ISF Assignment1
ISF Assignment1
Practical File
Solution:
Step1: To start the scanning, click on the Scan multiple computers option.
Step4: Now the scanning will start, and it will take some time to complete the scan.
Step5:
Once the scan is completed a scan report will be generated, click on the Pick a security report
view option.
Step6: On the next window the report will be expanded, click on Ok after analysing the report.
Experiment 2:
Consider you are the cybersecurity lead for an enterprise, and you have been tasked with
enhancing the security of the organization's endpoint devices. One of the key concerns is to
protect these devices from potential threats, including port scanning attacks.
Your goal is to develop a Python program for port scanning that can help detect open
ports on a device (laptop or desktop) in a network.
Maintain a white list of ports that should not be reported.
Ask user for an IP address to scan that IP address for open post.
Ask user for a range of IP address to scan all the computers in that range.
Solution:
Experiment 3:
To protect a network device and all the critical information on that device, it is important to
keep a track of detailed profile of all the installed software and hardware, network
inventory, any missing Microsoft hotfixes, anti-virus status, security benchmarks, and
displays the results in the Web browser.
Solution:
• There are 3 missing security updates, therefore in the section missing security updates
there is a link to install them.
• We can also see a computer profile summary which gives all the information about software,
hardware, virus protection, communications and other devices.
Experiment 4:
Opening a large range of listening sockets on your computer to mimic vulnerable services can
help to monitor the latest tricks and exploits of hackers. When an attacker connects to these
services, they are fooled into thinking they are attacking a real server. The honeypot safely
captures all communications with the attacker and logs these results for future analysis. As a
cybersecurity expert,
Solution:
A. Open HoneyBOT and select the network adapter through which you want to use the
HoneyBOT then list the ports with their services and then start the engine click on the
blue play button to start the HoneyBOT listening engine. The status bar at the bottom of
the window will increment as each port is successfully opened.
B. On the top left corner go to the view tab then select services then add the service you
want to add with their respective details such as (port
number,protocol,enable,description).
Click on the blue play button to start the HoneyBOT listening engine. The
status bar at the bottom of the window will increment as each port is
successfully opened. Now wait for a while after that click on the red stop button
to shut down all listening services and terminate existing open sockets. The
status bar at the bottom of the window will decrement as each port is closed.
Double clicking a record in the list view of the main window will open the
Packet Log viewer window. On the upper left hand side of the window is the
Connection Details which displays basic information about the selected hit
including the total number of bytes sent and bytes received for that hit. In the
upper right hand side the application displays the Packet History list view of all
transmitted and received IP packets associated with the hit.
C. 172.16.151.56 This IP Address seems malicious.
D. Go to the view tab on the top left corner then select the whitelist option to create a
whitelist. After going to the whitelist option add the details (remote IP,local
port,protocol,description) of the IP that has to be whitelisted.
Experiment 5:
Let’s assume, based on experiments, you have identified a malicious IP address which is
launching DDoS attack on your server. Now you have to find MAC address and hop distance
of that malicious device. Use ZenMap to scan the target device using “Quick scan plus” and
find out the hop distance from your device to the victim device. Discuss the possible ways to
block the malicious device using the MAC address.
Solution:
Identifying Malicious Device and Blocking with ZenMap
b. ZenMap may provide the hop distance (number of hops) between your device
and the victim device. This indicates the number of intermediary devices
(routers or switches) between your device and the target.
6. Verify Blocking:
a. Monitor network traffic to ensure that traffic from the malicious device is
effectivel blocked.
b. Test connectivity to confirm that legitimate traffic is not affected by the MAC
address filtering.
2. Firewall Rules:
a. Create firewall rules on your firewall device to block traffic originating from the
MAC address of the malicious device.
By effectively blocking the malicious device's MAC address, you can mitigate the impact of
the DDoS attack and protect your server from further harm. Regular monitoring and
updating of security measures are essential to maintaining a secure network environment.
Experiment 6:
Your organization suspects a security breach in the network, and you have been assigned
the task of investigating the incident using Wireshark.
A. Describe the steps you would take to set up a Wireshark capture to monitor network
traffic for suspicious activities.
B. Analyse the captured packets in Wireshark and identify any signs of unauthorized
access, malware, or unusual network behaviour.
C. Propose security measures or actions that should be taken based on your findings to
mitigate the potential security threat.
Solution:
3. Filtering Traffic:
a. Use capture filters to focus on specific types of traffic (e.g., HTTP, FTP, SMTP) or
specific IP addresses that might be involved in the suspicious activity.
b. Apply display filters to narrow down the captured packets based on criteria
such as source/destination IP, port numbers, protocols, etc.
3. By applying filter of tcp port 8080 as there was unusual amount of network traffic
going out and coming from
a. As we can see on port 8080 the connection is established between our device
and IP 192.168.43.1.
b. And when we analyze the network packet between them and reassembled tcp
bytes we found out that ipconfig command is remotely executing on the device,
c. From this we can say it is a reverse shell through which our system getting
exploited by the attacker.
C. Proposing Security Measures:
1. Immediate Actions:
a. Disconnect compromised devices from the network to prevent further damage.
b. Change passwords and access credentials for affected systems and accounts.
c. Quarantine suspicious files or payloads identified during the analysis for further
investigation.
2. Mitigation Measures:
a. Patch vulnerabilities in software and firmware to prevent future exploits.
b. Enhance network segmentation and access controls to limit the impact of
future breaches.
c. Implement intrusion detection and prevention systems to proactively identify
and block malicious activity.
d. Educate users and employees about security best practices, such as avoiding
suspicious links and emails, and reporting any unusual network behavior
promptly.
3. Forensic Analysis:
a. Preserve captured packet data and other relevant logs for forensic analysis and
legal purposes.
b. Conduct a thorough investigation to identify the root cause of the security
breach and take corrective actions to prevent similar incidents in the future.
By following these steps, you can effectively use Wireshark to investigate security breaches,
identify malicious activity, and implement appropriate measures to mitigate potential
threats to your network.
Experiment 7:
You are a network administrator in a medium-sized company, and you have received
complaints from several employees about slow internet speeds and intermittent
connectivity issues. You decide to use Wireshark to analyse the network traffic and identify
the potential causes of the problems. You are required to perform following task to identify
the three bandwidth-consuming devices.
B. Identify the source and destination IP addresses of the top three bandwidth-consuming
devices.
C. Determine the protocol used by each of these devices for communication. Based on your
analysis, provide recommendations to resolve the slow internet speeds and intermittent
connectivity issues.
Solution:
1. Open Wireshark:
a. Launch Wireshark application on your computer.
3. Start Capture:
a. Click on the Start button or press Ctrl + E to begin capturing network traffic.
4. Capture Duration:
a. Allow Wireshark to capture traffic for a sufficient duration to gather relevant
data (e.g., 5-10 minutes).
5. Stop Capture:
a. Click on the Stop button or press Ctrl + E again to stop capturing traffic.
1. To determine the protocols we can go to TCP and UDP next to ipv4 option and check
match source and destination IP address to find port number.
Experiment 8:
Your university has recently developed an online quiz portal where students can check their
quizzes, and teachers can input and manage quizzes for various subjects. As a cybersecurity
student, you decide to perform a basic security assessment using ZAP (Zed Attack Proxy) to
ensure the application is secure.
A. Outline the initial steps you would take to set up ZAP for testing the university's quiz
portal.
B. Perform a simple scan using ZAP and identify any potential security vulnerabilities
that might exist in the web application.
C. List at least two common security issues that ZAP might detect during the scan, and
provide a brief explanation of each.
Solution:
1. Installation:
- Download ZAP from the official website and install it on your system.
- Ensure you have Java installed as ZAP runs on Java.
3. Start ZAP:
- Launch ZAP after installation.
- ZAP will start a local proxy server to intercept and inspect HTTP and HTTPS traffic.
4. Configure Browser:
- Open your browser and navigate to the ZAP welcome page (`http://localhost:8080/`).
- Follow the instructions to set up your browser to work with ZAP.
2. Security Headers:
- Implement security headers such as Content Security Policy (CSP), X-Content-
TypeOptions, and X-Frame-Options to mitigate various web application security risks.
3. Parameterized Queries:
- Use parameterized queries or prepared statements to prevent SQL injection attacks by
separating SQL code from user input.
By addressing the identified vulnerabilities and adopting security best practices, the
university can enhance the security posture of its quiz portal and mitigate potential risks to
student and teacher data.
Experiment 9:
You are a network administrator tasked with securing your GLA University network. The
University has recently experienced some security incidents, and has asked you to perform a
comprehensive network scan using Nmap to identify potential vulnerabilities in any device.
In this regard, you are required to perform following tasks: You are required to recommend
actions to mitigate the identified risks.
a. Use Nmap to perform a basic network discovery scan to identify the IP addresses of
all devices in the simulated network. Provide a detailed list of discovered devices,
including their IP addresses.
b. Conduct a detailed port scan on one of the target machines to identify open ports
and services.
c. Document the open ports and the corresponding services running on the machine.
Solution:
1. Patch Management:
- Ensure that all devices on the network have the latest security patches and updates
installed to address known vulnerabilities.
2. Network Segmentation:
- Implement network segmentation to isolate critical systems and reduce the attack
surface. This prevents attackers from moving laterally within the network in case of a
breach.
3. Access Control Policies:
- Enforce strict access control policies to limit access to sensitive resources only to
authorized users. Use strong authentication mechanisms such as multi-factor authentication
(MFA).
4. Firewall Configuration:
- Configure firewalls to filter incoming and outgoing traffic, blocking unnecessary ports and
services. Regularly review and update firewall rules to adapt to changing security
requirements.
- Device 1:
- IP Address: xxx.xxx.xxx.xxx
- Description: (Provide any known information about the device, such as hostname or device
type)
- Device 2:
- IP Address: xxx.xxx.xxx.xxx
- Description: (Provide any known information about the device, such as hostname or device
type)
- Port 80 (HTTP):
- Service: Hypertext Transfer Protocol (HTTP)
- Description: Used for web traffic, indicating the presence of a web server.
- (Repeat the above format for all open ports and their corresponding services)
Ensure to analyze the results of the network scan thoroughly and take appropriate actions
to address any vulnerabilities or security risks identified. Regularly monitor the network for
changes and updates to maintain a secure environment.
Experiment 8:
You have been given a task to organize a directory containing various files and subdirectories
on a Linux system. Use the terminal and basic Linux commands to accomplish the following:
A. Navigate to the "Projects" directory, which is located inside the "Documents" directory.
D. Display the contents of the "Reports" directory to verify the creation of the new files.
E. Move the "Annual_Report.txt" file to the "Backup" directory, which is located in the
parent directory of "Documents."
G. Display the updated contents of the "Reports" directory. Ensure to use appropriate Linux
commands for navigation, directory and file creation, listing, moving, and renaming.
Explain each step briefly as you perform it.
Solution:
Here's how to accomplish the given tasks using basic Linux commands:
Explanation: This command changes the current directory to the "Projects" directory located
inside the "Documents" directory.
mkdir Reports
Explanation: This command creates a new directory named "Reports" within the "Projects"
directory.
cd Reports
Explanation: The `cd Reports` command changes the current directory to the "Reports"
directory, and the `touch` command is used to create two text files named
"Quarterly_Report.txt" and "Annual_Report.txt" inside it.
Explanation: This command lists the contents of the current directory, which should now
include the two text files created in the "Reports" directory.
mv Annual_Report.txt ../../Backup
Explanation: The `mv` command moves the "Annual_Report.txt" file to the "Backup"
directory located in the parent directory of "Documents" (two levels up).
mv Quarterly_Report.txt Q1_Report.txt
Explanation: Finally, this command lists the contents of the "Reports" directory to verify that
the files have been renamed and moved as intended.