Cyber security
Tasks for Assignment 2
You can select any tasks that add up to 30 marks.
Internal and external students submit power presentation with voice embedded in it. NO NEED FOR ANY ADDITIONAL FILES.
1. Based on your personal experiences or those of someone you know (you may have to interview other students or a friend), write a paragraph regarding a computer attack that occurred.
· When did it happen and what was the attack?
· What type of damage did it inflict?
· List the reason or reasons you think that the attack was successful.
· How was the computer fixed after the attack?
· What could have prevented it?
(05 Marks)
2. Describe onion router and its purposes. Download onion router and using wireshark capture packets coming out of onion router when you visit a website. What path are the packets taking to go out of the network? (05 marks)
3. Download “smb3-aes-128-ccm.pcap” from the following link
https://wiki.wireshark.org/SampleCaptures#SMB3_encryption
. Analyse the pcap file using wireshark and list down all information you can read from the packets.
(05 marks)
4. Download PGP (freeware or paid) and try to encrypt an email using someone’s public key. Describe other functions that you can do with PGP (05 marks)
5. Download any steganography software and demonstrate hiding a 500kB document in the software– (05 marks)
6. Password cracking : Create a digest on a password and then crack it with an online cracking website to demonstrate the speed of cracking passwords. You can create 10 different passwords and see how those passwords could be cracked.
Note : The first step is to use a hash algorithm to create a password digest. Use your web browser to go towww.fileformat.info/tool/hash.htm.
You can use
https://crackstation.net/
to check the password cracking time.
(05 Marks)
7. VirusTotal, a subsidiary of Google, is a free online service that analyses files and URLs in order to identify potential malware. VirusTotal scans and detects any type of binary content, including a Windows executable program, Android, PDFs, and images. VirusTotal is designed to provide a“second opinion” on a file and URL that may have been flagged as suspicious by other AV software. In this task, you will use VirusTotal to scan a file and a URL. You can create a file or upload an existing file to check for malicious signatures. URL :
https://www.virustotal.com/gui/home/upload
(Note : You have to check both file and an URL of your choice) (05Marks)
8. Test your windows firewall / defender.
Configure the firewall in your windows machine. Now, go to your virtual machine (Kali) and use nmap command to scan the windows machine(host). (Hint :try to reach the windows machine from kali – you have to configure virtual box network settings) Can you get any results from nmap results? Now, switch off the firewall/defender and run the nmap scan again. Compare both the results and explain your answer. (05 marks)
9. QR code has different vulnerabilities and it could easily exploited. With the help of
www.qrstuff.com
explain how an attacker could use a QR code to direct a victim to a malicious website?
!End!