Reference no: EM133928341
Network & Information Security
Assessment Details for Assessment Item 2:
Introduction
This individual assignment focuses on vulnerability assessment, network security analysis, and practical application of security tools.
Network Environment Setup (Building on Labs 1-5):
Ensure your virtual network environment, including Windows 10 Enterprise VM, Kali Linux VM, and pfSense firewall with Snort, is fully operational. This is the base for your assessment.
Document your network topology (diagram) and the configurations of each virtual machine.
Vulnerability Scanning (Building on Lab 4):
Utilize Nessus Essentials (or OpenVAS if you prefer) from your Kali Linux VM to perform a vulnerability scan of your Windows 10 Enterprise VM.
Critically analyse the scan results. Specifically address the following:
Identify and categorize the detected vulnerabilities.
Discuss the potential impact of each vulnerability.
Propose mitigation strategies for the prioritized vulnerabilities, such as applying patches, configuration changes, or additional security controls.
Explain the difference between false positives and real vulnerabilities.
Demonstrate your ability to filter and optimize scan results to minimize false positives.
Provide screenshots of your scans and the results.
Assessment 3:
Introduction
This individual assessment task requires you to demonstrate your practical skills in implementing and configuring an Enterprise Antivirus solution within your virtual network environment. You will create a video presentation showcasing the installation, configuration, and effectiveness of your chosen antivirus solution in detecting and blocking malware.
Antivirus Implementation (Building on Lab 5):
Install and configure an Enterprise Antivirus solution, such as the HAVP package with ClamAV, within your pfSense firewall.
Clearly demonstrate the installation process and explain the key configuration settings, including advanced features such as heuristic scanning or real-time monitoring.
Lab5: Installs and configure pfSense
According to Wikipedia and Netgate, "pfSense is a firewall/router computer software distribution based on FreeBSD. The open-source pfSense Community Edition (CE) and pfSense Plus are installed on a physical computer or a virtual machine to create a dedicated firewall/router for a network. It can be configured and upgraded through a web-based interface and requires no knowledge of the underlying FreeBSD system to manage."
We will use pfSense in the course to configure a firewall, a commercial virus guard, a proxy server, as well as an Intrusion Detection System (IDS). Therefore, this lab is crucial for both Assessment 3 and the major assessment.
You have to follow the below screenshots to install pfSence and add your screenshots to the reports.
When installing pfSence, you may follow these links or resources:
pfSense Official Documentation: Official documentation covering installation, configuration, and troubleshooting.
Create the VMprofile to install pfSense. You have to select BSD and FreeBSD as the type and version respectively
Create the below network adapters by going to the settings of the virtual box manager. This is exactly similar to both the Kali and Windows servers we used.
Adapter 1:
- Enable Network Adapter
Attached to: NAT
Adapter 2:
- Enable Network Adapter
Attached to: Internal Network
Name: intnet
Install pfSence by following the necessary steps given in the installation. Youmay follow the instructions below you may refer to the links or the videos given in the introduction.
Do the disk partitioning correctly. If you need more information you may follow the information given in the netgate wiki
Make sure that you select "Swap Size" (S) as two times as your RAM size of the VM. For example, in my VM, I gave 2 GB RAM and I Set the Swap size as 4G. Get expert online assignment help in the USA.
Then proceed with the installation
Once finish with the partitioning and file system configuration, make sure you select the hdd from the install below (* has to be there)
Finalize the setup and let the pfSence to install.
Finalize the installation by clicking to reboot.
After installing, power off the pfsence.
Before running the VM, make sure you remove the iso file you loaded. Else, you will be guided through the installation again. Therefore, it is very important to remove the iso file from the CD ROM and powerup your pfSense.
In the successful installation you will see your pfSense as below
Those who are good at CLI interfaces, can work on the CLI. However, those who are not good at CLI, can use Step 3 to access pfSence.
Enter option 8 and then go to shell.
Then type "ifconfig | less" and check the IP address of the pfSence VM. This has to be in your report. 6
If you wanted to come out of CLI, type "exit"
Access pfSense using GUI to do the Configurations to pfSense
Go to Kali or Windows 10 VMs. Make sure the LAN IP addresses are correct (192.168.1.1/24). Note that this has to be in the LAN network you configured in both Windows (192.168.1.101/24) and Kali (192.168.1.100/24). This is very important.
Go to the browser and type 192.168.1.1 do the configurations below. I recommend using Firefox.
Once you try to access the pfSence, as it is working through http, the browser will let you know that is a dangerous site. But you can go to "Advanced" and accept the risk and then navigate to pfSence.
The defauly Uname is "admin" and the PWD is "pfsense"
Enter the hostname as "ITNE2002"
Do not change the LAN IP Address.
Then follow the on-screen comments and configure the pfSence. You might change the below as you prefer.
Timezone
Change default "admin" PWD to "root"
Finally check for the updates and finish the installation.
Congratulations, you successfully installed an industry-grade firewall. Now Enjoy pfSence.
Malware Detection and Blocking (Building on Lab 4):
Utilize a source of known malware, such as VirusShare or VirusTotal, to obtain sample virus files.
Demonstrate the antivirus solution's ability to detect and block these virus files within your Windows 10 Enterprise VM.
Show the antivirus logs and dashboard, highlighting the detected threats and the actions taken.
Lab 4: Make your Windows VM a Vulnerable PC
In this experiment, you will purposefully make your Windows VM a vulnerable PC by installing services and opening vulnerable ports. Furthermore, we will use a firewall to open several unnecessary ports on your Windows PC. Specifically, you will install and open the following ports:
Open Port 21:
Install an FTP server on Windows 10 by following the instructions at [Windows Central].
Open Port 22
Install the OpenSSH server on a Windows 10 PC. You may use the following link help to configure it
Set the SSH server to start automatically at Windows startup and add the firewall rule.
Open Port 23
Install the telnet client using "Turn Windows features on or off." You may use the link below as a help to do that.
Open Port 80
Install IIS using "Turn Windows features on or off" by following the instructions at [Windows Central]
Find the services associated with port numbers 135, 445, and 3389 in the Windows Services console and set each relevant service to start automatically at Windows startup.
Enable the service.
Open Port 3306
Download and install the XAMPP web server and the MySQL database server, which will open port 3306. You can download XAMPP from [Apache Friends]
Finally, you need to configure the Windows firewall to allow the following applications through the firewall. Do this if the firewall does not already have these rules:
- SSH
- IIS
- Web
- All services related to Remote Desktop Management
Video Presentation:
Record a video presentation that clearly and concisely demonstrates the following:
The installation and configuration of your chosen antivirus solution.
The process of obtaining and testing diverse malware samples in a simulated real-world attack scenario.
The antivirus solution's detection and blocking capabilities.
An explanation of the key configuration settings and their impact.
Speak clearly and provide a logical flow to your presentation.
Include screen recordings of your virtual machines and antivirus dashboards.