1 / 6100%
Performancec Labc Reportc 2c Template
Duec inc Weekc 6
1
Strayerc Universityc CIS502c Theoriesc ofc Securityc Management
PERFORMANCEc LABc REPORTc 2
Submittedc by:
Februaryc 13,2022
Performancec Labc Reportc 2c Template
Duec inc Weekc 6
2
Instructions:
Columnc 1c providesc thec labc number,c title,c andc ac briefc descriptionc ofc thec lab.
Inc Columnc 2c youc willc summarizec inc threec toc fivec sentencesc thec keyc lessonsc youc learnedc fromc completingc
thec lab.
Lab
Keyc Lessonsc Learned
(Noc morec thanc 3c toc 5c sentences)
Chapterc 5c
5.2.1c Usingc Ettercapc forc ARPc Spoofing
Inc thisc lab,c youc willc usec Ettercapc forc addressc resolutionc
protocolc (ARP)c spoofing.c Ettercapc isc anc openc sourcec
networkc securityc tool.c Itc canc bec usedc forc securityc auditc
andc ARPc spoofing.
Thec learningc objectivec forc thisc labc wasc toc utilizec thec Ettercapc byc
addressingc thec resolutionc protocolc (ARP)c spoofing.c Inc thisc lab,c
thec Ettercapc refersc toc anc open-sourcec networkc securityc tool.c
Here,c Ic canc accessc thec Ettercap-graphicalc byc focusingc onc thec
sniffingc andc spoofing,c andc thec application.c Afterc that,c Ic canc startc
variousc tasks.c
5.3.1c Obtainingc Hardwarec Informationc ofc ac Networkc
Adapter
Inc thisc lab,c youc willc obtainc hardwarec informationc ofc ac
networkc adapter.c Ac networkc adapterc isc thec componentc ofc
ac computer'sc internalc hardwarec thatc isc usedc forc
communicatingc overc ac networkc withc anotherc computer.
Thec learningc objectivec forc thisc labc wasc toc acquirec thec c
hardwarec informationc ofc ac networkc adapter.c Here,c thec
simplec processc canc bec takenc byc executingc thec singlec
commandc andc focusingc inc thec Windowc PowerShell.c Thus,c
thec informationc willc appearc withc ac simplec pressc ofc enterc
key.c
Performancec Labc Reportc 2c Template
Duec inc Weekc 6
3
Lab
Keyc Lessonsc Learned
(Noc morec thanc 3c toc 5c sentences)
5.3.5c Gettingc thec TCPc Settings
Inc thisc lab,c youc willc getc thec transmissionc controlc protocolc
(TCP)c settings.c TCPc settingsc arec optimizedc forc differentc
networkc conditions,c includingc latencyc andc congestion.
Thec learningc objectivec forc thisc labc wasc toc accountc thec
transmissionc controlc protocolc (TCP)c settings.c Here,c Ic
insertedc ac singularc commandc byc utilizingc thec Windowc
PowerShellc becausec itc permitsc thec PowerShellc toc createc
ac listc ofc thec settings.c Overall,c thesec settingsc arec acquiredc
forc variousc conditionsc ofc network.c
5.3.7c Gettingc thec UDPc Settings
Inc thisc lab,c youc willc getc thec userc datagramc protocolc (UDP)c
settings.c UDPc communicatesc withc thec userc byc sendingc
datac overc anc IPc network.
Thec learningc objectivec forc thisc labc wasc toc acquirec thec userc
datagramc protocolc (UDP)c settings.c Here,c Ic insertedc ac
singularc commandc byc utilizingc thec PowerShellc thatc
permitsc thec PowerShellc toc createc thec settingsc andc permitsc
thec userc datagramc protocolc communicatec withc thec
individualc throughc providingc datac overc anc IPc network.c
5.3.8c Gettingc Informationc aboutc thec Currentc Connectionc
Statisticsc ofc TCP
Inc thisc lab,c youc willc getc informationc aboutc thec currentc
connectionc statisticsc ofc TCP.c TCPc enablesc twoc hostsc toc
establishc ac connectionc andc exchangec streamsc ofc data.
Thec learningc objectivec forc thisc labc wasc toc acquire
informationc aboutc thec TCP’sc currentc connectionc statistics.c
Here,c Ic havec executedc thec commandc byc utilizingc thec
Windowc PowerShell.c Thus,c itc helpedc toc createc thec TCP’sc
connectionc statistics.c
5.3.10c Findingc thec Hostc Namec ofc ac Machine
Inc thisc lab,c youc willc findc thec hostc namec ofc ac machine.c Ac
hostc namec isc ac labelc assignedc toc ac devicec connectedc toc ac
computerc network.c Thec hosec namec isc alsoc usedc toc
identifyc thec device.
Thec learningc objectivec forc thisc labc wasc toc accountc thec
machine’sc hostc name.c Here,c Ic executedc ac singularc
commandc byc utilizingc thec Windowc PowerShell.c And,c thisc
commandc willc permitc thec PowerShellc toc createc thec
machine’sc hostc name.c
5.3.11c Findingc thec Physicalc Addressc ofc ac LANc Adapter
Inc thisc lab,c youc willc findc thec physicalc addressc ofc ac localc
areac networkc (LAN)c adapter.c Ac LANc adapterc connectsc ac
computerc orc computingc devicec toc ac network.
Thec learningc objectivec forc thisc labc wasc toc accountc ac localc
areac networkc adapterc andc itsc physicalc address.c Here,c Ic
executedc ac singularc commandc byc utilizingc thec Windowc
PowerShell.c Atc last,c thec generatedc commandc createsc thec
localc areac networkc adapterc andc itsc physicalc address.
Performancec Labc Reportc 2c Template
Duec inc Weekc 6
4
Lab
Keyc Lessonsc Learned
(Noc morec thanc 3c toc 5c sentences)
5.3.12c Findingc thec Logicalc Addressc ofc ac LANc Adapter
Inc thisc lab,c youc willc findc thec logicalc addressc ofc ac LANc
adapter.c Ac LANc adapterc connectsc ac computerc orc
computingc devicec toc ac network.c
Thec learningc objectivec forc thisc labc wasc toc acquirec a
localc areac networkc adapterc andc itsc logicalc address.c Thisc
wasc conductedc byc executingc thec singularc commandc
throughc thec usec ofc Windowc PowerShell.c Thisc createsc thec
localc areac networkc adapterc andc itsc logicalc address.
5.6.7c Performingc ac DoSc Attackc withc thec SYNc Flood
Inc thisc lab,c youc willc performc ac denialc ofc servicec (DoS)c
attackc withc thec SYNc flood.c Ac DoSc attackc isc anc attackc
meantc forc shuttingc downc thec networkc orc ac machinec andc
makingc itc inaccessiblec toc itsc users.c Ac SYNc floodc isc anc
attackc inc whichc thec attackerc sendsc ac successionc ofc SYNc
requestsc toc thec target'sc system.
Thec learningc objectivec forc thisc labc wasc toc accountc
performingc ac denial-of-servicec attackc withc thec SYNc flood.c
Firstc ofc all,c itc usesc thec Metasploitc frameworkc andc Virtualc
Machinec Managerc thatc permitsc thec denial-of-servicec
attack.c Afterc that,c itc slowsc downc thec CPUc throughc lagging.c
Here,c thec CPUc goesc backc toc thec normalc runningc state,c
whenc thec attackc hasc beenc stoppedc byc thec command.c
Chapterc 6
6.4.1c Creatingc ACLc inc Router
Inc thisc lab,c youc willc createc accessc controlc listsc (ACL)c inc
router.c Accessc controlc listsc arec orderedc setsc ofc rulesc thatc
controlc thec trafficc thatc isc permittedc orc deniedc thec usec ofc ac
pathc throughc thec router.c Thesec rulesc canc operatec atc
Layerc 3,c makingc thesec decisionsc onc thec basisc ofc IPc
addresses.c Theyc canc alsoc operatec atc Layerc 4,c whenc onlyc
certainc typesc ofc trafficc arec allowedc basedc onc ac TCPc orc
UDPc portc number.c Whenc thisc isc done,c thec ACLc willc
typicallyc referencec ac portc numberc ofc thec servicec orc
applicationc thatc isc allowedc orc denied.
Thec learningc objectivec forc thisc labc wasc toc createc accessc
controlc listsc inc router.c Inc thec firstc step,c itc permitsc thec usersc
toc pingc anc IPc addressc andc controlsc thec trafficsc byc tellingc
thec whichc onec toc denyc andc whichc onec toc permit.c Inc thisc
lab,c thec PuTTYc configurationc ahsc gainedc morec exposurec
becausec ofc thec simplec steps.c
Performancec Labc Reportc 2c Template
Duec inc Weekc 6
5
Lab
Keyc Lessonsc Learned
(Noc morec thanc 3c toc 5c sentences)
Chapterc 7c
7.2.1c Observingc anc MD5-Generatedc Hashc Value
Inc thisc lab,c youc willc observec anc MD5-generatedc hashc
value.c Anc MD5c hashingc algorithmc producesc ac 128-bitc
hashc valuec orc digestc valuec ofc anc entirec file.c Thesec hashc
valuesc canc bec usedc toc checkc thec file’sc datac integrity.c
Whenc ac userc downloadsc anyc file,c anc attackerc canc
manipulatec thec filec datac duringc thec processc ofc sendingc
thec filec betweenc sites.c MD5c givesc authenticationc asc toc
whetherc orc notc thec filec hasc beenc manipulated.
Thec learningc objectivec forc thisc labc wasc toc observec anc
MD5-generatedc hashc value.c Here,c thec usersc willc inputc
commandsc toc observec anc MD5-generatedc hashc valuec inc
thec applicationc ofc terminal.c And,c executionc ofc thesec codesc
willc permitc thec usersc toc observec thec value.c
7.2.2c Observec anc SHA-Generatedc Hashc Value
Inc thisc lab,c youc willc observec ac SHA-generatedc hashc value.c
Thec SHA-256c hashingc algorithmc producesc 1-bitc toc 256-bitc
hashc valuesc ofc thec entirec file.c Thesec hashc valuesc canc bec
usedc toc checkc thec file’sc datac integrity.c Whenc ac userc
downloadsc anyc file,c anc attackerc canc manipulatec thec filec
datac duringc thec processingc ofc sendingc thec filec betweenc
sites.c SHA-256c generatesc anc almost-uniquec 256-bitc (32-
byte)c signaturec forc ac text.
Thec learningc objectivec forc thisc labc wasc toc observec ac SHA-
generatedc hashc value.c Here,c thec usersc willc inputc
commandsc toc observec SHA-generatedc hashc valuec inc thec
applicationc ofc terminal.c Forc instance,c thec executionc ofc
thesec codesc willc helpc toc observec thec value.c
7.4.1c Applyingc Symmetricc Keyc Encryption
Inc thisc lab,c youc willc applyc symmetricc keyc encryption.c Thisc
processc encryptsc andc decryptsc thec informationc usingc thec
samec secretc key.c Youc willc encryptc ac filec usingc thec
AxCryptc open-sourcec encryptionc algorithm,c whichc usesc
thec AESc algorithmc withc 128-bitc keys.
Thec learningc objectivec forc thisc labc wasc toc applyc symmetricc
keyc encryption.c Here,c Ic executedc differentc stepsc throughc
generatingc ac textc filec inc thec filec explorer.c Afterc that,c itc
permitsc AESc algorithmc toc decryptc andc encryptc thec
informationc byc usingc thec samec secret.c
Performancec Labc Reportc 2c Template
Duec inc Weekc 6
6
Lab
Keyc Lessonsc Learned
(Noc morec thanc 3c toc 5c sentences)
7.4.2c Usingc OpenSSLc toc Createc ac Public/Privatec Keyc Pair
Inc thisc lab,c youc willc usec OpenSSLc toc createc ac
public/privatec keyc pair.c OpenSSLc isc usedc forc securec
communicationc overc thec network.c Itc worksc onc thec
exchangec ofc publicc keysc andc authenticationc byc ac privatec
key.
Thec learningc objectivec forc thisc labc wasc toc utilizec thec
openSSLc toc generatec ac privatec andc publicc keyc pair.c Here,c
Ic havec executedc differentc commandsc inc thec terminalc
application.c Thus,c thec OpenSSLc willc exchangec thec privatec
andc publicc keysc byc securingc thec communication.c
Students also viewed