Sei sulla pagina 1di 54

CHAPTER 1

INTRODUCTION

Our final year project is mainly about hacking, the norm for those who have basic
computer know what a hacker or hacking. Our group would like to implement the
project shaped hacking, hacking way or ways determine whether or not exposed to
hacking.

Hacking is the art of exploiting computers to get access to otherwise unauthorised


information. Now that the world is using IT systems to gather, store and manipulate
important information there is also a need to make sure that data is secure. However,
no system is without its problems. Vulnerabilities are often present within security
systems which, if exploited, allow hackers to gain access to this otherwise restricted
information. The hacking technique that we use here is ethical hacking where the use
of programming skills to determine vulnerabilities in computer systems. The work of
ethical hacking is still considered hacking because it uses knowledge of computer
systems in an attempt to in some way penetrate them or crash them. This work is
ethical because it is performed to increase the safety of the computer systems.

The advantages of this hacking skill are it can be used to recover lost information
where the computer password has been lost. With that it teaches you that no
technology is 100% secure. But still, it can harm someones privacy. It makes sense
that hacking and security need to constantly update and it is a fast moving sector of
the computing industry.

1.1 Problem Statement

Nowadays, usually data are used or implicate in the internet, and that can be the
reason why the data being stolen. This problem usually related with one or more
computer hacker. As we know, the hacker has knowledge in programming and
networking field. On this latest technology, many range of business can be done
online such as payment through internet banking. At that time, the hackers will take
the opportunity to get all desired data, including transfer money into their own
accounts. From this problem arise; we can conclude that our project can identify the
methods used by hackers to hack into a network. In addition, important data in a
large company such as tenders corporate information and a range of other
confidential information of the company that require data tight security. Our project
also involve on secure network that help to reduce the problem of stealing data done
by hackers. Personal websites can also be changed easily by hackers simply because
it is not secured. Therefore, with this project, we can detect and give the best solution
to reduce the problem.

1.2 Objective
There are three objectives involve in our project. It is:

To setup secure network.

To implement IP Spoofing and Dos Attack using hacking tools

To test the IP Spoofing and Dos Attack to the network.

1.3 Scope
1.3.1 System Scope
To setup secure network
In our project, from start we have to create one secure network. One of the technique
to secure is using packet filtering access control list where we use standard access
control list. Other basic security that we are going to use is windows host based
firewall with advanced security where from there we can control the traffic especially
inbound traffic.

To implement the IP spoofing and Dos attack using hacking tools


After setting up the network, we can start focusing on implement the hacking itself.
The first one is an IP Spoofing which is an technique used to gain unauthorized
access to computers, whereby the intruder sends a message to a computer with an IP
address indicate that the message is coming from a trusted host. Other hacking
technique is about Dos attack, stand for Denial of Service. It is a malicious attempt
by a single person to cause the victim or site to deny service to its customer. The
hacking tools that we used to implement these two types of hacking technique are
Scapy and Python for IP Spoofing and Slowloris for Dos attack. Scapy able to forge
or decode packets of a wide number of protocols, send them on the wire, capture
them, match requests and replies. Backtrack is our most suitable operating system to
place these hacking tools.

To test the IP Spoofing and Dos attack

The final attempt for our project is to test the two hacking technique that we have
create. We start the hacking with IP Spoofing technique. Using the hacking tools
provided, we can send a fake ip address to the victim so that the victim get trick with
it thinking that ip is from the trusted host. After that we do the Dos attack on the
server to slow down and stop the services. While we test the hacking, we must setup
the network with vulnerabilities which see what will happen with the network if it
get hack. After the first hacking test, we switch on the security that we provide for
our server and then start the second testing. From there, we can explain the flaws that
we have if we dont equipped with strong security. That is what we call an ethical
hacking project.

Area
The place that most suit for our project is the computer lab. The lab is equipped with
pc and other networking devices such as switch and router is suitable for our kind of
project.

Time
The dateline for our project is start from the January until October of 2014 which is
about 10 months. Those 10 months we use to create our project accordingly to the
objectives.

Payment
The total cost of our project is RM4700.00. The cost is more to the type of computer
that we use to develop our project. We use two type of desktop computer that cost
about RM1900.00 for both. The other we use Sony laptop which cost RM1600.00.
The balance left is for networking device in our project.

1.3.2 User Scope

Ethical Hacker
The most common user is an ethical hacker. They protect networks and computers
from attacks from bad hackers who illegally penetrate computers to access private
and sensitive information. Though they possess technical skills like those of an bad
hacker, an ethical hacker uses these skills for protection. Using advanced software,
an ethical hacker attempts to penetrate his company's system in much the same way a
hacker does. The goal is to uncover any weak areas in the system. Once a weakness
is found, it is patched. As part of the security team, the ethical hacker also ensures
that the system is firewalled, security protocols are in place and sensitive files are
encrypted.

Network Administrator
Network administrator is also one of the common users. Their job is maintenance and
monitoring of active data network or converged infrastructure and related network
equipment. The actual role of the network administrator will vary from place to
place, but will commonly include activities and tasks such as network address
assignment, management and implementation of routing protocols such as OSPF,
ACL, routing table configurations and certain implementations of authentication. It
can also include maintenance of certain network servers such as file servers, VPN
gateways, and intrusion detection systems. They also test the network for weakness,
keeping an eye out for needed updates, installing and implementing security
programs.

Network Security Engineer


This individual will be responsible for implementation and administration of network
security hardware and software, enforcing the network security policy and complying
with requirements of external security audits and recommendations. Other
responsibilities analysing, troubleshooting and correcting network problems remotely
and on-site. They also maintaining and administering perimeter security systems
such as firewalls and intrusion detection systems.

1.4 Project Significant


Every project that developed by a group of student have their own significant. This
will make sure all the project can be managed smoothly. The project that will be
developed should have agreement by all the group member so that the project can
grow without any serious problem involved in it.

There must be the reason why the project should be developed. It should have a lot of
interest in doing the project. The group member can learn and practise the real
project by their owned. In this project, student can be more hardworking person and
can learn how to cooperate with each group member more. All this can make a
student become better in the real working situation.

The group member can get the opportunity to know more about the device used and
can manage it by their own. This will make the student have more knowledge about
network hardware. It also can improve the confident of the student to manage all the
device without any fear.

When come to the project, there are many interests on doing our project. Our group
member can learn how to know when there is an untrusted person try to hack the
trusted person in real situation. Then we can learn how to solve the problem by their

own. This will be the biggest interest when develop this project. At least we can
become more serious in making this project successful.

Other than all that, we become more interested when can know some of the hacking
tools and the type of security used to make sure the problem can be solve according
to the wishes. This type of software is usually used when we learn in networking
class but we cannot have chance to try it because this is all just a theory in the
subject. But this time, we have the chance to learn more and run the software to
make sure the project are done on time.

Lastly, every project that student develop, have their own interest on it. Similar to us,
this project have many interest which make us more excited on doing it. When the
project is developing successfully, we can feel more open minded and more
confident in next time.

CONCLUSION
The conclusion is that we have explained all the important details about our project
in this chapter 1. The first is about the problem statement; basically we must list out
all the problems that make us decide to develop our project. So, based on the
problems occur and we have to ensure that we can manage the network in secure
ways.
On the objective, we have our target on this project. Based on that, automatically we
can show our skills. Then, at the same time, we can learn new skills throughout the
whole process of our project. Next, about the scope, the scope has been split into two
which are system scope and user scope. For system scope, we give the details on the
project that develop such as the operating system, hardware devices, software and
many more. While on user scope, we have to identify the type of user that normally
or going to use this project based on their daily life. Then, move on to the project
significant.
The topic will cover the reason why we have to create our project. On this section,
there is a lot of benefit that we can gain while doing our project. Last but not least,
hopefully all our planning will be run smoothly according to the target that we want
to achieve. There are many things that we will be learn in this project to make us
become more good and confident in the future. For us, it not only just to develop the
project in successful, but it is more than that. In this project we can be more close to
each other and know the strengths and weakness of our group member. Hopefully, all
this make us completing each other in the way to make this project done in the
correct way and specific time given.

CHAPTER 2

LITERATURE REVIEW

A literature review is a text of a scholarly paper, which includes the current


knowledge including substantive findings, as well as theoretical and methodological
contributions to a particular topic. Literature reviews use secondary sources, and do
not report new or original experimental work. At this chapter we decided to divide
into four sub topic. First, we explain about the terms used for naming our project
title. At this section, we tell more details regarding our project. Next, we have also
explained about the main component used to accomplish our project. Without this
entire main component our project will not going to be done in proper way. At this
section, we are going to tell about the method and technique used to make sure all the
component runs smoothly. After that, we are going to tell about the equipment that
will be used to support the main component. All the hardware and software will be
explained in more details to make sure that our project can be done in right time.
Lastly, from all the explanation that has been stated, we will be list out the project
that has been done from others. We will make a comparison between the previous
project and our project. There will be some weaknesses and advantage between those
projects.

2.1 Definition of terms


2.1.1 Ethical

Being in accordance with the rules or standards for right conduct or practice,
especially the standards of a profession.

2.1.2 Hacking
In computer networking, hacking is any technical effort to manipulate the normal
behaviour of network connections and connected systems. A hacker is any person
engaged in hacking. The term "hacking" historically referred to constructive, clever
technical work that was not necessarily related to computer systems. Today, however,
hacking and hackers are most commonly associated with malicious programming
attacks on the Internet and other networks.

2.1.3 Ethical Hacking


Ethical hacking is the use of programming skills to determine vulnerabilities in
computer systems. It usually performs by computer experts or white hats can work in
a variety of ways. Many companies utilize ethical hacking services from consultants
or full-time employees to keep their systems and information as secure as possible.

The work of ethical hacking is still considered hacking because it uses knowledge of
computer systems in an attempt to in some way penetrate them or crash them. This
work is ethical because it is performed to increase the safety of the computer
systems. Its reasoned that if a white hat can somehow break the security protocols of
a system. Thus, the goal of ethical hacking is to determine how to break in or create
mischief with the present programs running, but only at the request of the company
that owns the system and specifically to prevent others from attacking it.

With increasing use of the Internet and concerns about its security, especially when it
comes to things like consumer information or private medical details, there is
considerable need for computer experts to work in ethical hacking. Even sites owned
by organizations like the US government have been hacked in the past, and concern
about information theft remains incredibly high. Designing impenetrable systems or
identifying the current weaknesses of a system are vital parts of keeping the Internet
safe and information private, and even with the present legion of ethical hackers that
perform this work, there is still more work to do.

Those with interest in the field of ethical hacking often acquire a lot of their skills on
their own, and many have particular talent with and affinity for computers. Some
knowledge can also be acquired through formal education in computer programming.
This work requires creativity, and the ethical hacker must be able to think outside of
the box, coming up with as many possible ways as he or she can derive. The figure
below show a statistic about cyber incidents including DOS attack happen in
Malaysia.

Figure 2.1: General incident Classification Statistics 2013

2.2 Explanation of main component

2.2.1 Creating Network


For our project, we need to configure all the devices. The first Network is Network
A, we use two personal set computer, one switch, and one router. Network B, two
laptop, one switch, and one router. The configuration as follow:

Network A
Table 2.2 : Configuration Devices at Network A
Item

Software

Configuration

Web

Ip Address

: 192.168.1.3

Server(XAMPP

Subnet Mask

: 255.255.255.0

Default Gateway : 192.168.1.1

)
Snort
Wireshark

Nagios

Ip Address

: 192.168.1.4

Subnet Mask

: 255.255.255.0

Default Gateway : 192.168.1.1

No Software

Ip Address

: 192.168.1.2

Subnet Mask

: 255.255.255.0

Default Gateway : 192.168.1.1

Ip Address fa0/0

: 192.168.1.1

se0/0/0 : 192.168.2.1

No Software

Subnet Mask fa0/0 : 255.255.255.0


se0/0/0 : 255.255.255.252
Default Gateway

: 192.168.1.1

Network B
Table 2.3: Configuration Devices at Network B

Item

Software

Backtrack 5

Configuration

Ip Address

: 172.16.100.3

Subnet Mask

: 255.255.255.0

Default Gateway : 172.16.100.1

No Software

Ip Address

: 172.16.100.2

Subnet Mask

: 255.255.255.0

Default Gateway

: 172.16.100.1

Ip Address fa0/0

: 172.16.100.1

se0/0/0 : 192.168.2.2
No Software

Subnet Mask fa0/0

: 255.255.255.0

se0/0/0 : 255.255.255.252
Default Gateway

: 172.16.100.1

2.2.2 Hacking Tools


A hacking tool is a program designed to assist with hacking, or a piece of software
which can be used for hacking purposes. There are two types of hacking tools that we
are using which is Dos attack and Ip spoofing.

First is Dos attack, in computing, a denial-of-service (DoS) or distributed denial-ofservice (DDoS) attack is an attempt to make a machine or network resource
unavailable to its intended users.

Although the means to carry out, the motives for, and targets of a DoS attack vary, it
generally consists of efforts to temporarily or indefinitely interrupt or suspend
services of a host connected to the Internet.

As clarification, distributed denial-of-service attacks are sent by two or more


persons, or bots, and denial-of-service attacks are sent by one person or system. As of
2014, the frequency of recognized DDoS attacks had reached an average rate of 28
per hour.

Perpetrators of DoS attacks typically target sites or services hosted on high-profile


web servers such as banks, credit card payment gateways, and even root name
servers. Denial-of-service threats are also common in business and are sometimes
responsible for website attacks.

This technique has now seen extensive use in certain games, used by server owners,
or

disgruntled

competitors

on

games,

such

as

server

owners'

popular Minecraft servers. Increasingly, DoS attacks have also been used as a form
of resistance. Richard Stallman has stated that DoS is a form of 'Internet Street

Protests. The term is generally used relating to computer networks, but is not limited
to this field for example it is also used in reference to CPU resource management.
One common method of attack involves saturating the target machine with external
communications requests so much so that it cannot respond to legitimate traffic, or
responds slowly as to be rendered essentially unavailable. Such attacks usually lead
to a server overload. In general terms, DoS attacks are implemented by either forcing
the targeted computer to reset, or consuming its resources so that it can no longer
provide its intended service or obstructing the communication media between the
intended users and the victim so that they can no longer communicate adequately.

Denial of service attacks are considered violations of the Internet Architecture


Board's Internet proper use policy, and also violate the acceptable use policies of
virtually all Internet service providers. They also commonly constitute violations of
the laws of individual nations.

Slowloris attacks are popular Denial of Service (DoS) network attacks, likely named
because of its use of a large number of small ICMP packets.

The goal of this network attack is to create a crushing amount of traffic. This attack
strategy came about as a function of ICMP (Internet Control Message Protocol) and
the network broadcast address.

If an attacker has a large network segment that he is aware of, he can send a ping or
an ICMP Echo Request to that broadcast address. Each host on that network should
take that because the broadcast address was used, though the Echo Request is
actually destined for itself.

An Internet Control Message Protocol (ICMP) Slowloris attack is a brute-force


attack on the direct broadcast feature that is built in to the IP protocol.

For a second hacking tool which is ip spoofing. In computer networking, IP address


spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a
source IP address, with the purpose of concealing the identity of the sender or
impersonating another computing system.

The basic protocol for sending data over the Internet network and many other
computer networks is the Internet Protocol ("IP"). The header of each IP packet
contains, among other things, the numerical source and destination address of the
packet. The source address is normally the address that the packet was sent from. By
forging the header so it contains a different address, an attacker can make it appear
that the packet was sent by a different machine. The machine that receives spoofed
packets will send a response back to the forged source address, which means that this
technique is mainly used when the attacker does not care about the response or the
attacker has some way of guessing the response. In certain cases, it might be possible
for the attacker to see or redirect the response to his own machine. The most usual
case is when the attacker is spoofing an address on the same LAN or WAN.

IP spoofing is most frequently used in denial-of-service attacks. In such attacks, the


goal is to flood the victim with overwhelming amounts of traffic, and the attacker
does not care about receiving responses to the attack packets. Packets with spoofed
addresses are thus suitable for such attacks. They have additional advantages for this
purpose they are more difficult to filter since each spoofed packet appears to come
from a different address, and they hide the true source of the attack. Denial of service
attacks that use spoofing typically randomly choose addresses from the entire IP

address space, though more sophisticated spoofing mechanisms might avoid


unroutable addresses or unused portions of the IP address space. The proliferation of
large botnets makes spoofing less important in denial of service attacks, but attackers
typically have spoofing available as a tool, if they want to use it, so defences against
denial-of-service attacks that rely on the validity of the source IP address in attack
packets might have trouble with spoofed packets. Backscatter, a technique used to
observe denial-of-service attack activity in the Internet, relies on attackers' use of IP
spoofing for its effectiveness.
IP spoofing can also be a method of attack used by network intruders to defeat
network security measures, such as authentication based on IP addresses. This
method of attack on a remote system can be extremely difficult, as it involves
modifying thousands of packets at a time. This type of attack is most effective where
trust relationships exist between machines. For example, it is common on some
corporate networks to have internal systems trust each other, so that users can log in
without a username or password provided they are connecting from another machine
on the internal network (and so must already be logged in). By spoofing a connection
from a trusted machine, an attacker may be able to access the target machine without
an authentication.

2.2.3 Web Server


Computer system whose primary purpose is to the internet and to download stored
webpages and files on to the user (client) computers when accessed or requested. A
single web server may support multiple websites, or a single. The most common use
of web servers is to host websites, but there are other uses such as gaming, data
storage, running enterprise applications, handing email, FTP or other web uses.

1. XAMPP

2.2.3.1.1 XAMPP

XAMPP in Wikipedia is an open-source web server package that works on various


platforms. It is actually an acronym with X meaning cross platform, A for Apache
HTTP server, M for MySQL, P for PHP, and P for Perl. XAMPP was designed to
help webpage developers, programmers, and designers check and review their work
using their computers even without connection to the web or internet. So, basically
XAMPP may be used to stand as pages for the internet even without connection to it.
It can also be used to create and configure with databases written in MySQL.

2.2.3.1 How to setup XAMPP

To use XAMPP, only one zip, exe or tar file is needed. Users just need
to download this file and run the application. There is also not much configuration
and tinkering to be done in terms of settings and its components.

Figure 2.2.3.1.2 : Installer XAMPP


Next we will test if the server is running correctly by opening an internet browser
and typing http://localhost/xampp. If configured correctly, you will be presented with
a screen similar to that of the one in figure 2.2.3.1.3.

Figure 2.2.3.1.3 : Interface For XAMPP

The XAMPP package is also updated on a regular basis to synchronize with the
updates made on the different platforms involved in the package like Apache, PHP,
Perl, and MySQL. This means users on different operating systems can download
this server package free of charge. Not to mention that there is no configuration
necessary to setup the system. After downloading and extracting the free application,
users can immediately use XAMPP.

2. Joomla

Figure 2.2.3.2.1 : Joomla


Joomla in book is a basic website up and running on an XAMPP local host server.
Joomla also a free and open source content management system for publishing web
content. Joomla is designed to be easy to install and set up even if you're not an
advanced user. Many Web hosting services offer a single-click install, getting new
site up and running in just a few minutes.

2.2.3.2 How to setup Joomla

Step 1 : Getting XAMPP ready. The first thing you'll need to do is turn on the bits of
XAMPP that Joomla needs to run you shouldn't need to do anything other than
double click the icon on your desktop and click a couple of buttons the 'Start' buttons
next to Apache and MySql.

Figure 2.2.3.2.2 : Interface Control Panel XAMPP

Step 2 : Unzip Joomla to the XAMPP folder.Assuming you've


installed XAMPP to the 'root' of your C: drive (how the installer tries
to do it as default), you'll need to go to C:\xampp\htdocs\ and make
yourself a new folder

Figure 2.2.3.2.3 Unzip folder Joomla

Figure 2.2.3.2.4 : List folder in folder htdocs at Xampp

Step 3 : Starting the Joomla installation.


Open your favoured browser and type the following into the
address bar: http://localhost/*your-file-name*, changing the final
part to whatever you called your file in step 2 in our case it would
be http://localhost/kasspmj2014. All being well, you should have the
first step of the Joomla installation in front of you, like this:

Figure 2.2.3.2.5 : Joomla installation

Step 4: Setting up the database. Not as terrifying as it sounds,


there are just a couple of fields to fill in:
Username: Assuming you haven't been tinkering with XAMPP, this should be
'root' (without the quotation marks)
Database name: It's a good idea to make this the same as your installation
folder, just so that it's easier to identify if you have a few sites further down the
line.
Table prefix: Feel free to change this if required, but note that it must end in an
'underscore' and ideally be 3 or 4 characters long.

Figure 2.2.3.2.6 : Database configuration

Step 5: Final configuration. All being well, you should now see this
screen:

Figure 2.2.3.2.7 Final Configuration

3.

Nagios

Nagios in Wikipedia is an open source computer system monitoring, network


monitoring and infrastructure monitoring software application. Nagios offers
monitoring and alerting services for servers, switches, applications, and services. It
alerts the users when things go wrong and alerts them a second time when the
problem has been resolved.
Nagios is a powerful tool that provides you with instant awareness of your
organization's mission-critical IT infrastructure. Nagios allows you to detect and
repair problems and mitigate future issues before they affect end-users and
customers.

4. Wireshark
Wireshark is

a free

and

network troubleshooting,

open-source packet
analysis,

analyser.

software

It

is

used

for

and communications

protocol development, and education. Originally named Ethereal, in May 2006 the
project was renamed Wireshark due to trademark issues.

Wireshark is cross-platform, using the GTK+ widget toolkit in current releases,


and Qt in the development version, to implement its user interface, and using pcap to
capture packets; it runs on GNU/Linux,OS X, BSD, Solaris, some other Unixlike operating systems, andMicrosoft Windows. There is also a terminal-based (nonGUI) version called TShark. Wireshark, and the other programs distributed with it
such as TShark, are free software, released under the terms of theGNU General
Public License.

Wireshark is very similar to tcpdump, but has a graphical front-end, plus some
integrated sorting and filtering options. Wireshark allows the user to put network
interface controllers that support promiscuous mode into that mode, in order to see
all traffic visible on that interface, not just traffic addressed to one of the interface's
configured addresses and broadcast/multicast traffic. However, when capturing with
a packet analyser in promiscuous mode on a port on a network switch, not all of the
traffic travelling through the switch will necessarily be sent to the port on which the
capture is being done, so capturing in promiscuous mode will not necessarily be
sufficient to see all traffic on the network. Port mirroring or various network
taps extend capture to any point on the network. Simple passive taps are extremely
resistant to tampering.

On Linux, BSD, and OS X, with libpcap 1.0.0 or later, Wireshark 1.4 and later can
also put wireless network interface controllers into monitor mode.

Wireshark is software that "understands" the structure (encapsulation) of different


networking protocols. It can parse and display the fields, along with their meanings
as specified by different networking protocols. Wireshark uses pcap to capture
packets, so it can only capture packets on the types of networks that pcap supports.
a)

Data can be captured "from the wire" from a live network connection or read
from a file of already-captured packets.

b)

Live data can be read from a number of types

of network,

including Ethernet, IEEE 802.11, PPP, and loopback.


c)

Captured network data can be browsed via a GUI, or via the terminal
(command line) version of the utility, TShark.

d)

Captured files can be programmatically edited or converted via commandline switches to the "editcap" program.

e)

Data display can be refined using a display filter.

f)

Plug-ins can be created for dissecting new protocols.

g)

VoIP calls in the captured traffic can be detected. If encoded in a compatible


encoding, the media flow can even be played.

h)

Raw USB traffic can be captured.

Wireshark's native network trace file format is the libpcap format supported
by libpcap and WinPcap, so it can exchange captured network traces with other
applications that use the same format, including tcpdump and CA NetMaster. It can
also read captures from other network analysers, such as snoop, Network General's
Sniffer, and Microsoft Network Monitor.

2.2.3.4 How to capture packet.


Step 1: After downloading and installing Wireshark, launch it and click the name of
an interface under Interface List to start capturing packets on that interface

Figure 2.2.3.4.1: Installer Wireshark

Step 2: Click the interfaces name, the packets start to appear in real time. Wireshark
captures each packet sent to or from network

Figure 2.2.3.4.2 Interface Wireshark


Step 3: Click the stop capture button near the top left corner of the window if want to
stop capturing traffic.

Figure 2.2.3.4.3 Stop capturing traffic

2.2.3.5 How to filtering packet


Step 1: Typing it into the filter box at the top of the window and clicking Apply (or
pressing Enter).

Figure 2.2.3.5.1 : Filter box


Step 2: Click the analyse menu and select Display Filters to create a new filter

Figure 2.2.3.5.2 : Profile default

2.2.3.6 How to inspect packet


Step 1: Click a packet to select it and dig down to view its details.

Figure 2.2.3.6.1 View its details


Step 2: Create filters from here just right-click one of the details and use the
Apply as Filter submenu to create a filter based on it.

Figure 2.2.3.6.2 : Apply as Filter submen

2.3 Explanation of equipment


Table 2.3 Hardware Requirement

ITEM (Hardware)

DESCRIPTION

Cisco Catalyst 2950 Switch Enabling service breadth, availability,


Series

COST

RM999.00

security, and manageability.


Featuring advanced rate
limiting, voice virtual LAN (VLAN)
support, and multicast management,
these switches enable a variety of
residential metro services such as
Internet access, voice over IP (VoIP),
and broadcast video.

Cisco 1941 Integrated Series

All-in-One device that combines the

Router

functions of a high speed ADSL


modem, a 4-Port 10/100Mbps NAT
router and a wireless access point. It is
designed to provide end-users with a
one-stop solution to acquiring and
sharing high-speed Internet access
over a wired/wireless network. It
brings with it much higher speed than
dial-up connections. Complying with
the IEEE 802.11n standard, users will
get up to 15X the speed and 5X the
range of conventional 11g products.

RM 4827.29

Broadband

-For internet option, we use a

RM100.00

broadband.

Asus Powerlogic Azzura

Built-in 450 watts standard

rated power
20 + 4 pins, 2 x SATA cables

built-in
Side panel with air duct built-

in
High Quality 0.6 mm SGCC

steel
1 x 90 mm front fan built-in
4 x 5.25" + 1 x 3.5" drive bay
Screwless H.D.D bay
1 year I-to-I exchange for

power supply
Blue color power LED
1 x 90 mm rear fan built-in

2000

4 x USB port, audio in/out


port

RM 1300

HP COMPAQ 4000 PRO

One RS-232 compatible port

SMALL FORM FACTOR

standard second port available

BUSINESS PC

optionally
One port available as an option
Color coded support for

RM 1400

keyboard (purple) and mouse

(green)
VGA and
integrated

dual

provide

independent

monitor support
RJ-45 port accesses
integrated

DVI-D

Intel

the

network

interface controller
(2) PCI
PCIe x1; 10 W max power
PCIe x16; 25 W max power

Card Reader

5.25-inch external
1 bay 8.19-inch depth for
optional optical disc drive

Internal HDD Bay

1 bay for 3.5-inch hard disk


drive

Controller

Hard Drive Controller


Serial ATA (SATA) 2.0
Supports up to 3.0 GB/s

SATA Interfaces

Host SATA Controller


Advanced Host Controller
Interface (AHCI) Revision 1.2.

SONY VAIO PRO

Platform

Intel Core(tm) Duo Processor


T2400 (1.83GHz) *1

RM1400

Processor System Bus

1.8 MHz

Memory Bus

533MHz

Main Memory

512MB

DDR2

SDRAM*2

(upgradeable up to 2GB)
Hard Disk

80GB

Video Memory

256MB

Display

15.4" Wide (WXGA: 1280 x


800) TFT colour display (Clear
Bright High Colour LCD: Dual
Lamp, Wide View)

Camera

310,000 pixels effective


Image Device: 1/5", VGA
CMOS

Table 2.3.1 System Requirement

ITEM (Software)

DESCRIPTION

COST

Backtrack R5
Backtrack

is

Ubuntu

based

Open

operating system. Backtrack is the

source

best operating system for the


security professionals and hackers.
There are lots of inbuilt tools in the
backtrack 5 like sqlmap , metasploit
,

Information

gathering,

maintaining access ,backdooring


etc.

Wireshark

Wireshark is the network protocol Open


analyzer which can also be called as source
packet sniffer.

Open
Nagios

An open source computer system


monitoring,
and

network

infrastructure

software

application.

monitoring
monitoring
It

have

monitoring and alerting services for


servers, switches, applications, and
services.

Source

CentOS

The CentOS Linux distribution is a

Open

stable, predictable, manageable and

Source

reproduceable

platform

derived

from the sources of Red Hat


Enterprise Linux (RHEL). We are
now looking to expand on that by
creating the resources needed by
other communities to come together
and be able to build on the CentOS
Linux platform. And today we start
the process by delivering a clear
governance

model,

increased

transparency and access. In the


coming weeks we aim to publish
our own roadmap that includes
variants of the core CentOS Linux.
Windows 7

Open

1 gigahertz (GHz) or faster


32-bit

(x86)

or 64-bit

(x64) processor

1 gigabyte (GB) RAM (32bit) or 2 GB RAM (64-bit)

16 GB available hard disk


space (32-bit) or 20 GB (64bit)

DirectX 9 graphics device


with WDDM 1.0 or higher
drive

source

2.4 Previous Project


2.4.1 Andy Cronin Ethical Hacking Honors Project
Drive-by Healing - The Idea of Hack for Easier Update
Updates for a computer can be vital. They are made to makes things better, more
secure and more reliable. They take time but without those computers would be slow,
crash more often than not and probably be riddled with viruses.
His idea is to make these updates painless. To do this he try to use hacking
techniques, the naughty hacking techniques that send and spread viruses or damage
computers, but instead of loading these techniques with viruses his load these
techniques with updates and anti-virus tools and safe secure that will hopefully heal
computers of their ailments.
The technique is known as a Drive-by Download attack, which involves users
browsing normally but then getting hit by a website that instead of sending them
useful content sends them a virus. The user doesnt know, the virus is well hidden
and the Drive-by Download happens without even a pop-up or any kind of
notification.
He wants the updates to happen in a similar way, that dont bother the user and hide
away and do what they need to, to make sure the computer is up to date and clean.
He creates a Wi-Fi Hotspot that has this technique built-in. The Wi-Fi Hotspot will:

Wait for a new user

Give the user a hotspot log-in page(but instead of asking for a password, ask
the users a simple question)

Ask the users if they want to update their computer and if they agree.

Then the hotspot page could run the Drive-by technique and start healing the
computer.

The system could then let the user to browse freely while their computer was updated
and they could walk away at the end of their session with a much healthier computer.

Comparison
The main reason of our project is to test our network vulnerabilities with some
hacking techniques that we use. Compare to his, he use his hacking technique not for
testing but for a much easier updates. We use DOS attack and IP Spoofing for our
hacking techniques. In Andy project, the technique is known as a Drive-by
Download attack. The attack explain about when users browsing normally but then
getting virus which is the updates and anti-virus tools by a website instead of sending
them other content. The updates are well hidden and the Drive-by Download happens
without even a pop-up or any kind of notification. With this, it could let the user to
browse freely while their computer was updated.
Also, he doesnt involve much hardware for his project. Instead, he uses a
programming language and other software for him to create his own attack. We use a
lot hardware to develop our own project because its involve us to create our own
network. However, when it comes to hacking, we only use the hacking technique that
usually use in most situation. In the other project, he uses the Drive-by Download
attack, a technique that not most ethical hacker uses. His project also dont use local
network to apply his hacking technique. He needs an internet which is a Wi-Fi Hot
Spot to apply his updates that was made for the users. For our network, we use local
network and then apply our hacking to it.

2.4.2 Project hosted by SourceForge


Costas Kotsokalis
Panoptis: A project to detect and block DoS/DDoS attacks

Panoptis is a project created by Costas Kotsokalis started some time ago, with the
aim to stop the Denial of Service and Distributed Denial of Service attacks that have
been torturing the Internet. It is based on real-time processing of Cisco (R) NetFlow
(TM) data, since this seems to be the most efficient approach as it is router-centric,
allowing for automated central response without intervention from the affected
organizations' network administrators.
Panoptis is now in a beta stage, and released under the GNU Public License. At the
moment, Panoptis detects the attacks and uses the mail.py script to notify the
administrators through email that an attack has started (or ended). It also connects to
potential peers to notify them. Users can download the source code (0.1.4 release)
and compile/run it.
Comparison
The project given above is more on creating security software to prevent DOS or
DDOS Attack. In our project, we use ACL and Snort for detection and prevention of
DOS Attack. Also, our project does not just involve in securing the network, but also
creating the hacking process. The Panoptis project focusing on making a security tool
for users out there to defend their network from DOS attack. Panoptis detects the
attacks and uses the mail.py script to notify the administrators through email that an
attack has started (or ended). Just like the other previous project, Costas project does
not use much hardware for his project. He uses a programming language to create the
Panoptis.

2.4.3 OWASP Zed Attack Proxy Project - A Penetration Testing Tool


This project, OWASP Zed Attack Proxy Project (ZAP), provides an easy to use
integrated penetration testing tool for testing web applications. It is designed to be
used by people with a wide range of security experience and as such is ideal for
developers and functional testers who a new to penetration testing. ZAP provides
automated scanners as well as a set of tools that allow you to find security
vulnerabilities manually. Its functionality includes intercepting Proxy, automated

scanner and passive scanner and forced browsing. It has dynamic SSL certificates,
Smartcard and Client Digital Certificates support, web sockets support, support for a
wide range of scripting languages, Plug-n-Hack support and many more.
ZAP is developed by a worldwide team of volunteers but also been helped by many
organizations, either financially or by encouraging their employees to work on ZAP
such as OWASP, Mozilla, Google, Microsoft and Hacktics, Ernst & Young. The
project was license by Apache 2.0. They use operating systems such as Linux, Java
Runtime Environment 6, Windows and Mac OS and implement it by

Java 1.6+.

The ZAP project also has translated into many languages. The project is available for
download for users out there to use.
Comparison
The ZAP project focusing on creating software that test what kind of vulnerabilities
of the web applications happen to have while in our project, we have to figured out
the vulnerabilities ourselves in the network we created. With DOS Attack and IP
Spoofing, we must develop our security strategy to overcome those hacking
techniques and our vulnerabilities in the network. The Zap Project also has been
developed by many professional programmers for them to create it using Java. Our
project doesnt involve coding in it, instead we just use the penetration tools given in
Backtrack operating system to test the system vulnerabilities.

Conclusion

We have discussed all the important components in our literature review and first are
about the definition of term where we explain the term for ethical hacking in details.
Then, we explain about all the main component of our project such as the network,
monitoring using nagios, the hacking tools, the web server, the security and the

configuration. We must elaborate all of it so we could get the guide on what kind of
project that we done. Next, we explain about the equipment that we use in our
project. We listed all the details about the software and hardware to get a better
explanation in our equipment. Lastly, we describe about the compare and contrast of
our project to other kind of project that almost similar to us. We have three projects
that are almost related to our project and make some comparison to it. The first is
about hacking for updating, the second is about software for detecting DOS/DDOS
Attack and the third one is focusing on making a penetration testing tool. With
making a comparison to other project, we can find the significant and vulnerabilities
of our project and inspires us to develop our project into much better.

CHAPTER 4

ANALYSIS AND DESIGN

Analysis and design deal with planning the development of information systems
through understanding and specifying in detail what a system should do and how the
components of the system should be implemented and work together. System
analysts solve business problems through analysing the requirements of information
systems and designing such systems by applying analysis and design techniques.

We will explain many details about the hacking weve done in this chapter and the
hacking is about DOS attack and IP Spoofing. Then, we will explain about the
prevention of those hacking. The flowchart given in this chapter will give a much
bigger view on how our project really works. We also explain more details on the
topology that we created.

4.1 Users
Based on the project, there are three types of users which are ethical hacker, network
administrator and network security engineer. All of them can implement the common
hacking technique to test to their own network for better future security.

4.2

Network

Setting up about two network where hacking process happening at network B while
the main web server placed in the network B. In the network A we have configure
static ip address while in the network B as DHCP.

4.3

Dos Attack

Using any Backtrack Version for doing DOS attack like Backtrack 5 can easily do
DDOS with a perl script. This script make this attack every easy and userfriendly.
You can easily use this script and its 100% work on Backtrack R1 R2 R3. Script
name is slowloris.pl. .pl extension is perl extension. Perl is a scripting language

It is denial of service attack against particular services, rather than flooding


networks, a concept emerged that would allow a single machine to take down another
machine's web server with minimal bandwidth and side effects on unrelated services
and ports. The ideal situation for many denials of service attacks is where all other
services remain intact but the webserver itself is completely inaccessible. Slowloris
was born from this concept, and is therefore relatively very stealthy compared to
most flooding tools.

On the project that we do, we would dos attacking on the website we created and see
how the flow of the attack works.

4.4

Ip Spoofing

Every IP datagram sent in the Internet contains a source and destination IP address in
its header. The source is the original sender of the datagram and the destination is the
intended recipient. Setting the IP source address of datagrams to be a fake address is
called address spoofing. In Linux it is very easy to do using sytem that is built in the
backtrack os. One of it is iptables. Address spoofing can be performed with a single
command using iptables. We also use scapy to develop the ip spoofing. Scapy is a
Python interpreter that enables you to create, forge, or decode packets on the
network, to capture packets and analyse them, to dissect the packets. It also allows
you to inject packets into the network. It supports a wide number of network
protocols and it can handle and manipulate wireless communication packets. Scapy
can be used to perform the jobs done by many network tools, such as nmap, hping,
arpscan, and tshark (the command line of wireshark).

4.5

Prevention of the Attack

After the attacking, we would show some prevention that can defend that kind of
attack. We can block the attack with packet filters on the router which is ACL. This is
by far the best method, and if you can do this, you are pretty much done, except that
its still a good idea to contact the other ISPs who are victims of this attack. Most
ISPs have a bunch of routers.

We also block the attack by configuring Windows Firewall. Instead of configure


firewall using normal setup; we will setup Windows Firewall with Advanced
Security using a graphical interface. This prevention will help people out there that
try to securely protect their network and system.

4.6

Dos Attack Flowchart

START

Target the website


to attack
(kasspmj2014.com)

copy the url of


the website

open terminal in
the backtrack os

Using
slowloris, do
the dos
attacking

Is the attack working?

NO
YES

END

4.7

Ip Spoofing Flowchart

START

Open browser
and go to
kasspmj2014.co
m
Is your ip being denied?

NO

YES
Open terminal in
backtrack os

Use nmap to search


for available ip and
copy that ip

Use iptables,
scapy and others
tools to do IP
Spoofing
Is the ip spoofing working

NO
YES

END

Block that ip
using ACL and
Firewall

4.8

Prevention Flowchart

START

open browser and go


to your website

Is your website downed

go to wireshark

Detect ip that do the


attacking

Block it by using
packet filtering ACL
and Firewall with
Advanced Security

See the result of secure


network

END
Conclusion

As a conclusion, the project shown through the flowcharts given is an effective way
for really understanding the flow of the project. An important benefit of flowcharts is
that they provide documentation of a process. This is useful when problems arise
because flow charts let you trace the process from one step to the next. This lets you
easily identify when the problem took place. The flowchart also provides guidance
for network administrator overseeing operations and helps ensure compliance with
policy and regulations. For example, network administrator can reference a flowchart
of procedures to verify that the activities are being conducted according to generally
accepted accounting principles.

Chapter 6

Introduction

This chapter concludes the summary of the research is presented and findings of the
study are discussed and interpreted of the significance for this research in the
immediate context for ethical hacking. At this point of view, we summarize and
conclude all information related to the system which is done from the start to the end
of module. This chapter will give some suggestion as appropriate and will conclude
or summarize the whole of this report. First, it will list several suggestions that can
be applied for improvement in the future. Second, this chapter will give a general
conclusion about the results of the project that have been carried out. Conclusion
made by evaluating from the several aspects of the results collected from the project
of Wi-Fi Hotspot Bridge from the beginning until the end.

6.1 Suggestion
There some suggestions which can be consider furthering improving the network
development of Ethical hacking. One of the suggestions is to make the network
become more secure by using open security in order to prevent the network or the
entire network. Other than that, the technique that used is not a professional ways to
prove the attacks performed. There is a lot of ways in order to develop the best
attacking in the ways to hacked the website or network. As we know there a lots of
attacking occur with different types of ways today. Next, the device that be used
should be upgrade such as personal computer used should have wireless adapter in
order to facilitate installation of software. This project needs to be improved in the
ways of proper wiring closet. This is because it can easily manage the cable and also
the power supply.

6.2 Conclusion

As a conclusion, there are several different ways to define hacking, but the best and
most used definition describes hacking as a computer system being entered through
unauthorized access. Ethical hackers are network and computer experts who attack a
security system to help the computer system's owners. They do this to look for any
vulnerability that could be exploited by a malicious hacker. They will use the same
methods as a malicious hacker to test a security system, but instead of taking
advantage of these vulnerabilities, they will report them.
In order to develop this project, we are exposed to the situation where we can
implement all the knowledge that we gain in our studies. We also learn new
knowledge so that we can become more practises in the future.

Potrebbero piacerti anche