CS Lab Workbook Om Rawat 21csu335
CS Lab Workbook Om Rawat 21csu335
(CSL 422)
Lab Workbook
INDEX
S.No Experiment Page Date of Date of Marks CO Sign
No. Experiment Submission Covered
EXPERIMENT NO. 1
Student Name and Roll Number: Om Rawat 21csu335
Link to Code:
Date: 3.2.22
Faculty Signature:
Marks:
Objective(s):
The students will understand which type of passive information can be gathered to exploit the
target machine
Problem Statement:
Perform reconnaissance to find all the relevant information on selected website using 10
information gathering tools. (Including 4 Kali Linux Tools)
Background Study:
Question Bank:
Star topology
Star topology
TCP
Systems are vulnerable because they are interconnected and can be accessed from
any point in the connection.
Netcraft was founded by Mike Prettejohn. The company provides web server and
web hosting market-share analysis, including web server and operating system
detection.
• Haveibeenpwned - https://haveibeenpwned.com/
Have I Been Pwned? - is a website that allows Internet users to check whether their
personal data has been compromised by data breaches.
• OSINT Framework
The OSINT framework is a methodology that integrates data, processes, methods, tools
and techniques to help the security team identify information about an adversary or
their actions quickly and accurately. An OSINT framework can be used to: Establish the
digital footprint of a known threat.
• Harvester
It is pre-installed in Kali Linux. theHarvester is a command-line tool included in Kali
Linux that acts as a wrapper for a variety of search engines and is used to find email
accounts, subdomain names, virtual hosts, open ports / banners, and employee
names related to a domain from different public sources (such as search engines and
PGP key servers).
• DNS Enumeration: NSLOOKUP
Nslookup is a network administration tool for querying the Domain Name System
(DNS) to obtain Domain name or IP address mapping or any other specific DNS
record.
Nslookup can operate on both "Interactive mode" and "non-Interactive mode". Interactive
mode -allows the user to query the DNS-Server about various host, and domains non-
lnteractive mode -allows the user to query the information for a host or domain.
EXPERIMENT NO. 2
Student Name and Roll Number:
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
Outcome:
The students will understand how to gather information available on google freely using google
dorks
Problem Statement:
Background Study:
1. "Login: *" "password =*" filetype: xls (searching data command to the system files that are stored
in Microsoft Excel)
3. filetype: xls inurl: "password.xls" (looking for username and password in ms excel format). This
command can change with admin.xls)
4. intitle: login password (get link to the login page with the login words on the title and password
words anywhere. If you want to the query index more pages, type allintitle)
7. intitle: index.of people.lst (will find web pages that contain user list).
8. intitle: index.of passwd.bak ( will search the index backup password files)
Question Bank:
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
To familiarize the students with the concept of Second phase of penetration testing
Outcome:
• The students will understand difference between active and passive reconnaissance.
• The students will be able to gather the information of the target machine by interacting with it.
• The students will understand Nmap Tool.
Problem Statement:
• Perform Network Scanning using NMAP in windows and ZENMAP in kali Linux
Background Study:
Question Bank:
• How to find the network addresses of live hosts, firewalls, routers, etc
• In which phase where attacker will interact with the target with an aim to identify the
vulnerabilities.
• Differentiate between static and dynamic analysis.
• Explain the different types of scanning.
• Differentiate between filtered and unfiltered ports.
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
To familiarize the students with the concept of Second phase of penetration testing
Outcome:
• The students will be able to find all the vulnerabilities present in the target machine
• Will also understand the Nessus Vulnerability scanner tool
Problem Statement:
Use NIKTO & Nessus tool to find all the vulnerabilities with its level and generate a report for an
organization
Background Study:
Packet sniffer:
• It has a database of vulnerabilities based on which it performs the check on the remote
host.
• Its database contains all the information required (service, port, packet type, a potential
path to exploit, etc.) to check the security issue.
• They can scan the network and websites against thousands of vulnerabilities, provide the
list of issues based on the risk and suggest the remediation as well.
Question Bank:
EXPERIMENT NO. 5
Student Name and Roll Number:
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
To familiarize the students with the concept of Second phase of penetration testing
Outcome:
• The students will be able to gather the information of the network by analyzing the traffic
moving in and out from target machine
• The students will understand Wireshark inbuilt Tool of Kali Linux
Problem Statement:
• Install Wireshark on any network and apply filters to gather different information of the
target machine
• Perform Session hijacking/ find credentials of unsecure real time website using Wireshark
Background Study:
Question Bank:
• How to combine filters in Wireshark to check the traffic from a particular IP and for http
then.
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
Outcome:
The students will be able to gain access of target machine using Malware
Problem Statement:
Create Trojan and Exploit victim’s machine by taking its complete access
Background Study:
• Trojans are the malicious applications or programs which looks like a normal application but is
harmful in nature as it can give the whole remote access of the Target's Machine to the
Attacker's Machine.
• E.g. Poke and take remote control of your machine
• ways of remote connection
• Forward Connection
• Reverse connection
Question Bank:
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
To familiarize the students with the concept of Third phase of penetration testing
Outcome:
Problem Statement:
Background Study:
Ardamax Keylogger
• https://www.ardamax.com/keylogger
• Username: ardamax
• Password: ardamax
• After install you can delete but it is working (can check in task manager or triangle yellow icon
on taskbar)
• Open and view logs
• It works on everything notepad, start, online accounts etc
• Hidden mode: attacker can hide also (right click)- ctrl + H
• Invisibility option: from task manager. It auto starts
Question Bank:
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
Outcome:
• The students will be able to learn commands of Linux required for exploitation
• Student will be able to change permissions of the Files and Folders
Problem Statement:
Background Study:
Example –
crunch 4 4 0123456789
Question Bank:
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
To familiarize the students with the concept of Bypass the Login of Windows.
Outcome:
• The students will be able to Bypass the login details of target in active and passive mode on all
type of operating system
Problem Statement:
• Perform windows Login Bypass using netuser and John the Ripper Tool
Background Study:
• Login Bypass
• Online Method
• System Unlocked
• Offline Method
• System locked
Question Bank:
• Which command is used to create new user after Windows Login bypass?
• How to remove the password of a victim's Window machine?
• How to change the password of a victim's Window machine?
• What is the purpose of the following command: net user gg /delete
• Write a short note on RainbowCrack tool.
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
To familiarize the students with the concept of Bypass the Login of Linux and MAC
Outcome:
• The students will be able to Bypass the login details of target in active and passive mode on all
type of operating system
Problem Statement:
Background Study:
Question Bank:
EXPERIMENT NO. 12
Student Name and Roll Number:
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
To familiarize the students with the concept of Third and Fourth phase of penetration testing
Outcome:
• The students will be able to gain and maintain access of the target machine using pdf file
Problem Statement:
Background Study:
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
To familiarize the students with the concept of Third and Fourth phase of penetration testing
Outcome:
• The students will be able to gain and maintain access of the target machine
Problem Statement:
Background Study:
• Exploit/multi/handler
• This module provides all of the features of the Metasploit payload system on different
platforms and architectures.
Question Bank:
• What is a meterpreter?
• Explain the Msfvenom commands required to generate payload.
• Write the command to start key scanner on victim’s machine.
• What is the output of following command - keyscan_dump.
• Write the command to upload a file in window’s F drive after getting meterpreter access.
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
To familiarize the students with the concept of Fifth phase of penetration testing
Outcome:
• The students will be able to Cover tracks and post exploit the target machine
Problem Statement:
Background Study:
• In the phases previous to this one the pen tester successfully managed to avoid detection by
firewalls and intrusion detection systems,
• The purpose of this phase is to cover up all the little clues that would give away the nature of
his deeds.
• There are few ways that we can cover our tracks, making it VERY difficult to track our
malicious activities.
• Clear the File, events logs or clear history
• Hide the Files
Question Bank:
• What is pivoting?
• What is the use of getsystem command in Meterpreter script.
• Write the command for taking screenshots of victim's machine after getting meterpreter
access.
• Write the command to clear event logs for clearing hacker's tracks.
• What is the outcome of the follwoing command: shred -zu root/.bash_history