Tuesday, 7 March 2023

Cyber Security - Lab 2

 




Practical No.

Practical Name

Session

1

Preform Rule Based and Role Based Configuration of Windows Firewall

Session 1

2

To Configure Linux Firewall using iptables command

3

Perform port and protocol scanning.

Session 2

4

Perform OS fingerprinting of remote hosts.

5

Perform packet tracking and determine the content of the packet

Session 3

6

By intercepting data/packet extract user id and password of xyz user.


Information to be filled in by learner

Procedure (Write step-wise)


Observations
Write your observations of the task here


Queries about the codes/scenarios given for practice (if any to ask the facilitator)


Feedback from the Facilitator
To be filled in by facilitator


Practical Session 1 Preform Rule Based and Role Based Configuration of Windows Firewall

 

Practical Title: Working with Firewalls

Problem statement

 Preform Rule Based and Role Based Configuration of Windows Firewall.

Instructions

 Login in windows with admin privileges.

Objective: By the end of this practical, you will be able to successfully configure Windows based firewalls.

Software/s required, if any:

1. Windows Firewall

Hardware required, if any:  NA

External references, any




Click on New Rule and select the feature that you want to control.

 









Open Edge browser and access google.com


Rule Settings Success !




 

Practical Session 2 To Configure Linux Firewall using iptables command

 

Practical Title: Working with Firewalls

Problem statement

 To Configure Linux Firewall using iptables command

Instructions

·         Login as root user in Linux (if you are using your own machine) Otherwise use sudo.

Objective: By the end of this practical, you will be able to configure Linux Firewall.

Software/s required, if any:

1. NA

Hardware required, if any: NA

External references, any

Practical Session 3 Perform port and protocol scanning.

 Practical Title: Port and protocol scanning.

Problem statement

 Perform port and protocol scanning.

 Instructions

·         Work with Nmap

·         Download the cheat sheet of Nmap from internet (https://github.com/jasonniebauer/Nmap-Cheatsheet)

Objective: By the end of this practical, you will be able to determine open port numbers and protocols enabled on the host machine.

Software/s required, if any:

1. Nmap

Hardware required, if any: NA

External references, any : No

Refer :  LAB -1 

    

Practical Session 4 Perform OS fingerprinting of remote hosts.

 

Practical Title: OS Fingerprinting

Problem statement

 Perform OS fingerprinting of remote hosts.

Instructions

·         Use Nmap for this one too.

·         Download the cheat sheet of Nmap from internet (https://github.com/jasonniebauer/Nmap-Cheatsheet )

 

Objective: By the end of this practical, you will be able to determine the operating system installed on the remote host.

Software/s required, if any:

1. Nmap

Hardware required, if any: NA

External references, any : No

Refer :  LAB -1 

Practical Session 5 Perform packet tracing and determine the content of the packet.

 

Practical Title: Working with Wireshark (Packet Analysis)

Problem statement

 Perform packet tracking and determine the content of the packet.

Instructions

·         Work with Wireshark.

·         Start capturing packets.

·         Analyse the packets and get the required details.

Objective: By the end of this practical, you will be able to analyse network traffic successfully.

Software/s required, if any:

1. Wireshark

Hardware required, if any: NA

External references, any : No

 

Practical Session 6 By intercepting data/packets extract user id and password of xyz user.

 

Practical Title: Working with Wireshark (Packet Analysis)

Problem statement

 By intercepting data/packets extract user id and password of xyz user.

Instructions

·         Work with Wireshark.

·         Start capturing packets.

·         Analyze the packets and get the required details.

Objective: By the end of this practical, you will be able to analyze network traffic successfully.

Software/s required, if any:

1. Wireshark

Hardware required, if any: NA

External references, any : No

Refer :  LAB -1 

No comments:

Post a Comment