Lab 2 Fundamental Security
Lab 2 Fundamental Security
Instructions
• The lab report must be submitted one week after the lab session on the Moodle
platform, respecting the deadline mentioned there.
• The lab must be performed individually in class, but the report should be submitted in
groups of up to 2 students.
• Lab groups must remain the same for all reports throughout the semester.
DoS and DDoS attacks, as well as other penetration tests, are illegal if they are
carried out without explicit permission. Please ensure that these tests are
conducted in a controlled and ethical environment (e.g., on systems for which
you have permission to test for security). This lab must be carried out in a
laboratory setting or with dedicated testing machines.
This lab will be carried out on two machines: a virtual machine running Kali Linux, used to
perform network attacks and security analyses, and a machine running Windows 7, which will
be used as a target to test resilience to attacks. Kali Linux offers many tools such as Nmap and
Hping3, which are essential for this type of testing. Windows 7 will make it possible to
simulate a vulnerable system and observe the impact of attacks on a real environment.
$ file /tmp/macapture.pcap
3. Advanced Capture:
Capture 20 packets without address translation and view the first 1500 bytes of each
packet.
4. Packet Filtering:
Apply filters to observe specific types of traffic, such as TCP packets, ARP packets, or
web connections (port 80).
$ wireshark -r macapture.pcap
Ettercap command: