Session Hijacking and Evading Firewalls and IDS-Lab Report

docx

School

ECPI University *

*We aren’t endorsed by this school

Course

CIS411

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

4

Uploaded by BhengLove

Report
ECPI University School of Technology: Department of Computer Information Science- Learning Activity Instructions Student Name <Merced Dompierre> Activity Type 1.4 / Computer Lab Instructions Perform the labs per the instructions in the iLabs environment. As you complete the tasks in the lab, insert a screenshot of the steps indicated below. Screenshots should contain uniqueness information generated within the VM, this should include a shell (Bash in Linux, or PowerShell in Windows) with the output of the date command and your username typed below. Perform all the tasks shown below. Only provide screenshots for the tasks that specify a screenshot. There should be a total of 4 screenshots for this lab. Complete the following lab tasks in the Session Hijacking ILab Module: 1. Lab 1 – Perform Session Hijacking o Task 2 – Intercept HTTP Traffic using bettercap 1. Screenshot step 25. Lab Version: 08.31.2023
ECPI University School of Technology: Department of Computer Information Science- Learning Activity Instructions 2. Lab 2 – Detect Session Hijacking o Task 1 – Detect Session Hijacking using Wireshark 1. Screenshot step 16. Complete the following lab tasks in the Evading IDS and Firewalls ILab Module: 1. Lab 1 - Perform Intrusion Detection using Various Tools o Task 1 – Detect Intrusions using Snort o Task 2 – Detect Malicious Network Traffic using ZoneAlarm o Task 3 – Detect Malicious Network Traffic Using HoneyBOT 1. Screenshot step 28. Lab Version: 08.31.2023
ECPI University School of Technology: Department of Computer Information Science- Learning Activity Instructions 2. Lab 2 – Evade Firewalls using Various Evasion Techniques o Task 1 – Bypass Windows Firewall using Nmap Evasion Techniques o Task 2 – Bypass Firewall Rules using HTTP/FTP Tunneling 1. Screenshot step 36. Lab Version: 08.31.2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ECPI University School of Technology: Department of Computer Information Science- Learning Activity Instructions Summary: As a result of this lab, I have learned: Include a few paragraphs summarizing the key skills you have acquired during this guided practice. Learning about session hijacking and evading firewalls and IDS is important because it helps individuals to understand how attackers can gain unauthorized access to sensitive information and systems. By understanding these techniques, individuals can better protect themselves and their organizations from cyber attacks. Also, learning about these topics can help individuals develop skills in network security and become better equipped to secure their own networks or pursue careers in cybersecurity. Overall, the skills and knowledge gained from learning about session hijacking and evading firewalls and IDS are crucial in today's digital age where cyber attacks are becoming increasingly common and sophisticated. Lab Version: 08.31.2023