0% found this document useful (0 votes)
8 views

Document 1

network + comptia

Uploaded by

mpumikgetho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Document 1

network + comptia

Uploaded by

mpumikgetho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

Question 1 18 Marks

Configurations

NOTE: Ensure you take screenshots of all your configurations and put
them in one final document.

Create two virtual machines using a virtualisation software of your choice,


name them SRV and Kali.

Use the following specifications for the virtual machines:

• RAM: Use the RAM size of your choice based on the amount of RAM you
have on your laptop/desktop
• Hard Drive: A minimum of 50GB HDD.
On SRV:

1.1 Install Windows Server 2022 Standard edition and configure it as


follows:

a. Computer Name – SRV


b. Password – Password123

c. TCP/IP settings:

• IP Address: 192.168.10.1
• Subnet Mask: 255.255.255.0
• DNS Server address: 192.168.10.1

d. Promote the server to a domain controller in the


deltech.co.za forest
e. Firewall – Allow File and Printer Sharing on all
profiles

On Kali:

1.2 Install or Import Kali Linux and configure it as follows:

a. Password – Use any suitable password. (If you are


using a virtual machine version of Kali the password will
be kali)
b. TCP/IP settings:

• IP Address: 192.168.10.2
• Subnet Mask: 255.255.255.0
Question 2 28 Marks
Performing Reconnaissance &
Analysing Data with Wireshark

NOTE: Ensure you take screenshots of all your configurations and put
them in one final document.

You want to see how attackers can execute a reconnaissance attack. You
will scan the network and hosts to see the kind of intelligence an attacker
can gain.
2.1 Install Wireshark on Windows Server and start capturing packets.
2.2 On Kali Linux, use Nmap to perform the following scans:
a. Run a ping scan against the local network (192.168.10.0/24).

b. Run an OS discovery scan on the server. Skip host discovery.

2.2 Analyse the captured packets using Wireshark.


2.3 List any five captured packets from the scans in the previous section.
2.4 Create and save filters for the following packets on Wireshark:

a. IP address – Kali Linux Address

b. Destination Ports – 53 and 445

Question 3 22 Marks
SSH Hacking

NOTE: Ensure you take screenshots of all your configurations and put
them in one final document.
On SRV:

3.1 Install OpenSSH server. Configure the services to automatically start


during start-up.
3.2 Create an inbound firewall policy for TCP port 22 to any remote port.
On Kali:

3.3 Use ncrack to perform a password cracking attack against the SSH
server using a pre-generated password dictionary. The password
dictionary is called top50000.pwd and it is located in the /usr/share/ncrack
directory.

a. If the attack is successful, log in to the SSH server


using the credentials you just cracked.
b. Run the command that displays all the privileges you
have.

c. Create a file called Gotin.txt using the echo command


with the message “You have been PWNed!!” The file must
be saved on the Windows Server’s desktop. Confirm if the
file has been created on the server’s desktop.

3.4 State other activities an attacker could do with this access

• IP, MAC, DHCP Spoofing

3.5 How would you defend against this type of attack?

• Use strong Passwords


• Implement multi-factor Authentication
• Limit SSH Access
• Use Key based Authentication
• Limit user privileges
• Implement firewall rules
• Monitor and log activity

Question 4

Vulnerability Scanning

4.1 Install and activate Nessus Essential. Use your email address to get
the one-time activation key.
4.2 Create a new policy called “First Scan”.

4.3 Run a basic network scan on the First Scan policy.

4.4 Analyse the scan results. What are the vulnerabilities detected from
the scan and how would you remediate them?

4.5 Explain how a vulnerability scan like this can be useful to a


penetration test?

You might also like