Malware and Sniffing Lab Report

docx

School

ECPI University *

*We aren’t endorsed by this school

Course

403L

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

6

Uploaded by kitapatel4923

Report
ECPI University School of Technology: Department of Computer Information Science- Learning Activity Instructions Student Name <Enter Name Here> Activity Type Guided Practice / Computer Lab Instructions Perform the Guided Practice per the instructions in your course. As you complete each lab, insert a screenshot of your results. Perform all the tasks shown below. Note: Some tasks in the labs are not completed in this class, instead they are completed in the associated lab class. Only provide screenshots for the tasks that specify a screenshot. There should be a total of 4 screenshots for this lab. Complete the following lab tasks in the Malware ILab Module: 1. Lab 1 - Gain access to the target system using Trojans. o Task 1 - Gain control over a victim machine using the njRAT RAT Trojan o Task 2 - Hide a Trojan using SwayzCryptor and make it undetectable to various anti-virus programs o Task 3 - Create a Trojan server using Theef RAT Trojan Lab Version: 12.13.2016
ECPI University School of Technology: Department of Computer Information Science- Learning Activity Instructions 1. Screenshot step 22 Complete the following lab tasks in the Sniffing ILab Module: 1. Lab 1 - Perform active sniffing. o Task 1 - Perform MAC flooding using macof o Task 2 - Perform a DHCP starvation attack using Yersinia o Task 3 - Perform ARP poisoning using arpspoof Lab Version: 12.13.2016
ECPI University School of Technology: Department of Computer Information Science- Learning Activity Instructions 1. Screenshot step 18. 2. Lab 2 - Perform network sniffing using various sniffing tools. o Task 1 - Perform password sniffing using Wireshark Lab Version: 12.13.2016
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ECPI University School of Technology: Department of Computer Information Science- Learning Activity Instructions 1. Screenshot step 45. 3. Lab 3 - Detect network sniffing. o Task 1 - Detect ARP poisoning in a switch-based network 1. Screenshot step 50. Lab Version: 12.13.2016
ECPI University School of Technology: Department of Computer Information Science- Learning Activity Instructions Summary: As a result of this lab, I have learned: Include a few paragraphs summarizing the key skills you have acquired during this guided practice. Password sniffing, a typical attack vector in network security, is intercepting and analyzing network traffic to get plaintext passwords and other information. Wireshark, for example, makes it possible to capture, filter, and analyze network packets in real time, making password sniffing easier. Password sniffing exercises with Wireshark can help practitioners learn how to identify login credentials, comprehend network protocols, and create encryption techniques to secure sensitive data. This hands-on experience not only improves competency with network analysis tools, but it also creates a better awareness of network security vulnerabilities and mitigation solutions. DHCP starvation attacks, on the other hand, attack Dynamic Host Configuration Protocol servers in order to exhaust available IP addresses, breaking network access and potentially enabling other attacks. Yersinia is a versatile tool that allows for DHCP starvation attacks by flooding DHCP servers with fake DHCP queries. Individuals that participate in DHCP starvation attack exercises with Yersinia can learn how to launch and Lab Version: 12.13.2016
ECPI University School of Technology: Department of Computer Information Science- Learning Activity Instructions mitigate DHCP assaults, analyze DHCP server setups, and implement DHCP snooping and port security measures to defend against these attacks. This practical experience is critical for cybersecurity professionals working in network protection, penetration testing, and vulnerability assessment. Lab Version: 12.13.2016
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help