SlideShare a Scribd company logo
1 of 2
Download to read offline
Network Security VMs (Virtual Machines) Project
cyber security project and need an explanation and answer to help me learn.
It's so simple project
I just need someone to explain to me the project and help me doing it, please check the file
I'll upload and read it carefully
Requirements: Short
Network Security CCCY323 Project Page 2 of 5 Part 1: Network Setup (3 marks) Task 1:
Server setting • Operating system: Linux (Ubuntu) • You need to setup Apache server (on
the server VM) with a sample webpage, such as “hello world”. Hint: You can use XAMPP to
create your Apache test server. Download link: https://www.apachefriends.org/index.html
Task 2: Attacker VM • Operating system: Linux (Ubuntu) • In this project, you need to
perform two types of attacks using nmap tool. o Network Scanning Attack o Dos Attack Task
3: Client • Operating system: Linux (Ubuntu) Submission: 1. Network setup of the project
(draw a diagram with labels and IP addresses). [1 mark] 2. Screenshots of your VM
configurations. [1 mark] 3. Screenshots of your web page. [0.5 mark] 4. Screenshots of the
nmap tool installation commands. [0.5 mark]
Network Security CCCY323 Project Page 3 of 5 Part 2: Performing passive and active
attack (3 marks) Task1: Perform network scanning attack from the attacker machine to the
server VM. • Perform TCP Connect Scan • Perform Stealth Scan • Perform a scan that
enables OS detection, version detection, script scanning, and traceroute Task2: Perform
DoS attack from the attacker machine using http-slowloris script to the server VM. Check
the following link: https://nmap.org/nsedoc/scripts/http-slowloris.html Submission: 1. A
brief description about the used network scanning commands [3X 0.33= 1 mark] 2.
Screenshots of the network scanning outputs. [3X 0.33= 1 mark] 3. A brief description about
the used DoS attack command. [0.5 mark] 4. Screenshots of the running DoS attack. [0.5
mark] Part 3: Wireshark (2 marks) Install Wireshark tool on the server VM and use it to
capture: • The TCP connect scan • The Stealth Scan. • The malicious packets coming from
attacker VM (Capture only 500 packets) • Capture both the incoming and outgoing packets
between the client VM and the server. Submission: 1. Add the Four screenshots to your
submitted report. [1 mark] 2. Briefly explain each of them. [1 mark]
Network Security CCCY323 Project Page 4 of 5 Part 4: Firewall (5 marks) Task 1: After
you successfully complete Part 2 and 3, write the following iptables on the server to block
the following traffic types originated from the attacker to the server: 1. HTTP connection
request from the attacker to the server. 2. SSH connection request from the attacker to the
server. 3. FTP and Telnet requests ( Use single rule to block these multiple ports). Task 2:
Configure the iptables to log dropped packets (enable logging in iptables) and then show
the log messages. Submission: 1. Screenshot the iptables block commands with a brief
explanation for each command. [3 marks] 2. Screenshot the iptables log enabling command
with a brief explanation. [1 mark] 3. Screenshot of the log messages. [1 mark] Part 5: IDS
(3 marks) Install and configure snort on server VM to alert on TCP connect scan on port 22
from the attacker VM. Submission: 1. Screenshot the configured alert snort command from
the server VM and briefly explain it. [1 mark] 2. Screenshot the TCP connect scan on port 22
command from the attacker VM. [1 mark] 3. Screenshot the snort response at the server VM.
[1 mark]
Network Security CCCY323 Project Page 5 of 5 Part 6: Project Report (4 marks) In the
report, you need to include the following details: • Network setup of the project (a diagram
with labels and IP addresses) • List of software or tools used in the project and their
configurations. • To demonstrate the impact of the DoS attack and the effectiveness of
firewall, take three screenshots to the web browser on the client VM as the following: o
Before the attack: client can access the web page on the server. [1 mark] o During the
attack: client cannot access the web page. [1 mark] o After the attack: client become able to
access the web page after applying the firewall rules. [1 mark] • Step-by-step project
description (screenshots are required) • Conclusion [1 mark] Some useful installation and
operation tips: • Root privilege: Some operations need root privilege on Linux (for example,
software package installation, configurations etc.). ✓From command line prompt you can
raise your power to root privilege: #su password: ***** ✓To exit from root
privilege: #exit 2. • How to install software package from its source on Ubuntu?
Use apt-get command in Ubuntu. Reference: https://itsfoss.com/apt-get-linux-guide/ • A
Complete Guide to Using VirtualBox on Your Computer (nakivo.com) • XAMPP tutorial:
installation and first steps: https://www.ionos.com/digitalguide/server/tools/xampp-
tutorial-create-your-own-local-test-server/ • How to Use Wireshark to Capture, Filter and
Inspect Packets: https://www.howtogeek.com/104278/how-to-use-wireshark-to-capture-
filter-and-inspect-packets/ • Iptables Tutorial - Beginners Guide to Linux Firewall
(hostinger.com) • Snort Rules: https://resources.infosecinstitute.com/topic/snort-rules-
workshop-part-one/

More Related Content

Similar to Network Security VMs Project.pdf

COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docxCOIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
clarebernice
 
Session 9 Tp 9
Session 9 Tp 9Session 9 Tp 9
Session 9 Tp 9
githe26200
 
CLIENT SERVER IN OS.ppt
CLIENT SERVER IN OS.pptCLIENT SERVER IN OS.ppt
CLIENT SERVER IN OS.ppt
suman yadav
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
Freddy Buenaño
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
webhostingguy
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
webhostingguy
 
basic mikrotikbasic mikrotikbasic mikrotik.pdf
basic mikrotikbasic mikrotikbasic mikrotik.pdfbasic mikrotikbasic mikrotikbasic mikrotik.pdf
basic mikrotikbasic mikrotikbasic mikrotik.pdf
Arif293146
 

Similar to Network Security VMs Project.pdf (20)

6th SDN Interest Group Seminar - Session6 (131210)
6th SDN Interest Group Seminar - Session6 (131210)6th SDN Interest Group Seminar - Session6 (131210)
6th SDN Interest Group Seminar - Session6 (131210)
 
Orchestrating Microservices with Kubernetes
Orchestrating Microservices with Kubernetes Orchestrating Microservices with Kubernetes
Orchestrating Microservices with Kubernetes
 
Famous C&C servers from inside to outside.
Famous C&C servers from inside to outside.Famous C&C servers from inside to outside.
Famous C&C servers from inside to outside.
 
Design and Development of ARM9 Based Embedded Web Server
Design and Development of ARM9 Based Embedded Web ServerDesign and Development of ARM9 Based Embedded Web Server
Design and Development of ARM9 Based Embedded Web Server
 
Cisco Malware: A new risk to consider in perimeter security designs
Cisco Malware: A new risk to consider in perimeter security designsCisco Malware: A new risk to consider in perimeter security designs
Cisco Malware: A new risk to consider in perimeter security designs
 
Penetration Testing Project Game of Thrones CTF: 1
Penetration Testing Project Game of Thrones CTF: 1Penetration Testing Project Game of Thrones CTF: 1
Penetration Testing Project Game of Thrones CTF: 1
 
Vulnerabilities in multiplayer games (2001-2012)
Vulnerabilities in multiplayer games (2001-2012)Vulnerabilities in multiplayer games (2001-2012)
Vulnerabilities in multiplayer games (2001-2012)
 
Collabnix Online Webinar - Demystifying Docker & Kubernetes Networking by Bal...
Collabnix Online Webinar - Demystifying Docker & Kubernetes Networking by Bal...Collabnix Online Webinar - Demystifying Docker & Kubernetes Networking by Bal...
Collabnix Online Webinar - Demystifying Docker & Kubernetes Networking by Bal...
 
HAVOC-Workshop-Slides.pptx
HAVOC-Workshop-Slides.pptxHAVOC-Workshop-Slides.pptx
HAVOC-Workshop-Slides.pptx
 
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docxCOIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
 
Session 9 Tp 9
Session 9 Tp 9Session 9 Tp 9
Session 9 Tp 9
 
CLIENT SERVER IN OS.ppt
CLIENT SERVER IN OS.pptCLIENT SERVER IN OS.ppt
CLIENT SERVER IN OS.ppt
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
 
MikeTaulty_WPF_DevDays
MikeTaulty_WPF_DevDaysMikeTaulty_WPF_DevDays
MikeTaulty_WPF_DevDays
 
Insert coin to continue - Ransomware in the gaming industry.pdf
Insert coin to continue - Ransomware in the gaming industry.pdfInsert coin to continue - Ransomware in the gaming industry.pdf
Insert coin to continue - Ransomware in the gaming industry.pdf
 
Mini Project- Virtual Network Project
Mini Project- Virtual Network ProjectMini Project- Virtual Network Project
Mini Project- Virtual Network Project
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
basic mikrotikbasic mikrotikbasic mikrotik.pdf
basic mikrotikbasic mikrotikbasic mikrotik.pdfbasic mikrotikbasic mikrotikbasic mikrotik.pdf
basic mikrotikbasic mikrotikbasic mikrotik.pdf
 
Netw200 final joshua_brown
Netw200 final joshua_brownNetw200 final joshua_brown
Netw200 final joshua_brown
 

More from sdfghj21

you interviewed the CEO and evaluated the organization to gain.docx
you interviewed the CEO and evaluated the organization to gain.docxyou interviewed the CEO and evaluated the organization to gain.docx
you interviewed the CEO and evaluated the organization to gain.docx
sdfghj21
 
Write a to paper about genetically vigorous.docx
Write a to paper about genetically vigorous.docxWrite a to paper about genetically vigorous.docx
Write a to paper about genetically vigorous.docx
sdfghj21
 
When you talk about the meaning of which sense.docx
When you talk about the meaning of which sense.docxWhen you talk about the meaning of which sense.docx
When you talk about the meaning of which sense.docx
sdfghj21
 
Virtualization and cloud services continue to gain momentum as more.docx
Virtualization and cloud services continue to gain momentum as more.docxVirtualization and cloud services continue to gain momentum as more.docx
Virtualization and cloud services continue to gain momentum as more.docx
sdfghj21
 
Your name Brief background Your profession What you hope to.docx
Your name Brief background Your profession What you hope to.docxYour name Brief background Your profession What you hope to.docx
Your name Brief background Your profession What you hope to.docx
sdfghj21
 
The ways in which views related to race seem.docx
The ways in which views related to race seem.docxThe ways in which views related to race seem.docx
The ways in which views related to race seem.docx
sdfghj21
 
This project provides you an opportunity to apply the marketing.docx
This project provides you an opportunity to apply the marketing.docxThis project provides you an opportunity to apply the marketing.docx
This project provides you an opportunity to apply the marketing.docx
sdfghj21
 
The assignment must be submitted on a Microsoft word.docx
The assignment must be submitted on a Microsoft word.docxThe assignment must be submitted on a Microsoft word.docx
The assignment must be submitted on a Microsoft word.docx
sdfghj21
 
Using online or library research articles explain the.docx
Using online or library research articles explain the.docxUsing online or library research articles explain the.docx
Using online or library research articles explain the.docx
sdfghj21
 
Standards are designed to ensure Without no structure.docx
Standards are designed to ensure Without no structure.docxStandards are designed to ensure Without no structure.docx
Standards are designed to ensure Without no structure.docx
sdfghj21
 
think of a leader or presenter whose communication has.docx
think of a leader or presenter whose communication has.docxthink of a leader or presenter whose communication has.docx
think of a leader or presenter whose communication has.docx
sdfghj21
 
The Community of Inquiry frameworkLinks to an external is.docx
The Community of Inquiry frameworkLinks to an external is.docxThe Community of Inquiry frameworkLinks to an external is.docx
The Community of Inquiry frameworkLinks to an external is.docx
sdfghj21
 
we focus on notion of the in addition.docx
we focus on notion of the in addition.docxwe focus on notion of the in addition.docx
we focus on notion of the in addition.docx
sdfghj21
 
When and how did you become aware of people being.docx
When and how did you become aware of people being.docxWhen and how did you become aware of people being.docx
When and how did you become aware of people being.docx
sdfghj21
 
To Working with your field identify a social.docx
To Working with your field identify a social.docxTo Working with your field identify a social.docx
To Working with your field identify a social.docx
sdfghj21
 
Write Cornell notes after reading Cornell Notes are.docx
Write Cornell notes after reading Cornell Notes are.docxWrite Cornell notes after reading Cornell Notes are.docx
Write Cornell notes after reading Cornell Notes are.docx
sdfghj21
 
What are some current challenges your chosen groups.docx
What are some current challenges your chosen groups.docxWhat are some current challenges your chosen groups.docx
What are some current challenges your chosen groups.docx
sdfghj21
 
To complete this review the Learning Resources for this.docx
To complete this review the Learning Resources for this.docxTo complete this review the Learning Resources for this.docx
To complete this review the Learning Resources for this.docx
sdfghj21
 
summarize Jacob and inspirations in a.docx
summarize Jacob and inspirations in a.docxsummarize Jacob and inspirations in a.docx
summarize Jacob and inspirations in a.docx
sdfghj21
 
Strong leaders do not only focus on building their own.docx
Strong leaders do not only focus on building their own.docxStrong leaders do not only focus on building their own.docx
Strong leaders do not only focus on building their own.docx
sdfghj21
 

More from sdfghj21 (20)

you interviewed the CEO and evaluated the organization to gain.docx
you interviewed the CEO and evaluated the organization to gain.docxyou interviewed the CEO and evaluated the organization to gain.docx
you interviewed the CEO and evaluated the organization to gain.docx
 
Write a to paper about genetically vigorous.docx
Write a to paper about genetically vigorous.docxWrite a to paper about genetically vigorous.docx
Write a to paper about genetically vigorous.docx
 
When you talk about the meaning of which sense.docx
When you talk about the meaning of which sense.docxWhen you talk about the meaning of which sense.docx
When you talk about the meaning of which sense.docx
 
Virtualization and cloud services continue to gain momentum as more.docx
Virtualization and cloud services continue to gain momentum as more.docxVirtualization and cloud services continue to gain momentum as more.docx
Virtualization and cloud services continue to gain momentum as more.docx
 
Your name Brief background Your profession What you hope to.docx
Your name Brief background Your profession What you hope to.docxYour name Brief background Your profession What you hope to.docx
Your name Brief background Your profession What you hope to.docx
 
The ways in which views related to race seem.docx
The ways in which views related to race seem.docxThe ways in which views related to race seem.docx
The ways in which views related to race seem.docx
 
This project provides you an opportunity to apply the marketing.docx
This project provides you an opportunity to apply the marketing.docxThis project provides you an opportunity to apply the marketing.docx
This project provides you an opportunity to apply the marketing.docx
 
The assignment must be submitted on a Microsoft word.docx
The assignment must be submitted on a Microsoft word.docxThe assignment must be submitted on a Microsoft word.docx
The assignment must be submitted on a Microsoft word.docx
 
Using online or library research articles explain the.docx
Using online or library research articles explain the.docxUsing online or library research articles explain the.docx
Using online or library research articles explain the.docx
 
Standards are designed to ensure Without no structure.docx
Standards are designed to ensure Without no structure.docxStandards are designed to ensure Without no structure.docx
Standards are designed to ensure Without no structure.docx
 
think of a leader or presenter whose communication has.docx
think of a leader or presenter whose communication has.docxthink of a leader or presenter whose communication has.docx
think of a leader or presenter whose communication has.docx
 
The Community of Inquiry frameworkLinks to an external is.docx
The Community of Inquiry frameworkLinks to an external is.docxThe Community of Inquiry frameworkLinks to an external is.docx
The Community of Inquiry frameworkLinks to an external is.docx
 
we focus on notion of the in addition.docx
we focus on notion of the in addition.docxwe focus on notion of the in addition.docx
we focus on notion of the in addition.docx
 
When and how did you become aware of people being.docx
When and how did you become aware of people being.docxWhen and how did you become aware of people being.docx
When and how did you become aware of people being.docx
 
To Working with your field identify a social.docx
To Working with your field identify a social.docxTo Working with your field identify a social.docx
To Working with your field identify a social.docx
 
Write Cornell notes after reading Cornell Notes are.docx
Write Cornell notes after reading Cornell Notes are.docxWrite Cornell notes after reading Cornell Notes are.docx
Write Cornell notes after reading Cornell Notes are.docx
 
What are some current challenges your chosen groups.docx
What are some current challenges your chosen groups.docxWhat are some current challenges your chosen groups.docx
What are some current challenges your chosen groups.docx
 
To complete this review the Learning Resources for this.docx
To complete this review the Learning Resources for this.docxTo complete this review the Learning Resources for this.docx
To complete this review the Learning Resources for this.docx
 
summarize Jacob and inspirations in a.docx
summarize Jacob and inspirations in a.docxsummarize Jacob and inspirations in a.docx
summarize Jacob and inspirations in a.docx
 
Strong leaders do not only focus on building their own.docx
Strong leaders do not only focus on building their own.docxStrong leaders do not only focus on building their own.docx
Strong leaders do not only focus on building their own.docx
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
PUBLIC FINANCE AND TAXATION COURSE-1-4.pdf
PUBLIC FINANCE AND TAXATION COURSE-1-4.pdfPUBLIC FINANCE AND TAXATION COURSE-1-4.pdf
PUBLIC FINANCE AND TAXATION COURSE-1-4.pdf
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Ernest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsErnest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell Tolls
 
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxMichaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 

Network Security VMs Project.pdf

  • 1. Network Security VMs (Virtual Machines) Project cyber security project and need an explanation and answer to help me learn. It's so simple project I just need someone to explain to me the project and help me doing it, please check the file I'll upload and read it carefully Requirements: Short Network Security CCCY323 Project Page 2 of 5 Part 1: Network Setup (3 marks) Task 1: Server setting • Operating system: Linux (Ubuntu) • You need to setup Apache server (on the server VM) with a sample webpage, such as “hello world”. Hint: You can use XAMPP to create your Apache test server. Download link: https://www.apachefriends.org/index.html Task 2: Attacker VM • Operating system: Linux (Ubuntu) • In this project, you need to perform two types of attacks using nmap tool. o Network Scanning Attack o Dos Attack Task 3: Client • Operating system: Linux (Ubuntu) Submission: 1. Network setup of the project (draw a diagram with labels and IP addresses). [1 mark] 2. Screenshots of your VM configurations. [1 mark] 3. Screenshots of your web page. [0.5 mark] 4. Screenshots of the nmap tool installation commands. [0.5 mark] Network Security CCCY323 Project Page 3 of 5 Part 2: Performing passive and active attack (3 marks) Task1: Perform network scanning attack from the attacker machine to the server VM. • Perform TCP Connect Scan • Perform Stealth Scan • Perform a scan that enables OS detection, version detection, script scanning, and traceroute Task2: Perform DoS attack from the attacker machine using http-slowloris script to the server VM. Check the following link: https://nmap.org/nsedoc/scripts/http-slowloris.html Submission: 1. A brief description about the used network scanning commands [3X 0.33= 1 mark] 2. Screenshots of the network scanning outputs. [3X 0.33= 1 mark] 3. A brief description about the used DoS attack command. [0.5 mark] 4. Screenshots of the running DoS attack. [0.5 mark] Part 3: Wireshark (2 marks) Install Wireshark tool on the server VM and use it to capture: • The TCP connect scan • The Stealth Scan. • The malicious packets coming from attacker VM (Capture only 500 packets) • Capture both the incoming and outgoing packets between the client VM and the server. Submission: 1. Add the Four screenshots to your submitted report. [1 mark] 2. Briefly explain each of them. [1 mark] Network Security CCCY323 Project Page 4 of 5 Part 4: Firewall (5 marks) Task 1: After you successfully complete Part 2 and 3, write the following iptables on the server to block the following traffic types originated from the attacker to the server: 1. HTTP connection
  • 2. request from the attacker to the server. 2. SSH connection request from the attacker to the server. 3. FTP and Telnet requests ( Use single rule to block these multiple ports). Task 2: Configure the iptables to log dropped packets (enable logging in iptables) and then show the log messages. Submission: 1. Screenshot the iptables block commands with a brief explanation for each command. [3 marks] 2. Screenshot the iptables log enabling command with a brief explanation. [1 mark] 3. Screenshot of the log messages. [1 mark] Part 5: IDS (3 marks) Install and configure snort on server VM to alert on TCP connect scan on port 22 from the attacker VM. Submission: 1. Screenshot the configured alert snort command from the server VM and briefly explain it. [1 mark] 2. Screenshot the TCP connect scan on port 22 command from the attacker VM. [1 mark] 3. Screenshot the snort response at the server VM. [1 mark] Network Security CCCY323 Project Page 5 of 5 Part 6: Project Report (4 marks) In the report, you need to include the following details: • Network setup of the project (a diagram with labels and IP addresses) • List of software or tools used in the project and their configurations. • To demonstrate the impact of the DoS attack and the effectiveness of firewall, take three screenshots to the web browser on the client VM as the following: o Before the attack: client can access the web page on the server. [1 mark] o During the attack: client cannot access the web page. [1 mark] o After the attack: client become able to access the web page after applying the firewall rules. [1 mark] • Step-by-step project description (screenshots are required) • Conclusion [1 mark] Some useful installation and operation tips: • Root privilege: Some operations need root privilege on Linux (for example, software package installation, configurations etc.). ✓From command line prompt you can raise your power to root privilege: #su password: ***** ✓To exit from root privilege: #exit 2. • How to install software package from its source on Ubuntu? Use apt-get command in Ubuntu. Reference: https://itsfoss.com/apt-get-linux-guide/ • A Complete Guide to Using VirtualBox on Your Computer (nakivo.com) • XAMPP tutorial: installation and first steps: https://www.ionos.com/digitalguide/server/tools/xampp- tutorial-create-your-own-local-test-server/ • How to Use Wireshark to Capture, Filter and Inspect Packets: https://www.howtogeek.com/104278/how-to-use-wireshark-to-capture- filter-and-inspect-packets/ • Iptables Tutorial - Beginners Guide to Linux Firewall (hostinger.com) • Snort Rules: https://resources.infosecinstitute.com/topic/snort-rules- workshop-part-one/