Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Assignment 1.docx

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Disclaimer

The author is not responsible for the actions committed by listeners and readers.
The information and tasks are provided for informational purposes only.
The author of this material urges not to break the law.

Laws of the Republic of Kazakhstan:


https://online.zakon.kz/Document/?doc_id=33885902
https://online.zakon.kz/document/?doc_id=39415981
https://online.zakon.kz/Document/?doc_id=31396226

Assignment 1
(11.1/60 points) Feel like a hacker
Deadline: 13.10.2024 23:59 on Moodle
14.10.2024 - 19.10.2024 Defending work on practice session
Policy: Please read the instructions carefully. Cheating from any resources is strictly prohibited.
If cheating is suspected, a 0 is given for the course.

Grading Policy: You should submit your work according to the deadline in pdf or doc format
with a full description of each step that you have done on Moodle. In case you are late your lab
will not be accepted. Afterward, you have to defend your work and be able to answer the
questions.

Part 1.
You will have to create a text file with your name, surname, group number, and email
address, and your goal is to encrypt it using a symmetric encryption algorithm and later decrypt
it to retrieve the original information. For your solution, you will use OpenSSL in Kali Linux (or
any Linux environment). You will encrypt the file using the AES-256-CBC algorithm, then
decrypt it using the same password.
Don’t forget to take a screenshot of each step. The completed task should provide all
information with a clear explanation of each step and also provide the date and time when you
decrypted the file.

Part 2.
Lab Description: You will set up two Linux servers in a local network: one server will act as
the target (destination), and the other will be a Kali Linux machine that you will use to perform
the attack. Your objective is to hack the password of the target Linux server (running SSH) using
Hydra. On the target server, create a user account and set the password to a variation of your
name and surname (e.g., "Aigul_Imanbayeva_123"), ensuring that the SSH port is open and
running.
Document each step of your process, including the commands you used, any errors
encountered and how you resolved them, the date and time when you successfully hacked the
password, and include a screenshot of the successful login.

Part 3.
Identify what kind of cipher this and decrypt yrgzxeyiskmkxer using any tools you want. (Hint:
you have to find a key). Write a full description and provide all screenshots from each step.

Part 4.
There is something hidden in this document (part5_designpatterns), but instead of a password I
only have this (part4encryption.txt, part4key.txt)
https://drive.google.com/drive/folders/19YpY-UH279JSGfD588UTDIMx6hJdclV6?usp=sharing.
Write a full description and provide all screenshots from each step.

Supporting resources:
1. VMware workstation and Kali Linux: https://zsecurity.org/download-custom-kali/
2. Windows 10VM:
https://drive.google.com/file/d/1-TIp1Jnj5avio3v_hpLiWrZgKXIDAZIU/view?usp=drivesdk
3. Ubuntu:
https://ubuntu.com/download/desktop/thank-you?version=24.04.1&architecture=amd64&
lts=true
4. https://gchq.github.io/CyberChef/

You might also like