Network and Security Lab Report: Lab 4.1: Installing Certificate Services
Network and Security Lab Report: Lab 4.1: Installing Certificate Services
Network and Security Lab Report: Lab 4.1: Installing Certificate Services
- Then select Language and click Download to save the ISO to hard drive.
- Launch VirtualBox and create a new VM with Window Server 2016 ISO.
- Set up password as Pa$$word and click Finish.
- Open Server Manager, click Add Roles and Features, then click Next until
see the Server Roles window.
- Open Server Manager, click Manage, and then click Add Roles and
Features.
- Click Next until you reach the Server Roles window.
- Select the Active Directory Certificates Services check box.
- Read the AD CS page.
- In the Role Services window, select Certification Authority and
Certification Authority Web Enrollment check box, then click Next.
- Click Install, then click Close (after the installation has completed).
- Click the notifications flag, the click Configure Active Directory Certificate
Services on the destination server.
- Click Start, then click Windows Administrative Tools and double-click the
Internet Information Services (IIS) Manager.
- In the Connections pane, expand NameServer, then expand the Sites folder
and then the Default Web Site.
- Click Default Web Site (in the left pane). In Actions section of the right
pane click Bindings.
- Click Add, set Type to https, and in the SSL certificate box, select the
certificate that is named with the fully qualified domain name of
NameServer.
- Click OK, then click Close.
- Select Default Web Site (in the left pane) and double-click SSL settings (in
the middle pane).
- Select the Require SSL checkbox, then click Apply in the Actions pane.
- Click Start, then click Windows Administrative Tools and double-click the
Active Directory Users and Computers.
- Expand VinhNguyen.local, click User and then Create a new user in the
current container.
- Create a domain user account for Anthony Newman, with the username
anewman and the password Pa$$word.
Review Question
1. D
2. B
3. D
4. C
5. True
- Click the General tab, then in Template display box, type “VinhNguyen”.
- In the Validity period number box, change 1 to 2 years.
- In the Renewal period number box, change 6 to 12 weeks.
- In the Request Handling tab, select Prompt the user during enrollment.
- On the Security tab, click Add button, in the Enter the object names to
select box, type ”Anthony Newman” and click OK.
- In the Group or user names box, select Anthony Newman, and in the
Permissions for Anthony Newman box, place check marks in the Allow
column for Enroll and Autoenroll, then click OK.
Review Questions
1. A
2. ii. and B
3. B
4. True
5. B
- In Select start-up disk window, select the Kali Linux 2021.4 ISO file.
- In the Configure the network window, enter Vinhnguyen.com in the
Domain name box.
- In the Set up users and passwords window, enter vinh for username and
admin for administrator password.
- In the Partition Disk window, select Yes.
Review Question
1. B
2. True
3. D
4. C
5. D
- On the Kali Linux VM’s terminal, type wireshark and press Enter.
- Open the terminal window, type sudo hping3 -S 192.168.0.1 and press
Enter.
Review Question
1. Because it is absent from back table.
2. UDP
3. A
4. A
5. C
- Click the Applications button, click Sniffing and Spoofing, then click
ettercap-graphical. From Sniff menu, click Unified sniffing and then click
OK.
- From the Hosts menu, click scan for hosts. From the Hosts menu, click
Hosts list.
- Repeat the ping, but this time, capture the result with Wireshark on Kali
Linux.
- Close the Ettercap program. Type arp -d* and press Enter on both
Windows Server and Windows 10 VM.
- Close all windows and log off.
Review Question
1. A, B, C, D
2. By altering the MAC addresses to those Kali Linux, the session was
hijacked, and the pings were intercepted.
3.
4. False
5. A
- Log on to Windows Server, open your web browser, access any website to
verify that you have Internet connectivity.
- Launch the Kali Linux VM, open a terminal window and ping Window
Server to verify connectivity.
- Open ettercap-graphical. From the Host menu, click Scan for hosts.
- Select the Hosts list entry that represent the router and click Add to Target
1. Select the entry that represents Windows Server and click Add to Target
2.
- Click Start sniffing.
- From the MITM menu, click Arp poisoning. In the MITM Attack: ARP
Poisoning window, select the Sniff remote connections checkbox and click
OK.
- From the Plugins menu, click Manage the plugins. Scroll down and double-
click the plugin named remote_browser.
- On Windows Server, open web browser. In the address window, type
www.google.com and press Enter.
- Close Ettercap.
- Open a command prompt, type arp -d* and then press Enter.
- On Windows Server, enter www.yahoo.com in browser’s address window
and then press Enter.
Review Question
1.
2. Default settings get restored.
3. A, C
4. B
5. B
Review Questions
1. C
2. D
3. C
4. C
5. C
- In the search box, type wf.msc to open Window Firewall. Turn off the
firewall for Domain, Private and Public. Click Apply and then OK.
- Setup Wireshark on Windows 10 VM.
- Close all windows and log off.
Review Questions
1. B
2. A, D
3. B
4. True
5. C
Review Question
1. A
2. A
3. C
4. D
5. D