SSM Record
SSM Record
Introduction
1. Nessus
Key Features:
o Compliance checks against standards like PCI DSS and CIS benchmarks.
Use Cases:
Key Features:
Use Cases:
Key Features:
Use Cases:
4. Metasploit Framework
Key Features:
Use Cases:
5. Zenmap
Type: Network mapping and port scanning tool (GUI for Nmap).
Key Features:
Use Cases:
1. Host Discovery:
2. Port Scanning:
o Zenmap scans for open ports and the services running on them.
o Identifies services like HTTP, SSH, DNS, and FTP to assess their security posture.
6. Topology Mapping:
7. Customizable Profiles:
o Provides predefined scan profiles such as “Quick Scan,” “Intense Scan,” and
“Ping Scan.”
o Allows users to create and save custom profiles for repeated use.
8. Report Management:
o Zenmap saves scan results in XML format for analysis and comparison.
Zenmap utilizes the Nmap engine to perform scans. Its GUI allows users to input parameters
and interpret results visually, which can be daunting in the command-line version.
Step-by-Step Process:
o Example Profiles:
o Initiate the scan, and Zenmap processes the request through the Nmap engine.
4. Review Results:
o Use tabs like “Ports/Hosts,” “Topology,” and “Host Details” for detailed insights.
1. Network Discovery
Purpose:
Example:
2. Port Scanning
Purpose:
o Determine which ports are open and assess the security of associated services.
Example:
Purpose:
Purpose:
Purpose:
o Example:
Scenario:
1. Setup:
2. Execution:
3. Results:
o Vulnerabilities:
o Recommendations:
1. User-Friendly Interface:
2. Predefined Profiles:
4. Script Integration:
5. Cross-Platform:
Limitations of Zenmap
3. No Automated Updates:
4. Performance:
Conclusion
Zenmap is an invaluable tool for preliminary network security assessments and understanding
system configurations. It excels in network discovery, port scanning, and service fingerprinting,
making it ideal for mapping potential attack surfaces. While it lacks the automated vulnerability
detection capabilities of tools like Nessus, its integration with Nmap scripting o ers flexibility
and adaptability. For comprehensive security assessments, Zenmap is best used in conjunction
with dedicated vulnerability scanners and penetration testing tools.
Ex 2 Access Control
Aim:
Report:
Configuring access control on Windows and Linux systems involves setting permissions and
access rights for users and groups to ensure that only authorized individuals can access certain
resources.
Thus, Access Control commands and actions in Windows and Linux are executed
successfully.
Ex.3 MULTI – FACTOR AUTHENTICATION
Date: 21.01.25
By:
S Nittin Balajee
23011103042
Aim:
To implement Multi Factor Authentication Concept on Windows and Linux Systems.
Report:
Here, we have installed google-authenticator through the terminal and ran the configuration.
This will generate a QR code which needs to be scanned through the Google Authenticator
App.
This QR code helps the app to configure with the system and generate verification codes for
it. Now, we must do the necessary changes in the security files of the system to set up MFA.
After this modification, restarting the sshd should set it up. We must test it in another terminal
window.
2. Windows Multi Factor Authentication
Open Settings
MFA was implemented on Linux using Google Authenticator for SSH logins, requiring a
password and a time-based OTP, and on Windows using Windows Hello, enabling biometric
or PIN authentication. Both systems now enforce enhanced security.
Ex.4 Firewall
Date: 28.01.25
By:
S Nittin Balajee
23011103042
Aim:
Implement and Configure a System Firewall on Windows and Linux
1. Linux
To start the firewall and check if the firewall is up and running then the instructions are added
one by one.
The command below lists all the sets of instructions for the firewall.
The below images shows that the firewall is up and running and it cannot connect to one of
the blocked ports.
2. Windows
A new firewall rule is being added to block the inbound and outbound packets the HTTP port
and the firewall is enabled.
A new firewall rule is added to block inbound and outbound packets for the HTTPS port.
Even after setting up the rules the network can ping using those ports to solve this issue ping
should be blocked this is done using the a new firewall rule to block the ICMP .
The firewall successfully blocks any packets from being received or sent through the specific port so
our firewall is active.
Result:
To write a report on Host Intrusion Detection System (HIDS) Implementation and Analysis
in Windows and Linux.
REPORT:
Introduction A Host Intrusion Detection System (HIDS) is a security mechanism designed to
monitor and analyze activities on an individual host for signs of malicious behavior or policy
violations. Unlike Network Intrusion Detection Systems (NIDS), which operate at the network
level, HIDS focuses on endpoint security by analyzing system logs, file integrity, user activities,
and application behaviors.
This report provides an overview of HIDS implementation and analysis in both Windows and
Linux environments.
OSSEC: Open-source HIDS that provides log analysis, integrity checking, and
active response.
Windows Defender Advanced Threat Protection (WDATP): Microsoft’s
built-in HIDS solution for monitoring and responding to threats.
Splunk with Sysmon: Provides detailed event logging and anomaly detection.
3.2 Installation and Configuration
OSSEC Implementation:
1. Download and install OSSEC agent.
2. Configure the agent to communicate with the OSSEC server.
3. Define rules for log monitoring and integrity checking
4. Enable active response mechanisms to block threats.
Windows Defender ATP Implementation:
Tripwire Implementation:
1. Install Tripwire using apt or yum package managers.
2. Initialize the baseline database of system files.
3. Regularly run integrity checks and analyze reports.
OUTPUT/PROCEDURE:
1.) LINUX:
Installing an initialising tripwire:
2.) WINDOWS:
Installing and viewing symon :
RESULTS:
Thus the implementation of HIDS is done in windows and linux.
VPN
REPORT:
A VPN (Virtual Private Network) is a technology that allows you to
create a secure and private connection over a less secure network, such as
the internet. It essentially extends a private network across a public
network, enabling you to send and receive data as if your devices were
directly connected to the private network, even when you're not physically
present.
Installation of wireguard:
Configuration of IP:
By:
S Nittin Balajee
23011103042
Aim:
Implement a Hybrid (private+public) Encryption and Decryption Mechanism for Data
Protection in Transit.
Code:
import time
from Crypto.Cipher import AES
from Crypto.Random import get_random_bytes
from Crypto.Util.Padding import pad, unpad
from cryptography.hazmat.primitives.asymmetric import rsa
from cryptography.hazmat.primitives import serialization
from cryptography.hazmat.primitives.asymmetric import padding
from cryptography.hazmat.primitives import hashes
import base64
# Example Usage
Output:
Result:
Implement a Hybrid (private+public) Encryption and Decryption Mechanism for Data
Protection in Transit is successful.
Ex.8 PENTESTING
Date: 25.02.25
By:
S Nittin Balajee
23011103042
AIM:
Conduct any type of Penetration Testing on a Web Application.
Theory:
XSS is a web security vulnerability that allows attackers to inject malicious JavaScript code
into webpages viewed by other users. These scripts are executed in the browser of the victim, and
they can do many things like steal session cookies, perform actions on behalf of the user, deface the
website, or redirect users to malicious websites.
XSS vulnerabilities arise when user inputs (such as in forms, comments, or search fields) are not
properly sanitized, allowing malicious code to be executed within the user’s browser.
Algorithm:
OUTPUT:
Lets try it on a website called WWW.breddit.com
It has a comment page where all the comments are stored in the database.
Now we are entering the script in the website.
Lets try
another
Example:
now, lets enter the script.
RESULT:
Hence, to conduct any type of Penetration Testing on a Web Application is verified.