Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
104 views
16 pages
MAHE-IsAC Cybersecurity Lab Manual
Lab manual
Uploaded by
crazythings246
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save MAHE-IsAC Cybersecurity Lab Manual For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
104 views
16 pages
MAHE-IsAC Cybersecurity Lab Manual
Lab manual
Uploaded by
crazythings246
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save MAHE-IsAC Cybersecurity Lab Manual For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save MAHE-IsAC Cybersecurity Lab Manual For Later
You are on page 1
/ 16
Search
Fullscreen
am MANNIE IPAL ACADEMY of HIGHER EDUCATION (Deemed to be University under Section 3 of the UGC Act, 1956) S ‘3. ie rece MAHE - ISAC Center of Excellence for Cybersecurity - Lab Handling ManualAll Scenarios are on the network and communicating over the network. Table of network devices Sl. | Device IP Address | Scenarios no 1 | Nvidia Jetson | 172.16.16.100 | Local Server / Database / Dashboard 2 Arduino Mega 172.16.16,101 Tollgate 1 3 |ArduinoMega | 172.16.16,102 | Tollgate 2 4 | Espsz66 172.16.16.103 | Tollgate 1 Display 5 ESP8266 172.16.16.104 Tollgate 2 Display 6 | Raspberry pi 172.16.16.105 | Airport Baggage sorting / Flight Position Sensor / Arrival Display 1 7 | Raspberry pi 172.16.16.106 _| Villa 2/ Motion Sensor / Table Relays 8 | Raspberry pi 172.16.16.107 | Villa 2/ Housing Fire sensor / Light Sensor 9 | Raspberry pi 172.16.16.108 _| Gas Sensors / Hotel Fire Sensor 10 | Raspberry pi 172.16.16.109 | Traffic Lights 11 | Raspberry pi 172.16.16.110 _| Stock Exchange Billboard 12 | Raspberry pi 172.16.16.111 _ | Stock Edchange Display 13 | Raspberry pi 172.16.16.112 | Air Quality Sensor / Industry Object Sorting / Hospital & Industry Fire Sensor 14 | Raspberry pi 172.16.16.113 | Arival Display 2 / Smart parking Gate / Xbee / Hvac Fire Sensor / Radio 15 | Raspberry pi 172.16.16.114 | Smart Parking Sensors / Xbee / Airport Billboard 16 | Raspberry pi 172.16.16.115 | Check-in Sensor / Arrival Display 17 | Raspberry pi 172,16.16.116 _| Boarding Pass KIOSK 18 | Raspberry pi 172.16.16.117 _| Central Fire Station19 | ESP8266 172.16.16.118 | Smartmeter 1 20 | EsP8266 172.16.16.119 | Smartmeter 2 21 | EsPez6s 172.16.16.120 | Hospital Patients Records 22 | Siemens PLC 172.16.16,121 | Power Station Turbine / Sub-station Contacts 23 | Siemens PLC 172.16.16.122 | Water Treatment Plant 24 | Siemens PLC 172.16.16.123 | Airport Entry Gate 25 | Siemens PLC 172.16.16.124 | Airport Arival / Departure Gate 26 | Siemens PLC 172.16.16.125 | Airport Exit Gate / ATC Tower 27 | Siemens PLC 172.16.16.126 | Data center HVAC 28 | Siemens PLC 172.16.16.127 | Metro Track Switching 29 | Siemens PLC 172.16.16.128 | Check-in Conveyor Belt 30 | Siemens PLC 172.16.16.129 | Lift Mechanism 31 | Siemens PLC 172.16.16.130 | Baggage Collection Belt 32 | Siemens PLC 172.16.16.131 | Metal Detector 33 | Siemens PLC 172.16.16.132 | Alert Tower 34 | ESP8266 172.16.16,133 | TDS Sensor 35 | IP Camera 172.16.16,134 | IP Camera 1 36 | IP Camera 172.16.16.135 ||P Camera2 37 | Raspberry pi 172.16.16,136 | Alexa Integration 38 | Router 172.16.16.1__| Table Router 39 | Netwrok Switch Table networking switch 40 | Network Switch Table networking switch 41 | PoE Switch Table networking switchNote 1: One should be on the same network to access any device, you can either connect to the wi-fi or use the RJ45 socket provided on the table. Students should only connect via the RU45 port provided as the number of devices on the wifi is limited. Note 2: All the network devices have been assigned a static IP address. Never change those IP addresses. Table Electrical Diagram: Electrical Wiring Diagram of Table mee mn Lee ust uS2 USS US u828 ce, 20vAC a, wl eA There are two main electrical lines allocated to the table, 25Amp and 16Amp.The MCB of Both lines is outside the table near the Tablet stand for easy access. The 25Amp lines are connected to all the sockets alongside the table for the students to use for their laptops. The 16Amp line powers all the hardware in the boxes alongside the table with each box with 2Amp MCP for further protection.Table Network PLC PLO PLO PLC 555 T Pi T re BR ie Lee ars ~ Neigear POE Switch The lease Line is connected to the Asus router and distributed to each switch, Router is connected to the local server. Note: Do not plug any device into the Netgear PoE switch (third in the box). It could damage your device. The wifi of the router is meant for some hardware only and users/students are not to connect to this wif Workings Turn on the two MCBs on the table near the tablet stand, Wait around 5 minutes for the network to boot and for all the devices to connect to the network, Then all the scenarios on the table will work by themselves without having to start anything There is an Nvidia Jetson, installed in Box no. 3 with IP address 172.16.16.100, which acts as a table local server to communicate with all the physical scenarios on the tableItalso hosts a unified dashboard to control the entire model and the database for the scenarios. ¢ Dashboard Url: http://172.16.16.100:1880/uil © Database Url: _http://172.16.16.100/phpmyadmin Alll the sensors and actuators on the tables are connected to a local controller in ‘each box that acts as an edge device of the real physical world and communicates with the server at 172.16.16.100 to send data and receives commands from the server. Edge devices can be either raspberry pi or an Arduino controller, or PLC. The same network is provided on the table via the ethernet port for the students to connect. Once you are on the same network, the entire model scenarios can be controlled via the dashboard by visiting http://172.16.16.100:1880/uil. The scenarios and corresponding ‘edge device IP are given in the table above. 1. Power Station 1, Hardware location: Box no 7. 2. Relays Location: Box no 3 3. The power station has two components, the turbine, and the substation contact. 4. The turbine can be controlled by the physical switch on the table as well as from the dashboard. The substation can be controlled from the dashboard only. 5. Working: Turn on the turbine, once the turbine is running you can control the sub-station contact. When the contact is closed the model lights will be ON, when the contacts are closed the modal lights will go OFF. 6. Sub-station can be controlled only when the turbine is running 7. The reset switch on the table and the dashboard resets the scenario. 2. RFID Toll Gates 1. Hardware location: Box no 8. 2. There are two toll gates on the table at the toll plaza 3. Both toll gates will be functional on power-up without any additional setup 4, Reset push-button is provided near the toll plaza to reset the tollgate if it malfunctions or freezes for any reason. 5. Both gates are fitted with an RFID scanner, which scans the RFID tag attached to the running vehicle. 6. Working: Tollgate’s controller reads the car's tag and compares it in the database and decides its status and access: © Ifthe car is not found in the database, the status is unregistered, and access is denied.© Ifthe car is in the database but the balance is lower than the toll fee (set to 50), the status is balance low, and access is denied © Ifthe car is in the database and marked as stolen, the status is stolen car, and access is denied with an alert © Ifthe car is in the database, the stolen status is not true and the balance is above the toll fee, the toll fee is deducted and access is granted. © All'status and access can be viewed from the dashboard when scanning. 7. Each toll gate can be controlled from the dashboard as well. With the open/close button or the Grant Access button, 8. The open and close button is just to open/close the boom barrier while the Grant Access button is to open the boom barrier and get the car moving if it has been stopped by the tollgate(for eg. in case of access is denied the car will be stopped by the toll gate) 9, An RFID cloning device along with cloning cards is stationed near the tollgate, using which one can clone or replicate any RFID cards. 3. Water Treatment Plant 1. Hardware location: Box no 6. Water tank location: Box 9 2. Working: The water treatment plant has two processes, filtration of the dirty water and circulation of clean water back to the city. 3. Both processes should be running together to get the water processed and sent back to the clean water 4. Ifeither of the processes isn't working the red LED with be it 5. The Status LED will go green only when both processes are running simultaneously 6. Both processes can be controlled via a button on the dashboard and a physical button on the water treatment plant, 7. The master switch will turn both of them at once ATDS sensor is installed in the tank to measure the water TDS level 9. Maintenance: There are five level sensors in the water treatment tank, The pumps are programmed not to run if the water level in the tank is below 20%(lowest sensor) in order to protect the pumps from burning. Fill the tank by opening the tank top lid if the water level gets low. Avoid pouring water from the top of the water treatment plant to avoid scattering water on the table and electronics. 2
You might also like
2 Scoping Questionnaire
PDF
No ratings yet
2 Scoping Questionnaire
1 page
Ethical Hacking Fundamentals Labs
PDF
No ratings yet
Ethical Hacking Fundamentals Labs
2 pages
Rapid7 InsightIDR Product Brief
PDF
No ratings yet
Rapid7 InsightIDR Product Brief
2 pages
Machine Learning Based Intrusion Detection System: Anish Halimaa A Dr. K.Sundarakantham
PDF
No ratings yet
Machine Learning Based Intrusion Detection System: Anish Halimaa A Dr. K.Sundarakantham
5 pages
Accops VMware Comparison Brochure
PDF
No ratings yet
Accops VMware Comparison Brochure
3 pages
Scoping Questionnaire For Penetration Testing: # Questions Answer Comments
PDF
No ratings yet
Scoping Questionnaire For Penetration Testing: # Questions Answer Comments
7 pages
Seminar Report Rover Technology Repaired)
PDF
75% (4)
Seminar Report Rover Technology Repaired)
43 pages
COE Lab Report-1
PDF
No ratings yet
COE Lab Report-1
9 pages
Nba - Cse-Presentation 15.7.2022
PDF
No ratings yet
Nba - Cse-Presentation 15.7.2022
88 pages
Computer Networks (203105255) : Mr. Sushil Kumar, Assistant Professor
PDF
No ratings yet
Computer Networks (203105255) : Mr. Sushil Kumar, Assistant Professor
88 pages
Project Report 2020-21-Merged
PDF
No ratings yet
Project Report 2020-21-Merged
50 pages
Project Report For Intrusion Detection System Using Fuzzy Clustring Algorithm
PDF
100% (1)
Project Report For Intrusion Detection System Using Fuzzy Clustring Algorithm
48 pages
Website Pen Project
PDF
No ratings yet
Website Pen Project
65 pages
LP-IV Lab Manual
PDF
No ratings yet
LP-IV Lab Manual
42 pages
Project Report Under Mudra Loans
PDF
No ratings yet
Project Report Under Mudra Loans
3 pages
Iotandembeddedsystems 230128120326 0f156a8c
PDF
No ratings yet
Iotandembeddedsystems 230128120326 0f156a8c
28 pages
CS8091 - Big Data Analytics - Unit 1
PDF
No ratings yet
CS8091 - Big Data Analytics - Unit 1
28 pages
CB 17 Black Book
PDF
No ratings yet
CB 17 Black Book
47 pages
1 Penetration Testing in IoT Network
PDF
No ratings yet
1 Penetration Testing in IoT Network
7 pages
Wireframe+Prototype+Template Tejasvi
PDF
No ratings yet
Wireframe+Prototype+Template Tejasvi
14 pages
NCCoE UMD Pitch
PDF
No ratings yet
NCCoE UMD Pitch
16 pages
Nptel: Mobile Computing - Web Course
PDF
100% (1)
Nptel: Mobile Computing - Web Course
2 pages
Mini Report
PDF
No ratings yet
Mini Report
29 pages
SPM
PDF
No ratings yet
SPM
83 pages
Detection of Phishing URLs Using Machine Learning
PDF
No ratings yet
Detection of Phishing URLs Using Machine Learning
6 pages
20131A0568 Intern Docu
PDF
No ratings yet
20131A0568 Intern Docu
48 pages
VPN Security Mechanisms
PDF
No ratings yet
VPN Security Mechanisms
11 pages
Ilovepdf Merged
PDF
No ratings yet
Ilovepdf Merged
26 pages
Securing Data With Block Chain and Ai
PDF
No ratings yet
Securing Data With Block Chain and Ai
9 pages
Pra Bcie Student Lab Assessment Criteria
PDF
No ratings yet
Pra Bcie Student Lab Assessment Criteria
17 pages
Report Firewall
PDF
No ratings yet
Report Firewall
27 pages
Internship Report
PDF
No ratings yet
Internship Report
31 pages
Gaurav Bhalla Capstone Project
PDF
No ratings yet
Gaurav Bhalla Capstone Project
41 pages
Senior Java Developer Resume
PDF
No ratings yet
Senior Java Developer Resume
4 pages
Secure Software Development
PDF
No ratings yet
Secure Software Development
5 pages
Internal Penetration Testing
PDF
No ratings yet
Internal Penetration Testing
22 pages
Communication Assessment For Cognizant Recruitment Drive - 2024 Graduating Batch
PDF
No ratings yet
Communication Assessment For Cognizant Recruitment Drive - 2024 Graduating Batch
18 pages
Adaline Madaline Comes Under The Supervised Learning Networks
PDF
No ratings yet
Adaline Madaline Comes Under The Supervised Learning Networks
8 pages
CS Lab Manual
PDF
No ratings yet
CS Lab Manual
24 pages
Splash Corporate Profile
PDF
No ratings yet
Splash Corporate Profile
17 pages
GE3361 Professional Development
PDF
No ratings yet
GE3361 Professional Development
45 pages
It Technologies
PDF
No ratings yet
It Technologies
5 pages
Vtu 8th Sem Cse Network Management Systems Notes 10cs834
PDF
No ratings yet
Vtu 8th Sem Cse Network Management Systems Notes 10cs834
57 pages
Case Study Based On Intrusion Detection System
PDF
100% (1)
Case Study Based On Intrusion Detection System
5 pages
IT Director Resume Template
PDF
No ratings yet
IT Director Resume Template
2 pages
Activation Model in RMI
PDF
100% (2)
Activation Model in RMI
13 pages
Seminar Topics
PDF
No ratings yet
Seminar Topics
10 pages
JNTUH Mobile Application Development Syllabi
PDF
No ratings yet
JNTUH Mobile Application Development Syllabi
2 pages
Introduction To Unit: Introduction To VAPT (Vulnerability Assessment and Penetration Testing)
PDF
100% (1)
Introduction To Unit: Introduction To VAPT (Vulnerability Assessment and Penetration Testing)
3 pages
Parking Management Solution
PDF
No ratings yet
Parking Management Solution
11 pages
Understanding VAPT - Non Technical Guide To Cybersecurity
PDF
No ratings yet
Understanding VAPT - Non Technical Guide To Cybersecurity
32 pages
E-Mail Bombing: Description
PDF
No ratings yet
E-Mail Bombing: Description
2 pages
Cyber Security
PDF
No ratings yet
Cyber Security
14 pages
Phishing Attack Seminar
PDF
No ratings yet
Phishing Attack Seminar
20 pages
Task 1
PDF
No ratings yet
Task 1
48 pages
Assignment 1 - Researching Pentesting Careers
PDF
No ratings yet
Assignment 1 - Researching Pentesting Careers
4 pages
Burp Suite Training Guide (Thoery)
PDF
No ratings yet
Burp Suite Training Guide (Thoery)
6 pages
Iot Ia 2 Qn&ans..
PDF
No ratings yet
Iot Ia 2 Qn&ans..
14 pages
Expanded RFID Library Network Guide Part1
PDF
No ratings yet
Expanded RFID Library Network Guide Part1
2 pages
CloudSecurity Unit 1
PDF
No ratings yet
CloudSecurity Unit 1
24 pages