Ccs340 Cybr Security Lab
Ccs340 Cybr Security Lab
LIST OF EXPERIMENTS
SL. Experiment
No.
1 Study of different wireless network components and features of
any one of the Mobile Security Apps.
2 Study of the features of firewall in providing network security and
to set Firewall Security in windows.
3 Steps to ensure Security of any one web browser (Mozilla
Firefox/Google Chrome)
4 Study of different types of vulnerabilities for hacking a websites /
Web Applications.
5 Analysis the Security Vulnerabilities of E-commerce services.
6 Analysis the security vulnerabilities of E-Mail Application
EXPERIMENT-1
Learning Objectives
Introduction
As long as you have all the hardware, you can quickly set up any wireless
network. Here is everything you need to know about the hardware you need
to have in place before you use Windows to configure the wireless network.
There are two types of wireless networks: infrastructure and ad hoc.
The infrastructure network is most likely the type of wireless setup you
have in your home or office. It’s laid out similarly to a wired network, but
without wires.
Wireless Routers
Wireless routers function comparably to traditional routers for
wired Ethernet networks. One generally deploys wireless routers when
building an all-wireless network from the ground up.
Wireless Antennas
Access points and routers often utilize a Wi-Fi wireless antenna that
significantly increase the communication range of the wireless radio signal.
These antennas are optional and removable on most equipment. It's also
possible to mount aftermarket add-on antennas on wireless clients to
increase the range of wireless adapters.
Wireless Repeaters
A wireless repeater connects to a router or access point. Often called signal
boosters or range expanders, repeaters serve as a two-way relay station for
wireless radio signals, helping clients otherwise unable to receive a
network's wireless signal to join.
That might disappoint people who love spending time in settings menus, but
you're not going to be doing that with CM Security. One potential drawback,
however, is that it's relentless in nagging you about other aspects of your
device and other apps made by Cheetah that can help you out. But again, it's
free, so it's hard to complain too much.
EXPERIMENT-2
Learning Objectives
Firewall in Windows 7
Windows 7 comes with two firewalls that work together. One is the
Windows Firewall, and the other is Windows Firewall with Advanced
Security (WFAS). The main difference between them is the complexity of
the rules configuration. Windows Firewall uses simple rules that directly
relate to a program or a service. The rules in WFAS can be configured based
on protocols, ports, addresses and authentication. By default, both firewalls
come with predefined set of rules that allow us to utilize network resources.
This includes things like browsing the web, receiving e-mails, etc. Other
standard firewall exceptions are File and Printer Sharing, Network
Discovery, Performance Logs and Alerts, Remote Administration,
Windows Remote Management, Remote Assistance, Remote
Desktop, Windows Media Player, Windows Media Player Network Sharing
Service
With firewall in Windows 7 we can configure inbound and outbound rules.
By default, all outbound traffic is allowed, and inbound responses to that
traffic are also allowed. Inbound traffic initiated from external sources is
automatically blocked.
Windows 7 comes with some new features when it comes to firewall. For
example, "full-stealth" feature blocks other computers from performing
operating system fingerprinting. OS fingerprinting is a malicious technique
used to determine the operating system running on the host machine.
Another feature is "boot-time filtering". This feature ensures that the
firewall is working at the same time when the network interface becomes
active, which was not the case in previous versions of Windows.
Exceptions
Add a Program
Here we have to browse to the executable of our program and then click the
Add button. Notice that we can also choose location types on which this
program will be allowed to communicate by clicking on the "Network
location types" button.
Network Locations
Many applications will automatically configure proper exceptions in
Windows Firewall when we run them. For example, if we enable streaming
from Media Player, it will automatically configure firewall settings to allow
streaming. The same thing is if we enable Remote Desktop feature from the
system properties window. By enabling Remote Desktop feature we actually
create an exception in Windows Firewall.
Firewall Customization
Note that we can modify settings for each type of network location (private
or public). Interesting thing here is that we can block all incoming
connections, including those in the list of allowed programs.
In our case the service is running. If we stop it, we will get a warning that
we should turn on our Windows Firewall.
Warning
Remember that with Windows Firewall we can only configure basic firewall
settings, and this is enough for most day-to-day users. However, we can't
configure exceptions based on ports in Windows Firewall any more. For that
we have to use Windows Firewall with Advanced Security.
How to Start & Use the Windows Firewall with Advanced Security
The Windows Firewall with Advanced Security is a tool which gives you
detailed control over the rules that are applied by the Windows Firewall.
You can view all the rules that are used by the Windows Firewall, change
their properties, create new rules or disable existing ones. In this tutorial we
will share how to open the Windows Firewall with Advanced Security, how
to find your way around it and talk about the types of rules that are available
and what kind of traffic they filter.
The Windows Firewall with Advanced Security looks and works the same
both in Windows 7 and Windows 8.1. To continue our tutorial, we will use
screenshots that were made in Windows 8.1.
In order to provide the security you need, the Windows Firewall has a
standard set of inbound and outbound rules, which are enabled depending on
the location of the network you are connected to.
Inbound rules are applied to the traffic that is coming from the network and
the Internet to your computer or device. Outbound rules apply to the traffic
from your computer to the network or the Internet.
These rules can be configured so that they are specific to: computers, users,
programs, services, ports or protocols. You can also specify to which type of
network adapter (e.g. wireless, cable, virtual private network) or user profile
it is applied to.
In the Windows Firewall with Advanced Security, you can access all rules
and edit their properties. All you have to do is click or tap the appropriate
unit in the left-side panel.
The rules used by the Windows Firewall can be enabled or disabled. The
ones which are enabled or active are marked with a green check-box in the
Name column. The ones that are disabled are marked with a gray check-box.
If you want to know more about a specific rule and learn its properties, right
click on it and select Properties or select it and press Properties in the
column on right, which lists the actions that are available for your selection.
In the Properties window, you will find complete information about the
selected rule, what it does and in when it is applied. You will also be able to
edit its properties and change any of the available parameters.
What Are The Connection Security Rules?
Connection security rules are used to secure traffic between two computers
while it crosses the network. One example would be a rule which defines
that connections between two specific computers must be encrypted.
Unlike the inbound or outbound rules, which are applied only to one
computer, connection security rules require that both computers have the
same rules defined and enabled.
If you want to see if there are any such rules on your computer, click or tap
"Connection Security Rules" on the panel on the left. By default, there are
no such rules defined on Windows computers and devices. They are
generally used in business environments and such rules are set by the
network administrator.
What Does the Windows Firewall with Advanced Security Monitor?
You should note that the Monitoring section shows only the active rules for
the current network location.
EXPERIMENT-3
Learning Objectives
Browsers use many tools for various tasks, such as Java, Flash Player,
ActiveX, etc. But these often come with security flaws, which
cybercriminals exploit to get access to your PC. A quick rundown of these
tools will help you figure out if you need them or not.
Delete Cookies. These are small data files stored on your browser. Websites
use cookies in order to remember your accounts and passwords, browsing
history and to track user behaviour on their site.
Because of the information they contain, cookies are prime targets for
cybercriminals, especially the ones that contain emails, account names and
passwords.
When you disable and clear cookies you cut down on the personal data
cybercriminals can obtain.
One thing you will want to keep in mind is that there are two types of
cookies:
First party and third party cookies. First party cookies are placed by the site
you visit, for instance you get a first party cookie by cnn.com while visiting
cnn.com.
Third party cookies are placed by other sites, for example you get a cookie
from amazon.com while visiting cnn.com.
First party cookies are frequently used to remember your login information
so you don’t have to enter it every time you visit a site. But we can’t stress
this enough, don’t allow your browser to save passwords!
Third party cookies are almost always placed on your computer by
advertisers or marketers interested in tracking your movement online, so
nothing bad will happen if you block them.
Browser extensions and add-ons add extra functionality to your browser
such as ad blocking or search bars. However, these add-ons pose a security
risk, since they can open up windows into your PC which can be exploited
to inject malware.
If you use Mozilla Firefox and want to improve your browser security
settings, press the hamburger menu in the top right corner and go to
“Options”.
At the “Tracking” section press the blue text with “manage your Do Not
Track settings” and check “Always apply do not track”. After you do this
advertising, commerce and various other sites shouldn’t be able to track you
across the web.
While in the Privacy tab, at the “History” section, choose “Firefox will
never remember history”. This is especially important if you know your
device may be used by other people.
For a more detailed control of your history section, select “Use custom
settings for history”.
Check “Always use private browsing mode” so every time you close your
Firefox browser it will clear browsing history, search results, cookies and
download history.
The last changes you should make in Firefox can be found in the “Security”
category.
First, make sure all of the four check boxes in the General section are
checked in. This ensures that your browser will inform you whenever
websites try to install malicious add-ons and other content.
In the “Logins” section you can set up a Master Password. Doing this is
especially useful when multiple people have access to the computer, since it
asks you introduce a master password before you can access logins.
This way, other people won’t be able to access your important accounts such
as email. Once more, we cannot recommend this enough, but don’t let your
browser remember your passwords.
EXPERIMENT-4
Currently there are many privacy risks in web applications. Today too many
websites are hacked by anonymous. They target website because of different
types of reasons. They are mentioned in table 1.
Attack Goal %
Stealing Sensitive Information 42%
Defacement 23%
Planning Malware 15%
Unknown 08%
Deceit 03%
Blackmail 03%
Link Spam 03%
Worm 01%
Phishing 01%
Information Warfare 01%
This all are the Vulnerability types and how much it’s usage. The SQL
Injection and Cross Site Scripting are the most famous vulnerabilities in web
application. Generally web servers, application servers, and web application
environment are affected to following types of vulnerabilities. The OWASP
(Open Web Application Security Project) listed all security vulnerability at
.There are two types of attacks which are frequently used by hackers namely
SQL Injection attack and XSS (Cross Site Scripting) Attack. The following
are the brief explanation of each type of attack.
Stored XSS
Reflected XSS
Dom based XSS
Stored XSS also known as persistent XSS .This occurs when hacker stored
malicious script permanently in target server like database, visitor log, and
comment field or in URL. Reflected XSS occur when hacker insert inject
script into some input field.
This attack also like a XSS but there is one difference that is here attacker
create forged http request (e.g. Update account, login – logout, purchase
process) and forced victim in to submitting malicious action via image tags,
XSS, or other techniques. In which he is authenticated such as submitting
http request through alert box or with other techniques. If the user is
authenticated the attack succeeds. By this attack attacker can steal all the
information or get the password or username.
Generally web application redirects users to another page or website and use
un-trusted data to consider designation pages without proper validation.
Hacker can redirect victim to phishing site. Hacker links to redirect and
forced victim to click. Since the link is to a valid site. Attacker targets
unsafe forward to bypass authentication.
Mostly web applications verify function level rights before making that
visible in the UI. Application need to perform the same access control
checks on the server when each function is accessed. If request are not
verified hacker, it will be able to forge requests in order to access
functionality without proper authorization. Hacker who is authorized user
simply changes the URL or a parameter to privileged system. He can also
access private functions that aren’t protected.
EXPERIMENT-5
Learning Objectives
Log Forging: Writing invalidated user input to log files can give access to
attacker for forging log entries or injecting malicious content into the logs.
Log forging vulnerabilities occur in following conditions:
(1) Tolerating weak passwords: weak passwords are arguably the most
nonsensical, yet simplest security flaws to fix.
(2) Connecting to unsecured Wi-Fi hotspots: Many people don’t think
twice about logging onto a random (and unprotected) wireless
network just to get some work done. That’s all it takes for someone
with ill intent to capture a user’s login credentials and work his way
onto your wireless network.
(3) Ignorance in encrypting hard drives and USB storage disks:
Simply encrypting computer hard drives can eliminate a huge
portion of information risks.
(4) Assuming that patches are under control: There are typically
hundreds of missing patches on both workstations and servers. In
many situations, admins are unaware of specific patches to be
installed.
(5) Not balancing security with convenience: Unintended acts,
security controls often get in the way of users, who then find ways
around it. General habit of writing passwords on sticky notes is just
the beginning.
EXPERIMENT-6
Learning Objectives
At the end of the session you should be able to
Message Modification: Anyone who captures your message can also alter
your message contents if it is not encrypted. Further anyone having
administrative rights on any of SMTP server your message visit can not only
read your message but can also modifies it.
False Messages: Sender’s name can easily be fabricated so it is very easy to
send message that pretends to be send by someone else.
Sending threats: Threatening mails are sending to users which disturb their
state of mind or to provoke them to take some wrong step. Sometimes false
statements are also forwarded to third parties or users to injure the
reputation of some particular person. It is called as Defamation, a
communication is not considered defamatory unless it is forwarded to
someone other than the target.
Email frauds: Email Fraud is the intentional deception made for some
personal or monetary gain.
Emails used as tools to spread malicious software: Emails are also used
as tools to spread viruses, worms and other malicious software. They are
attached to your emails as attachment, when you click on them they attack
your computer or browser.
Any Network service like email system must provide following five services
for security reasons
POP and IMAP: POP and IMAP are pull protocols, Request is send to mail
server to access the mailbox and for that login using username and password
is required. These details are not encrypted before sending unless SSL is
used. So our confidential information is at stake.