Report Cyber
Report Cyber
par :
Fadili Nasrallah
I. Introduction
This lab uses VMware to build a mini enterprise network split into LAN and DMZ zones.
You’ll deploy three VMs, enforce a default-deny iptables policy, host a PHP login site over
both HTTP and HTTPS, and capture traffic with Wireshark. By simulating HTTP-based
credential theft and then switching to HTTPS, you’ll see firsthand how zone isolation, firewall
filtering, and TLS encryption combine to defend against common network attacks.
II. Objectives
• Deploy three VMs and assign them to LAN or DMZ.
• Implement a stateful firewall with iptables to enforce a least-privilege policy.
• Configure Apache + PHP to serve a login page on ports 80 and 443, and generate a
self-signed SSL certificate with OpenSSL.
• Use Wireshark to capture and inspect HTTP vs. HTTPS traffic.
• Compare exposed plaintext data (HTTP) with encrypted TLS payloads (HTTPS).
• Illustrate how strict firewall rules and HTTPS together harden system security.
The virtual environment consists of 3 machines, all connected to the same internal virtual
network:
Role OS IP Address
Zone Role
Hosts login site over HTTP and
Web Server Debian 192.168.211.131 LAN
HTTPS
Client Windows XP 192.168.211.129 LAN Sends login requests via browser
Captures traffic, simulates
Administrator Kali Linux 192.168.211.128 DMZ
Administrator
• Implementation:
2
• We install wireshark by running sudo apt update && sudo apt install -y wireshark
• We open wireshark by running wireshark &
• We start capturing on eth0.
• We Install Snort
• Testing:
Interpretation: this proves HTTP is insecure as the attackers can reads credentials in plain
text.
3
• We only see TLS handshakes (Client Hello, Server Hello...), which means the client
and the server started an encrypted session
IV. Conclusion
This lab successfully demonstrated how a layered virtualization environment, combined
with well-crafted iptables rules and HTTPS encryption, can significantly enhance the
security posture of a small enterprise network. By segmenting the network into LAN and
DMZ zones and enforcing a default-deny firewall policy, we limited potential attack paths
to only SSH and HTTPS services. The HTTP login test clearly showed that credentials
and session data are exposed in plaintext, whereas the HTTPS test confirmed that all
application-level data is protected within a TLS tunnel.
4
Overall, the exercise highlighted three key takeaways:
1. Isolation: Virtual network segmentation prevents an attacker on the LAN from freely
accessing all services on the DMZ.
2. Access Control: Stateful firewall rules enforce strict service-level permissions,
reducing the attack surface.
3. Encryption: Transport-layer security is essential to protect sensitive data in transit;
without it, even a well-configured firewall cannot prevent credential theft.