CYB-362 Lab 1: Establishing a VM Lab for Cybersecurity Testing
VerifiedAdded on  2022/09/09
|35
|2571
|18
Practical Assignment
AI Summary
This assignment details the process of creating a virtual machine (VM) lab environment for cybersecurity purposes. The student begins by downloading and installing VirtualBox, followed by the installation of Kali Linux and Windows operating systems as VMs within VirtualBox. The lab setup includes configuring a host-only network to enable communication between the VMs. The student then installs guest additions and explores network connectivity through ping tests and the use of Nmap for network scanning. The assignment also covers setting up and accessing an Apache web server within the Kali Linux environment and utilizing Netcat for network utility. The student demonstrates understanding of the installation processes, network configuration, and the functionality of essential security tools within the virtualized environment. The document provides screenshots and detailed explanations of each step, concluding with a discussion of the challenges faced and the knowledge gained throughout the lab exercise.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: Information System Threats, Attacks and Defences
Information System Threats, Attacks and Defences
Name of the Student
Name of the University
Author Note
Information System Threats, Attacks and Defences
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Information System Threats, Attacks and Defences 1
Table of Contents
Introduction:...............................................................................................................................2
Procedure:..................................................................................................................................2
Discussion:...............................................................................................................................32
Conclusion:..............................................................................................................................33
Bibliography:............................................................................................................................34
Table of Contents
Introduction:...............................................................................................................................2
Procedure:..................................................................................................................................2
Discussion:...............................................................................................................................32
Conclusion:..............................................................................................................................33
Bibliography:............................................................................................................................34

2Information System Threats, Attacks and Defences
Introduction:
The purpose of this paper is discuss about the establishing connection between kali
Linux and windows operating system. For doing the Lab procedure I have chosen oracle
virtual box. It is a free and open source hosted hyper visor for the x86 visualization. The tool
is developed by Oracle Corporation. It supports management and creation of guest virtual
machines such as Windows, Linux, BSD, OS/2, Solaris, Haiku, and OSx86. For the task I
will create 2 vms in virtual box. One is kali Linux and the other one is windows. Both the
system will be installed as host only network.
Procedure:
Question 1:
Downloading VMware virtual machine for windows from:
https://www.oracle.com/virtualization/technologies/vm/downloads/virtualbox-
downloads.html
File downloaded:
Installing virtual box:
Introduction:
The purpose of this paper is discuss about the establishing connection between kali
Linux and windows operating system. For doing the Lab procedure I have chosen oracle
virtual box. It is a free and open source hosted hyper visor for the x86 visualization. The tool
is developed by Oracle Corporation. It supports management and creation of guest virtual
machines such as Windows, Linux, BSD, OS/2, Solaris, Haiku, and OSx86. For the task I
will create 2 vms in virtual box. One is kali Linux and the other one is windows. Both the
system will be installed as host only network.
Procedure:
Question 1:
Downloading VMware virtual machine for windows from:
https://www.oracle.com/virtualization/technologies/vm/downloads/virtualbox-
downloads.html
File downloaded:
Installing virtual box:

3Information System Threats, Attacks and Defences
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4Information System Threats, Attacks and Defences

5Information System Threats, Attacks and Defences
Installation complete:
Installation complete:

6Information System Threats, Attacks and Defences
Question 2:
Downloading kali Linux from https://www.kali.org/downloads/
Question 2:
Downloading kali Linux from https://www.kali.org/downloads/
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7Information System Threats, Attacks and Defences
64 bit kali iso downloaded:
Question 3:
Creating kali vm in virtual box:
64 bit kali iso downloaded:
Question 3:
Creating kali vm in virtual box:

8Information System Threats, Attacks and Defences
Ram setting:
Creating virtual disk:
Ram setting:
Creating virtual disk:

9Information System Threats, Attacks and Defences
Selecting hard disk type:
Storage type in hard disk:
Selecting hard disk type:
Storage type in hard disk:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10Information System Threats, Attacks and Defences
Hard disk size:
Selecting ISO file:
Hard disk size:
Selecting ISO file:

11Information System Threats, Attacks and Defences
Kali vm created:
Host only adapter:
Kali vm created:
Host only adapter:

12Information System Threats, Attacks and Defences
Kali Linux is running:
Installing guest additions:
Kali Linux is running:
Installing guest additions:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13Information System Threats, Attacks and Defences
Question 4:
Windows 10 pro downloaded:
Question 5:
Creating windows vm:
Question 4:
Windows 10 pro downloaded:
Question 5:
Creating windows vm:

14Information System Threats, Attacks and Defences
Selection of ram:
Creating hard disk:
Selection of ram:
Creating hard disk:

15Information System Threats, Attacks and Defences
Disk type:
Storage on physical drive:
Disk type:
Storage on physical drive:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

16Information System Threats, Attacks and Defences
Windows 10 installed:
Host only network:
Windows 10 installed:
Host only network:

17Information System Threats, Attacks and Defences
Windows 10 is running:
Windows 10 is running:

18Information System Threats, Attacks and Defences
Installing guest addition:
Question 6:
Ifconfig (Kali Linux):
Installing guest addition:
Question 6:
Ifconfig (Kali Linux):
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

19Information System Threats, Attacks and Defences
Ipconfig (windows 10):
Ipconfig (windows 10):

20Information System Threats, Attacks and Defences
Question 7:
Starting apache server:
Question 7:
Starting apache server:

21Information System Threats, Attacks and Defences
Question 8:
Ping connection from kali to windows:
Ping connection from windows to kali Linux:
Question 8:
Ping connection from kali to windows:
Ping connection from windows to kali Linux:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

22Information System Threats, Attacks and Defences
Accessing apache server from windows machine:
Nmap scanning report:
Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 14:21 UTC
Accessing apache server from windows machine:
Nmap scanning report:
Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 14:21 UTC

23Information System Threats, Attacks and Defences
NSE: Loaded 151 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 14:21
Completed NSE at 14:21, 0.00s elapsed
Initiating NSE at 14:21
Completed NSE at 14:21, 0.00s elapsed
Initiating NSE at 14:21
Completed NSE at 14:21, 0.00s elapsed
Initiating SYN Stealth Scan at 14:21
Scanning localhost (127.0.0.1) [65535 ports]
Discovered open port 80/tcp on 127.0.0.1
Discovered open port 111/tcp on 127.0.0.1
Completed SYN Stealth Scan at 14:21, 0.81s elapsed (65535 total ports)
Initiating Service scan at 14:21
Scanning 2 services on localhost (127.0.0.1)
Completed Service scan at 14:21, 6.05s elapsed (2 services on 1 host)
Initiating OS detection (try #1) against localhost (127.0.0.1)
NSE: Script scanning 127.0.0.1.
Initiating NSE at 14:21
Completed NSE at 14:21, 0.17s elapsed
Initiating NSE at 14:21
Completed NSE at 14:21, 0.01s elapsed
Initiating NSE at 14:21
Completed NSE at 14:21, 0.00s elapsed
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000042s latency).
Not shown: 65533 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.41 ((Debian))
| http-methods:
|_ Supported Methods: POST OPTIONS HEAD GET
|_http-server-header: Apache/2.4.41 (Debian)
|_http-title: Apache2 Debian Default Page: It works
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 3,4 111/tcp6 rpcbind
|_ 100000 3,4 111/udp6 rpcbind
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6.32
OS details: Linux 2.6.32
Uptime guess: 38.090 days (since Sat Feb 22 12:11:55 2020)
Network Distance: 0 hops
TCP Sequence Prediction: Difficulty=260 (Good luck!)
IP ID Sequence Generation: All zeros
NSE: Script Post-scanning.
NSE: Loaded 151 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 14:21
Completed NSE at 14:21, 0.00s elapsed
Initiating NSE at 14:21
Completed NSE at 14:21, 0.00s elapsed
Initiating NSE at 14:21
Completed NSE at 14:21, 0.00s elapsed
Initiating SYN Stealth Scan at 14:21
Scanning localhost (127.0.0.1) [65535 ports]
Discovered open port 80/tcp on 127.0.0.1
Discovered open port 111/tcp on 127.0.0.1
Completed SYN Stealth Scan at 14:21, 0.81s elapsed (65535 total ports)
Initiating Service scan at 14:21
Scanning 2 services on localhost (127.0.0.1)
Completed Service scan at 14:21, 6.05s elapsed (2 services on 1 host)
Initiating OS detection (try #1) against localhost (127.0.0.1)
NSE: Script scanning 127.0.0.1.
Initiating NSE at 14:21
Completed NSE at 14:21, 0.17s elapsed
Initiating NSE at 14:21
Completed NSE at 14:21, 0.01s elapsed
Initiating NSE at 14:21
Completed NSE at 14:21, 0.00s elapsed
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000042s latency).
Not shown: 65533 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.41 ((Debian))
| http-methods:
|_ Supported Methods: POST OPTIONS HEAD GET
|_http-server-header: Apache/2.4.41 (Debian)
|_http-title: Apache2 Debian Default Page: It works
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 3,4 111/tcp6 rpcbind
|_ 100000 3,4 111/udp6 rpcbind
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6.32
OS details: Linux 2.6.32
Uptime guess: 38.090 days (since Sat Feb 22 12:11:55 2020)
Network Distance: 0 hops
TCP Sequence Prediction: Difficulty=260 (Good luck!)
IP ID Sequence Generation: All zeros
NSE: Script Post-scanning.

24Information System Threats, Attacks and Defences
Initiating NSE at 14:21
Completed NSE at 14:21, 0.00s elapsed
Initiating NSE at 14:21
Completed NSE at 14:21, 0.00s elapsed
Initiating NSE at 14:21
Completed NSE at 14:21, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at
https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 10.24 seconds
Raw packets sent: 65557 (2.885MB) | Rcvd: 131114 (5.508MB)
Initiating NSE at 14:21
Completed NSE at 14:21, 0.00s elapsed
Initiating NSE at 14:21
Completed NSE at 14:21, 0.00s elapsed
Initiating NSE at 14:21
Completed NSE at 14:21, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at
https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 10.24 seconds
Raw packets sent: 65557 (2.885MB) | Rcvd: 131114 (5.508MB)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

25Information System Threats, Attacks and Defences
Question 10:
Question 11:
Downloading nmap in windows vm:
Question 10:
Question 11:
Downloading nmap in windows vm:

26Information System Threats, Attacks and Defences
Nmap scanning:
Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 18:18
NSE: Loaded 151 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 18:18
Completed NSE at 18:18, 0.00s elapsed
Initiating NSE at 18:18
Completed NSE at 18:18, 0.00s elapsed
Initiating NSE at 18:18
Completed NSE at 18:18, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 18:18
Completed Parallel DNS resolution of 1 host. at 18:18, 0.01s elapsed
Initiating SYN Stealth Scan at 18:18
Scanning localhost (127.0.0.1) [65535 ports]
Discovered open port 135/tcp on 127.0.0.1
Discovered open port 445/tcp on 127.0.0.1
Discovered open port 49666/tcp on 127.0.0.1
Discovered open port 49669/tcp on 127.0.0.1
Discovered open port 49665/tcp on 127.0.0.1
Discovered open port 5357/tcp on 127.0.0.1
Discovered open port 49667/tcp on 127.0.0.1
Discovered open port 49670/tcp on 127.0.0.1
Discovered open port 7680/tcp on 127.0.0.1
Nmap scanning:
Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 18:18
NSE: Loaded 151 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 18:18
Completed NSE at 18:18, 0.00s elapsed
Initiating NSE at 18:18
Completed NSE at 18:18, 0.00s elapsed
Initiating NSE at 18:18
Completed NSE at 18:18, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 18:18
Completed Parallel DNS resolution of 1 host. at 18:18, 0.01s elapsed
Initiating SYN Stealth Scan at 18:18
Scanning localhost (127.0.0.1) [65535 ports]
Discovered open port 135/tcp on 127.0.0.1
Discovered open port 445/tcp on 127.0.0.1
Discovered open port 49666/tcp on 127.0.0.1
Discovered open port 49669/tcp on 127.0.0.1
Discovered open port 49665/tcp on 127.0.0.1
Discovered open port 5357/tcp on 127.0.0.1
Discovered open port 49667/tcp on 127.0.0.1
Discovered open port 49670/tcp on 127.0.0.1
Discovered open port 7680/tcp on 127.0.0.1

27Information System Threats, Attacks and Defences
Discovered open port 5040/tcp on 127.0.0.1
Discovered open port 49664/tcp on 127.0.0.1
Discovered open port 49668/tcp on 127.0.0.1
Completed SYN Stealth Scan at 18:19, 9.14s elapsed (65535 total ports)
Initiating Service scan at 18:19
Scanning 12 services on localhost (127.0.0.1)
Service scan Timing: About 33.33% done; ETC: 18:21 (0:01:24 remaining)
Completed Service scan at 18:21, 156.41s elapsed (12 services on 1 host)
Initiating OS detection (try #1) against localhost (127.0.0.1)
Retrying OS detection (try #2) against localhost (127.0.0.1)
Retrying OS detection (try #3) against localhost (127.0.0.1)
Retrying OS detection (try #4) against localhost (127.0.0.1)
Retrying OS detection (try #5) against localhost (127.0.0.1)
NSE: Script scanning 127.0.0.1.
Initiating NSE at 18:21
Completed NSE at 18:22, 30.15s elapsed
Initiating NSE at 18:22
Completed NSE at 18:22, 1.25s elapsed
Initiating NSE at 18:22
Completed NSE at 18:22, 0.00s elapsed
Nmap scan report for localhost (127.0.0.1)
Host is up (0.00023s latency).
Not shown: 65522 closed ports
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
137/tcp filtered netbios-ns
445/tcp open microsoft-ds?
040/tcp open unknown
5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Service Unavailable
7680/tcp open pando-pub?
49664/tcp open msrpc Microsoft Windows RPC
49665/tcp open msrpc Microsoft Windows RPC
49666/tcp open msrpc Microsoft Windows RPC
49667/tcp open msrpc Microsoft Windows RPC
49668/tcp open msrpc Microsoft Windows RPC
49669/tcp open msrpc Microsoft Windows RPC
49670/tcp open msrpc Microsoft Windows RPC
No exact OS matches for host (If you know what OS is running on it, see
https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.80%E=4%D=3/31%OT=135%CT=1%CU=36466%PV=N%DS=0%DC=L
%G=Y%TM=5E833D
OS:08%P=i686-pc-windows-windows)SEQ(SP=104%GCD=1%ISR=10A%TI=I%CI=I
%II=I%TS=
OS:U)OPS(O1=MFFD7NW8NNS%O2=MFFD7NW8NNS
%O3=MFFD7NW8%O4=MFFD7NW8NNS%O5=MFFD7N
OS:W8NNS%O6=MFFD7NNS)WIN(W1=FFFF%W2=FFFF%W3=FFFF%W4=FFFF
%W5=FFFF%W6=FF70)EC
Discovered open port 5040/tcp on 127.0.0.1
Discovered open port 49664/tcp on 127.0.0.1
Discovered open port 49668/tcp on 127.0.0.1
Completed SYN Stealth Scan at 18:19, 9.14s elapsed (65535 total ports)
Initiating Service scan at 18:19
Scanning 12 services on localhost (127.0.0.1)
Service scan Timing: About 33.33% done; ETC: 18:21 (0:01:24 remaining)
Completed Service scan at 18:21, 156.41s elapsed (12 services on 1 host)
Initiating OS detection (try #1) against localhost (127.0.0.1)
Retrying OS detection (try #2) against localhost (127.0.0.1)
Retrying OS detection (try #3) against localhost (127.0.0.1)
Retrying OS detection (try #4) against localhost (127.0.0.1)
Retrying OS detection (try #5) against localhost (127.0.0.1)
NSE: Script scanning 127.0.0.1.
Initiating NSE at 18:21
Completed NSE at 18:22, 30.15s elapsed
Initiating NSE at 18:22
Completed NSE at 18:22, 1.25s elapsed
Initiating NSE at 18:22
Completed NSE at 18:22, 0.00s elapsed
Nmap scan report for localhost (127.0.0.1)
Host is up (0.00023s latency).
Not shown: 65522 closed ports
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
137/tcp filtered netbios-ns
445/tcp open microsoft-ds?
040/tcp open unknown
5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Service Unavailable
7680/tcp open pando-pub?
49664/tcp open msrpc Microsoft Windows RPC
49665/tcp open msrpc Microsoft Windows RPC
49666/tcp open msrpc Microsoft Windows RPC
49667/tcp open msrpc Microsoft Windows RPC
49668/tcp open msrpc Microsoft Windows RPC
49669/tcp open msrpc Microsoft Windows RPC
49670/tcp open msrpc Microsoft Windows RPC
No exact OS matches for host (If you know what OS is running on it, see
https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.80%E=4%D=3/31%OT=135%CT=1%CU=36466%PV=N%DS=0%DC=L
%G=Y%TM=5E833D
OS:08%P=i686-pc-windows-windows)SEQ(SP=104%GCD=1%ISR=10A%TI=I%CI=I
%II=I%TS=
OS:U)OPS(O1=MFFD7NW8NNS%O2=MFFD7NW8NNS
%O3=MFFD7NW8%O4=MFFD7NW8NNS%O5=MFFD7N
OS:W8NNS%O6=MFFD7NNS)WIN(W1=FFFF%W2=FFFF%W3=FFFF%W4=FFFF
%W5=FFFF%W6=FF70)EC
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

28Information System Threats, Attacks and Defences
OS:N(R=Y%DF=Y%T=80%W=FFFF%O=MFFD7NW8NNS%CC=N%Q=)T1(R=Y
%DF=Y%T=80%S=O%A=S+%F
OS:=AS%RD=0%Q=)T2(R=Y%DF=Y%T=80%W=0%S=Z%A=S%F=AR%O=
%RD=0%Q=)T3(R=Y%DF=Y%T=8
OS:0%W=0%S=Z%A=O%F=AR%O=%RD=0%Q=)T4(R=Y%DF=Y%T=80%W=0%S=A
%A=O%F=R%O=%RD=0%Q
OS:=)T5(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y
%DF=Y%T=80%W=0%S=A
OS:%A=O%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR
%O=%RD=0%Q=)U1(R=Y
OS:%DF=N%T=80%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=Z%RUCK=G
%RUD=G)IE(R=Y%DFI=N%T
OS:=80%CD=Z)
Network Distance: 0 hops
TCP Sequence Prediction: Difficulty=260 (Good luck!)
IP ID Sequence Generation: Incrementing by 2
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-security-mode:
| 2.02:
|_ Message signing enabled but not required
| smb2-time:
| date: 2020-03-31T12:51:56
|_ start_date: N/A
NSE: Script Post-scanning.
Initiating NSE at 18:22
Completed NSE at 18:22, 0.00s elapsed
Initiating NSE at 18:22
Completed NSE at 18:22, 0.00s elapsed
Initiating NSE at 18:22
Completed NSE at 18:22, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at
https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 219.08 seconds
Raw packets sent: 65616 (2.891MB) | Rcvd: 131273 (5.519MB)
OS:N(R=Y%DF=Y%T=80%W=FFFF%O=MFFD7NW8NNS%CC=N%Q=)T1(R=Y
%DF=Y%T=80%S=O%A=S+%F
OS:=AS%RD=0%Q=)T2(R=Y%DF=Y%T=80%W=0%S=Z%A=S%F=AR%O=
%RD=0%Q=)T3(R=Y%DF=Y%T=8
OS:0%W=0%S=Z%A=O%F=AR%O=%RD=0%Q=)T4(R=Y%DF=Y%T=80%W=0%S=A
%A=O%F=R%O=%RD=0%Q
OS:=)T5(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y
%DF=Y%T=80%W=0%S=A
OS:%A=O%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR
%O=%RD=0%Q=)U1(R=Y
OS:%DF=N%T=80%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=Z%RUCK=G
%RUD=G)IE(R=Y%DFI=N%T
OS:=80%CD=Z)
Network Distance: 0 hops
TCP Sequence Prediction: Difficulty=260 (Good luck!)
IP ID Sequence Generation: Incrementing by 2
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-security-mode:
| 2.02:
|_ Message signing enabled but not required
| smb2-time:
| date: 2020-03-31T12:51:56
|_ start_date: N/A
NSE: Script Post-scanning.
Initiating NSE at 18:22
Completed NSE at 18:22, 0.00s elapsed
Initiating NSE at 18:22
Completed NSE at 18:22, 0.00s elapsed
Initiating NSE at 18:22
Completed NSE at 18:22, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at
https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 219.08 seconds
Raw packets sent: 65616 (2.891MB) | Rcvd: 131273 (5.519MB)

29Information System Threats, Attacks and Defences

30Information System Threats, Attacks and Defences
Downloading netcat:
Netcat scanning:
Question 12:
Stopping apache server:
Downloading netcat:
Netcat scanning:
Question 12:
Stopping apache server:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

31Information System Threats, Attacks and Defences
Starting python:
Starting python:

32Information System Threats, Attacks and Defences
Discussion:
The purpose of this lab is to understand how to install different operating systems in a
machine. The task helps to understand how to install more than one operating system in
virtual box. The lab also helps in understanding how two virtual machines can be connected
with each other. In this lab I have learned how apache web server can be run in kali system as
well as in windows system. For performing the tasks two operating systems have been
selected. First the systems are installed in to the virtual box. Then via host network the
systems were connected to each other. For better understanding I have provided the ping
connection between the systems. For the task apache web server has been used. Apache is
one of the most widely utilized web server. It was developed by apache software foundation.
Still they are also maintaining it. The server is available open source and free of cost. Most of
the hosting providers of word press utilize apache for their web server software. For scanning
Discussion:
The purpose of this lab is to understand how to install different operating systems in a
machine. The task helps to understand how to install more than one operating system in
virtual box. The lab also helps in understanding how two virtual machines can be connected
with each other. In this lab I have learned how apache web server can be run in kali system as
well as in windows system. For performing the tasks two operating systems have been
selected. First the systems are installed in to the virtual box. Then via host network the
systems were connected to each other. For better understanding I have provided the ping
connection between the systems. For the task apache web server has been used. Apache is
one of the most widely utilized web server. It was developed by apache software foundation.
Still they are also maintaining it. The server is available open source and free of cost. Most of
the hosting providers of word press utilize apache for their web server software. For scanning

33Information System Threats, Attacks and Defences
the network web server nmap and nectat. Nmap is a network security scanning tool. Mainly it
is used in Linux environment but it is also available for windows. The tool is open source and
freely available. On the other side, netcat is basically a network utility for computer to read
the network connection by using UDP and TCP. In the question 12 I have learnt how the
apache server can be stopped running and how to start python web server. For doing the task
I have faced so many challenges like I did not know how to scan network via netcat. For that
I have taken help from Google search and YouTube videos. Overall from the task I have
learnt so many things, it will definitely help me in future.
With the host only network, the virtual box will not try to utilize a physical network
adapter for the host. The host only network is basically a set up that helps the user to
configure the network. It automatically configure the network connection between the virtual
machines and the main host computer. After using host network the main host computer and
the virtual machines will be connected to a private network.
In kali Linux apache web server is the most preferable web server for kali Linux
environment. As the source codes of the apache web server is freely available in internet. No
licence or permission is needed. The codes can be modified for adjusting the server as well as
for fixing the errors. The web server is highly reliable and it can perform better than python
web server.
Conclusion:
Thus, it can be concluded from the lab that I have understood so many things from the
lab. The lab helped me to understand how two virtual machines can be connected with each
other. In this lab I have learned how apache web server can be run in kali system as well as in
windows system. I have also learnt about how a network can be scanned by nmap and netcat.
the network web server nmap and nectat. Nmap is a network security scanning tool. Mainly it
is used in Linux environment but it is also available for windows. The tool is open source and
freely available. On the other side, netcat is basically a network utility for computer to read
the network connection by using UDP and TCP. In the question 12 I have learnt how the
apache server can be stopped running and how to start python web server. For doing the task
I have faced so many challenges like I did not know how to scan network via netcat. For that
I have taken help from Google search and YouTube videos. Overall from the task I have
learnt so many things, it will definitely help me in future.
With the host only network, the virtual box will not try to utilize a physical network
adapter for the host. The host only network is basically a set up that helps the user to
configure the network. It automatically configure the network connection between the virtual
machines and the main host computer. After using host network the main host computer and
the virtual machines will be connected to a private network.
In kali Linux apache web server is the most preferable web server for kali Linux
environment. As the source codes of the apache web server is freely available in internet. No
licence or permission is needed. The codes can be modified for adjusting the server as well as
for fixing the errors. The web server is highly reliable and it can perform better than python
web server.
Conclusion:
Thus, it can be concluded from the lab that I have understood so many things from the
lab. The lab helped me to understand how two virtual machines can be connected with each
other. In this lab I have learned how apache web server can be run in kali system as well as in
windows system. I have also learnt about how a network can be scanned by nmap and netcat.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

34Information System Threats, Attacks and Defences
Bibliography:
Bagyalakshmi, G., Rajkumar, G., Arunkumar, N., Easwaran, M., Narasimhan, K., Elamaran,
V., ... & Ramirez-Gonzalez, G. (2018). Network vulnerability analysis on brain
signal/image databases using Nmap and Wireshark tools. IEEE Access, 6, 57144-
57151.
Barreto, M. V., Barra, W., Rocha, E. M., Nogueira, F. G., Marcillo, K. L., De Medeiros, R. L.
P., ... & Alves, M. S. (2019). Apache Dynamic Update for Feedback Control of
Computing Resources. IEEE Access, 7, 55861-55872.
Mack, J., Hu, Y. H. F., & Hoppa, M. A. (2019). A Study of Existing Cross-Site Scripting
Detection and Prevention Techniques Using XAMPP and VirtualBox. Virginia
Journal of Science, 70(3), 1.
Najera-Gutierrez, G., & Ansari, J. A. (2018). Web Penetration Testing with Kali Linux:
Explore the methods and tools of ethical hacking with Kali Linux. Packt Publishing
Ltd.
Sinha, S. (2017). Installing Virtual Box. In Beginning Ethical Hacking with Python (pp. 9-
11). Apress, Berkeley, CA.
Srinivasa, K. G., & Singh, A. (2018). Hands-On Guide to Virtual Box. In Design and Use of
Virtualization Technology in Cloud Computing (pp. 194-207). IGI Global.
Bibliography:
Bagyalakshmi, G., Rajkumar, G., Arunkumar, N., Easwaran, M., Narasimhan, K., Elamaran,
V., ... & Ramirez-Gonzalez, G. (2018). Network vulnerability analysis on brain
signal/image databases using Nmap and Wireshark tools. IEEE Access, 6, 57144-
57151.
Barreto, M. V., Barra, W., Rocha, E. M., Nogueira, F. G., Marcillo, K. L., De Medeiros, R. L.
P., ... & Alves, M. S. (2019). Apache Dynamic Update for Feedback Control of
Computing Resources. IEEE Access, 7, 55861-55872.
Mack, J., Hu, Y. H. F., & Hoppa, M. A. (2019). A Study of Existing Cross-Site Scripting
Detection and Prevention Techniques Using XAMPP and VirtualBox. Virginia
Journal of Science, 70(3), 1.
Najera-Gutierrez, G., & Ansari, J. A. (2018). Web Penetration Testing with Kali Linux:
Explore the methods and tools of ethical hacking with Kali Linux. Packt Publishing
Ltd.
Sinha, S. (2017). Installing Virtual Box. In Beginning Ethical Hacking with Python (pp. 9-
11). Apress, Berkeley, CA.
Srinivasa, K. G., & Singh, A. (2018). Hands-On Guide to Virtual Box. In Design and Use of
Virtualization Technology in Cloud Computing (pp. 194-207). IGI Global.
1 out of 35

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.