Lab 3: Deploying and Configuring a Virtual Machine

Process:

Create a new virtual machine

Choose ESXI compatibility (ESXI 6.5)

Then we choose the guest operating system version: Microsoft Windows 7 (64-bit)

Select Windows 7 ISO from my data store and click on the connection

Then,we can use vSphere to view other details and functions of the virtual machine.

We disable the update, and Windows will not automatically update after that.

Configuration Choices:

Comparison of Esxi6.0 and Esxi6.5

The ESXI6.0 partition formatting process is obviously stuck for a few minutes to complete. ESXI 6.5 is the same speed as a normal hard drive

Thin provisioning: How much is ESXI6.0 used for provisioning. However, the ESXI6.5 provisioning capacity will be greater than the current usage

Critical Thinking Analysis:

This lab teaches us how to create operating systems and virtual machines

We can use the mouse in the virtual machine without installing VMware tools. But when creating a new virtual machine we need to install the VMware tool to use the mouse function. This is difficult for us to operate if you don’t use a mouse

Therefore, we can learn from this lab to use the keyboard shortcuts to operate and install and select without using the mouse.

Lab 8: Understanding PKI Concepts

Reflection:

PKI: PKI(Public Key Infrastructure) is a standard-based technology and specification that uses public key cryptography to provide a secure infrastructure for e-commerce development.

CA: The CA Digital Authentication Center is an important part of PKI. The CA Digital Authentication Center is responsible for issuing digital certificates containing identity authentication for users. Digital certificates are user identity information and a collection of user keys. After authentication, users can communicate with corresponding systems. .

1.What is the role of the Root CA and Subordinate CA in PKI?

Root CA: The core role of root CA is to send and manage digital certificates. Key features include certificate sending, certificate renewal, certificate revocation and certificate verificationRoot CA:

Subordinate CA: The security technology provided by CA identifies the data on the Internet, the sender of the information, and the recipient. To ensure the security, integrity, reliability and non-repudiation of transactions

2.Outline the steps involved in creating the Subordinate CA private key and certificate.

Steps to create a certificate:

  1. Click on the link to add roles and features
  2. Select Role-based or feature-based installation in the target server.
  3. Then click on Active Directory Certificate Services in the Select Server role and check
  4. We select the online responder in the role server
  5. Select the role service via the web server role (IIS) and click Install and wait

Steps to create a Subordinate CA:

  1. Click Add Roles and Features
  2. Accept the default settings in the Select Installation Type and click Next.
  3. Click Active Directory Certificate Services in the Select Server Roles page, then click Add Features.
  4. Selecting the Online Responder in the Select Role Service will display the Add Roles and Features Wizard and click Add Features.
  5. Click Next in the Web Server Role (IIS) and confirm the installation.

3.Can the certificate be used on a public website? Justify your answer.

Certificates cannot be published online.Configuring Active Directory Certificate Services requires the creation of a new private key and is protected. And the database that still exists in this certificate is also protected. Ultimately, you need to pass a certification authority.

4.Discuss the use of Certificate Revocation Lists

Certificate logout can revoke client certificate sent by the browser to the IHS server when the key is compromised or the access permission for the key is revoked.The CRL shows all digital certificates that were revoked before the original expiration date arrived, and the revoked digital certificate cannot be used. The CRL also contains the date the next certificate was issued. Whether a potential user can access the server depends on the state of the user in the CRL.

5.Explain why an organisation use Active Directory Certificate Services

Because Active Directory Certificate Services has a lot of functionality.

  1. Server and client computer management: management server and client computer accounts, all servers and client computers join domain management and implement group policy
  2. User services: management user domain account, user information, corporate directory (integrated with email system), user group management, user identity authentication, user authorization management, etc.
  3. Resource management: management of network resources such as printers and file sharing services
  4. Desktop configuration: System administrators can centrally configure various desktop configuration policies, such as: resource usage restrictions in the domain, user interface restrictions, and application execution feature restrictions.
  5. Application system support: support various applications such as finance, personnel, email, enterprise information portal, office automation, patch management, anti-virus system.

Critical Thinking Analysis

Potential uses/advantages/pitfalls for this in securing a business

Active Directory protects its stored user accounts and group information through object access control lists and user credentials

Active Directory allows administrators to create group accounts, and administrators can more effectively manage system security

There are many advantages in business. For example, we can implement a management system through a management server. The public key cryptography technology can support non-tamperable digital signatures, including the certifier’s identity information, verification information and other data in the digital signature, which can guarantee the security of the digital certificate. The disadvantage of PKI is that the application environment must be a limited network.

Lab 5: Navigating the vSphere Clients

Process:

Choose what a vSphere Web Client shows

The summary manager is shown as VMware ESXI, 6.7.0, 1032608. The logical processor is 16. In addition, the NICs is 4.

Demonstrate the configuration content of ESXI06

Configuration Choices

There is nothing in this lab for us to choose.We can find out the configuration of different virtual machines from the vSphere Client.

Critical Thinking Analysis:

We can learn from this lab how to navigate the vSphere Client and see the details of different virtual machines. For example, hypervisors and processors. We can understand the data of each virtual machine more clearly so that we can see where we need to improve.

It can be seen from this lab that it does not teach us a lot of useful operations. This is just a brief introduction to some of the features and details of vSphere. If you complete these operations before the course, the lab will be more beneficial to us.

WEEK 3:Classic Scientific Paradigm

Describe it:

The paradigm shift from classical science to systems science has caused a fundamental shift in worldview. The transformation of world outlook mainly includes five aspects: from “construction theory” to “generation theory”, from “existence theory” to “evolution theory”, from “entity theory” to “relationship theory”, from “simple theory” to “complex theory” “From “determinism” to “non-determination”. With the colored glasses of the system science paradigm, the world will become significantly different.The classical scientific paradigm refers to empirical science, focusing on the description and practicality of past experience. This method mainly concentrates on induction

Explain what it could possibly be used for – also, give an example

Experiments need to be hypothetical, and experiments are conducted to verify the hypothesis. For example, the famous experiment of the Leaning Tower of Pisa in Galileo. He made hypotheses through daily observation, and then confirmed the correctness through various experiments, which eventually overturned the theory that people believed in in in the past.

Write why you like this paradigm – or don’t like it

For me, I like this paradigm. Because the content expressed by this paradigm is very intuitive and very purposeful.

Lab 7: Password Cracking Tools

Reflection:

Cain & Abel:

It is a crack tool that can crack password screen, PWL password, shared password, cache password, remote shared password

PWdump7:

PWdum7 is a command-based utility that can help you recover password hashes from local system as well as remote systems. You can dump the hashes in a txt file and then use tools such as Cain & Abel or John the Ripper to crack the hashes.

1.Discuss how to use Cain & Abel to initiate a brute force attack.

Cain & Abel is a password cracking tool. We can determine the need to launch a brute force attack by choosing NTLM Hashes. After that, we can display many accounts from NT Hashes. Then you can choose to use the “brute force attack” according to your choice. Then select NTLM Hashes. Finally, we can crack the password based on the selection in the password length list. If the higher the value, the longer it takes

2.Discuss the problems with using the brute force attack and compare and contrast with another password attack.

Brute force attacks make it easier for us to crack passwords. We can choose different strings based on what we want.

Cain & Abel:Can help us recover passwords from a variety of sources. For example, local systems and wireless systems.We can select a specific object for a brute force attack to successfully obtain the cracked password.Cain & Abel:Can help us recover passwords from a variety of sources. For example, local systems and wireless systems.Its advantage is that it can be remotely controlled to crack passwords.

Brute force attack: Attempts to determine a secret by trying every possible combination.

Dictionary attack: Typically, a guessing attack which uses precompiled list of options. Rather then trying every option, only try complete options which are likely to work.

3.In relation to your findings in the lab define and justify the minimum requirements for a secure password policy.

The minimum requirement for a password security policy is that the password you enter contains uppercase, lowercase, special characters, and numbers. When there is a lack of conditions. Setting the administrator password will prompt that the password policy is not met. Also, if the password is too simple, the characters displayed are too short. It is easy to use Cain & Abel to crack. Because the time it is cracked is determined by the length of the character.

We can use things that are common in everyday life as long passwords. For example: “My cat is very cute.” Therefore, the password is mycatisverycute. One of the benefits is that we can remember this password very clearly. Another advantage is that using brute force attacks is very difficult to get passwords.

Critical Thinking Analysis

Any lab problems and solutions described.

This lab showed us the use of Cain & Abel and used brute force attacks to crack passwords. And use PWDump to reply to the hash key value of the hashes from the local system and the remote system.But sometimes there are some instructions in the lab that are not particularly clear. Did not give us detailed explanations. Just tell us to click NEXT to go to the next operation.

Nonetheless, the Lab did not provide an opposing solution to show how to protect the security of passwords. I think it’s possible to combine cracked passwords with protected passwords. Can make our impressions and practical skills more prominent

Lab 6: Encryption and Hashing

Reflection:

Encryption

Encryption technology is the main security and security measure adopted by e-commerce. It is the most commonly used security and confidentiality means. It uses technical means to turn important data into garbled (encrypted) transmission. After reaching the destination, it can be restored (decrypted) by the same or different means.

Hashing

Hash method is a method of converting a string of characters into a fixed-length (usually shorter length) value or index value, called hashing, also known as hashing. Since it is faster to perform a database search with a shorter hash value than the original value, this method is generally used to index and search in the database, and is also used in various decryption algorithms.

1.Discuss the use of MD5 hashes for software downloads.

A widely used cryptographic hash function that produces a 128-bit (16-byte) hash value to ensure complete and consistent information transmission.

Using the MD5 download software can ensure the correctness of the file and prevent some people from stealing the program or adding Trojans to tamper with the file.

2.Discuss the difference between MD5 and SHA-1 hashes.

Security for forced attacks:
The most significant and important difference is that the SHA-1 digest is 32 bits longer than the MD5 digest. Using the forcing technique, generating any message such that its digest is equal to the difficulty of a given message digest is 2^128 orders of magnitude for MD5, and 2^160 orders of magnitude for SHA-1. In this way, SHA-1 has greater strength against forced attacks.

Security for crypt analysis:
Due to the design of the MD5, it is vulnerable to crypt analysis attacks, and SHA-1 is not vulnerable to such attacks.

Speed:
On the same hardware, SHA-1 runs slower than MD5.

3.Discuss the use of SHA hashes for digital signatures in SSL certificates.

Digital signatures use technology implementations in the field of public key cryptography to identify digital information.

Digital signatures use a double encryption method to achieve anti-counterfeiting and anti-counterfeiting. The principle is:
1. The transmitted file is encrypted with SHA code to generate a 128-bit digital digest (see the previous section).
2. The sender re-encrypts the digest with its own private key, which forms a digital signature.
3. Pass the original text and the encrypted abstract to the other party at the same time.
4. The other party decrypts the digest with the sender’s public key, and simultaneously encrypts the received file with SHA code to generate another digest.
5. Compare the decrypted digest with the digest generated by the recipient’s re-encryption. If the two are consistent, the information has not been destroyed or tampered with during the transfer. Otherwise it is not.

Critical Thinking Analysis

Potential uses/advantages/pitfalls for this in securing a business

Advantage: SHA-1

1.The chain address method handles conflicts simply and has no accumulation phenomenon, that is, non-synonyms never conflict, so the average search length is shorter.

2.In the hash table constructed by the chain address method, the operation of deleting nodes is easy to implement.

Disadvantage: MD5

The pointer requires extra space, so when the node size is small, the open addressing method saves space, and if the saved pointer space is used to expand the size of the hash table, the loading factor can be made smaller, which reduces the open addressing method. Conflicts in the middle, thereby increasing the average search speed

WEEK 2 : Ontology And Epistemology

1.What is ontology? How is it relevant to research?

Ontology is a philosophical theory that explores the origin or matrix of the world.

Aristotle believes that the main object of philosophical research is the entity, and the problem of the entity or ontology is about the nature, the common phase and the individual things. He believes that the philosophy of studying entities or ontology is the first philosophy above all other sciences. Since then, ontological research has shifted to explore the relationship between essence and phenomenon, common and special, general and individual. In Western modern philosophy, Descartes first called the first philosophy of studying entities or ontology “the ontology of metaphysics.”

2.What is epistemology? How is it relevant to research?

Epistemology is the individual’s view of knowledge, that is, the individual’s belief in the acquisition of knowledge and knowledge, including beliefs about the structure of knowledge and the nature of knowledge, beliefs about sources of knowledge and knowledge, and the construction and knowledge of these beliefs in individual knowledge. The adjustment and influence of the acquisition process has long been a core issue of philosophical research.

Knowledge is repeatable and we can constantly improve and improve. We can explore many areas of research through knowledge and expand more. Correct and scientifically based cognition has a guiding role in research

3.What is the connection between ontology and epistemology in a research context?

Although there are various definitions of the term ontology, there is still a certain understanding of it. Generally speaking, the ontology used in the previous philosophy of Marxism has a broad and narrow distinction. After Marxism, philosophy is integrated into practice.

Refers to the ultimate nature of tangibleness. This nature needs to be recognized through epistemology. Therefore, the study is actually based on the ontology of the ultimate nature, and the study of how to recognize it is epistemology. This is symmetry between ontology and epistemology.

Lab 5: Scanning and Remediating Vulnerabilities with OpenVAS

Reflection

Kain:

Kali is a multifaceted Linux operating system which is mainly focused towards security and penetration testing. It combines a wide range of tools, from port scanners both active and passive to forensic tools which can be used to pull deleted data off hard drives.

OpenVAS Scanning:

OpenVAS stands for Open Vulnerability Assessment System. It’s can be quite comprehensive in its scanning techniques as well assisting in finding vulnerabilities. It can be used in conjunction with other Kali tools to help pen test environments more efficiently. OpenVAS stands for Open Vulnerability Assessment Syste

Active Directory Access LDAP

Active Directory holds a great of critical information about a business or organisation regarding how its structured, who the participating members are, the groups and positions of those members, how the domain is defined and which computer groups are assigned

1.Investigate and discuss one of the SSL vulnerabilities found as a result of the OpenVAS scan that has a severity rating of 4 or higher.

We need to scan the OpenVAS interface and open the scanner. We can scan by selecting a specific port in a zone through the scanner. This scan is very intrusive and provides a great deal of depth; it looks for a very wide range of faults and some of which might not be very useful depending on the device being scanned.

Scanning with certain types of devices can be done using OpenVAS scanning. This in turn allows for more effective screening of vulnerabilities. We can enter specific Task Name and Target Host into the Advanced Task Wizard to display the report content on the dashboard.

We can click on the name of the scan to see more detailed results. As long as it refers to the date and type of scanner. We can click on the value of Reports and then distinguish the high, medium and low results in detail to represent the vulnerability related information. This vulnerability affects Axis2 installations as well as SAP BusinessObjects via the web service module (known as dswsbobje) and other products that are based on Axis2

2.Investigate and discuss the Common Vulnerabilities and Exposures (CVE) database

Common vulnerabilities We can scan through OpenVAS and click on the scan name to see the date. We can pass the date and then see the common vulnerabilities. In addition, we can click on the vulnerability to see what port is being used on the TCP service.

3.Outline the steps to use a vulnerability scanner to identify and remediate security issues

Log in to the OpenVAS interface and click on Configuration and then click on Ports. After that, we can check all the windows through the NMAP scanner. We can customize the scan through the scan configuration on the Configuration tab. This scanning method is invasive and provides a large depth. We can selectively scan to increase efficiency. Finally click Firefox to view the vulnerability. We can choose Full and fast ultimate for the controller search. The orange requirement will eventually be displayed on Greenbone. Find the vulnerability by clicking on the name and time.

We start Active Directory Users and Calculator by running dsa.msc. After that we can delete all users via ‘Pre-Windows 2000 Compatible Access’. After that, select the properties and click on Members. We can see which members of the group have this feature turned on. Finally we can click Delete to remove them from the group.

Critical Thinking Analysis

potential uses/ advantages/ pitfalls for this in securing a business

We can efficiently scan for vulnerabilities in specific files through OpenVAS scanning.

In addition, we also access LDAP through secure Active Directory. We can remove or disable certain threat groups for security purposes.

Finally, we can modify the security verification through OpenVAS. The advantage of this is that you can operate according to people’s wishes to reduce the risk of vulnerability intrusion.

Lab 4: Network Vulnerabilities Part 2

Explain in your own words the DOS attack scenario.

Dos is a denial of service. Its purpose is to make the normal service not available to the computer or network.

First, when establishing a connection, the client sends a SYN packet ((SYN=i) to the server and enters the SYN SEND state, waiting for the server to confirm;

Second, the server receives the SYN packet, must confirm the customer’s SYN (ACK=i+1), and also sends a SYN packet ((SYN=j)}, that is, the SYN+ACK packet, and the server enters the SYN_RECV state;

Third, the client receives the SYN+ACK packet of the server and sends an acknowledgement packet ACK (ACK=j+1) to the server. After the packet is sent, the client and the server enter the ESTABLISHED state, completing the three-way handshake, and the client and the server start. Transfer data.

Explain in your own words how the Hping3 attack causes the denial of service.

Hping3 supports file transfer via TCP/UDP/ICMP and other packages. Equivalent to establishing secret tunnel communication with TCP/UDP/ICMP packets. Using Hping3 makes it easy to build denial of service attacks. For example, a large number of SYN connections are initiated to the target device, the forged source address is 192.168.10.99, and each SYN packet is sent at intervals of 1000 microseconds.

Discuss the benefits of using anti-phishing functionality.

Phishing attacks use fraudulent emails and fake Web sites to conduct fraudulent activities. The fraudsters often disclose their financial data, such as credit card numbers, account numbers and passwords, and social security numbers.

Anti-phishing means that regardless of the user’s access to any website, the software will promptly alert the user through the lower right corner of the IE window. The security alert is a three different color cue light, and the user can check the security of the website according to the cue light. So using anti-phishing can effectively protect your finances and be safe to go online.

Critical Thinking Analysis

Denial of service is usually a means of cyber attack used to make sub-weapons or networks paralyzed. And the denial of service can be generated under the attack of Hping3. In addition, phishing is by sending a large amount of fraudulent spam claims to come from banks and other well-known institutions, by enticing the recipient to give sensitive information.

Consequently, understanding the functions of denial of service and anti-phishing can effectively make people have a sense of self-protection. Thereby reducing the risk of personal information disclosure

WEEK 2 : TRUTH AND FACTS

1. Is there difference between ‘knowing’ something and ‘having knowledge’ of something?

There is a difference between the two. “knowing” knowledge is the study of certain unfamiliar areas. “Having knowledge” is part of understanding the existence of a domain. We treat things that are unknown from “knowing” to “having knowledge”.

2.What is ‘truth’?

Truth is unique and objective. The content they contain will not be affected by changes in subjective consciousness.

3.What do we really mean when we say something is ‘true’?

What we really mean is to express that after analyzing and thinking by ourselves, it is right to judge the matter through the field and experience of the knowledge I have learned.

4.Is there a difference between knowing something is ‘true’ and believing that something is ‘true’?

There is of course a fundamental difference between the two. Knowing that something is “true” is right from an objective point of view. However, the belief that certain things are “true” is based on people’s subjective wishes.

5.What is the difference between subjective and objective ‘truth’?
What is a ‘fact’ and can ‘facts’ change ?

Subjective truth is to express opinions and draw conclusions according to their own wishes.

Objective truth is real and will not change because of changes in the environment and changes in one’s own mood. Thus based on the facts to draw conclusions.

6.What is a ‘fact’ and can ‘facts’ change ?

The truth is that something is objective and real. But the facts may change. Through the continuous development of society and technology, people are constantly improving and improving themselves. Therefore, the previous ideas will be gradually eliminated.

7.How do we discover if something is ‘true’ or not?

We obtain knowledge from the literature of the book and find the corresponding evidence. In addition, we can increase the scope of our knowledge fields through news, newspapers and magazines, which makes it easier for us to find out whether things are ‘true’.

8.“We do not see things as they are but as we are” Anais Nin. What does this mean?

Most of the “truth” that exists in the world is defined by people. So the knowledge and ‘true’ that we have learned are all based on this premise. These are only at the level of the appearance of things, not the essence of things.

9.“Reality is an illusion, albeit a very persistent one”Einstein. What does this mean?

In fact, the so-called reality is a world formed by filtering and processing people’s brains, which can easily help people build a world view. But what people perceive in their hearts is the illusion. That is an area that cannot be reached.

10.Is there a difference between ‘true’ and ‘valid’? Explain!

‘true’ is based on facts. And the standard is recognized by people. “Valid” can achieve the desired effect or purpose.

通过 WordPress.com 设计一个这样的站点
从这里开始