given to hasten the brute-
forcing for the target server and desktop. However, for the target router, the
username was not indicated. The attacker used wordlists for the dictionary attacks
[26]
See Appendix Q for the sample laboratory manual 78
Ganesh, B. (2019). Brutespray – Port Scanning and Automated Brute Force Tool. Retrieved from
[26]
https://gbhackers.com/brutespray-port-scanning-brute-force/
CHAPTER IV: PRESENTATION AND DISCUSSION
The text above is the commands used for brute force. Wherein the –f option
f <file name location>. The file contains the scanned services that were opened on
the target, specifically the target server. Thus, the file supplemented is located on
option –u specifies the exact username for the target, which is ubuntu. However,
unlike the username, the attacker did not know the password of the target server,
<service> indicates the type of service to attack, and it was the SSH. The –t option
is the number of threads for the brute-forced to use. The researchers used four
(4), which is the suggested number of threads to use for SSH service. Figure 19.1
shows the actual brute force process of the target-server that out of 200 possible
passwords, the 195th password matched the username ubuntu with the password
serveradmin. Also, the username and password were the same as the Nmap script
ssh-brute. nse used and can be seen in figure 11.2. The output was written to the
folder: ./brutespray-output/. The same procedure was done on the target desktop
79
CHAPTER IV: PRESENTATION AND DISCUSSION
are similar to the configuration used for the Cisco Router. The difference is that the
username was stated for the target server and desktop. However, for the Cisco
Router, the username was not noted and the password. Nonetheless, the scanned
information for the target router was still located on the directory
80
CHAPTER IV: PRESENTATION AND DISCUSSION
attack was issued for the username. Wherein wordlist was also provided, located
and passlist.txt for the password. Depicted in figure 19.2 is the brute force process
of the Cisco Router. One hundred sixty-one (161) usernames were deployed, and
the 2nd username, BlueTeam, matched the username credential for the Cisco
Router. On the other hand, out of 200 possible passwords, the 199th password
matched the username BlueTeam, with the password cisco-admin. The output was
81
CHAPTER IV: PRESENTATION AND DISCUSSION
Brutespray’s display was not showing the time it took to generate the result,
thus the researchers used a device to estimate and monitor the time taken for this
tool to show results. Brute-forcing of the target router took eleven (11) minutes and
the credential captured for the target server was ubuntu:serveradmin, and brute-
forcing took two (2) minutes and forty-two (42) seconds. Lastly, for the target
desktop, brute-forcing the credential, pi: raspberry, took three (3) minutes and eight
(8) seconds. And as stated earlier, SSH was used as the target service. The thread
used for the target router was only three (3). Then, the number of threads used for
82
CHAPTER IV: PRESENTATION AND DISCUSSIONS
THC-Hydra
tools. Like the Brutespray, THC-Hydra performs and uses both dictionary and
and the command-line interface (CLI). It also supports operating systems like all
UNIX platforms such as Linux, Solaris, etc., or MacOS and Windows. Furthermore,
Hydra is effective against numerous protocols like SSH, Telnet, and many more.
However, for this study, only the SSH service was subjected to brute forcing. Hydra
can work online and needs to ensure that the target host is up.
attacks to get the credentials of the target machines: target server, desktop, and
router. The information about the IP address and the service targeted, SSH, were
taken from the Nmap scan, which can be seen in figure 9. The passwords were
not disclosed although the usernames were given. The researchers then utilized
wordlists to perform a dictionary attack on the target hosts' passwords. The option
–l <login name> was used to indicate the target server’s username: ubuntu. On
the contrary, the password for the host was not given; therefore, a password list
was generated and then designated as the parameter for the –P option. The
provided password list was stored and can be accessed in the directory
[27]
See Appendix Q for the sample laboratory manual 83
[27]
Rajalingham, K. (2021). How to install and use THC Hydra?. Retrieved from https://linuxhint.com/how-to-
install-and-use-thc-hydra/)
CHAPTER IV: PRESENTATION AND DISCUSSIONS
In addition to that, the option –t was used to specify the number of threads. The
attacker used sixteen (16) threads, which is a faster way of authenticating the
username and password. Moreover, -V, which stands for verbosity, was used to
show the attempts if the username and password being tried to match the actual
ssh://192.168.2.200, was used to connect to the target host. This also indicates
the password credentials for the target server. It shows the numerous potential
passwords for the machine that went for the trial and error phase. The text in green
was an indication that the generated host's IP address 192.168.2.200, login name
wherein the result can be seen in figure 11.2 of the tool Nmap. Also similar to the
tool Brutespray's process, and not displaying the time it took to generate the result,
the researchers’ used THC-Hydra to brute-force target router and target desktop,
as well as used a stopwatch to monitor the time taken to generate the result. As
seen from the result below, the credential captured for the target server was
ubuntu:serveradmin, and brute forcing it took two (2) minutes and twenty-nine (29)
seconds. For the target router, the credential captured was BlueTeam:cisco-
admin, and it took three (3) minutes and forty-three (43) seconds to be brute-
84
CHAPTER IV: PRESENTATION AND DISCUSSIONS
forced. Lastly, for the target desktop, brute forcing the credential, pi: raspberry,
took three (3) minutes and four (4) seconds. The credentials were the same as the
captured credentials by the tool Brutespray. Also, the number of threads used was
sixteen (16) for all the targets. Same to the captured credentials by the tool
Brutespray. Also, the number of threads used was sixteen (16) for all the targets.
85
CHAPTER IV: PRESENTATION AND DISCUSSIONS
John-the-Ripper
initially designed for Unix-based computers but now works on various platforms.
It's a password cracking program that identifies encryption on hashed data and
compares it to a big plain-text or built-in wordlist and can use in both brute-force
and dictionary attack modes. The three (3) primary modes of password cracking
used by John-the-Ripper are single crack mode, which is the fastest and best if
you have an entire password file to crack; wordlist mode, which compares the hash
to a known list of potential password matches; and incremental mode, which is the
most powerful and uses brute force to try every possible combination until gave a
possible result. In the penetration testing laboratory, the attacker used John-the-
Ripper to decrypt the hash password of the usernames in the target server located
on its shadow.txt file. Furthermore, there were some required steps, performing
SSH in the brute-forced target server, remotely copying the shadow file to the
directory of the attacker, and making kali (attacker) the owner of the shadow.txt
file. Below is the command used to decrypt the users' passwords inside the
shadow.txt file.
[28]
See Appendix Q for the sample laboratory manual 86
[28]
Petters, J. (2020). How to Use John the Ripper: Tips and Tutorials. Varonis. Retrieved from
https://www.varonis.com/blog/john-the-ripper
CHAPTER IV: PRESENTATION AND DISCUSSION
Using the command john <hash passwords file name>, figure 21 is the
result of the decrypted hash passwords of the usernames present in the target
server using the built-in wordlist of John-the-Ripper and the type of encryption
algorithm used, which was the SHA512crypt. Since the mode was not indicated,
by default, the single crack mode was automatically implemented. With that, using
username: password, the target server has presented five (5) existing usernames,
previous tools that were not displaying the time it took to produce the results, the
same method was used in this tool John-the-Ripper to measure the time it took to
prompt the results. With that, the time it took to decrypt the shadow file was twenty-
87
CHAPTER IV: PRESENTATION AND DISCUSSION
.pot file contains stored decrypted hash passwords, whereas if the hash password
was entered to be decoded again, a display noticing that ‘No password hashes left
to crack', implies that the hash passwords have been cracked and stored in the
john. pot. To prompt the details of the SHA512crypt hash and decrypted
88
CHAPTER IV: PRESENTATION AND DISCUSSION
BurpSuite
tool that operates using the graphical user interface (GUI). It is the most widely
used tool among professional web app security researchers and bug bounty
with much fewer features. Its goal is to provide a comprehensive security solution
for web applications. A spider that is used to map target web applications. A
Furthermore, a decoder comes in handy when looking for chunks of data in values
(2) items of data to identify visual differences and an extender that helps BurpSuite
its capabilities. Lastly, a sequencer was also an entropy checker that checks for
the randomness of tokens generated by the web server, which are among the tool's
more complex features. On the other hand, proxy server and intruder are essential
About the tool Nikto, the target server was vulnerable to SQL injection
attacks, as reflected in figure 12.1. Thus, SQL injection was performed in the target
server using BurpSuite. In this study, the researchers used an SQL injection attack
to enable the entire disclosure of the available data on the database server. An
external web browser was used by the attacker, wherein the proxy server was not
[29]
See Appendix Q for the sample laboratory manual 89
[29
Huro, S. (2020. How to Use Burp Suite Professional for Web Application Security [Part One]. Delta Risk.
Retrieved from https://deltarisk.com/blog/how-to-use-burp-suite-professional-for-web-application-security-part-
one/
CHAPTER IV: PRESENTATION AND DISCUSSION
configured, and the researchers had to set it up manually. The Burp proxy server
was used to intercept and manipulate the traffic coming from the target server, the
The requested input was used and reflected by the proxy server, therefore sent to
the intruder to mark the parameters set by payload markers (§) for the sniper attack
that injects one payload at a time. Hence, one-hundred forty-seven (147) payloads
were tested, which were a series of syntaxes or strings to be loaded in the input
field inserted to begin the process of SQL injection. BurpSuite was further tested
into different security levels of DVWA, which were: low, medium, high, and
impossible, whereas the same method of injecting payloads was used. And for
each trial, the time it took to generate the result was not prompted in the display,
the same method of measuring this data was done the same as on the previous
tools.
Shown in figure 22.1 are the responses of the low-security level of the target
website to the one-hundred forty-seven (147) injected payload. Only thirteen (13)
of them worked for the SQL injection on DVWA. They were arranged from highest
to lowest length number. The result prompted the researchers with the 5074
lengths of the response in bytes. It had a request number of 144 and a payload of
1' UNION SELECT user, password FROM users#. It was also discovered that the
lesser number of length was, the less chance that the SQL injection would be
successful; thus, no data was disclosed. The next successful SQL injection were
the following queries separated by semi-colon: ' UNION select user, password
90
CHAPTER IV: PRESENTATION AND DISCUSSION
FROM users# ; x' or 1=1 or 'x'='y ; ' or user like '% ; ' or 1=1 or ''=' ; hi' or 'a'='a ; "'
or 1 --'" ; ' or ''=' ; '%20or%20''=' ; ' or 0=0 # ; 1' OR 1=1 # ; '%20or%20'x'='x ; and
%' or '0'='0 . Despite being different in payload strings and length, they all resulted
in the same thing. Although the chromium browser was installed, the researchers
cannot view the results in the render section. Therefore, putting the payload one
by one on the input field for user ID, the researchers displayed this result on the
target website. Performing SQL injection at a low-security level took three hundred
eighty (380) seconds or six (6) minutes and twenty (20) seconds.
To view the results, the researchers tried to put the top three (3) payloads
1' UNION SELECT user, password FROM users#; ' UNION select user, password
FROM users#; and x' or 1=1 or ‘x’=’y on the input field of the target website to see
the result and the response of the target. Figure 23.1.1 and 23.1.2 shows the result
91
CHAPTER IV: PRESENTATION AND DISCUSSION
of the payloads. The image on the left shows that the result of the payload strings
1' UNION SELECT user, password FROM users# and ' UNION select user,
password FROM users#. The image implies that these payload strings have
successfully captured the username and hashed passwords stored in the database
for the DVWA website. On the other hand, the image from the right only shows the
and unlike with the low-security level, researchers are presented with the result in
figures 24.1 and 24.2. Unlike in the low-level security, the researchers discovered
that only two (2) of them worked out of one-hundred forty-seven (147) payloads.
The payload string with the highest length: 5230, was 1 = 1 union select user,
92
CHAPTER IV: PRESENTATION AND DISCUSSION
password from users. The other payload string was 0 or 1=1 with a length of 4802.
Also, the payload string 1 = 1 union select user, password from users response
was different compared to the other payload string. The time it took to finish
conducting SQL injection at this level was three hundred fifty (350) seconds or
approximately six (6) minutes. Referring to figure 24.1, the image from the left
represents the response of the payload string 1 = 1 union select user, password
from users, and the image from the right was the response from the payload string
0 or 1=1. From that, the image from the left has successfully captured the
username and hashed password stored in the database. On the other hand, the
image from the right, figure 24.2, only captured the First Name and Surname of
the usernames from the left image. Again, although the chromium web browser
was installed, the researchers still could not use the render option to view the
result. Using the Pretty method, the generated result was in an HTML code,
93
CHAPTER IV: PRESENTATION AND DISCUSSION
Figures 24.1 and 24.2. Displaying the Response of the Payloads Through HTML
security level of DVWA: high and impossible. It was found out that the payloads
were not working in any of them because of the more challenging security level
and different web interfaces than the previous ones. Therefore, BurpSuite has its
limitations and restrictions; the researchers cannot modify it however they want,
thus failing to have a successful SQL injection attack on these levels of security.
94
CHAPTER IV: PRESENTATION AND DISCUSSION
Sqlmap
penetration testing tool that automates the detection and exploits of SQL injection
problems; it also has fingerprint and enumeration features and takes over
SQL injection techniques that are both powerful and diverse for Web Application
Testing.
One of the performed commands in the tool Nikto previously was scanning
the target server if it was susceptible to SQL injection. Figure 12.1 have shown
that it was viable. With that, the researchers applied SQL injection attack to the
target website, Damn Vulnerable Web Application. The goal of this attack is to
disclose all the users' credentials. It was tested on a series of trials using the
different DVWA security levels from low, medium, high, and impossible. For each
security level, the web interfaces and URLs changed. However, it was different for
the PHP Default Session Storage (PHPSESSID) or the session cookie. The low-
security level on DVWA signifies that it has no security at all, thus prone to
vulnerabilities. The researchers interacted on this website using the input field.
Hence, typing the user ID within 1 – 5 displayed the ID, first name, and username.
Conversely, it showed how bad security practices could be for the medium security
level. Unlike the previous security level, the researchers interacted on this website
using a drop-down box. Wherein user ID can be selected. Thus, prompted with the
[30]
See Appendix Q for the sample laboratory manual 95
[30]
Imperva, n.d. SQL (Structured query language) Injection. Retrieved from
https://www.imperva.com/learn/application-security/sql-injection-sqli/
CHAPTER IV: PRESENTATION AND DISCUSSION
same credentials for every particular user ID. The high-security level is like an
extension to the medium difficulty that has both mixtures of good and bad security
levels. Unlike the previous ones, the web interface of the high-security is different.
researchers were asked to change the user ID and prompted with another window
for the input field. Again, the researchers chose from any number within 1 – 5, and
of the target website: URL and cookie, which were contained in the double-
parameters for each security level, which will be discussed later in the following
paragraphs. The command –u specifies the URL of the target website. The cookie
information was identified using the command --cookie. Wherein the only thing
that’s consistent throughout was the PHPSESSID value. The value for security
depends on the level the researchers were on. With that, --dbs was used to
enumerate the database names inside the running DBMS of that website, which is
identified to be dvwa. Using that information, the researchers checked if there were
96
CHAPTER IV: PRESENTATION AND DISCUSSION
tables in that database. The command –tables –D dvwa, since the database name
is already identified was used. There are two tables presented on the result:
whether columns were available in that table, which prompted them to eight (8)
columns. Since columns were discovered, the 4th line was initialized to dump the
up the parameters for each security level. These security levels are low, medium,
high, and impossible. At each security level, the web interfaces changed. On a low-
security level, presented in figure 25.1, notice that there were data parameters for
ID, which was 1, and a backslash was added to cause a fatal error on the database
itself, represented in figure 25.2. The security level was set to low, and the
PHPSESSID was also indicated. After completing all commands and dumping the
data, the researchers used the same method from the previous tools to measure
the time taken to disclose all of its data, and took sixty-eight (68) seconds.
On the other hand, shown in figure 26 was the command entered for the
medium security level. Compared to figure 25 previously, the pasted URL had no
data parameters. To be specific, the URL for the medium-level just ends in “sqli/”
wherein from the low-level, the URL contains the ID parameter. Therefore, the
researchers used the command --data=”ID” to set the parameters for the HTTP-
POST request to the server. The PHPSESSID remained the same, while the
security value became medium. For the medium-security level, Sqlmap dumped
Moreover, incorporating the previous commands, the security level was set
to high (figure 27). Notice that still, the PHPSESSID was the same, and the data
parameters were set. However, the URL specified using the command -u was the
second URL or the redirected URL of the main page. In addition, another command
was inserted to determine where the execution of the SQL injection attack should
be performed, and it was on the original page of DVWA, thus the pasted URL. It
took sixty-two (62) seconds to dump all the data at the high-security level.
98
CHAPTER IV: PRESENTATION AND DISCUSSION
Then shown in figure 28, the researchers were prompted with the low-
security level's exact type of web interface on the impossible-security level. The
only difference it made from the low-security level is that the URL of the high-
security level contains a Cross Site Request Forgery (CSRF) token. This CSRF
tokens serve as a protection to the websites thus, heightening the security. At first,
the researchers did not set anything for the data parameters, resulting in no data
dump. However, after entering data into the input field and a backslash character,
data were dumped, making the impossible-security level a low-security. The time
Figure 29 shows the result of the SQL injection attack on Damn Vulnerable
Website. Despite raising the security level for each trial from low to impossible, the
form, indicating the successful attacks. There were seven (7) columns in total. The
first column is the user IDs 1, 2, 3, 4, and 5. At the same time, the second column
is the equivalent user name for each user IDs 1 – 5: admin, gordonb, 1337, pablo,
and smithy, respectively. Additionally, the third column is the avatars of each user
ID, which are in the format of .jpg (jpeg). Furthermore, in parenthesis form, besides
the avatar column, are the hash passwords with their corresponding meaning.
99
CHAPTER IV: PRESENTATION AND DISCUSSION
Moreover, included in the dump information is their last name and first name.
100
CHAPTER IV: PRESENTATION AND DISCUSSION
Cisco-Global-Exploiter
where it has the ability to exploit the most dangerous vulnerabilities of Cisco
namely: Cisco 677/678 Telnet Buffer Overflow Vulnerability, Cisco IOS Router
Denial of Service Vulnerability, Cisco IOS HTTP Auth Vulnerability, Cisco IOS
Catalyst Memory Leak Vulnerability , Cisco CatOS CiscoView HTTP Server Buffer
Overflow Vulnerability, 0 Encoding IDS Bypass Vulnerability (UTF), and Cisco IOS
Each vulnerability has its corresponding way of attacking the different Cisco
Systems, such as the denial of service, HTTP server being disabled, bypassing
authentication and executing any command on the router at the most privileged
level, and many more. CGE is executable from the command line by inputting two
simple parameters, like the target and the vulnerability to exploit. Basic syntax for
first tried the first vulnerability, which is the Cisco 677/678 Telnet Buffer Overflow
[31]
See Appendix Q for the sample laboratory manual 101
[31]
James, P. (2018). Cisco Auditing Tool & Cisco Global Exploiter to Exploit 14 Vulnerabilities in Cisco
Switches and Routers. Retrieved from https://gbhackers.com/cisco-global-exploiter-cge/
CHAPTER IV: PRESENTATION AND DISCUSSION
Vulnerability, which affects the operating system of the Cisco routers. Furthermore,
this vulnerability can cause a denial of service by freezing the system. Figure 30
shows the result of the attack. It shows on the result that “No telnet server detected
number two (2) attack Cisco IOS Router Denial of Service Vulnerability, wherein it
can, again, cause a denial of service on both Cisco routers and switches. If the
IOS HTTP service is enabled, this vulnerability can cause the Cisco router or
switch to stop, perform slower, or reload. The result showed that there is no HTTP
The researchers tested some pilot tests wherein they tried all fourteen (14)
fourteen (14) vulnerabilities did not successfully affect the services in Cisco routers
and switches systems. The researchers discovered that this was due to the
equipment that the researchers used. The researchers found specific models and
102
CHAPTER IV: PRESENTATION AND DISCUSSION
versions of cisco routers and switches that must be utilized for these fourteen (14)
tools to become successful with the attack. With that being said, the researchers
103
CHAPTER IV: PRESENTATION AND DISCUSSION
Yersinia
Yersinia[32] is a penetration testing tool that performs layer two (2) attacks
on the Open Systems Interconnection (OSI) layer. It targets protocols explicitly like
the Dynamic Host Configuration Protocol (DHCP), Spanning Tree Protocol (STP),
Cisco Discovery Protocol (CDP), Hot Standby Router Protocol (HRSP), VLAN
Trunking Protocol (VTP), and many more. It performs a denial of service attack. It
is a free and open-source penetration testing tool that uses its two (2) modes: GTK
researchers simulated two (2) types of attacks on the target DHCP server: the
BlueTeam router, the DHCP starvation, and the flooding of the CDP tables. Also,
these two protocols were stated to be found from the monitoring done by the tool
devices (e.g., computers, laptops, cellphones, etc.), and the other additional
information like the default gateway or Domain Name System (DNS) is configured.
By that, DHCP has a range of IP addresses to give away, depending on the size
of the network. However, with the DHCP starvation, the attacker sends tons of fake
requests for IP addresses until all the IP address is already acquired. Since all
[32]
See Appendix Q for the sample laboratory manual 104
[32]
Bisson, M. n.d. How To Install And Use Yersinia On Kali Linux? Retrieved from
https://blog.eldernode.com/install-and-use-yersinia-on-kali-linux/
CHAPTER IV: PRESENTATION AND DISCUSSION
The second type of attack was flooding the CDP tables. The CDP Protocol
is a proprietary layer 2 Cisco network protocol that is enabled by default and used
and tells the type of devices present within its network and how it was connected.
For every sixty (60) seconds, CDP messages are transmitted. Also, the time
interval for the neighboring compliant devices to cache the information is one-
attacker to flood the CDP tables that cause the device to record in its table non-
existent MAC addresses. Furthermore, it causes the CPU process of the device to
slow down.
from the attacker to the DHCP server on the target router. Overall, there were two-
requests bombarded to the target at sixty (60) seconds. Using a device to monitor
the time, which was also used for the rest of the evaluation of this tool, at the eighty-
two (82) seconds mark, the target router started to malfunction, wherein the LED
said, depicted in figure 32, using the ifconfig eth0, no IP address was presented
105
CHAPTER IV: PRESENTATION AND DISCUSSION
Figure 33, shown below, verifies the successful flooding of the CDP table
on the switch. Different device IDs were detected as neighbors of the router, all of
which are connected to the eth0 port. The hold time or the interval of the CDP
(250) seconds or so, wherein the actual time interval is for one hundred eighty
seconds (180) seconds only. Furthermore, there are several capabilities codes
listed on each detected neighboring device. Wherein R stands for the router, S for
Switch, H for the host, and T for trans bridge. In addition, the port ID was also
identified to be eth0 for all of the fake devices. Just like what happened in the target
router, the target switch’s LED indicators stopped flashing, indicating that the
denial-of-service attack was a success. The time it took was forty-eight (48)
seconds.
106
CHAPTER IV: PRESENTATION AND DISCUSSION
107
CHAPTER IV: PRESENTATION AND DISCUSSION
Aircrack-ng
phase, where it evaluates Wi-Fi network security. Its functionalities include the
ability to monitor a Wi-Fi network through packet capturing and then sending the
points, checking the capabilities of Wi-Fi cards, and cracking WEP and WPA PSK.
Aircrack-ng operates through the command-line interface (CLI) and uses various
tools for evaluating Wi-Fi network security. In this study, the researchers used
which are the steps for cracking the WPA of the access point.
The Raspberry Pi's wireless network adapter, which the researchers used
as the attacker, offers a monitor mode option. The monitor mode feature is a mode
in the wireless network adapter that enables the researchers to inspect the traffic
ongoing around the area. Airmon-ng is used to manage wireless extension modes.
The wireless card was switched from managed to monitor mode in sniffing wireless
connection. After getting inside the monitor mode, scanning for the target access
points and station is the next step, using the airodump-ng tool.
[33]
See Appendix Q for the sample laboratory manual 108
[33]
Robb, D. (2019). Aircrack-ng: Pen Testing Product Overview and Analysis. Retrieved from
https://www.esecurityplanet.com/products/aircrack-ng/
CHAPTER IV: PRESENTATION AND DISCUSSION
Figure 34.1 shows the scanned access points within the vicinity. A column
of STATION can be seen. In this study, the target access point was the TP-Link-
gained information regarding the target access point, capturing packets were
utilized. One of the researcher’s goals is to capture the WPA Handshake, a set of
4 EAPOL messages. But to capture 4 EAPOL data, the researchers first used the
tool aireplay-ng for the de-authentication of the client connected to the access
point. Once the WPA handshake has been captured, the captured WPA
109
CHAPTER IV: PRESENTATION AND DISCUSSION
Figure 34.2 shows the cracked WPA from the target TP-Link-Pentester.
Depending on the complexity of the password use, cracking WPA may take hours,
days, or even months. However, in this study, the access point’s password was
may take more time. Finally, to determine the speed of this tool, the researchers
only focused on the cracking phase. Using a device to measure the time taken to
crack the password, thus cracking the password “34859803” took twenty-one (21)
seconds.
110
CHAPTER IV: PRESENTATION AND DISCUSSION
Fern-WiFi-Cracker
gaining access phase with the same goal as other wireless network password
Fern-WiFi-Cracker can also recover those keys. It is just like Aircrack-ng but with
cracking. Specifically, it was used to decrypt the vulnerable access point with a
to change from managed mode to monitor mode. Therefore, the interface wlan0
was selected. With that, Fern-WiFi-Cracker could scan the active access points
within the range. Since the target access point was detected, the researchers
chose the regular attack, which was used for Wired Equivalent Privacy (WEP) and
Wi-Fi Protected Access (WPA) Protocols. Then, provided with a wordlist for a
Handshake was captured. Wherein the password was located on the Key
Database option.
In which it was arranged in a tabular form. The first column presented the SSID
the MAC address is also shown. Indicated in figure 35 is the Key Database option
[34]
See Appendix Q for the sample laboratory manual 111
[34]
Tutorialspoint, n.d. Kali Linux - Wireless Attacks. Retrieved from
https://www.tutorialspoint.com/kali_linux/kali_linux_wireless_attacks.htm#
CHAPTER IV: PRESENTATION AND DISCUSSION
of the Fern Wi-Fi-Cracker. In which it was arranged in a tabular form. The first
Furthermore, in the second column, the MAC address is also shown. The type of
encryption and the password key, the WPA and 34859803, were given,
respectively. In addition, the assigned channel was also stated. Finally, unlike the
tool Aircrack-ng, wherein only the cracking phase was tested for speed, Fern-WiFi-
Cracker’s speed was determined after pressing the “Attack” button. Like the
previous tool, the researchers used a device to measure the time to generate a
result. It took six (6) minutes and fifty-six (56) seconds to fully-cracked the wireless
network. And the time it took to crack the WPA handshake was five (5) minutes
112
CHAPTER IV: PRESENTATION AND DISCUSSION
Karmetasploit
create fake access points or modems. When users are connected to these spoofed
access points, Karmetasploit can be able to listen to the network traffics and then,
later, can be used to capture passwords. The captured information from the target
victim was then again used to execute a web browser attack. When using
such as airmon-ng.
From the Aircrack-ng section, figure 34.1 shows that one of the discovered
access points was the TP-Link-Pentester. With this, the researchers have targeted
this for performing fake access points. Due to the hardware limitations of the
attacker’s machine, an error was already prompted. The error was specifically on
the attacker’s wireless interface card. The researchers only used the built-in
monitor mode, creating an access point was impossible. Therefore, a fake access
point cannot be created. With that, measuring the speed could not also be
determined.
[35]
See Appendix Q for the sample laboratory manual 113
[35]
Offensive Security, n.d. Karmetasploit. Retrieved from https://www.offensive-security.com/metasploit-
unleashed/karmetasploit-action/
CHAPTER IV: PRESENTATION AND DISCUSSION
Setoolkit
Setoolkit[36] is the last penetration testing tool under the gaining access
phase. It is designed for social engineering attacks wherein humans are the main
target of the attack techniques. It has various custom attacks you can choose from,
and some of its features include creating phishing pages, cloning the original web
pages, faking phone numbers, sending SMS, and many more. The attacks are
done and operated in a command-line interface (CLI). SEtoolkit is simple and easy
to use, for it does not use any complicated commands in the execution of the
different attacks. It only uses numbers for the simulation of the attacks. Although
SEtoolkit exhibits many attacks for social engineering, only one feature under the
SEtoolkit tool was performed, specifically the cloning of the login page attack.
Google (google.com) was used as the website for the cloning attack. Measuring
Figure from the left, figure 36.1, shows that the researchers successfully
cloned the google.com (Google) website. The cloned website’s URL is not the
same as google.com. Instead, the URL of the fake website is the IP address of the
attacker. The cloned website was then sent to the target victim, acting like it was
the real and original website, but after the login credentials were typed in, it was
redirected back to the original website, which is google.com (Google). This cloned
passwords from the target. Then shown in figure 36.2, the figure from the right, the
[36]
See Appendix Q for the sample laboratory manual 114
[36]
Borges, E. (2020). The Social Engineering Toolkit. Security Trails. Retrieved from
https://securitytrails.com/blog/the-social-engineering-toolkit
CHAPTER IV: PRESENTATION AND DISCUSSION
attacker successfully sniffed the target’s username and password instantly. The
sniffed username and password were used for the next phishing attack.
Figure 36.1 and 36.2 Cloned Google Login Page and the Capture Credentials
115
CHAPTER IV: PRESENTATION AND DISCUSSION
testing tools. It can be seen that two (2) of the tools were under information
gathering. These were Recon-ng and theHarvester. Five (5) tools were classified
TCPDump, and ExploitDB. Lastly, twelve (12) tools were under the gaining access
116
CHAPTER IV: PRESENTATION AND DISCUSSION
The first phase conducted in this study was information gathering. Two (2)
tools were used during this phase. These were Recon-ng and theHarvester.
Shown in table 3.1 is the speed of the modules used in Recon-ng, and
theHarvester. Recon-ng has a total of two (2) modules used to gather information.
The whois_pocs module, which was specifically tasked to find contacts, generated
results for forty-seven (47) seconds, while the hackertarget module which was
utilized to scan hosts in a domain, produced results for twelve (12) seconds. On
the other hand, the tool theHarvester only used one (1) module which is the
hackertarget, it prompted results for six (6) seconds. However, these results may
Represented in table 3.2.1 is the two (2) of the five (5) tools used in scanning
vulnerabilities which are: Nmap, and Nikto. The tool Nmap, executed five (5)
attacks. For the ping scan to discover IP addresses of the target hosts, without and
with parameters, generated results for twenty-seven point four (27.04) seconds,
and sixteen point fourteen (16.14) seconds, respectively. While the scanning for
open ports, produced results for twenty-six point thirty seconds (26.30) seconds.
method using the script ssh-brute.nse, which prompted results for one hundred
(100) seconds.
Table 3.2.2 shows the two (2) tools used for network monitoring, which are
However, measuring the speed was an unnecessary factor for these tools since
the goal was to capture wanted packets regardless of the time. The researchers
set a time limit of sixty (60) seconds for every three (3) trials and determined the
number of packets captured within the time frame. For Wireshark, it captured
118
CHAPTER IV: PRESENTATION AND DISCUSSION
consistently only two (2) packets within sixty (60) seconds for every trial. On the
other hand, TCPDump, generated twenty-three (23), two (2), and three (3) packets
The last tool under the scanning for vulnerabilities phase, the tool was
ExploitDB. The function that was discussed and performed in this study was
searching for exploits to specific services and these results must be included in the
tool Metasploit. Three (3) services were subjected to searching for vulnerabilities
and these were Telnet, SMB, and VNC. The result was shown in an instant the
reason that these exploits were locally stored in the attacker's machine. For this
reason, measuring the speed of ExploitDB was not taken as seen in table 3.2.3.
tools were subjected to test for speed. The exact process from previous phases
was conducted regarding how to evaluate each tool's speed. Speed was measured
from the start of exploiting or gaining access to a certain target up to when the
process concluded. However, it can also be seen in the table that three (3) tools'
speed was not measured because they all failed to perform their attacks. But, one
(1) of these three (3) tools, Metasploit, performed other than the gaining access
119
CHAPTER IV: PRESENTATION AND DISCUSSION
another phase other than its expected phase, which is the gaining access phase.
More of this was discussed in the proceeding parts of these chapters. Under the
the open port to the target server. This port scanning process took twelve (12)
seconds, as seen in table 3.3.1. For the gaining access phase wherein it exploited
the SMB service running in the same target server, speed was not measured since
exploitation failed.
For the next set of tools in table 3.3.2, Brutespray and THC-Hydra, the
speed will be discussed simultaneously since both tools were almost alike in the
process. Also, both tools brute-forced the SSH service running on the targets. No
comparison can be made since the number of threads used for brute-forcing was
not the same. The number of threads for Brutespray was set to four (4) for both
the target server and target desktop, and then three (3) for the target router for the
120
CHAPTER IV: PRESENTATION AND DISCUSSION
reason that exceeding three (3) will yield failure. For the THC-Hydra, the number
of threads used was set to sixteen for all the targets. In the order of target router,
target server, and target desktop, gleaned in table 9, the brute spray has brute-
forced the targets for two (2) minutes and forty-two (42) seconds; eleven (11)
minutes and fifty-one (51) seconds; and three (3) minutes and eight (8) seconds.
Similarly, also seen in table 9, THC-Hydra brute-forced the target for two (2)
minutes and twenty-nine (29) seconds; three (3) minutes and forty-three (43)
table 3.3.3. This tool performed a de-hashing of passwords of the other users
stored in the target server. All of the four (4) other users’ hashed passwords were
121
CHAPTER IV: PRESENTATION AND DISCUSSION
Just like from the tools Brutespray and THC-Hydra, the Burpsuite and
both performed a SQL injection to the same target website, which was the DVWA.
Also, another parameter that was considered was the difficulty level, ranging from
low, medium, high, and impossible. Although the target was the same time, their
respective process for performing SQL injection was not the same. BurpSuite
injected payloads from a list. On the other hand, SQLmap automatically performed
the SQL injection process. Starting at Burpsuite, referring to table 3.3.4, it only
took three-hundred eighty (380) seconds for low-level security and three-hundred
fifty (350) seconds for medium-level security. And then BurpSuite did not manage
to capture anything at a high and impossible security level. Then for SQLmap, it
successfully conducted SQL injection at all levels. Reflected also in table 3.3.4, it
managed to finish the process at sixty-eight (68) seconds for the low level. Then
for the medium level, it took seventy-three (73) seconds. Next, it took sixty-two (62)
seconds for the high level. Lastly, for the impossible level, it took sixty-five (65)
seconds.
122
CHAPTER IV: PRESENTATION AND DISCUSSION
Again, both tools’ speeds were given simultaneously because they both targeted
the same devices, target router, and switch and performed the same attack called
denial-of-service. But no comparison was needed since they both differ in process,
although Cisco-Global-Exploiter failed to target the said devices. With that, the only
tool required to discuss at this point was the Yersinia. This tool performed two (2)
attacks, namely DHCP Starvation and CDP Flooding Table. Speed in this context
was measured from the start of the process until the target devices started to crash.
Referring to table 3.3.5, for the DHCP Starvation, it took eighty-two (82) seconds
to crash the target router, then for the CDP Flooding Table, it took forty-eight (48)
seconds.
wireless network cracking at the same target access point. With this, the
presentation was then again discussed at the same time. However, a comparison
was not needed since the process was manual at the Aircrack-ng tool. On the other
hand, Fern-WiFi-cracker will do the cracking automatically once the target network
and wordlist are provided. Also, for the Aircrack-ng, the speed was only measured
123
CHAPTER IV: PRESENTATION AND DISCUSSION
speed was measured at the start of automated cracking and the time it takes to
crack the WPA password. With that, looking at table 3.3.6, the time it took for
Aircrack-ng to crack the WPA password was twenty-one (21) seconds. On the
other hand, Fern-WiFi-cracker took five (5) minutes and twenty-six (26) seconds
to crack the WPA password and six (6) minutes and fifty-six (56) seconds for the
Table 3.3.7 above showed that Karmetasploit, another tool for gaining
access phase, has no recorded speed. It means that this tool also failed. However,
unlike the other previous tools that failed to attack their respective targets, the
reason that Karmetasploit failed was due to hardware failure. With that, speed
The last tool under the gaining access phase was Social Engineering Toolkit
or SEtoolkit. The attack employed in this tool was about cloning websites,
particularly the Google log-in page. Measuring the speed for this tool was tricky.
At most, this speed could depend on the target user entering their credentials.
However, the measured speed that can be seen in table 3.3.8 refers to the time it
124
CHAPTER IV: PRESENTATION AND DISCUSSION
took for the attacker to view the credentials in its screen/terminal once the target
has entered its credentials; thus, the term ‘instantly’ was used.
125
CHAPTER IV: PRESENTATION AND DISCUSSIONS
that were simulated in the penetration testing laboratory, arranged from left to right,
SEToolkit. Following the result and discussions in the previous section, which is
the Penetration Testing Tools, these tools can be further sub-categorized and were
not only capable of doing their assigned penetration testing phase, but some tools
Aside from their logo and the tool's name, the researchers used colors as
tool’s phases. For the first phase of penetration testing, which is the information
gathering, the researchers used the color blue. On the contrary, for the second
phase of penetration testing, scanning vulnerabilities, the color green was utilized
for visualization. Additionally, for the third phase of penetration testing, the gaining
access, the color red was used. However, the researchers used the color black if
the tool failed to be tested in the penetration testing laboratory; therefore, it cannot
be verified if a tool can do its assigned penetration testing phase. With that being
126
CHAPTER IV: PRESENTATION AND DISCUSSIONS
testing.
Legend:
Information Gathering Gaining Access
Figure 37. Penetration Testing Tools and Their Penetration Testing Phases
127
CHAPTER IV: PRESENTATION AND DISCUSSIONS
Figure 37.1 shows the two (2) tools used for information gathering. Starting
from left to right side, which is the Recon-ng and theHarvester. The blue
background color was used because they could passively gather information
successfully in their target domain google.com and was solely used for the first
and hosts, thus produced with publicly available information. However, these tools
used.
Presented in figure 37.2.1 were two (2) of the tools used for scanning
vulnerabilities. However, notice that the image on the left, Nmap, was represented
by three (3) different colors. The first color was blue for information gathering.
Nmap was used to discover what hosts were available in the target’s network.
Other colors can be green for scanning vulnerabilities and red for the gaining
access phase. For the scanning vulnerabilities phase, the tool Nmap was utilized
to detect open ports together with the service running with it, particularly conducted
this tool to scan the target router, target server, target desktop, and the target
128
CHAPTER IV: PRESENTATION AND DISCUSSIONS
access point which were discovered using the host discovery scan of Nmap. For
the gaining access phase, with the use of the script entitled ssh-brute.nse, Nmap
doubt, Nmap was vital in stimulating and aiding other penetration testing tools in
successful attacks. These tools that Nmap helped with were Nikto, ExploitDB,
Unlike Nmap, Nikto was just depicted with its corresponding solid color
green background because it was just used to scan for vulnerabilities. From the
scan conducted using the tool Nmap, one of the discovered targets, the target
server, was found to have an open port 80. This port 80 was used for web services,
specifically for HTTP. This discovery solely utilized this tool to execute basic web
server scanning in the target website DVWA. Vulnerabilities that were learned
enabled the researchers to visit the directories that were not supposed to be
accessible. In addition, tuning for SQL injection was also performed to identify if
the target website was susceptible to SQL injection, which showed that it was since
this website was created to be vulnerable to several Web Application Testing. That
said, this tool enabled other penetration testing tools, specifically BurpSuite and
129
CHAPTER IV: PRESENTATION AND DISCUSSIONS
TCPDump. It was explicitly expressed that these tools were represented using
different colors, which meant that some of the tools were not solely for scanning
vulnerabilities. Although Wireshark and TCP Dump were fairly different in how they
operate, like Wireshark having a GUI and TCP Dump on CLI, they were both used
as network monitoring tools. With that, both tools were identified using two
background colors: green for scanning vulnerabilities and red for gaining access.
To scan for vulnerabilities, the researchers used these tools to examine protocols
like HTTP, DHCP, CDP, and many more, some of which are used by other
these tools were also used to capture packets' information. With the ability to read
packet information, these tools were also used to sniff passwords in a vulnerable
130
CHAPTER IV: PRESENTATION AND DISCUSSIONS
Lastly, for the ExploitDB, it was also represented using a green color only
in figure 37.2.3, wherein the goal of this tool was to compile the complete collection
of exploits, shellcodes, and many more. With the help of Nmap’s open port
scanning, this tool was able to be employed to search for the open ports in the
target router’s port 23 (Telnet), target server’s port 445 (SMB), and target desktop’s
port 5900(VNC). The result of the scanned vulnerabilities on specific open ports or
the protocols used can be utilized to know what possible exploits may or not be
applicable. Also, these results were used by Metasploit to conduct the exploitation
of such targets.
penetration testing phases. It was used for automated exploitation. However, even
131
CHAPTER IV: PRESENTATION AND DISCUSSIONS
was also used for scanning vulnerabilities, thus represented using two (2) colors:
green, for scanning vulnerabilities, and red, for gaining access. The researchers
simulated various attacks using Metasploit for the gaining access phase, one of
which was creating payloads, which were known as trojans. Another attack that
was also used, wherein the only service that could be subjected to exploitation was
the SMB service, and only one (1) exploit module could be used, which is the
the result of ExploitDB's search for the service Samba. Out of nine (9) exploits
could be used due to the relevancy of this module to the version of the SMB
running in the target server. Going back in the exploitation process, regardless of
how high the chance of these exploits being successful, the researchers were
prompted with the result "Exploit completed, but no session was created," thus
ending the attack with a failed attempt. On the other hand, for the scanning
vulnerabilities phase of the tool Metasploit, the researchers used the exploit name
portscan to scan the open ports in the target. It showed the researchers that this
132
CHAPTER IV: PRESENTATION AND DISCUSSIONS
Figure 37.3.2 shows the tools used for password cracking, with few
These three (3) tools were only performed in the gaining access phase. No other
function of the said tools has been discovered by the researchers wherein it
operated other than gaining access to their targets, thus representing the solid
color red. Two of these tools, Brutespray and THC-Hydra, operate online, meaning
that their target should be up and must have a connection to the attacker.
According to the Nmap’s scanned for open ports, the three (3) targets: target
router, target server, and target desktop, have open port 22. Although it could
change where the port it will run, the service OpenSSH was also discovered to be
running in the said open port. Under gray-box testing, which was implemented in
this study, the target usernames were known. After performing the brute force, the
target router, server, and desktop credentials were the following, respectively:
tool, John-the-Ripper, works offline in this study. It only needed a copy of the hash
the credentials used resulted from the brute-forcing of the Brutespray and THC-
Hydra, the researchers discovered that other users were present in the system.
The researchers would then use the John-the-Ripper to de-hash their passwords.
133
CHAPTER IV: PRESENTATION AND DISCUSSIONS
Other tools used in the gaining access phase were Burpsuite and SQLmap,
as represented in figure 37.3.3. These two tools were used for web application
testing. One of the most common Web Application vulnerabilities that were being
exploited was SQL injection. This attack aims to dump sensitive information from
a database. Since Nikto detected that the target server's website, DVWA, was
susceptible to SQL injection attacks, these tools, Burpsuite and SQLmap, were
used to exploit that vulnerability. In addition, DVWA has a feature wherein the
security level could be changed from low, medium, high, and impossible. The tool
BurpSuite only managed to dump data from low to medium levels. Also, the
passwords dump was hashed. However, in the case of SQLmap, aside from
disclosing all information from low to high, all the passwords dumped were also
de-hash. It means that the passwords presented were already readable in plain
text.
134
CHAPTER IV: PRESENTATION AND DISCUSSIONS
(2) tools were used for network infrastructure testing, which is also under the
gaining access phase, as represented. The prime targets of these tools were the
Cisco devices present in the developed penetration testing laboratory under the
targets’ side. For the Cisco-Global-Exploiter, the attack performed was based on
the host discovery scan of the tool Nmap. It was detected there was a Cisco device
DHCP starvation attack and a CDP Flooding Table to the target router and switch.
The attacks perpetrated by Yersinia were all Wireshark and TCPDump’s feat for
discovering the DHCP and the CDP packets running in the penetration testing
laboratory.
135
CHAPTER IV: PRESENTATION AND DISCUSSIONS
Three (3) tools were used to continue the wireless network testing: Aircrack-
ng, Fern-WiFi-Cracker, and Karmetasploit. From figure 37.3.5, notice that aside
from gaining access, Aircrack-ng and Fern-WiFi-Cracker were also used in the
function, other than that Fern-WiFi-Cracker was operated through GUI. In the
information gathering phase, these two tools collected data needed to move on to
the gaining access phase. These data were BSSID which is the MAC address of
the target access point, STATION or the MAC address of the client connected, and
the channel that the access point is broadcasting. Then under the gaining access
phase, once these data are collected, the tools proceeded to de-authenticate the
connected clients to capture WPA passwords. The cracking for this WPA will start
fake access point for the other tool under wireless network testing. Supposedly,
the researchers aim this tool to imitate the target access point’s configurations,
such as the BSSID and the channel. However, due to the hardware limitation of
136
CHAPTER IV: PRESENTATION AND DISCUSSIONS
the wireless card of the attacker machine, creating an access point was futile thus,
The last tool under the gaining access phase, referring to figure 37.3.6, was
the tool Social Engineering Toolkit or SEtoolkit. As implied by its name, SEtoolkit
was used for social engineering attacks. Although it posits many attacks on social
engineering, the presentation for this tool became limited. This limitation was due
to the absence of connection to the Internet. From that, the researchers only
in page.
137
CHAPTER IV: PRESENTATION AND DISCUSSIONS
LABORATORY
The third specific objective of the study was to determine the reliability and
acceptability of the penetration testing laboratory. The data used to answer the
problem was gathered through a questionnaire using the Likert Scale. There were
thirty (30) respondents, and all of them were students of Bachelor of Science in
all students of the Systems and Network Administration track, it is expected that
the respondents have already a prior knowledge of the ethical hacking topics and
the uses of VMware as well as the different penetration testing tools. The
[37]
questionnaire has three (3) parts. The first part was divided into four (4)
from the Usefulness, Satisfaction, and Ease of Use questionnaire by Arnie Lund
wherein some parts of the questions are modified to provide suitability of the
questionnaire in the study. Part two was to determine if any problems were
encountered during the testing. The third and last part was to know if the nineteen
(19) tools were sufficient and if not then they could suggest any tools.
[37]
See Appendix R for the questionnaire 138
CHAPTER IV: PRESENTATION AND DISCUSSIONS
thirty-item survey that investigates the four dimensions of usability which are:
five-point Likert scale rating was used by the researchers in this study. As shown
in Table 4, for each dimension, there were five (5) statements answered by the
Strongly Agree, adopted from the Likert Scale approached by Rensis Likert. All in
all, there are twenty (20) questions provided in the questionnaire. The respondents
139
CHAPTER IV: PRESENTATION AND DISCUSSIONS
The first category was usefulness, which was defined as something useful
in the sense that respondents believe that the penetration testing laboratory will
assist them in honing their skills in various penetration testing tools as well as
general knowledge of Systems and Network Administration. Table 4.1 shows the
five (5) questions under the usefulness category and their respective weighted
mean and interpretation based on the data and computations[38]. As shown in table
4.1, items one, two, and three were all interpreted as "Agree" regarding the
and 4.27, respectively. The other two questions, four and five, were interpreted as
"Strongly Agree." "The suitability of the penetration testing laboratory to the course
[38]
See Appendix S for the computation of the average weighted mean 140
CHAPTER IV: PRESENTATION AND DISCUSSIONS
laboratory is reliable" have the two highest computed average weighted mean,
These results showed that the penetration testing laboratory was a useful
instrument for the respondents in honing their skills in the different penetration
testing tools as well as in the general knowledge of the SNA subject. Furthermore,
the computed overall average weighted mean was 4.50, interpreted as "Strongly
Agree.
The second category was ease of use. Ease of use describes how easily
and quickly the respondents use the penetration testing laboratory. Table 4.2
shows the five (5) questions under the ease-of-use category and their respective
weighted mean and interpretation based on the data and computations[39]. The
weighted means for all questions were all interpreted as “Agree.” “The penetration
[39]
See Appendix S for the computation of the average weighted mean 141
CHAPTER IV: PRESENTATION AND DISCUSSIONS
issues)” and “The information (in the laboratory manual) provided is clear” have
the two highest computed weighted means with 4.23 and 4.20, respectively, with
The result clearly showed that the respondents agreed that it was easy for
the respondents to use the penetration testing laboratory. Question number five
has the highest weighted mean among the five questions. The penetration testing
issues. Furthermore, the majority of the respondents agreed that the information
142
CHAPTER IV: PRESENTATION AND DISCUSSIONS
The third category was the ease of learning which was defined as how
easily the information was acquired and retained in the minds of respondents.
Table 4.3 shows the five questions under the ease-of-learning category with their
computations[40]. Questions one, three, and five were interpreted as “Agree” with
3.57, 4.33, and 4.00, respectively, as their weighted mean. Question number four
has the highest weighted mean with 4.55 and was interpreted as “Strongly Agree.”
Notice that question number two was interpreted as “Neutral” with a 3.37 weighted
mean. Among all the statements under the questionnaire, this statement got the
lowest weighted mean with an interpretation of “Neutral.” With that, the researchers
asked some of the respondents’ opinions why it got only a neutral response. Some
respondents answered that this is due to some of the penetration testing tools
available in the manual. Some of the tools are not familiar to them. The
respondents have not yet tackled some penetration testing tools in their SNA 2
subject resulting in the respondents having a hard time learning some of the tools
observed that some of the respondents did not read the lab manual thoroughly.
Nevertheless, the overall average weighted mean for the category under
the ease of learning was 4.00, interpreted as “Agree.” The results showed that the
acquiring information and knowledge about the different penetration testing tools.
About that, the number four question, which is "the actual equipment (e.g., routers,
[40]
See Appendix S for the computation of the average weighted mean 143
CHAPTER IV: PRESENTATION AND DISCUSSIONS
access points, switches) helps the sense of reality," has the highest weighted
mean. This shows that the help of the actual equipment provides a sense of reality
to the students. As a result, the information and steps can be easily retained in the
The fourth and last category was satisfaction. Knowing the satisfaction level
of respondents about the penetration testing laboratory was essential and relevant
expectations have been met. Table 4.4 shows the five questions under the
satisfaction category and their respective weighted mean and interpretation based
on the data and computations [41]. All the results of the weighted mean under the
[41]
See Appendix S for the computation of the average weighted mean 144
CHAPTER IV: PRESENTATION AND DISCUSSIONS
satisfaction category were interpreted as “Agree.” Questions one and four have
the highest weighted mean with 4.37 and 4.30, respectively, with an interpretation
of "Agree." The result of the overall average weighted mean for the category
satisfaction was 3.97 with an interpretation of "Agree." The result clearly showed
that most of the respondents agreed that they were satisfied with the penetration
Based on the results acquired by the researchers for the four categories
weighted mean of 4.50, 3.97, 4.00, and 3.9, respectively. The usefulness category
has an interpretation of Strongly Agree and the rest of the categories, Ease of Use,
technical difficulties or errors during the testing. For part two of the questionnaire,
a single question is asked, “Did you experience any technical difficulties and errors
during the simulation of the different penetration testing tools and the laboratory
equipment itself?” Possible errors and technical issues were listed such as delays
or lagging, software malfunctioning, and the operating system not functioning well.
145
CHAPTER IV: PRESENTATION AND DISCUSSIONS
The respondents can choose among the choices as many as possible, otherwise,
if there is still an error or technical issues that were not listed in the choices, they
can add to the given blank space provided. This part of the questionnaire helped
the researchers to what extent they need to improve on the penetration testing
laboratory. After further investigation, three (3) respondents only answered that
there were delays and lags during the testing, specifically, when using the tools
that were operated in the graphical user interface (GUI). Aside from that, there
Another part of the questionnaire, which is the last part, consists of only
another single question, “Are the tools provided enough for the supplement of the
Ethical Hacking topic?” The researchers wished to know if the provided penetration
testing tools, were enough to supplement the Ethical Hacking topic. This part was
another penetration testing tool he or she wished were included in the laboratory.
According to the researchers' data, twenty-seven (27) students among the thirty
(30) students answered “Yes.” This result means that the provided penetration
testing tools were enough to supplement the Ethical Hacking topic. The other three
(3) students who answered “No” recommended some penetration testing tools,
146
CHAPTER IV: PRESENTATION AND DISCUSSIONS
problems from setting up the lab using the provided equipment (Cisco switches,
routers, access points, and Raspberry Pi) to configuring each piece of equipment
to simulating various penetration testing tools. The major problem is the internet
internet plays an essential role in this study. Some of the results and outputs in
some penetration testing tools are dependent on the internet, such as Recon-ng,
and theHarvester; thus, solid, and fast internet connectivity is a great challenge for
BurpSuite
BurpSuite is one of the tools under the gaining access phase, a suite of
tools for web application penetration testing. The researchers faced problems
while installing the graphical user interface (GUI) of the BurpSuite. BurpSuite, by
default, is already installed in the Kali Linux operating system. However, for ARM
download it using the APT package manager. However, if the installed Kali Linux
147
CHAPTER IV: PRESENTATION AND DISCUSSIONS
is not in ARM 64-bit, BurpSuite cannot be installed in the APT package manager
inside the attacker’s machine because the version of Kali Linux installed in the
system should be 64-bit. However, Kali Linux does have BurpSuite in its APT
package manager.
Cisco-Global-Exploiter
phase that can exploit fourteen (14) most dangerous vulnerabilities in Cisco
switches and routers. The researchers tried all fourteen (14) attacks, but none of
them became successful. At the end of every attack, there was a message that
said that there was “No telnet server detected on 192.168.2.1 ...,” and “No HTTP
then found out that this is due to the equipment used. It was discovered that
specific models and versions of cisco routers and switches must be utilized for
these fourteen (14) tools to succeed with the attack. For example, for attack
number one, the Cisco 677/678 Telnet Buffer Overflow Vulnerability, this attack
only works to cisco routers models 626, 627, 633, 673, 675, 675e, 676, 77, 677i,
148
CHAPTER IV: PRESENTATION AND DISCUSSIONS
and 678 Telnet. The only model of the cisco router the researchers used was 2811.
Another example is attack number seven, the Cisco Catalyst 3500 XL Remote
Arbitrary Command Vulnerability. The only model of cisco switches with this
vulnerability that will work is the model Cisco Catalyst 3500 XL. The researchers
have only the model Cisco Catalyst 3750 Series Switch in this study.
Karmetasploit
Karmetasploit is one of the penetration testing tools, again from the gaining
access phase. Karmetasploit's primary goal is to create a fake access point where
the client or the victim will connect. After connecting, it will be greeted with a captive
portal, which is like a gateway to use the services. Several attacks will be made
against the victim or client after the connection, such as the attacker can now
The command used for creating a fake access point is sudo airbase-ng -P
SSID name of the access point target of the attacker. At first, the prompt shows
Access Point with BSSID xx:xx:xx:xx:xx:xx started, stating that a fake access point
has been created, but after some seconds, an error will be prompted. This error
means that the fake access point cannot be created. On the other hand, the
researchers tried simulating this in other devices such as laptops, and it worked.
Hence, the error is due to the hardware limitation of the attacker’s machine
149
CHAPTER IV: PRESENTATION AND DISCUSSIONS
specifically its wireless interface, which is a vital element for creating an access
point.
150
CHAPTER V: SUMMARY, CONCLUSION, AND RECOMMENDATIONS
CHAPTER 5
discussing the study's summary and conclusion and some recommendations for
SUMMARY
testing tools were tested without conducting any illegal activity and with utmost
testing laboratory were three (3) Raspberry Pi machines, two (2) routers, one (1)
switch, and an access point. Consequently, the target router was configured as a
DHCP server. Both routers are configured with routings such as EIGRP and BGP.
With that, nineteen (19) tools were tested. A laboratory manual was
provided for the users to guide them regarding how to use each tool. Of the
nineteen (19) tools, sixteen (16) tools have successfully gained access to the
different targets, some of which only aided some tools to gain access, and one (1)
tool failed due to the operating system used by the target desktop. However, it was
guaranteed that other operating systems, specifically Windows will work. The
151
CHAPTER V: SUMMARY, CONCLUSION, AND RECOMMENDATIONS
laboratory manual did not include the remaining two (2) tools. During the testing
of the said laboratory, thirty (30) respondents tried evaluating the reliability and
three (3) parts. The first part was divided into four (4) dimensions: Usefulness,
Ease of Use, Ease of Learning, and Satisfaction. The dimension Usefulness has
have scored "Agree." For the second part, problems encountered, the respondents
answered that they have encountered a problem. For the last part, the respondents
were to answer if the seventeen (17) tools presented in the laboratory manual were
sufficient. Most of them said that it was enough while some said "no" and they gave
this study. One problem encountered was the Internet connection. The other was
about the tools used. For the tools, one tool was not available for the attacker
function properly.
152
CHAPTER V: SUMMARY, CONCLUSION, AND RECOMMENDATIONS
CONCLUSIONS
B+ are the target computers, namely the target server and target desktop. The
attacker machine is running the Kali Linux operating system, which is dedicated to
penetration testing. The target server runs Ubuntu Server for ARM, and the target
desktop runs the Raspbian operating system. In addition to the computers, one (1)
switch and two (2) routers were also included. The switch was a Cisco Catalyst
3750, and the routers were Cisco 2811. Also included was an access point, TP-
Link TL-WR840N was also included. Finally, aside from developing a penetration
The nineteen (19) tools used were categorized according to the phase they
were used. Two (2) of them were under the information gathering, which were the
Recon-ng and theHarvester. Five (5) of the tools were categorized under the
scanning for vulnerabilities phase, and these were Nmap, Nikto, Wireshark,
TCPDump, and ExploitDB. For the last phase of the study, the gaining access
phase, the remaining twelve (12) tools were under it. These were Metasploit,
Social Engineering Toolkit. Of these nineteen (19) tools, two (2) of them were not
included in the created laboratory manual, CGE, and Karmetasploit. For the CGE,
153
CHAPTER V: SUMMARY, CONCLUSION, AND RECOMMENDATIONS
the target of these tools was not available in the developed laboratory, making it
pointless. Then for the Karmetasploit, the wireless card of the attacker machine
was not capable of creating an access point which is the vital function needed to
was followed in conducting penetration testing. From the tools under gaining
access, nine (9) have successfully attacked their targets. The three (3) remaining
tools have failed; specifically, the tools stated beforehand that were not used and
the Metasploit. Although a very useful tool, Metasploit has failed to attack due to
the reason that the vulnerable Samba app used by the target server was not
thirty (30) students from the Systems and Network Administration 2 students of
be the respondents. They answered a three (3) part questionnaire. The first part
was to determine the reliability of the laboratory in terms of four (4) dimensions.
The first dimension was Usefulness which scored an average weighted mean
(AWM) of 4.50 with a descriptive equivalent of "Strongly Agree." This means that
the respondents have found that the developed laboratory would be useful in
honing their penetration testing skills. The next dimension was the Ease of Use. It
garnered 3.97 AWM and a descriptive equivalent of "Agree." This means that the
respondents operate the laboratory with ease. The third dimension was Ease of
154
CHAPTER V: SUMMARY, CONCLUSION, AND RECOMMENDATIONS
proves that the respondents could absorb information in the created laboratory
manual easily. For the final dimension, Satisfaction, it also scored 3.97 AWM with
the developed laboratory. In the second part of the questionnaire, they were to
answer problems have arisen during their evaluation. Only three (3) respondents
have responded and stated that the problem they have encountered was delays
and lags. For the last part, the respondents were asked whether the seventeen
(17) tools presented were enough. Twenty-seven (27) of them answered "Yes"
while the remaining said "No" and gave some possible tools to be included. The
One main problem faced by the researchers was the Internet connection. Although
it did not directly affect the outcome of this study, the Internet played a vital role in
writing it. Other problems encountered were about the tools BurpSuite, Cisco-
only available for ARM 64-bit architectures. The first installed Kali Linux was only
32bit thus, forcing the researchers to install the 64-bit version. Then for the tool
CGE, as stated earlier, the target devices that could be used with CGE were not
included in the developed laboratory. Then for the Karmetasploit, again, the
wireless card of the attacker machine does not support creating an access point.
155
CHAPTER V: SUMMARY, CONCLUSION, AND RECOMMENDATIONS
RECOMMENDATIONS
Based on the summary and conclusions presented above, the researchers thus
connect some targets to the Internet since it may be the avenue for the black
for a Windows machine; thus, future researchers could explore more when
156
CHAPTER V: SUMMARY, CONCLUSION, AND RECOMMENDATIONS
5. Aside from the service SSH, brute force can also be applied to other
services. Also, for Web Application Testing, the researchers only performed
SQL injection. DVWA is a website that hosts different modules for web
Site Scripting (XSS), and many more. With this, future researchers are
need to replace the routers and switches with the right model that is
exploitable by the CGE. If not possible, CGE could be replaced with other
penetration testing tools, or if they were to use the same tools as the
researchers of this study used, they are also highly encouraged to dive
deeper into these tools. Moreover, future researchers could add penetration
8. Some minor problem that was not stated is that the attacker machine
sometimes hangs or lags. Thus a hard reboot was needed. For this to may
157
CHAPTER V: SUMMARY, CONCLUSION, AND RECOMMENDATIONS
two groups. One will act as the Red Team and the other as the Blue Team.
Blue Team will configure the topology, which could vary depending on the
difficulty. Therefore, the attacker Red Team will have little or no idea about
158
BIBLIOGRAPHY
14 Tips for Public Wi-Fi Hotspot Security (pcmag.com). Retrieved March 2, 2021,
from sea.pcmag.com Website:
https://sea.pcmag.com/networking/32315/14-tips-for-public-wi-fi-hotspot
security
Aar, Palak & Sharma, Aman. (2017). Analysis of Penetration Testing Tools.
International Journal of Advanced Research in Computer Science and
Software Engineering. 7. 36. 10.23956/ijarcsse.v7i9.408
Amer, O. (2020, Feb). FBI: Crybercrime losses tripled over the last 5 years.
Retrieved May 2022 from https://www.welivesecurity.com/2020/02/13/fbi
cybercrime-losses-tripled-last-5-years/
Art, S. (2020 June). Pinoy hackers patch sites without authorization. Retrieved
May 2022 from https://mb.com.ph/2020/07/01/pinoy-hackers-patch-sites
without-authorization/
Art, S. (2020, August). Hackers breach the Philippine Government website anew.
Retrieved May 2022 from https://mb.com.ph/2020/08/28/hackers-breach
philippine-government-website-anew/
Art, S. (2020, December). Office of the Solicitor General of the Philippines hacked.
Retrieved May 2022 from https://mb.com.ph/2020/12/01/office-of-the
solicitor-general-of-the-philippines-hacked/
Art, S. (2021, February). PNPA databased hacked, website defaced. Retrieved
May 2022 from https://mb.com.ph/2021/02/03/pnpa-database-hacked
website-defaced/
Bacudio, Aileen & Yuan, Xiaohong & Chu, Bei & Jones, Monique. (2011). An
Overview of Penetration Testing. International Journal of Network Security
& Its Applications. 3. 19-38. 10.5121/ijnsa.2011.3602
Ben, W. (2021). What is Kali Linux? Kali. Retrieved from
https://www.kali.org/docs/introduction/what-is-kali-linux/
Bisson, M. n.d. How To Install And Use Yersinia On Kali Linux? Retrieved from
https://blog.eldernode.com/install-and-use-yersinia-on-kali-linux/
Blancaflor, E., Alvarez, L.A., Dioniso, N.M., Acuna, G.E., Funilas, J.R., & Odicta,
J.M. (2021). Penetration Test on Home Network Environments: A
Cybersecurity Case Study. Association for Computing Machinery New
York, NY, United States. 100–
104https://doi.org/10.1145/3483816.3483834
159
BIBLIOGRAPHY
Borges, E. (2020). The Social Engineering Toolkit. Security Trails. Retrieved from
https://securitytrails.com/blog/the-social-engineering-toolkit
Brathwaite, S. (2021, February 23). Active vs Passive cybersecurity
reconnaissance in Information Security. SecurityMadeSimple. Retrieved
June 9, 2022, from https://www.securitymadesimple.org/cybersecurity-
blog/active-vs-passive-cyber-reconnaissance-in-information-security
Chipeta, C. (2022, May 12). Open Source Intelligence (OSINT): Top Tools and
Techniques | UpGuard. UpGuard. Retrieved June 9, 2022, from
https://www.upguard.com/blog/open-source-intelligence
Common Cyber Security Measures (n.d). Retrieved October 21, 2021, from
nibusinessinfo.co.uk. Website
https://www.nibusinessinfo.co.uk/content/common-cyber-security
measures
Comptia, n.d. What Is Wireshark and How Is It Used? Retrieved from
https://www.comptia.org/content/articles/what-is-wireshark-and-how-to-
use-it-Cyber threat encounter rate by country 2019. Retrieved March 2,
2021, from Statista.com. Website:
https://www.statista.com/statistics/194133/cybercrime-rate-in-selected
countries/
CyberDegrees.org Staff. (2022, May 13). Penetration Tester Career Overview |
Cyber Degrees. Explore Cybersecurity Degrees and Careers |
CyberDegrees.Org. Retrieved June 9, 2022, from
https://www.cyberdegrees.org/jobs/penetration-tester/
David, R. (2018, November). The Digitization of the World from Edge to Core.
Retrieved May 2022 from https://www.seagate.com/files/www-content/our-
story/trends/files/idc-seagate-dataage-whitepaper.pdf
160
BIBLIOGRAPHY
He-Jun Lu, Yang Yu, "Research on Wi-Fi Penetration Testing with Kali Linux",
Complexity, vol. 2021,ArticleID 5570001, 8 pages, 2021. https://doi.
org/10.1155/2021/5570001
Huro, S. (2020). How to Use Burp Suite Professional for Web Application Security
[Part One]. Delta Risk. Retrieved from https://deltarisk.com/blog/how-to-
use-burp-suite-professional-for-web-application-security-part-one/
Imperva (2021). Penetration Testing. Retrieved from:
https://www.imperva.com/learn/application-security/penetration-testing/
Imperva, n.d. SQL (Structured query language) Injection. Retrieved from
https://www.imperva.com/learn/application-security/sql-injection-sqli/
161
BIBLIOGRAPHY
Kaspersky. (2022b, March 30). White Hat Hackers: The Good, the Bad, or the
Ugly? Www.Kaspersky.Com. Retrieved June 9, 2022, from
https://www.kaspersky.com/resource-center/definitions/white-hat-hackers
Kaspersky. (2022c, May 11). Brute Force Attack: Definition and Examples.
Www.Kaspersky.Com. Retrieved June 9, 2022, from
https://www.kaspersky.com/resource-center/definitions/brute-force-attack
Kaspersky. (n.d). Black hat, White, hat, and Gray hat hackers – Definition and
Explanation Retrieved May 2022 from https://www.kaspersky.com/resource
center/definitions/hacker-hat-types
Mamilla, Sushmitha Reddy, "A Study of Penetration Testing Processes and Tools"
(2021). Electronic Theses, Projects, and Dissertations. 1220.
https://scholarworks.lib.csusb.edu/etd/1220
MB Technews. (2022, June 4th). SMEs and government agencies get
cybersecurity assistance. Retrieved from
https://mb.com.ph/2022/06/04/smes-and-government-agencies-get-
cybersecurity-assistance/
Offensive Security, n.d. Exploit Database (EDB). Retrieved from
162
BIBLIOGRAPHY
https://www.cybersecurityintelligence.com/exploit-database-edb-515.html
Offensive Security, n.d. Karmetasploit. Retrieved from https://www.offensive-
security.com/metasploit-unleashed/karmetasploit-
action/OJbnA9YzeNknJxuxGpKSJ~2Tji4usvoNDBi0eF6aXwRlMFgqtAYB
GQXAg KQ8PlI8DeY0bsSQ6v2C3suTUAeMf5KGq-
WzjCP4aEmdtO0~WSy8zvcytL0FYn4MleuPjYkIy6nLil5LGtE9rK0IfklcjJEl4
avJKZ
2vALeCk6GlfMPw4SNDLIcyPLu7LPTrl5R2SVJtwXFLR5oaYpud2TXB2Xk
vJ
Oxford University Press (OUP). (n.d.). datasphere. Lexico.Com. Retrieved June 9,
2022, from https://www.lexico.com/definition/datasphere
163
BIBLIOGRAPHY
Santhi, V., Kumar, K., & Kumar, B. L. (2016). Penetration Testing using Linux
Tools: Attacks and Defense Strategies. International Journal of Engineering
Shivanandhan, M. (2021). Web Server Scanning With Nikto – A Beginner's Guide.
freeCodeCamp. Retrieved from https://www.freecodecamp.org/news/an-
introduction-to-web-server-scanning-with-nikto/
Simplilearn (2019). What Is Nmap? A Comprehensive Tutorial For Network
Mapping. Retrieved from https://www.simplilearn.com/tutorials/cyber-
security-tutorial/what-is-nmap-testing.html
Swinhoe, D. (2020, August 5). What is a dictionary attack? And how you can easily
stop them. CSO Online. Retrieved June 9, 2022, from
https://www.csoonline.com/article/3568794/what-is-a-dictionary-attack-
and-how-you-can-easily-stop-them.html
Techopedia. (2021, October 21). Session Cookie. Techopedia.Com. Retrieved
June 9, 2022, from https://www.techopedia.com/definition/4910/session-
cookie
Tutorialspoint, n.d. Kali Linux - Wireless Attacks. Retrieved from
https://www.tutorialspoint.com/kali_linux/kali_linux_wireless_attacks.htm#
What Is an API Key? | API Key Definition. (n.d.). Fortinet. Retrieved June 9, 2022,
from https://www.fortinet.com/resources/cyberglossary/api-key
164
APPENDICES
APPENDIX A
(ACTUAL LABORATORY SETUP)
Access Point
RPi 3B+ RPi 3B+ TP-Link TL-
(Target (Target Web WR840N
Desktop) Server)
RPi 4B
(Attacker)
2811 Cisco
3750 Cisco
2811 Cisco Router
Switch
Router (BlueTeam)
(RedTeam)
165
Page 1 of 2
APPENDICES
APPENDIX A
(ACTUAL LABORATORY SETUP)
RPi 3B+
(Target
Desktop)
RPi 3B+
(Target Web
Server)
RPi 4B
(Attacker)
166
Page 2 of 2
APPENDICES
APPENDIX B
(CISCO 2811 ROUTER FULL TECHNICAL SPECIFICATIONS)
167
Page 1 of 3
APPENDICES
APPENDIX B
(CISCO 2811 ROUTER FULL TECHNICAL SPECIFICATIONS)
Page 2 of 3 168
APPENDICES
APPENDIX B
(CISCO 2811 CATALYST ROUTER FULL TECHNICAL SPECIFICATIONS)
169
Page 3 of 3
APPENDICES
APPENDIX C
170
APPENDICES
APPENDIX D
171
APPENDICES
APPENDIX E
Page 1 of 6 172
APPENDICES
APPENDIX E
173
Page 2 of 6
APPENDICES
APPENDIX E
174
Page 3 of 6
APPENDICES
APPENDIX E
Page 4 of 6 175
APPENDICES
APPENDIX E
Page 5 of 6 176
APPENDICES
APPENDIX E
Page 6 of 6 177
APPENDICES
APPENDIX F
Page 1 of 2 178
APPENDICES
APPENDIX F
Page 2 of 2 179
APPENDICES
APPENDIX G
180
APPENDICES
APPENDIX H
181
APPENDICES
APPENDIX I
182
Page 1 of 2
APPENDICES
APPENDIX I
183
Page 2 of 2
APPENDICES
APPENDIX J
(FULL SPECIFICATIONS OF STRONTIUM NITRO SRN32TFU1QR 16GB
MICRO SD CARD
184
APPENDICES
APPENDIX K
(PORTS AND NETWORK CONFIGURATIONS)
Red Team router:
Router>enable #Enter privileged mode
Router#configure terminal #Enter global configuration mode
Router(config)#hostname RedTeam #Changing hostname
RedTeam(config)#interface fastethernet #Enter interface configuration mode
0/1
RedTeam(config-if)#ip address #Assigning IP address and subnet mask
192.168.4.1 255.255.255.0
RedTeam(config-if)#no shutdown #Enables/brings up an interface
RedTeam(config-if)#exit #Goes back to global configuration
mode
RedTeam(config)#interface serial0/3/0 #Goes to interface configuration mode
RedTeam(config-if)#ip add 10.0.0.2 #Assigning IP address and subnet mask
255.0.0.0
RedTeam(config-if)#no shutdown #Enables/brings up an interface
RedTeam(config-if)#end #Enter privileged EXEC mode
185
APPENDICES
APPENDIX L
(SSH AND TELNET CONFIGURATIONS)
186
Page 1 of 2
APPENDICES
APPENDIX L
(SSH AND TELNET CONFIGURATIONS)
187
Page 2 of 2
APPENDICES
APPENDIX M
Blue Team
BlueTeam>en #Enter privileged mode
BlueTeam#configure terminal #Enter global configuration mode
BlueTeam(config)#router eigrp 10 #Enable EIGRP and setting the ASN
BlueTeam(config-router)#network #Local interfaces to include in
192.168.2.0 255.255.255.0 EIGRP
BlueTeam(config-router)#network
10.0.0.0 255.0.0.0
BlueTeam(config-router)#end #Goes back to privileged EXEC
mode
188
Page 1 of 2
APPENDICES
APPENDIX M
RedTeam(config-router)#neighbor
10.0.0.1 remote-as 65002
RedTeam(config-router)#end #Goes back to privileged EXEC mode
Blue Team
BlueTeam>en #Enter privileged mode
BlueTeam #configure terminal #Enter global configuration mode
BlueTeam (config)#router bgp 65002 #Enabling BGP and setting ASN
BlueTeam (config-router)#network #Broadcasting a BGP on the
192.168.2.0 connected network
BlueTeam (config-router)#network
10.0.0.0
BlueTeam (config-router)#neighbor #Establishing this IP address as a
192.168.4.1 remote-as 65001 neighbor of a remote ASN
BlueTeam (config-router)#neighbor
10.0.0.2 remote-as 65001
BlueTeam (config-router)#end #Goes back to privileged EXEC
mode
189
Page 2 of 2
APPENDICES
APPENDIX N
190
APPENDICES
APPENDIX O
191
Page 1 of 2
APPENDICES
APPENDIX O
192
Page 2 of 2
APPENDICES
APPENDIX P
193
APPENDICES
APPENDIX Q
194
Page 1 of 5
APPENDICES
Page 2 of 5 195
APPENDICES
196
Page 3 of 5
APPENDICES
Page 4 of 5 197
APPENDICES
198
Page 5 of 5
APPENDICES
APPENDIX R
(QUESTIONNAIRE)
2. I got to familiarize
myself more with the
different penetration
testing tools.
Page 1 of 4 199
APPENDICES
4. Suitability of the
penetration testing
laboratory to the course
major Systems and
Network Administration.
b. EASE OF USE. How easy and quick for you to use the penetration testing
laboratory?
Strongly Disagree Neutral Agree Strongly
Disagree Agree
1. It is user-friendly.
200
Page 2 of 4
APPENDICES
201
Page 3 of 4
APPENDICES
II. Did you experience any technical difficulties and errors during the simulation
of the different penetration testing tools and the laboratory equipment itself?
Direction: If yes, put check () in the box provided. (You may choose as
many as possible.)
Delays, lagging
Software malfunction
Operating System not functioning well
Others comment below:
________________________________________________________________
III. Are the tools provided enough for the supplement of the Ethical Hacking
topic? (Optional)
___ Yes ___ No
If not, please recommend penetration testing tools you wish were included
in the laboratory.
________________________________________________________________
202
Page 4 of 4
APPENDICES
APPENDIX S
Data Gathered:
Numerical Rating
1 2 3 4 5
A. Usefulness Strongly Disagree Neutral Agree Strongly
Disagree Agree
1. It gives me more control 0 0 6 11 13
over the different
penetration testing tools.
4. Suitability of the 0 0 0 1 29
penetration testing
laboratory to the course
major Systems and
Network Administration.
5. The penetration testing 0 0 3 5 22
laboratory is reliable.
203
Page 1 of 6
APPENDICES
Numerical Rating
1 2 3 4 5
b. Ease of Use Strongly Disagree Neutral Agree Strongly
Disagree Agree
1. It is user-friendly. 0 0 9 12 9
Numerical Rating
1 2 3 4 5
c. Ease of Learning Strongly Disagree Neutral Agree Strongly
Disagree Agree
1. I learned to operate 0 4 9 13 4
the penetration testing
laboratory quickly and I
easily remember how to
use it.
2. I got to learn the 0 5 11 12 2
different penetration
testing tools quickly.
Page 2 of 6 204
APPENDICES
3. I found the 0 0 5 10 15
instructions on the
laboratory manual very
helpful and easy to
understand.
4. Actual equipment 0 0 2 4 24
(e.g., routers, access
points, switches) helps
the sense of reality.
5. It's easy to digest the 0 0 9 12 9
mind and understand the
penetration testing
laboratory in general.
Numerical Rating
1 2 3 4 5
d. Satisfaction Strongly Disagree Neutral Agree Strongly
Disagree Agree
1. I have been 0 2 0 13 15
motivated by the
penetration testing
laboratory to learn
more about different
penetration testing
tools.
2. I am satisfied with 0 0 9 17 4
the penetration testing
laboratory.
3. Information in the 0 3 12 11 4
lab manual was
sufficient.
205
Page 3 of 6
APPENDICES
Formula used:
X= ∑𝑿/𝑵
Page 4 of 6 206
APPENDICES
Page 5 of 6 207
APPENDICES
Page 6 of 6 208
APPENDICES
APPENDIX T
A. Usefulness
1. It helps me be more effective.
2. It helps me be more productive.
3. It is useful.
4. It gives me more control over the activities in my life.
5. It makes the things I want to accomplish easier to get done.
6. It saves me time when I use it.
7. It meets my needs.
8. It does everything I would expect it to do
B. Ease of Use
1. It is easy to use.
2. It is simple to use.
3. It is user-friendly.
4. It requires the fewest steps possible to accomplish what I want to do with it.
5. It is flexible.
6. Using it is effortless.
7. I can use it without written instructions.
8. I don't notice any inconsistencies as I use it.
9. Both occasional and regular users would like it.
10. I can recover from mistakes quickly and easily.
11. I can use it successfully every time.
C. Ease of Learning
1. I learned to use it quickly.
2. I easily remember how to use it.
3. It is easy to learn to use it.
4. I quickly became skillful with it
D. Satisfaction
1. I am satisfied with it.
2. I would recommend it to a friend.
3. It is fun to use.
4. It works the way I want it to work.
5. It is wonderful.
6. I feel I need to have it.
7. It is pleasant to use.
209
OTHER PERTINENT DOCUMENTS
A. TITLE DEFENSE
Page 1 of 2 210
OTHER PERTINENT DOCUMENTS
A. TITLE DEFENSE
Page 2 of 2 211
OTHER PERTINENT DOCUMENTS
212
Page 1 of 2
OTHER PERTINENT DOCUMENTS
Page 2 of 2
Page 2 of 2 213
OTHER PERTINENT DOCUMENTS
Page 1 of 2 214
OTHER PERTINENT DOCUMENTS
Page 2 of 2 215
OTHER PERTINENT DOCUMENTS
D. CHECK-UP DEFENSE
216
Page 1 of 2
OTHER PERTINENT DOCUMENTS
D. CHECK-UP DEFENSE
Page 2 of 2
E. MINUTES OF THE MEETING FOR CHECK-UP DEFENSE
Page 1 of 3
217
Page 2 of 2
OTHER PERTINENT DOCUMENTS
218
Page 1 of 3
OTHER PERTINENT DOCUMENTS
219
Page 2 of 3
OTHER PERTINENT DOCUMENTS
220
Page 3 of 3
OTHER PERTINENT DOCUMENTS
F. FINAL DEFENSE
221
Page 1 of 2
OTHER PERTINENT DOCUMENTS
F. FINAL DEFENSE
Page 2 of 2 222
OTHER PERTINENT DOCUMENTS
Page 1 of 5 223
OTHER PERTINENT DOCUMENTS
Page 2 of 5 224
OTHER PERTINENT DOCUMENTS
Page 3 of 5 225
OTHER PERTINENT DOCUMENTS
Page 4 of 5 226
OTHER PERTINENT DOCUMENTS
Page 5 of 5 227
OTHER PERTINENT DOCUMENTS
H. COMPLIANCE REPORT
228
Page 1 of 3
OTHER PERTINENT DOCUMENTS
H. COMPLIANCE REPORT
229
Page 2 of 3
OTHER PERTINENT DOCUMENTS
H. COMPLIANCE REPORT
Page 3 of 3 230
OTHER PERTINENT DOCUMENTS
231
OTHER PERTINENT DOCUMENTS
232
CURRICULUM VITAE
ELLYSA BALANZA
EDUCATIONAL BACKGROUND
2018-2022
2016-2018
Binalonan, Pangasinan
2012-2016
233
CURRICULUM VITAE
234
CURRICULUM VITAE
I hereby certify that the above information is true and correct to the best of my
knowledge.
ELLYSA BALANZA
235
CURRICULUM VITAE
EDUCATIONAL BACKGROUND
2018-2022
2016-2018
Binalonan, Pangasinan
2012-2016
236
CURRICULUM VITAE
237
CURRICULUM VITAE
SKILLS
Leadership Skills
I hereby certify that the above information is true and correct to the best of my
knowledge.
238
CURRICULUM VITAE
EDUCATIONAL BACKGROUND
2018-2022
2016-2018
2012-2016
239
CURRICULUM VITAE
240
CURRICULUM VITAE
SKILLS
Leadership Skills
Communication Skills
I hereby certify that the above information is true and correct to the best of my
knowledge.