Ehsd Lab File
Ehsd Lab File
Aim: To install and configure Damn Vulnerable Web Application (DVWA) on a local
machine for testing vulnerabilities.
Explanation:
DVWA is a PHP/MySQL web application that is extremely vulnerable to common web
vulnerabilities. It is used by security professionals to practice penetration testing and
understand how real attacks work. It includes modules for SQL Injection, XSS, CSRF,
and more.
Tools Used:
o XAMPP/WAMP
o Web browser
Procedure:
Conclusion:
DVWA was successfully installed and configured. The lab environment is ready for
further testing of web vulnerabilities.
Screenshot:
Experiment 2: Reconnaissance
Aim: To perform reconnaissance on a target system using various information-
gathering tools.
Explanation:
Reconnaissance is the first phase in ethical hacking, used to gather information about
a target before launching any attack. It can be passive (without direct contact) or
active (directly probing systems).
Tools Used:
o WHOIS
o Nslookup
o Google Hacking
o Maltego
Procedure:
o Use WHOIS to gather domain details.
o Use Nslookup to find IP and DNS records.
o Use Google advanced operators for open data.
o Use Maltego for visual mapping of data.
Conclusion:
Reconnaissance helps in understanding the attack surface of a target by gathering
public and technical information.
Screenshot:
Experiment 3: NeoTrace Tool
Aim: To trace the route from source to destination using NeoTrace and analyze each
network hop.
Explanation:
NeoTrace is a network diagnostic tool that provides graphical path tracing to a
destination. It helps in understanding the number of hops and delays between the
source and destination server.
Tools Used:
o NeoTrace
o Internet connection
Procedure:
Conclusion:
NeoTrace successfully mapped the route to the destination, providing insight into the
network path and latency.
Screenshot:
Experiment 4: Visual Look Out Tool
Aim: To use the Visual Lookout tool for real-time monitoring and scanning of
systems.
Explanation:
Visual Lookout is a network monitoring tool that shows graphical representations of
network traffic and intrusion attempts. It helps administrators visualize suspicious
activity.
Tools Used:
Procedure:
Conclusion:
The tool successfully visualized traffic, allowing monitoring of live threats and
suspicious behaviour.
Screenshot:
Experiment 5: SuperScan and NMap
CO-PO Mapping: CO1, CO2
Aim: To scan open ports and services on a network using SuperScan and NMap.
Explanation:
SuperScan and NMap are powerful tools for port scanning and network mapping.
They help find vulnerabilities in open ports and identify active devices and services.
Tools Used:
o SuperScan
o Nmap
Procedure:
o Launch SuperScan and NMap tools.
o Enter target IP addresses.
o Perform a TCP scan.
o View the open ports, protocols, and services.
Conclusion:
Port scanning with SuperScan and NMap helps discover vulnerabilities and
understand the services running on a system.
Screenshot:
Experiment 6: IP Network Browser
Aim: To analyse and monitor IP-based devices using IP Network Browser.
Explanation:
IP Network Browser allows you to scan your network and find all active IP devices. It
helps in identifying unauthorized devices and ensures the network is secure.
Tools Used:
o IP Network Browser
Procedure:
Conclusion:
IP Network Browser is effective for monitoring connected devices and helps maintain
a secure internal network.
Screenshot:
Experiment 7: Exploiting SQL Injection
Aim: To demonstrate SQL Injection vulnerability and how attackers can use it to gain
unauthorized access.
Explanation:
SQL Injection is a code injection technique used to manipulate the database of a web
application. It can be used to retrieve, alter, or delete database information without
authorization.
Tools Used:
o DVWA
o Web browser
Procedure:
Conclusion:
SQL Injection vulnerability was successfully exploited to retrieve protected user data,
highlighting poor validation.
Screenshot:
Experiment 8: Exploiting Cross-Site Scripting (XSS)
Aim: To understand and demonstrate the XSS vulnerability in web applications.
Explanation:
Cross-Site Scripting allows attackers to inject malicious scripts into web pages viewed
by other users. It is often used to steal cookies, session tokens, or redirect users.
Tools Used:
o DVWA
o Web browser
Procedure:
Conclusion:
XSS vulnerability allows execution of malicious scripts, showing how critical input
validation is for web apps.
Screenshot:
Experiment 9: DDoS Attack Demonstration
Aim: To simulate a Distributed Denial-of-Service (DDoS) attack and understand its
effects.
Explanation:
DDoS attacks aim to flood a target system with traffic from multiple sources, making
the service unavailable to legitimate users.
Tools Used:
Procedure:
Conclusion:
DDoS attacks can severely disrupt services and require mitigation techniques like
firewalls, rate-limiting, and CDNs.
Screenshot:
Experiment 10: LFI and RFI Exploitation
CO-PO Mapping: CO4
Aim: To demonstrate Local File Inclusion (LFI) and Remote File Inclusion (RFI)
vulnerabilities.
Explanation:
LFI and RFI allow attackers to include files on a server through the web browser. LFI
includes local server files while RFI includes external files. These are common in
misconfigured servers.
Tools Used:
Procedure:
Conclusion:
LFI and RFI can expose sensitive data or execute remote scripts, highlighting the
importance of validating file inputs.
Screenshot: