Cyber Security Workshop Lab File
Cyber Security Workshop Lab File
1.
Basic Packet Inspection: Capture network traffic
using Wire shark and analyze basic protocols like
HTTP, DNS, and SMTP to understand how data is
transmitted and received.
2.
Detecting Suspicious Activity: Analyze network
traffic to identify suspicious patterns, such as
repeated connection attempts or unusual
communication between hosts.
3.
Malware Traffic Analysis: Analyze captured traffic to
identify signs of malware communication, such as
command-and-control traffic or data infiltration.
4.
Password Sniffing: Simulate a scenario where a
password is transmitted in plaintext. Use Wireshark
to capture and analyze the packets to demonstrate
the vulnerability and the importance of encryption.
6.
SQL Injection: Use DVWA to practice SQL injection
attacks. Demonstrate how an attacker can
manipulate input fields to extract, modify, or delete
database information.
7.
Cross-Site Scripting (XSS): Exploit XSS
vulnerabilities in DVWA to inject malicious scripts
into web pages. Show the potential impact of XSS
attacks, such as stealing cookies or defacing
websites.
Experiment No:1
a. Open Wireshark.
b. The following screen showing a list of all the network
connections is displayed. Select one or more of the network
interfaces using shift+left-click or by clicking on the tab All
Interfaces Shown
packets.”
OR
screen
e. Once all required packets are captured, use the same buttons
The Packet List, the top pane, lists all the packets in the capture.
Wireshark filters
Capture filters limit the captured packets by the chosen filter. If the
a. host IP-address: This filter limits the captured traffic to and from
the IP address
e. port not 53 and not arp: Capture all traffic except DNS and ARP
traffic
Wireshark display filters
analysis.
You can also use ip.addr to show packets to and from that
IP.
ii) tcp.port eq 25: This filter will show you all traffic on port 25,
iii) icmp: This filter will show you only ICMP traffic in the capture,
iv) ip.addr != IP_address: This filter shows you all traffic except
Start a Wireshark capture -> Open a web browser -> Navigate to any
HTTPS-based website -> Stop the Wireshark capture.
Input ' ssl' in the filter box to monitor only HTTPS traffic -> Observe
the first TLS packet -> The destination IP would be the target IP
(server).
Input ‘tcp.port == 80’ to see only TCP traffic connected to the web
server connection.
Observe the TCP [SYN] packet. Expand Ethernet and observe the
destination address that is the default gateway address; whereas, the
source is your own MAC address.
Monitor the acknowledgement code. It's worth noting that the number
is one relative ACK number. The real acknowledgement value is one
higher than the previous segment's identifier.
Monitor the flag values. [SYN, ACK], which is enabled, shows the
second section of the TCP three-way handshake.
Use the hping3 tool to flood the victim IP. Simultaneously, start
capturing the traffic on Wireshark. Input 'tcp.flags.syn == 1' in the
filter box to view SYN packets flood.
Notice a lot of SYN packets with no time lag.
The malware being use is called Dridex malware. This malware affects
financial institutions, and typically is found through spreadsheets with
malware.
tls.handshake.type eq 1
Since this traffic is encrypted we will be decrypting with the
decryption key we were provided with on GitHub.
Now, filter the HTTP traffic and the TLS handshake, along with
excluding SSDP:
Save this file, and use a website like virus total to see what kind of
malware it is.
We can also find an very weird POST request for this .php file:
Step 6: So firstly for knowing the credential we use the first method
and apply the filter for the GET methods.
As we can see in the image there are two packets where the login
page was requested with a GET request as well, but there is no form
data submitted with a GET request.
Step 7: Now after checking the GET method if we didn’t find the form
data, then we will try the POST method for that we will apply the filter
on Wireshark as you can see.
As we can see we have a packet with form data click on the packet
with user info and the application URL encoded. and click on the
down-
HTML form URL Encoded where the login credential is found. login
credential as it is the same that we filed on the website in step 2.
Experiment No:5
1. Open Ettercap.
5.
6. Now, using that same "Hosts" tab, click on "Hosts List". This will
display all the hosts that ettercap has discovered on your
network as seen in the screenshot below.
7. Now, select one of the hosts that will be the target of this attack
in the window by clicking on it and then click on "Add to Target
1" at the bottom of the window. When we do so, ettercap will
add that host as the first target in our MiTM attack as seen in
the screenshot below. Next, select the second host in this
attack and then click "Add to Target 2".
8. Finally, go to the menu above and click on MITM tab and the
drop down menu will have a selection called "ARP Poisoning" as
seen in the screenshot below.
9. Select it and it will open a pop window like below. Select "Sniff
remote connections".When we press OK, ettercap will begin
ARP poisoning and we see ettercap respond in its main windows
with the message below.
Now, we have successfully placed ourselves between the two targets
systems and all their traffic must flow through us.