0% found this document useful (0 votes)
31 views54 pages

Ccs340 Cyber Security

The CCS340 syllabus outlines a course focused on cybercrime, cyberlaw, and cybersecurity techniques. It includes practical experiments such as installing Kali Linux, performing open source intelligence gathering, and using tools like Metasploit and Snort for network security analysis. Upon completion, students will be able to explain cybersecurity concepts, classify attacks, and apply various tools for intrusion detection and prevention.

Uploaded by

Karthi Yuva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views54 pages

Ccs340 Cyber Security

The CCS340 syllabus outlines a course focused on cybercrime, cyberlaw, and cybersecurity techniques. It includes practical experiments such as installing Kali Linux, performing open source intelligence gathering, and using tools like Metasploit and Snort for network security analysis. Upon completion, students will be able to explain cybersecurity concepts, classify attacks, and apply various tools for intrusion detection and prevention.

Uploaded by

Karthi Yuva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

SYLLABUS

CCS340

2 0 2 3

OBJECTIVES:

The main objectives of this course are:


• To learn cybercrime and cyberlaw.
• To understand the cyber attacks and tools for mitigating them.
• To understand information gathering.
• To learn how to detect a cyber attack.
• To learn how to prevent a cyber attack

LIST OF EXPERIMENTS

1. Install Kali Linux on Virtual box


2. Explore Kali Linux and bash scripting
3. Perform open source intelligence gathering using Netcraft, Whois Lookups,
DNS Reconnaissance, Harvester and Maltego
4. Understand the nmap command d and scan a target using nmap
5. Install metasploitable2 on the virtual box and search for unpatched vulnerabilities
6. Use Metasploit to exploit an unpatched vulnerability
7. Install Linux server on the virtual box and install ssh
8. Use Fail2banto scan log files and ban Ips that show the malicious signs
9. Launch brute-force attacks on the Linux server using Hydra.
10. Perform real-time network traffic analysis and data pocket logging using Snort

TOTAL: 30 PERIODS
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
CO1: Explain the basics of cyber security, cyber crime and cyber law
CO2: Classify various types of attacks and learn the tools to launch the attacks
CO3 Apply various tools to perform information gathering
CO4: Apply intrusion techniques to detect intrusion
CO5: Apply intrusion prevention techniques to prevent intrusion

Downloaded by Hari ([email protected])


LIST OF EXPERIMENTS

S. NO. Name of the Experiments COs

Install Kali Linux on Virtual box CO2


1.

2. Explore Kali Linux and bash scripting CO1

Perform open source intelligence gathering using Netcraft, Whois CO3


3.
Lookups, DNS Reconnaissance, Harvester and Maltego
Understand the nmap command d and scan a target using nmap. CO3
4.

Install metasploitable2 on the virtual box and search for unpatched CO2
5.
vulnerabilities
Use Metasploit to exploit an unpatched vulnerability CO2
6.

Install Linux server on the virtual box and install ssh CO1
7.

Use Fail2banto scan log files and ban Ips that show the malicious CO4
8.
signs
Launch brute-force attacks on the Linux server using Hydra. CO2
9.

Perform real-time network traffic analysis and data pocket logging CO5
10.
using Snort

Downloaded by Hari ([email protected])


Ex.No:1
Install Kali Linux on Virtual box
Date:

Aim:

To Install Kali Linux on Virtual Box

Procedure:

Step 1: Open the Virtual Box website. Go to https://www.virtualbox.org/ in your computer's Internet
browser. This is the website from which you'll download the Virtual Box setup file.

Step 2: Install the Kali Linux ISO file in Google chrome

Step 3: Create a New Instances in the Virtual Box


Downloaded by Hari ([email protected])
Step 4: Select the Kali Linux ISO image files in the Storage

Step 5: Select the number of Processors and CPU’s in the Network tab

Downloaded by Hari ([email protected])


Step 6: Start the Server and Choose the Kali Linux in Virtual Box

Downloaded by Hari ([email protected])


Step 7: Select a Language as ‘English’ and Click to ‘Continue’

Step 8: Enter the Host Name for the System and Click to ‘ Continue’ and set username and Password

Downloaded by Hari ([email protected])


Downloaded by Hari ([email protected])
Step 9: Finish the Installation and Click to ‘Continue’

Step 10: Finally open the Kali Linux in Virtual Box

Step 11: Give User name and Password, click ‘Log in

Downloaded by Hari ([email protected])


Result:

Thus to Install Kali Linux on Virtual Box was Successfully Installed.

Downloaded by Hari ([email protected])


Ex.No:2
Explore Kali Linux and bash scripting
Date:

Aim:

To Explore Kali Linux and Bash Scripting.

Procedure:

Step 1: Start the Kali Linux on Virtual Box and open the File

Step 2: Create a New File in Terminal and Save it as – ‘./sh’

Step 3: Write a Simple program in the Script

Downloaded by Hari ([email protected])


Step 4: The Script can be Executed using ./file_name.sh

Step 5: Other Commands which can be used are

Ipconfig – Used to display information about the system

Ls –a – Used to view the files in the Directory

Mkdir – Used to Create a Directory

Downloaded by Hari ([email protected])


Downloaded by Hari ([email protected])
Result:

Thus to explore Kali Linux and Bash Scripting was Executed Successfully.

Downloaded by Hari ([email protected])


Ex.No:3 Perform open source intelligence gathering using Netcraft, Whois
Lookups, DNS Reconnaissance, Harvester and Maltego
Date:

Aim:

To Perform open source intelligence gathering using Netscraft, whois lookups, DNS
Reconnaissance, Harvester and Maltego.

Procedure:

Step 1: Netscraft is a tool used for finding what infrastructure and technologies in a site

Step 2: The tool can be accessed using Browser and the Infrastructure and technologies of the
website can be accessed by giving the URL of the site.

Downloaded by Hari ([email protected])


Step 3: The webs ite will display the information such as IP addresses of the web site.

Downloaded by Hari ([email protected])


Step 4: Whois is also a tool used to get the all domains and sub domains of a website. The website
can be accessed in https://whois.com. We can enter the name of the website to look for domains.

This tool is used to view the sub domain of the website. The sub domains can be viewed like a tree

Downloaded by Hari ([email protected])


Step 5: Perform the DNS Reconnaissance

Downloaded by Hari ([email protected])


Step 6: Harvester is a tool used in Linux System. This is used to get the IP addresses of the website

The Harvester tool can be used by giving following command: the harvester –d <website_name>

Downloaded by Hari ([email protected])


Result:

Thus to perform open source intelligence gathering using Netscraft, Whois lookups, DNS
Reconnaissance, Harvester and Maltego was Successfully Performed.

Downloaded by Hari ([email protected])


Understand the nmap command d and scan a target using nmap.
Ex.No:4

Date:

Aim:

To Understand the nmap command and Scan a target using nmap.

Procedure:

Step 1: The nmap command can be used in Kali Linux and Before using the nmap change the
network adapter to bridged adapter.

Downloaded by Hari ([email protected])


Step 2: The target can be Scanned using the following command – nmap <IP address> and sudo
map<IP address>

Step 3: This command will display all the posts which are open in that IP address
and these are used to attack that system

Downloaded by Hari ([email protected])


Result:

Thus to Understand the nmap command d and scan a target using nmap was executed
Successfully.

Downloaded by Hari ([email protected])


Ex.No:5
Install metasploitable2 on the virtual box and search for unpatched
Date: vulnerabilities

Aim:

To Install Metasploitable2 on the Virtual Box and Search for Unpatched Vulnerabilities.

Procedure:

Step 1: Install virtual box if not installed

Step 2: Install Metasploitable2 using following link


https://download.vulnhub.com/metasploitable/metasploitable-linux-2.0.0.zip

Downloaded by Hari ([email protected])


Step 3: Extract metasploitable-linuxzip

Step 4: Create new instance Click new in virtual box

Step 5: Give any name, choose linux In Type and other linux(64bit) in Version

Downloaded by Hari ([email protected])


Downloaded by Hari ([email protected])
Step 6: Click settings

Step 7: Click Storage

Step 8: Select Created Instance

Downloaded by Hari ([email protected])


Step 9: Load Metasploitable

Downloaded by Hari ([email protected])


Downloaded by Hari ([email protected])
Step 10: Give login and password as ms f admin

Result:

Thus to Install Metasploitable2 on the Virtual box and Search for unpatched Vulnerabilities
was Successfully Installed and executed.

Downloaded by Hari ([email protected])


Ex.No:6

Date: Use Metasploit to exploit an unpatched vulnerability

Aim:

To use Metasploit to exploit an Unpatched Vulnerability.

Procedure:

Step 1: Login into the metasploit terminal using the credentials and Open metasploitable2 and login,
note the ip of the machine

Step 2: Now open kali linux and scan the metasploitable2 machine for open ports and service
using nmap

Downloaded by Hari ([email protected])


Step 3: Using browser navigate to the ip of metasploitable2
example:http://<ip-metasploitable>

Step 4: Now open inspect element and move to network tab and reload the page,you can find
the request and response for the ip

Downloaded by Hari ([email protected])


Step 5: Move to kali and by using Metasploit we are going to exploit PHPCGI Argument Injectio

Step 6: Set the host IP as out metasploitable IP

Step 7: Exploit

Downloaded by Hari ([email protected])


Downloaded by Hari ([email protected])
Result:

Thus to use metasploit to exploit an Unpatched Vulnerability was Executed Successfully.

Downloaded by Hari ([email protected])


Ex.No:7
Install Linux server on the virtual box and install ssh
Date:

Aim:

To Install Linux Server on the Virtual Box and Install ssh

Procedure:

Step 1: Download and Install Virtual Box

Step 2: Start the Linux shell in the Virtual box and install linux shell to fill the necessary
instructions displayed on the screen.

Downloaded by Hari ([email protected])


Downloaded by Hari ([email protected])
Step 3: Show the Guided storage Configuration and Click ‘Done’

Step 4: Set up the Profile and enter your details such as name, service name, user name and
Password

Downloaded by Hari ([email protected])


Step 5: Installing System

Downloaded by Hari ([email protected])


Downloaded by Hari ([email protected])
Step 6: Enter user name and password and press enter (note: password will not be visibile)

Result:

Thus to Install Linux server on the Virtual Box and Install the ssh was installed and
executed Successfully.

Downloaded by Hari ([email protected])


Ex.No:8
Use Fail2banto scan log files and ban Ips that show the malicious
Date: signs

Aim:

To Use Fail2Banto Scan log files and ban IPS that show the malicious Signs.

Procedure:

Step 1: Change the Network adapter to Bridged Adapter

Step 2: Open ubuntu server and install fail2ban using the below command

Downloaded by Hari ([email protected])


Downloaded by Hari ([email protected])
Step 3: Write the below configuration inside the jail.localfile

Step 4: After every time changing the jail.local, restart the fail2ban service

Step 5: Check the status of fail2ban service

Downloaded by Hari ([email protected])


Step 6: Note the IP of ubuntu server

Step 7: Open kali linux and try brute forcing ssh login of ubuntu server using hydra

The brute force attempt is detected by fail2ban and our ip is blocked


Step 8: Lets disable fail2ban and try brute forcing,

Step 9: Now we can able to perform brute force successfully

Downloaded by Hari ([email protected])


Result:

Thus to use Fail2banto scan log files and Ban IPS that show the malicious signs was
executed Successfully.

Downloaded by Hari ([email protected])


Ex.No:9
Launch brute-force attacks on the Linux server using Hydra
Date:

Aim:

To Launch the Brute-Force attacks on the Linux Server using Hydra

Procedure:

Step 1: In ubuntu server and kali linux, Check the network settings is configured with bridged
adapter

Step 2: In ubuntu server,If openssh-server is not installed during the time of


server installation then install with apt

Downloaded by Hari ([email protected])


Step 3: Now start the ssh service

Step 4: Note the IP of ubuntu server

Step 5: In kali linux, Create a wordlist contains passwords

Downloaded by Hari ([email protected])


Step 6: Use hydra to brute force ssh login of ubuntu server
$ hydra -l <user> -P <wordlist file><IP of ubuntu server>ssh

Arguments

• l – user (user name for login in ubuntu server)


• P – wordlist file (contains passowrds)
• ssh – protocol

Result:

Thus to Launch Brute-Force attacks on the Linux server using Hydra was
executed Successfully.

Downloaded by Hari ([email protected])


Ex.No:10
Perform real-time network traffic analysis and data pocket logging
Date: using Snort

Aim:

To Perform real-time network traffic analysis and data pocket logging using snort.

Procedure:

Step 1: Install the Snort tool by using the command

Step 2: Note the IP and interface of the ubuntu server

SNIFFER MODE
Step 3: To run snort in sniffer mode (capture packets)

Downloaded by Hari ([email protected])


Step 4: Open kali linux and ping the ubuntu server

Step 5: In ubuntu server we can see the ICMPECHO messages.

Downloaded by Hari ([email protected])


PACKET LOGGER MODE

Step 6: Create a directory for logging

Step 7: Now run Snort in packet logging mode and store the logs in the created directory

Step 8: From kali linux ping the ubuntu server

Step 9: Press CTRL+C in ubuntu server to stop snort packet logger mode and move to log
directory

Step 10: Use sudo comman d to logs in as root and Move to the directory named as IP of
kali linux

Downloaded by Hari ([email protected])


Step 11: Use cat command to view the logs of ICMP protocol

IDS MODE
Step 12: Moveto/etc/snort

Create new rules file

Write the rule inside the rules file and save and exit (this rule will give alert when there is
a SSH packet is detected)

Downloaded by Hari ([email protected])


Come back to the/etc/snort and edit snort.conf to add the new.rules rule

Add the line to the snort.conf file

Start the snort in IDS mode with the snort.conf file

Now from kali linux try to login the ubuntu server using ssh

Alert found in snort console

Downloaded by Hari ([email protected])


Result:

Thus to Perform real-time network traffic analysis and data pocket logging using snort
was executed Successfully.

Downloaded by Hari ([email protected])

You might also like