Computer Security Testing Guide
Computer Security Testing Guide
To test your antivirus safely, you can use the test [Link]. This
the file is detected as a virus by antivirus software but it is not one, it does not contain
no viral code. If the fake virus is detected, it means your antivirus is active and protecting you.
1. To create this fake virus, you just need the Windows Notepad. Click
on the Start button, on Programs, Accessories and then on Notepad.
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-
FILE!$H+H*
3. Then save the file by clicking on the File menu and then on Save As.
4. Roll down the Type list and select the option All files.
6. If your antivirus is correctly activated, it should then instantly alert you to the
presence of the Eicar virus.
1
7. Then ask your antivirus to delete the file.
If your antivirus sees nothing, there is a problem. Either you installed it incorrectly, or
Well, the permanent protection is misconfigured. Therefore, please consult your documentation.
software to fix this problem.
If the fake virus is still not detected, you should seriously consider changing your
antivirus software.
Tools like those listed at this link exist to decrypt weak passwords:
[Link]
how-to-better-secure-yours/
For this lab session,
francois Password:
albert Password: bertal
firmin Password: nimrif
alice Password: alice
paul Password: Paula4518
II- Installation and use of John the Ripper
2
Its main feature lies in its speed in breaking various encryptions (DES,
BSDI, MD5, SHA-256, SHA-512, bcrypt, LM Windows...) while consuming very little
resources, which ranks it among the best tools. It will initially attempt to
detect weak passwords (Dictionary attack), then act accordingly
ingenious (Hybrid Attack).
Exercise 3:
Set up the following network after installing the Ubuntu virtual machines.
[Link] [Link]
eth0 [Link] eth1 [Link]
3
Exercise 4: Network Diagnostic Tools
Network scanner
I- Use of nmap
a- Installation of Nmap
nmap is somewhat the equivalent of netstat, but it can be used remotely. It indeed allows for
sweep a set of classic ports from one or more remote servers and list among
these ports are the ones on which an application responds to incoming connections. nmap is furthermore
able to identify certain applications, sometimes with the corresponding version.
Example
#nmap [Link]
#nmap -A localhost
See all the open UDP ports on a machine: #nmap -sU [Link]
Know the operating system of the machine (TCP/IP fingerprint) : #nmap -O [Link]
Scan a specific port. Here, it's the http port: #nmap -p 80 [Link]
Scan a range of ports. Here we scan from port 0 to 80: #nmap -p 0-80 [Link]
II- Wireshark
4
Launch the utility and scan the network.
To filter packets, type for example:
icmp allows you to see only ICMP packets
DNS or ICMP allows you to see only ICMP or DNS packets.
- [Link]==[Link] and dns allows you to see only the dns packets containing the address
[Link]
- [Link]>10 and [Link]<50 allows you to see only the packets whose
numbers are between 10 and 50