Essay Available:
You are here: Home → Lab Report → IT & Computer Science
Pages:
8 pages/≈2200 words
Sources:
3 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Lab Report
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 39.95
Topic:
Lab-10: Malware Creation and Denial of Service (DoS) (Lab Report Sample)
Instructions:
Lab-10: Malware Creation and Denial of Service (DoS)Lab-10: Malware Creation and Denial of Service (DoS)
Utilizing msfvenom, I was able to realistically demonstrate my abilities to generate a DoS assault scenario while highlighting the significance of protection mechanisms including network segmentation, behavioral analysis tools, and user education. This event brought to light the ever-changing nature of cybersecurity threats and the need for flexible defensive tactics. I found myself wondering if encoding and other conventional evasion techniques would hold up against more advanced antivirus software after completing the lab tasks. It brought up moral questions about the creation and testing of malware, even in controlled settings, emphasizing the need for cybersecurity professionals to always learn and adapt. The lab raised interest in recently created defense mechanisms that can defeat dynamic attack strategies, highlighting the necessity of an all-encompassing and proactive cybersecurity plan in the constantly shifting world of cyberthreats. source..
Content:
Lab-10: Malware Creation and Denial of Service (DoS)
In this lab, you will create a malware by using the Metasploit Framework. You will also launch as Denial of Service (DoS) attack.
Section-1: Create a Malware
Method-1: Create a malicious file by using msfvenom
center635
center635
Review the results. Notice how antivirus vendors label the file you created.
Take a screenshot of the VirusTotal result page showing the detection ratio graphic at the top left of the page and some vendor results.
Method-2: Create an encoded malicious file by using msfvenom
In this part, you will incorporate encoding to reduce the detection ratio by antivirus vendors. Please continue working at Kali VM hosted on your computer.
center635
Take a screenshot of the VirusTotal result page showing the detection ratio graphic at the top left of the page and some vendor results.
Method-3: Create a malicious file by iterating the encoding process ten times using msfvenom
In this part, you will create a malicious file by encoding it ten times, so that we expect to see a lower detection ratio on VirusTotal. Please continue working at Kali VM hosted on your computer.
center635
Take a screenshot of the VirusTotal result page showing the detection ratio graphic at the top left of the page and some vendor results.
Section-2: Denial of Service (DoS) Attack
Method-1: SYN Flood
1 Switch to Kali Linux.
2 Open a terminal window by clicking the terminal icon on the taskbar.
3 Type hping3 -S --flood -p 445 192.168.2.13 in terminal window and press enter.
Take a screenshot of the task manager.
4 Switch to Windows 7 Attacker, close any previous explorer windows. Type start \\192.168.2.13 in the cmd window and press enter. Once again, the explorer window will open very quickly.
Method-2: ICMP Flood
1 Open Kali Linux on the Netlab environment.
2 Open a terminal window by clicking the terminal icon on the taskbar.
3 Type hping3 -1 --flood 192.168.2.13
Take a screenshot of the command prompt.
4 Switch to Kali Linux again and press CTRL-C at the terminal window. This will stop the ICMP flood attack.
5 Switch to Windows 7 Target and observe that network utilization again becomes 0%.
Take a screenshot of the task manager.
6 Switch to Windows 7 Attacker. Check that ping replies again coming from Windows 7 Target.
Weekly Learning and Reflection
The flooding approach in the DoS assaults had compromised the server's internet connectivity, which the Windows 2008 computer used. The reverse_https payload was used for illicit operations to create a secure connection between the attacker and the victim. It was found in the cybersecurity lab. When the malware was uploaded to VirusTotal, different antivirus providers' detection percentages were displayed. Although the experiment demonstrated the improved recognition capabilities of contemporary antivirus systems against payloads encoded with shikata_ga_nai, using the shikata_ga_nai encoder reduced antivirus detection percentages. The once successful repeated encoding technique demonstrated decreased effectiveness in modern settings, highlighting the evolving antivirus detection scenario.
Utilizing msfvenom, I was able to realistically demonstrate my abilities to generate a DoS assault scenario while highlighting the significance of protection mechanisms including network segmentation, behavioral analys...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- Fast Food Hub Database ReportDescription: Fast Food Hub Database Report IT & Computer Science Lab Report...1 page/≈275 words| 5 Sources | APA | IT & Computer Science | Lab Report |
- Secure Scripting in LinuxDescription: Secure coding in Linux is essential for protecting your system from cyber attacks and data breaches....16 pages/≈4400 words| No Sources | APA | IT & Computer Science | Lab Report |
- CYBERSECURITY Description: What is cybersecurity? Cybersecurity refers to the practice of protecting computer systems, networks, and data from unauthorized access, theft, damage, or disruption. ...3 pages/≈825 words| No Sources | APA | IT & Computer Science | Lab Report |