This shows you the differences between two versions of the page.
cdci:labs:9 [2020/03/15 19:16] mihai.chiroiu |
cdci:labs:9 [2025/01/21 19:26] (current) mihai.chiroiu |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Lab09. TBA ====== | + | ====== Lab09. Introduction to IDS ====== |
===== Objectives ===== | ===== Objectives ===== | ||
- | * Using openssl to encrypt/decrypt | + | * Introduction to snort |
- | * Create a local PKI | + | |
- | * Providing integrity through hashing | + | |
===== Topology ===== | ===== Topology ===== | ||
- | {{ :cdci:labs:cdci_lab04-mitm-topology.png?direct&600 |}} | ||
===== Tasks ===== | ===== Tasks ===== | ||
- | ==== 01. [5p] Virtual machine setup ==== | + | Please solve Lab "26.1.7 Lab - Snort and Firewall Rules" from the Netacad platform. |
- | + | ||
- | First, make sure that your virtual machine is updated (run the provided update.sh script, or create one). | + | |
- | <code> | + | |
- | root@cdci:/# cat update.sh | + | |
- | #!/bin/bash | + | |
- | # (c) Mihai Chiroiu - CDCI | + | |
- | + | ||
- | git clone -b labs --single-branch https://github.com/mihai-chiroiu/cdci.git | + | |
- | git config user.email "student@upb.ro" | + | |
- | </code> | + | |
- | + | ||
- | Next, in one terminal start the provided Mininet topology. | + | |
- | <code> | + | |
- | root@cdci:/# cd cdci/lab05 | + | |
- | root@cdci:/# /usr/bin/python3 topology.py | + | |
- | </code> | + | |
- | + | ||
- | If there are any problems with starting the topology (if all is good you should see the Mininet prompt ">") use the given cleanup script and try to restart the topology. | + | |
- | + | ||
- | ==== 02. [5p] Internet connectivity ==== | + | |
- | + | ||
- | Before you begin, make sure that you have Internet connectivity on all two nodes (attacker and victim). R1 should be the gateway for the Attacker and Victim. Write down the MAC and IP addresses of all 3 nodes (including the gateway). Use the provided scripts to access the nodes. | + | |
- | <code> | + | |
- | root@ip-172-30-0-165:/# ./attacker_bash.sh | + | |
- | root@attacker:/# | + | |
- | + | ||
- | root@ip-172-30-0-165:/# ./victim_bash.sh | + | |
- | root@victim:/# | + | |
- | </code> | + | |
- | + | ||
- | ==== 03. [30p] ARP poisoning MITM attack ==== | + | |
- | + |