Info Security Threats and Vulnerabilities Labs
Info Security Threats and Vulnerabilities Labs
Info Security Threats and Vulnerabilities Labs
INFORMATION SECURITY
THREATS AND VULNERABILITIES
05
Exercise 1:
Create a Trojan to Gain Access to the Target System
22
Exercise 2:
Create a Virus to Infect the Target System
39
Exercise 3:
Create a Worm using the Internet Worm Maker Thing
48
Exercise 4:
User System Monitoring and Surveillance using Spytech SpyAgent
80
Exercise 5:
Find Vulnerabilities on Exploit Sites
OBJECTIVE
The objective of this lab is to provide expert knowledge about the information security threats and vulnerabilities. This includes knowledge of
the following tasks:
• Creating a trojan, virus, and worm to gain access to the target machine
Note: Turn on PfSense Firewall virtual machine and keep it running throughout the lab exercises.
LAB SCENARIO
A Trojan is wrapped within or attached to a legitimate program, implying that the program may have functionality that is not apparent to
the user. Furthermore, attackers use victims as unwitting intermediaries to attack others. They can use a victim’s computer to commit illegal
Denial-of-service (DoS) attacks.
A compromised system can affect other systems on the network. Systems that transmit authentication credentials such as passwords over
shared networks in clear text or a trivially encrypted form are particularly vulnerable. If an intruder compromises a system on such a network,
they may be able to record usernames and passwords or other sensitive information. Additionally, a Trojan, depending on the actions it performs,
may falsely implicate a remote system as the source of an attack by spoofing, causing a liability to the remote system. Trojans enter a system
by means such as email attachments, downloads, and instant messages.
The lab tasks in this exercise demonstrate how easily hackers can gain access to the target systems in an organization and create a covert
communication channel for transferring sensitive data between the victim computer and the attacker.
OBJECTIVE
This lab demonstrates how to do create a Trojan Server using Theef RAT Trojan.
OVERVIEW OF TROJAN
Attackers use Remote Access Trojans (RATs) to infect the target machine to gain administrative access. RATs help an attacker remotely access
the complete Graphical User Interface (GUI) of the victim’s computer and control without his/her awareness. They can perform screening and
camera capture, code execution, keylogging, file access, password sniffing, registry management, and other tasks. The Trojan infects victims
via phishing attacks and drive-by downloads and propagates through infected USB keys or networked drives. It can download and execute
additional malware, execute shell commands, read and write registry keys, capture screenshots, log keystrokes, and spy on webcams.
Theef is a RAT written in Delphi. It allows remote attackers access to the system via port 9871. Theef is a Windows-based application for both
client and server. The Theef server is a Trojan that can be installed on a target computer, and the Theef client is then used to control the Trojan.
Security professional can use the Theef Tool as a proof of concept to audit perimeter security controls in an organization.
TO THE TARGET
TO GAIN ACCESS
SYSTEM
TO THE TARGET
TO GAIN ACCESS
SYSTEM
TO THE TARGET
TO GAIN ACCESS
SYSTEM
TO THE TARGET
TO GAIN ACCESS
SYSTEM
TO THE TARGET
TO GAIN ACCESS
SYSTEM
TO THE TARGET
TO GAIN ACCESS
SYSTEM
TO THE TARGET
TO GAIN ACCESS
SYSTEM
Note: The Computer Information might differ when you perform the lab.
EXERCISE 1:
CREATE A TROAJ N
TO THE TARGET
TO GAIN ACCESS
SYSTEM
TO THE TARGET
TO GAIN ACCESS
SYSTEM
TO THE TARGET
TO GAIN ACCESS
SYSTEM
TO THE TARGET
TO GAIN ACCESS
SYSTEM
TO THE TARGET
TO GAIN ACCESS
SYSTEM
TO THE TARGET
TO GAIN ACCESS
SYSTEM
TO THE TARGET
TO GAIN ACCESS
SYSTEM
TO THE TARGET
TO GAIN ACCESS
SYSTEM
TO THE TARGET
TO GAIN ACCESS
SYSTEM
LAB SCENARIO
Viruses are the scourge of modern computing. Computer viruses have the potential to wreak havoc on both businesses and personal computers.
The lifetime of a virus depends on its ability to reproduce. Therefore, attackers design virus code in such a manner that the virus replicates itself
n times, where n is a number specified by the attacker.
A security professional must have the required knowledge to create a virus and infect a machine in the local network to test the security
infrastructure.
OBJECTIVE
This lab demonstrates how to create a virus using the JPS Virus Maker Tool and Infect the Target System.
OVERVIEW OF TROJAN
Virus reproduces its own code while enclosing other executables, and spreads throughout the computer. Viruses can spread the infection by
damaging files in a file system. Some viruses reside in the memory and may infect programs through the boot sector. A virus can also be in an
encrypted form.
The JPS Virus Maker tool is used to create its own customized virus. This tool has many options for building that can be used to create a virus.
Some of the tool’s features are auto-start, shutdown, disable security centre, lock mouse and keyboard, destroy protected storage, and terminate
windows. Security professional can use the JPS Virus Maker Tool as a proof of concept to audit perimeter security controls in an organization.
SYSTEM
SYSTEM
SYSTEM
SYSTEM
SYSTEM
SYSTEM
SYSTEM
SYSTEM
SYSTEM
SYSTEM
SYSTEM
SYSTEM
SYSTEM
SYSTEM
SYSTEM
SYSTEM
LAB SCENARIO
Worms are a subtype of viruses. A worm does not require a host to replicate; however, in some cases, the worm’s host machine is also infected.
Initially, black hat professionals treated worms as a mainframe problem. Later, with the introduction of the Internet, they mainly focused on and
targeted Windows OS using the same worms by sharing them in via e-mail, IRC, and other network functions. Attackers use worm payloads to
install backdoors on infected computers, which turns them into zombies and creates a botnet.
This lab demonstrates how easily an attacker can create a worm. A security professional can use Internet Worm Maker Thing as a proof of
concept to audit perimeter security controls in the organization.
OBJECTIVE
This lab demonstrates how to create a worm using Internet Worm Maker Thing.
Internet Worm Maker Thing is an open-source tool used to create worms that can infect a victim’s drives and files, show messages, disable
antivirus software, etc. This tool comes with a compiler that can easily convert your batch virus into an executable to evade antivirus software
or for any other purpose.
INTERNET WORM
MAKER THING
USING THE
INTERNET WORM
MAKER THING
USING THE
INTERNET WORM
MAKER THING
USING THE
INTERNET WORM
MAKER THING
USING THE
INTERNET WORM
MAKER THING
USING THE
INTERNET WORM
MAKER THING
USING THE
INTERNET WORM
MAKER THING
USING THE
INTERNET WORM
MAKER THING
USING THE
INTERNET WORM
MAKER THING
USING THE
LAB SCENARIO
Spyware is stealthy computer monitoring software that allows you to secretly record all the user activities on a target computer. It automatically
delivers logs to the remote attacker using the Internet (via email, FTP, command and control through encrypted traffic, HTTP, DNS, etc.). The
delivery logs include information about all areas of the system, such as emails sent, websites visited, every keystroke (including logins/passwords
for Gmail, Facebook, Twitter, LinkedIn, etc.), file operations, and online chat conversations. It also takes screenshots at set intervals, just like a
surveillance camera aimed at the computer monitor.
OBJECTIVE
This lab demonstrates how to perform user system monitoring and surveillance using Spytech SpyAgent.
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
SURVEILLANCE
USING SPYTECH
USER SYSTEM
MONITORING AND
SPYAGENT
LAB SCENARIO
Vulnerability research is the process of analyzing protocols, services, and configurations to discover the vulnerabilities and design flaws that will
expose an operating system and its applications to exploit, attack, or misuse.
A security professional must have the required knowledge to find vulnerabilities on exploit sites and further mitigate them to enhance the
organization’s security infrastructure.
OBJECTIVE
This lab demonstrates how to find the vulnerabilities of the target system using various exploit sites such as Exploit DB.