Cyber Security Lab
Cyber Security Lab
1. Introduction..............................................................................................................................2
1.1 Network Diagram......................................................................................................... 2
1.2 List of Tools.................................................................................................................. 3
1.3 System Setup...............................................................................................................5
1.3.1 Kali Linux............................................................................................................ 5
1.3.2 DVWA + Burp Suite............................................................................................ 5
2. Lab Exercise.............................................................................................................................6
Lab 1: Network Enumeration............................................................................................. 6
Objective : In this task, you will assume the role of a network security
consultant hired by a company to perform a security assessment on their
internal network. Your objective is to use Nmap and its various features to
gather information about the network and identify potential security
vulnerabilities................................................................................................... 6
Lab Work 1.1: Scan Network....................................................................................... 6
Objective: Use Nmap to scan the network for active devices, open ports, and
running services............................................................................................... 6
Lab Work 1.2: Scan Device..........................................................................................6
Objective: Use Nmap to perform OS detection, service detection, and
vulnerability scanning.......................................................................................6
Lab Work 2: Network Analysis And Security Auditing with hping3.................................. 10
Objective: Configure and utilize the hping3 tool to perform various network
analysis and security auditing tasks. Focus on sending custom TCP/IP
packets, conducting port scans, simulating DoS attacks, and performing
traceroute operations. Evaluate the network's performance, identify potential
vulnerabilities, and assess the effectiveness of firewall configurations..........10
Lab Work 3: Network Traffic Analysis and IPv4 Packet Spoofing with Wireshark........... 12
Objective: Use Wireshark to understand network traffic analysis, how
communication takes place when particular protocols are involved, diagnose
issues, and spoof IPv4 packets......................................................................12
Lab Work 4: Vulnerability Scanning with Nikto.................................................................13
Objective: Use Nikto to scan DVWA or another server or you can create a
test server for the lab. Focus on understanding the output and identifying
serious vulnerabilities.....................................................................................13
Lab 5: OWASP ZAP Installation and Vulnerability Scanning........................................... 14
Objective: Install OWASP ZAP, perform reconnaissance using the spidering
tool, conduct scans on the target web application, and generate a report
summarizing identified vulnerabilities.............................................................14
Lab Work 6 : Understanding of Web-Vulnerabilities through DVWA................................14
Objective : Install DVWA on a local server or a controlled virtual environment.
Discuss common web vulnerabilities such as SQL injection, XSS, etc..........14
Lab Work 7: Intercepting and Modifying HTTP Requests and Responses with Burp Suite
and DVWA....................................................................................................................... 16
Objective: Configure Burp Suite to intercept and modify HTTP requests and
responses with DVWA. Focus on manipulating sessions, capturing login
attempts, and modifying form data.................................................................16
Packets.......................................................................................................... 16
Lab Work 8: Using Burp Suite Intruder and Repeater Modules with DVWA....................16
Objective: Use the intruder module to perform automated attacks and the
repeater module to test specific vulnerabilities in DVWA............................... 16
1 Port Scanning
1.1 Nmap(Lab1)
1.2 Hping3(Lab2)
3 Network Analysis
3 Pentesting
1.Introduction
1.1 Network Diagram
Kali Kali Linux is an open-source, Mainly used for Network Security, Digital
Debian-based Linux distribution Forensics, Penetration testing, or
geared towards various information Ethical Hacking named Kali Linux.
security tasks, such as Penetration
Testing, Security Research,
Computer Forensics and Reverse
Engineering.
DVWA Damn Vulnerable Web Application, The main goal of this pentesting
shorter DVWA, is a PHP/MySQL playground is to aid penetration testers
web application that is damn and security professionals to test their
vulnerable. skills and tools. In addition it can aid
web devs better understand how to
secure web apps, but also to aid
students/teachers to learn all about web
app security and possible vulnerabilities.
Hping3 hping3 is a command-line utility for hping3 can be used to test the resilience
crafting and sending custom TCP/IP of your firewall rules by sending packets
packets. with various TCP flags and options.
Tracerouting: You can use hping3 to
trace the path taken by packets to reach
their destination.
DVWA configuration:
Testing for SQL injection vulnerabilities with Burp Suite - PortSwigger
For Window: Installing DVWA in Windows with XAMPP
For Linux : Installing DVWA | How to Install and Setup Damn Vulnerable Web Application i…
Steps :
2. Lab Exercise
Lab 1: Network Enumeration
Objective : In this task, you will assume the role of a network security consultant hired by a
company to perform a security assessment on their internal network. Your objective is to use
Nmap and its various features to gather information about the network and identify potential
security vulnerabilities.
Objective: Use Nmap to scan the network for active devices, open ports, and running services.
Objective: Use Nmap to perform OS detection, service detection, and vulnerability scanning.
Procedure:
https://www.networkstraining.com/nmap-commands-cheat-sheet/
nmap | Kali Linux Tools
How To Use Nmap for Vulnerability Scanning: Complete Tutorial
Part 1: Host Discovery and Port Scanning
A. Use Nmap to perform a ping scan (-sn) on the given IP range (e.g., 192.168.1.0/24) to
discover live hosts on the network.
B. For each live host identified, perform a TCP Connect scan (-sT) to enumerate open
ports.
1. Choose three live hosts from the previous scan results 172.31.2.1, 172.31.2.2,
172.31.2.3, 172.31.2.4, 172.31.2.31, 172.31.2.32
2. Use Nmap's version detection to identify services and versions:
3. Document the open ports, services, and versions detected for each host.
Part 3: Operating System Detection
1. Select two hosts from the scan results (e.g., 172.31.2.2).
2. Use Nmap's operating system detection:
nmap -O 172.31.2.2
1. Choose a live host with web services running (e.g., 172.31.2.2 running HTTP on port
80).
2. Use Nmap's scripting engine to scan for vulnerabilities related to web services:
nmap --script=http-vuln* 172.31.2.2
Report :
● Scan Type: The specific type of Nmap scan performed(Host Discovery and Port
Scanning, Service and Version Detection, Operating System Detection,
Vulnerability Scanning, ).
● Findings: The information gathered and vulnerabilities identified during the scan.
Objective: Configure and utilize the hping3 tool to perform various network analysis and
security auditing tasks. Focus on sending custom TCP/IP packets, conducting port scans,
simulating DoS attacks, and performing traceroute operations. Evaluate the network's
performance, identify potential vulnerabilities, and assess the effectiveness of firewall
configurations.
Basic Usage:
Performs a SYN scan on port X of the target IP address. This command sends SYN packets to
port X on the target IP address. The target will respond with a SYN-ACK packet if the port is
open.
● UDP Scan:
● Traceroute
This command sends packets with incrementing TTL (Time-To-Live) values to the target
IP address, allowing users to see each hop along the route.
● ICMP Traceroute:
○ hping3 --traceroute -1 192.168.1.1
○ --traceroute: Enables traceroute mode.
○ -1: Specifies ICMP mode.
○ 192.168.1.1: The target IP address.
● UDP Traceroute:
○ hping3 --traceroute --udp -p 33434 192.168.1.1
○ --traceroute: Enables traceroute mode.
○ --udp: Specifies UDP mode.
○ -p 33434: Sets the destination port for UDP packets. The default
starting port for traceroute is 33434, and it increases with each
hop.
○ 192.168.1.1: The target IP address.
● TCP Traceroute:
○ hping3 --traceroute -S -p 80 192.168.1.1
○ --traceroute: Enables traceroute mode.
○ -S: Send TCP SYN packets.
○ -p 80: Sets the destination port for TCP packets (port 80 is
commonly used for HTTP).
○ 192.168.1.1: The target IP address.
Tasks:
● Sent custom TCP/IP packets using hping3.
● Conducted port scans to identify open ports and services.
● Simulated a Denial of Service (DoS) attack and analyzed network impact.
● Performed traceroute operations to map network paths.
● Evaluated network performance metrics (latency, throughput).
● Identified potential vulnerabilities using hping3 scans.
● Assessed firewall effectiveness by testing with hping3.
Report Format:
● Interpreted results and discussed findings from each task.
● Reflected on challenges encountered and solutions implemented.
Lab Work 3: Network Traffic Analysis and IPv4 Packet Spoofing with
Wireshark
Objective: Use Wireshark to understand network traffic analysis, how communication takes
place when particular protocols are involved, diagnose issues, and spoof IPv4 packets.
Procedure:
Wireshark User’s Guide
Reference : Wireshark Tutorial for BEGINNERS // Where to start with Wireshark
Report Format:
● Interpretation of the results.
● Explanation of how the protocols work based on the captured traffic.
● Analysis of common issues identified and their causes.
● Report on the methods and implications of IPv4 packet spoofing.
Objective: Use Nikto to scan DVWA or another server or you can create a test server
for the lab. Focus on understanding the output and identifying serious vulnerabilities.
Peocecure:
Web Server Scanning With Nikto – A Beginner's Guide
https://www.linkedin.com/pulse/web-hacking-lab-octavious-w--3ylyc/
Reference: Nikto Web Vulnerability Scanner - Web Penetration Testing - #1
LAB WORK : Lab 43 – Web application vulnerability scanning with Nikto - 101Labs.net
Report Format:
Report Format:
● Generate a detailed report summarizing all findings from the passive scan, active
scan, and manual testing.
● Include recommendations for remediating the identified vulnerabilities.
Objective : Install DVWA on a local server or a controlled virtual environment. Discuss common
web vulnerabilities such as SQL injection, XSS, etc.
Procedure:
Example : 1 - Brute Force (low/med/high) - Damn Vulnerable Web Application (DV…
Report Format:
● Root cause of the vuln.
● Impact
● Solution
Lab Work 7: Intercepting and Modifying HTTP Requests and Responses
with Burp Suite and DVWA
Objective: Configure Burp Suite to intercept and modify HTTP requests and responses with
DVWA. Focus on manipulating sessions, capturing login attempts, and modifying form data.
Packets.
Procedure:
Report Format:
Lab Work 8: Using Burp Suite Intruder and Repeater Modules with DVWA
Objective: Use the intruder module to perform automated attacks and the repeater module to
test specific vulnerabilities in DVWA.
Procedure:
Reference: 02. Bruteforce (using Intruder) / Hacking DVWS with Burp Suite
Intercept Packet: