53
edits
Changes
no edit summary
<dl><dd><ul><li>This lab teaches the student how and why attackers break
into systems. For this purpose everyone will be a "victim" in the class
</dd></dl>
<br>
<ol><li>Install <b>Kali Linux (host)</b> on hard disk pack (or other suitable configuration).</li>
<li>Install Virtual Machine application called <b>VirtualBox</b> on host OS (Kali Linux).</li>
<p><br>
</p>
<ul>
<li> <b>SATA Hard Disk in removable disk tray</b> (Note: can use existing Notebook / Netbook with VMware)</li>
<p><br>
</p>
<ul><li> <b>None</b> (First Lab)
</li></ul>
<p><br>
</p>
<ul>
<li><a href="[http://www.kali.org/" target="_new">Kali Linux Website</a>]</li> <li><a href="[http://linuxmanpages.com/" target="_new">Online Linux Manpages</a>]<ul> <li><a href="[http://www.unix.com/man-page/Linux/8/adduser/" target="_new">adduser</a>]</li> <li><a href="[http://linuxmanpages.com/man8/visudo.8.php" target="_new">visudo</a>]</li> <li><a href="[http://linuxmanpages.com/man8/rpm.8.php" target="_new">rpm</a>]</li> <li><a href="[http://www.unix.com/man-page/Linux/8/service/" target="_new">/sbin/service</a>]</li>
</ul></li>
<li><a href="[http://www.virtualbox.org/wiki/Documentation" target="_new">VirtualBox Documentation</a>]</li> <li><a href="[http://docs.fedoraproject.org/en-US/Fedora_Core/5/html/Release_Notes/" target="_new">Fedora Core 5 Documentation</a>]</li> <li><a href="[http://technet.microsoft.com/en-us/windowsserver/bb512919.aspx" target="_new">Windows 2003 Server Documentation</a>]</li> <li><a href="[http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/ntcmds.mspx?mfr=true" target="_new">Online MS Windows Command Reference</a>]</li>
</ul>
<br><br>
<ul>
<li><a href="[http://zenit.senecac.on.ca/wiki/index.php/SEC520#Course_Resources" target="_new">Required Course Materials</a>]</li>
</ul>
<p><br>
</p>
<br>
There are many toolkits that
Whichever configuration you decide to use, your system MUST allow both the Kali Linux system to be running at the same time as your other vulnerable Windows and Linux operating systems (to conduct penetration testing).
<br><br><b>NOTE:
a future assignment may require the installation of other host and VM
operating system...</b>.
<br>
INSTRUCTIONS:
<li>Make certain that you can connect to the Internet (confirm by using a web-broswer)</li>
</ol>
"bad idea" to run XWindows as root. Running a graphical environment that
has the privileges as root can cause damamge when users become
accustomed to working in an everyday environment. It is suggested to create a regular user (same one that you added to group admin).<br /><br />
<ol>
<li value="9">You can use the <b>Synaptic Package Manager</b> (graphic tool) or the Linux commands <b>apt-get</b> to install other applications that you wish to use in on your system (eg. different web-browser).</li>
<li>It is recommended NOT to graphically install VirtualBox on your Kali machine. The lab's author has had success with installing VirtualBox (as a .deb file) from the main website.</li>
<li>Download the appropriate VirtualBox .deb file (32/64 bit) from the following link:<br /><a href="[https://www.virtualbox.org/wiki/Downloads" target="_blank">https://www.virtualbox.org/wiki/Downloads</a> ] <br /><br /></li>
<li>After the file has downloaded, open a Linux shell, go to the directory containing the downloaded file Issue the following command as root:</li>
</p>
<br><br>
<p><br>
</p><div class="messagebox" style="background-color: #f9f6b7; border: 1px solid #c4c295; color: black; padding: 5px; margin: 1ex 0; min-height: 35px; padding-left: 45px;"><div style="float: left; margin-left: -40px;"><a href="http:{{Admon//zenit.senecac.on.ca/wiki/index.php/File:Idea.png" class="image" title="Important.png"><img alt="" src="SEC520_Lab_1_files/35px-Idea.png" height="35" border="0" width="35"></a></div><div><b>tip|Other Vulnerable Linux Distributions</b><br>|Although we will be
using an outdate version of Fedora Linux, there are other Linux
distributions of Linux that are designed with security flaws for
penetration testing. An example would be <b>DVL</b> (<i>Damn Vulnerable Linux</i>). For interest, here is a link to download and install DVL:<br> <a href="[http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/">http://sourceforge.jp/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_Disease.iso/</a>].</div></div>|}}
will be exploring security issues with operating systems, weak or
"outdated" operating systems are preferred. This seems to run against
our nature to update an operating system immediately after an
installation. <b>You are allowed to update your host OS, but do NOT run updates on the vulnerable OS (Virtual Machines)</b>. You will update (or "harden") those vulnerable operating systems in later labs...
INSTRUCTIONS:
<ol>
<li>In your regular account, run a graphical X-Windows session.</li>
<li>Obtain and burn in the image of Fedora Core 5 onto a bootable DVD. <br><br>Here is a link to a downloadable source: <a href="[http://dl.fedoraproject.org/pub/archive/fedora/linux/core/5/i386/iso/FC-5-i386-DVD.iso">http://dl.fedoraproject.org/pub/archive/fedora/linux/core/5/i386/iso/FC-5-i386-DVD.iso</a>]<br>( Refer to <a href="[http://zenit.senecac.on.ca/wiki/index.php/SEC520#Supplies_Checklist_.28Required_for_Second_Class.29" target="_new">Required Materials</a>])<br><br></li>
<li>Insert the <b>Vulnerable Linux (FC5)</b> installation DVD into the DVD Drive.</li>
<li>From the <b>Applications</b> menu, select <b>System Tools</b>, then select <b>Oracle VM VirtualBox</b>.</li>
<li>Double-click on the VM called <b>Vulnerable Linux</b> in order to install that version of Linux from the CD drive.</li>
</ol>
methods to focus the keyboard and mouse on the Virtual Machine (VM) as
opposed to the host machine. The user can accept the default key <b><right ctrl></b> to act as a capture toggle-switch.
<ol>
<li value="13">Accept the defaults in the <b>Anaconda installation wizard</b>,
</ul></li>
</ol>
Since you are using an older version of Linux (Fedora Core 5) there is an annoying "connectivity issue" if you have booted from different machines (MAC ADDRESSES). Here is a suggested solution:<br /><ol><li>In a shell issue the command <b>ifconfig</b> and check if ethX like devices are listed.</li><li>login as root by issuing the command: <b>su -- </b>(and enter root password).</li><li>Issue the command <b>dhclient</b></li><li>Verify recognized ethernet device by using <i>ifconfig</i> command.</li>
</ol>
install applications from repositories for unsupported Linux
distributions (like Fedora Core 5). Instead, perform the following steps:<ol type="a"><li> Download the rpm packages for <b>telnet-server </b>and <b>xinted</b> by clicking on the following links:<br /><a href="[http://rpm.pbone.net/index.php3/stat/4/idpl/16682910/dir/fedora_5/com/telnet-server-0.17-35.2.1.i386.rpm.html">Telnet Server Download Page</a> ] (select a download mirror)<br /><a href="[http://rpm.pbone.net/index.php3/stat/4/idpl/16683039/dir/fedora_5/com/xinetd-2.3.13-6.2.1.i386.rpm.html">xinetd Dependency Download Page</a> ] (select a download mirror).</li><li>Change directory to where files were downloaded.</li><li>Install the <b>xinetd</b> dependency first, then the <b>telnet-server</b> program by using <b>rpm -i <packagename> </b>(you can ignore warnings. If you can't install due to public key issues, you can download public keys from the following site: <a href="[http://dl.fedoraproject.org/pub/archive/fedora/linux/core/5/" target="_blank">http://dl.fedoraproject.org/pub/archive/fedora/linux/core/5/</a>].</li><li>Issue the command: <b>/sbin/chkconfig telnet on</b> to start the telnet server.</li></ol><br />
After installing telnet-server, edit the file <b>/etc/xinetd.d/telnet</b> and change to "no" for disable. Then you need to reload xinetd by issuing the command: <b>/sbin/service xinetd reload</b><br /><br />You should become familiar with the <code>/sbin/service</code> , <code>/sbin/chkconfig</code> , and <code>/usr/sbin/sestatus</code> to set services, and to provide information to instructor for lab sign-off.
<ol>
<li value="14">Complete remaining screens to start installation - the installation process should take approximately 30 minutes to complete.</li>
<p><br>
</p><div class="messagebox" style="background-color: #f9f6b7; border: 1px solid #c4c295; color: black; padding: 5px; margin: 1ex 0; min-height: 35px; padding-left: 45px;"><div style="float: left; margin-left: -40px;"><a href="http:{{Admon//zenit.senecac.on.ca/wiki/index.php/File:Important.png" class="image" title="Important.png"><img alt="" src="SEC520_Lab_1_files/35px-Important.png" height="35" border="0" width="35"></a></div><div><b>important|DO NOT Install Service Packs (Beyond Service Pack 1) On Windows 2003 Server</b><br>|Since
this course will be exploring security issues with the Windows
operating systems, do not update your Window 2003 Server's OS. We will
be exploiting this less-secure OS, then later "harden" this OS from
attacks.
Make certain NOT to accept the default computer name. Use a smaller
name (like three letters), otherwise, the telnet server package will NOT
be installed by default (needs to be less than 15 characters).
INSTRUCTIONS:
<ol>
<li>Obtain an installation CD of <b>Windows 2003 Server</b> (refer to <a href="[http://zenit.senecac.on.ca/wiki/index.php/SEC520#Supplies_Checklist_.28Required_for_Second_Class.29" target="_new">Required Materials</a>]).</li>
<li>Create another Virtual Machine (<b>20 GB</b>) to be called <b>Vulnerable Windows</b>.</li>
<li>Install <b>Windows Server 2003 (Enterprise Edition)</b> on an <b>NTFS</b> partition. Follow similar selections for settings (such as Eastern Time Zone, administrative password) like you did in Task #2.<br><br><br><b>!!! NOTE:
<li><b>NOTE:</b> Select <b>Administration</b>, <b>Services</b>, scroll down the list to <b>Telnet</b>, right-click a select <b>View Properties</b>, enable telent server, <b>Apply</b> settings, and then <b>Start</b> the telent server.</li></ul></li>
<li><b>SSH SERVER</b><ul>
<li><b>NOTE:</b>You can download and install <b>FreeSSH</b> from the following URL:<br /><a href="[http://www.freesshd.com/freeSSHd.exe" >http://www.freesshd.com/freeSSHd.exe</a>].</li></ul></li>
</ol>
</p><div class="messagebox" style="background-color: #f9f6b7; border: 1px solid #c4c295; color: black; padding: 5px; margin: 1ex 0; min-height: 35px; padding-left: 45px;"><div style="float: left; margin-left: -40px;"><a href="http:{{Admon//zenit.senecac.on.ca/wiki/index.php/File:Important.png" class="image" title="Important.png"><img alt="" src="SEC520_Lab_1_files/35px-Important.png" height="35" border="0" width="35"></a></div><div><b>important|Verification of Running Services</b><br />|
To verify that services are running, you can select <b>Start</b>, <b>Administration</b>, <b>Services</b>.<br /><br /><b>Note:</b> To view that SSH service is running, select the <b>On Demand</b> services tab.
<ol>
<li value="9">Verify that all the above-mentioned services are running.</li>
</ol>
You have 30 days to register your Windows 2003 Server. If you are experiencing connectivity issues to register your Windows 2003 Server, you can power-off Windows 2003 Server, go to<b> Virtual Box main window</b> (for your <b>Vulnerable Windows</b> server), select in the menu <b>Settings</b>, choose the <b>Network</b>tab, and change to <b>Bridged Connection</b> for the appropriate network card. When you start your Windows 2003 Server and login as <b>Administrator</b>, then you should be able to register your copy of Windows 2003 Server...
<ol>
<p><b>Arrange evidence for each of these items on your screen, then ask
your instructor to review them and sign off on the lab's completion:</b>
<p><br>
</p>
<ol>