Ethical Hacking Lab Manual
ISBN 9788119221523

Highlights

Notes

  

Chapter 3: Use software tools/ commands to perform malware attacks and other cyber-attacks and generate analysis report

Aim: Malware Threats: Worms, Viruses, Trojans

    A) Password Cracking

    B) Dictionary Attack

    C) Encrypt and Decrypt Passwords

    D) Ifconfig, ping, netstat, traceroute

    E) Steganography tools

A) Password Cracking

    a) Use MD5 to generate to find out the md5 hash for some words:

      i) Admin

      ii) Admin123

      iii) admin@123

Output MD5 hash for:

Admin: e3afed0047b08059d0fada10f400c1e5 Admin123: e64b78fc3bc91bcbc7dc232ba8ec59e0 admin@123: e6e061838856bf47e1de730719fb2609

Admin@974$unil#: 4c644c8c48fe084e58c50419c94c867c

    b) Use CrackStation.net to feed the above MD5 hashed and find out the

B) Dictionary attack using python

Step 1: Create Passwordlist.txt file

Step 2: Create MD5 hash of the words in passlist.txt

Step 3: Write the python code for dictionary attack

Code: import hashlib

flag=0

p_hash=input(“Enter MD5 hash: “)

dictionary = input(“Enter dictionary Filename:”)

try: password_file=open(dictionary,“r”) except:

print(“No file found”) quit()

for word in password_file: enc_word=word.encode(‘utf-8’)

digest =hashlib.md5(enc_word.strip()).hexdigest() if(digest==p_hash):

print(“password has been found”) print(“password is:” +word) flag=1

break

if(flag==0):

print(“No password found”)

Output: on Cmd

C) Encrypts and Decrypt Password

Go to http://secretmessages.online/Home/Software and download SecretMessagerPro_2.0.0. Encrypt and decrypt text and password using the secretmessagerpro software.

D) Ipconfig, ping, netstat, traceroute

ipconfig:

The “ipconfig” displays the current information about your network such as your IP and MAC address, and the IP address of your router. It can also display information about your DHCP and DNSservers.

ipconfig

ipconfig/all

ping:

Allows you to send a signal to another device, and if that device is active, it will send a response back to the sender. The “ping” commandis a subset of the ICMP (Internet Control Message Protocol), and it uses what is called an “echo request”. So, when you ping a device you send out an echo request, and if the device you pinged is active or online, you get an echo response.

ping www.google.com

tracert:

This command lets you see all steps a packet takes to the destination. For example, if we send a packet to www.google.com, it actually goes through a couple of routers to reach the destination. The packet will first go to your router, and then it will go to all kinds of different routers before it reaches Google servers. We can also use the term “hops” instead of routers. Let’s run the command and see what kind of results we get.

tracert www.google.com

netstat

Displays all sorts of network statistics when used with its variousoptions. One of the most interesting variants of netstat is netstat -an, which will display a list of all open network connections on theircomputer, along with the port they’re using and the foreign IP address they’re connected to.

netstat -an

E) Steganography tools

Step 1: Prepare the secret file that you want to hide (e.g., Steganography_eg.txt)

Step 2: Launch the S-Tools

Step 3: Drag and drop the host file inside which you want to hide secret file (light.bmp)

Step 4: Now drag and drop the secret file on image file and alert by stool to enter passwordand choose encryption algorithm will come.

Step 5: After entering password and algo, click ok. Tool will create identical copy hiddendata.bmp.

Step 6: Right click and save it.

Step 7: To reveal the hidden data open the file in S-Tool. Right click select reveal and putpassword and select algorithm.