Cybersecurity Project | Wireshark Packet Analysis
Summary
TLDRIn this educational lab video, the presenter guides viewers through the process of capturing usernames and passwords using Wi-Fi tools like Wireshark and Putty. They demonstrate setting up a virtual environment with VMware or VirtualBox, installing Windows 10 and Ubuntu, and configuring network settings for internal communication. The video serves as a practical tutorial for beginners in cybersecurity, illustrating the importance of secure communication protocols like SSH over Telnet, which transmits data in plain text.
Takeaways
- 💻 The lab demonstrates how to capture username and password using Wireshark.
- 🛠️ Essential tools for the lab include VMware, VirtualBox, or Oracle VM, along with Wireshark and PuTTY.
- 📡 The setup involves creating a virtual environment with Windows 10 and Ubuntu to simulate network traffic.
- 🔒 The tutorial walks through the process of installing and configuring Windows 10 and Ubuntu for network communication.
- 🌐 Network configuration is crucial, with a focus on setting up internal network adapters for VM-to-VM communication.
- 🔄 The lab shows how to assign static IP addresses to VMs for controlled network traffic.
- 🔍 Wireshark is used to capture TCP packets, which can reveal sensitive information like usernames and passwords if not encrypted.
- 🔒 The video highlights the insecurity of Telnet, which transmits data in plain text, making it susceptible to packet sniffing.
- 🔑 The demonstration captures and analyzes Telnet traffic to show how easily credentials can be intercepted.
- 💼 The lab can be documented and added to a portfolio or GitHub as a practical project in cybersecurity.
Q & A
What is the main objective of the lab demonstrated in the video?
-The main objective of the lab is to demonstrate how to capture username and password using Wireshark and putty, and to set up a network between a Windows 10 and an Ubuntu VM for this purpose.
Which hypervisor tools are mentioned in the script for setting up the lab?
-The script mentions VMware Workstation, VM Player, and Oracle VirtualBox as the hypervisor tools needed for setting up the lab.
What operating systems are installed in the lab for the demonstration?
-The operating systems installed for the lab demonstration are Windows 10 Enterprise and Ubuntu 22.04.
How can the lab setup be beneficial for an individual's portfolio or resume?
-The lab setup can be documented and added to an individual's portfolio or GitHub, showcasing their practical experience in cybersecurity, specifically in network security and penetration testing.
What is the source for downloading Windows 10 Enterprise mentioned in the script?
-The source for downloading Windows 10 Enterprise is the Microsoft Evaluation Center, which can be found by searching for 'Microsoft Evaluation Center' on Google.
What network configuration is set up between the Windows 10 and Ubuntu VMs for the lab?
-An internal network adapter is configured to allow communication between the Windows 10 and Ubuntu VMs, using IP addresses in the 192.168.50.x range.
Why is it necessary to install VMware Tools or VirtualBox Guest Additions in the video?
-Installing VMware Tools or VirtualBox Guest Additions is necessary to improve the performance and usability of the VMs, including better mouse integration and screen resizing.
What is the purpose of using Wireshark in the lab?
-Wireshark is used in the lab to capture network packets, specifically to demonstrate how usernames and passwords can be intercepted during a Telnet session.
Why is putty used in conjunction with Wireshark in the demonstration?
-PuTTY is used to establish a Telnet connection to the Ubuntu VM, which then generates network traffic that can be captured and analyzed by Wireshark to show the transmission of plain text credentials.
What security risk is highlighted by the use of Telnet in the lab?
-The lab highlights the security risk of using Telnet, which transmits data, including usernames and passwords, in plain text, making it susceptible to interception and unauthorized access.
How can one connect with the presenter for questions or further discussion after the video?
-One can connect with the presenter by joining the Discord server mentioned in the video or by leaving comments in the comment section for questions or further discussion.
Outlines
💻 Setting Up the Lab Environment
The speaker introduces a lab tutorial on capturing usernames and passwords using Wi-Fi hacking tools. They emphasize the step-by-step process for better understanding. The necessary tools include VMware, VirtualBox, or Oracle VirtualBox as a hypervisor, Windows 10 and Linux (specifically Ubuntu) for the operating systems, and Wireshark and PuTTY for network traffic analysis and terminal access. The speaker suggests using this project as a portfolio piece for cybersecurity experience. They guide through downloading Windows 10 and Ubuntu from their respective official sources and setting up virtual machines in VirtualBox, detailing the installation process and configuration of network settings.
🛠️ Configuring Virtual Machines and Networks
The tutorial continues with the configuration of the newly installed virtual machines. The speaker demonstrates how to set up network adapters within the VMs to enable communication between the Windows 10 and Ubuntu systems. They explain the process of assigning IP addresses manually and adjusting network settings for internal lab communication. The focus is on ensuring that both VMs are properly configured to work within the same network for the upcoming lab activities.
🌐 Establishing Network Connectivity and Installing Tools
This section covers the final steps of configuring the network settings within the VMs to ensure they can communicate with each other. The speaker also details the installation of Wireshark on Windows 10 and PuTTY, a terminal emulator, on both operating systems. They explain the importance of these tools for capturing network traffic and accessing the VMs remotely. The speaker ensures that both VMs have internet connectivity and can communicate internally, which is crucial for the lab's success.
🕵️♂️ Demonstrating Username and Password Sniffing
The final paragraph describes the actual demonstration of capturing network traffic to sniff usernames and passwords. The speaker uses PuTTY to establish a Telnet connection from Windows 10 to Ubuntu, while Wireshark captures the traffic on Ubuntu. They show how to analyze the captured TCP packets to reveal the plain text credentials. The speaker concludes by emphasizing the importance of this demonstration for understanding cybersecurity risks and the necessity of using secure protocols like SSH over Telnet. They also invite viewers to join a Discord server for further discussion and provide links to resources in the video description.
Mindmap
Keywords
💡Wireshark
💡VMware
💡VirtualBox
💡Ubuntu
💡PuTTY
💡Telnet
💡IP Address
💡Network Adapter
💡ISO File
💡Firewall
💡Packet Capture
Highlights
Introduction to a lab demonstration on capturing username and password using Wi-Fi.
Explanation of the necessity of tools like VMware, VirtualBox, and specific operating systems for the lab.
Guidance on downloading Windows 10 and Ubuntu from official sources for the lab setup.
Instructions on setting up a hypervisor and installing Windows 10 and Ubuntu on it.
Emphasis on the educational value of the lab for cybersecurity and networking.
Details on configuring network settings for internal communication between virtual machines.
Demonstration of how to install and configure Wireshark for packet capturing.
Step-by-step guide on installing and using PuTTY for remote terminal access.
Practical advice on documenting the lab process for portfolio or GitHub purposes.
Tutorial on setting static IP addresses for virtual machines to facilitate internal communication.
Explanation of the process to enable and configure network adapters for internal VM communication.
Real-time demonstration of capturing packets using Wireshark while performing a telnet session.
Analysis of the captured TCP stream to reveal the plaintext telnet username and password.
Discussion on the security implications of using telnet compared to SSH.
Conclusion summarizing the lab's educational outcomes and potential applications.
Invitation for viewers to join a Discord server for further questions and interaction.
Transcripts
hi everyone in this lab we are going to
snip username and password using wihar
this is going to be a little bit long
video I want to demonstrate how you can
do this from the scratch please bear
with me we'll do each and every step one
by one step by step then you can have
better understanding how we can do that
before we start we need to have few
tools first you need to have VMware
VMware Workstation VM player or Oracle
virtual box this is for your hypervisor
we are going to install Windows 10 on
top of that as well as Linux drro here
I'm going to use the ubun to and you
need to have wire shockk we are going to
snip the username and password using wi
shock and puty to access the terminals
and access the other machines idea is
this demonstration is this is you can
take as a project you can document these
details you can put it on your own
portfolio you can upload this into ghub
you can use this as a small project
which you have done in cyber world as
well as you can add this into your
resume without further Ado let's get
started first we need to download these
tools I I am not going to download the
um Oracle virtual box because I have
already downloaded and installed that in
my laptop we'll see how we can download
the Windows 10 or 11 as well as Ubuntu
wi shark and puty first we'll download
the Windows 10 Windows 10 is available
in Microsoft website which is free if
you want to use Windows 11 fre free to
use it you can download both the it
Source from Microsoft evaluation center
if you Google like Microsoft evaluation
center you can definitely find this or
else I will write down all the links in
the description this is the Microsoft
evaluation center if you go to the
windows you can download Windows 11
Enterprise 10 Enterprise as well as
Windows servers if you want to build a
lab with the windows service in this
example I'm going to download Windows 10
Enterprise which is easy for to do and
I'm just H that download the iso
Enterprise button and you have to fill
this form which is really don't need to
fill your real details you can do
anything here test this is your whatever
11 some number set and download oh this
is required we'll see users and after
that you will have this window here I'm
going to use the 64-bit version with the
iso inter price download click 64bit
Edition and it will download to your
computer while it's downloading let's go
to the UB to version here I'm going to
use Ubuntu
22.4 version which is kind of stable and
which is easy to handle if you Google
like ubun
22204 you can easily find this page you
can landar to this page here I'm going
to use the desktop image if you're happy
to use the server install image yes you
can do that but here I'm going to use
the 64-bit version over here I will
click this and I will download this
image as well in the same time once all
downloaded then we can start our lab
we'll just wait until download and let's
meet again okay my images files are
ready ISO files this is my Windows 10
and this is my ubun ISO file I will
rename this because it's easy for us to
identify yes what we are going to do now
is we're going to install Windows 10 and
open 2 and configure the network
settings in Virtual box to communicate
in between those two and we perform the
lab after that I'm going to hit new and
I will rename this as Windows 10 I'll do
Windows 10 first and I will install this
in specific location for I am going to
select my desktop and Windows 10 this
version next uh you can give any
username but we give we'll do red
password you can see my password
password and host name also Windows 10
is will set this as home lab. local and
click next I will stick with the 2GB RAM
and if you're happy you can give two CPU
50 GB is fine for me you can adjust as
you want and that's it hit the Finish
button and it will prepare the VM for
for you we can do the same for the open
to machine and while this is installing
we can do the open to machine as well
again I'm going to hit new open two and
I'm going to install into the default
location and I'm going to browse this
select my open to here and click next we
will skip this one yes skip this one
again stick with 2 GB 2 CPUs for me 25
GB is enough for this tutorial I will
live as it is cck next looks good for me
and finish and uh while this is
installing we'll do this one as well but
before that I want to configure settings
in here so when you go to the ubu
machine and click the network settings
and you can see we can add four adapters
here net is default and we can add
another internal network adapter
specifically communicate between Windows
10 and open 2 this this is inet I will
leave it as inet because it's easy and
that's it we'll say okay and start keep
remember we have to configure the
network settings in here as well but I I
didn't do that at the moment but we'll
do it later we'll let both to install
and we'll see how we can go with this
lab why I'm doing this from the scratch
it's easy for everyone to get in the
same page and build your lab from the
scratch we wait and see I've got the um
Ubuntu installation window I'm going to
install Ubuntu cck continue um minimal
installation I don't want much things
here and I don't want to download
updates because this this is for our lab
we don't need much things here click
continue even we don't need third party
softw graphic we'll wait and continue
this process uh yes we would like to
erase entire this and install this now
yes please continue in the meantime
Windows 10 also setting up so this is
kind of time saving we can select any
time you want just by now I will go with
default um
username we will give any username Bob
password also I'm going to give you
password because this is for our lab
setup please keep remember your password
if you're entering like complex password
otherwise you will forgot the password
when you're doing the setup it's better
if you can take the notes and keep keep
the note in this side it it might
helpful for you in future when you use
the same lab setup you can see the
password you can reuse the VMS likewise
now we have to wait when these two
finish I will come back until now I will
give a quick pause for the video and
let's meet once this two been installed
all right both my Ubuntu and Windows 10
V Let's quickly set up those two I will
start from Windows 10 like yes it will
take bit time in UB 2 I'll skip this yes
I'm going to skip this now we don't need
send anything and again move back to the
Windows 10 like yes I don't want any
keyboard layout keep this one privacy we
are done all right our open 2 is ready
maybe I will try to increase the display
size if I could looks like no it's not
possible that's fine there's the T Al
it's here yep terminal we'll wait for
Windows 10 yep Windows 10 also up I am
going to click next or let's say Jo
instead who is this user at least
password this is also password I'm going
to use password again password right
security questions I will do everything
test test you can set up whatever you
want but this is for demo we can add
anything here we want doesn't matter
don't don't worry about the content so
it's fine accept not now looks like we
are done so in UB to I will increase
this a little bit then you can see it
better you can run pseudo a update as
well as AP upgrade uh I'm not going to
do that because I think it does not
required for this lab but let's see in
open 2 you can see there are two
interfaces one is connected which means
it is the Net Connection and this one is
not connected it is our internal lab
connection if I can show you it here
when you go to the network setting this
is the one which is not connected yet
and this is the one with the Net
Connection this is already connected
this will communicate with the internet
through my physical host and this is for
our lab setup just to communicate with
Windows 10 and our open Tu in Windows 10
we have to set up this but until it's
booting up we can connect this we can go
to the settings and this is the adapter
which is not connected we can go to
settings again and we can select ipv4
and click manual we're going to assign
an IP address to this one which IP we
will use we'll use um 192
16850 100 and net mask is 255 255 255 Z
we don't need a Gateway we don't need to
set up DNS all looks fine click apply it
it will take bit time and it will
connect that's fine just ignore this
burning and when you go to the terminal
say if config oh it's not installed
because I use the minimum installation
you can use IP a and you can see in that
adapter our IP has assigned in this one
I'm going to increase the display size
little bit and you can see it better
because I don't want to install the
VMware sorry virtual box tools in here
and when we go to this one if we go to
the network settings can see there's
only one adapter which is our net
adapter right only this one this is even
not connected what we are going to do is
we're going to shut down this is for a
little bit and add that adapter and come
back and do our lab we'll wait until
it's shut down yes go to the virtual box
manager click settings go to network
adapter 2 enable and we are going to
select internal adapter and in this
should has the same setting all right
same one Okay click okay click okay and
we are going to start our Windows 10 VM
again we can clear this window we need
to have internet connection on both VMS
and we need to have the um internal
Connection in between those two in order
to communicate between those two what
I'm going to do here is configure the
Tet in the Ubuntu machine and download
and install the wire shark in Windows 10
and then we are going to stay password
okay here I'm going to first we'll do
the IP config then we'll do this one
start without sing data I don't need
these ones close close this when you go
to the network settings again you should
able to see two adapters here yes this
is the usual adapter which we already
connected to net settings it's there and
this is the one we want to have with the
same IP range as open to we it 192
16850 100 we'll do this one go to
property click IP version 4 Again
Properties 192 168 5050 2550 and we
don't need to have a Gateway for this
lab as well as the DNS close close and
we'll try to Ping to the Ubuntu machine
1921 1680 100 and it's worked we try to
do the other way as well 1921 16
85050 it's not pinging because of the um
I think it's because of the firewall if
I turn off the firewall in this VM he
should able to Ping I am guessing that
fireball think it this one uh public
network that's fine we'll turn that off
yes it's pinging now which is fine now
all right now we do have connection in
between these two now I'm going to
download the yha to my Windows 10 as
well as the puty go to the edge and I
will go to Google I don't like Ben so
yeah we'll download wi Shar go to
download and 64bit installer and it will
download in a second and again go to the
Google and download the puty download py
here I'm going to use portable version
not the installer oh this is the MSI
installer I would like to use the
portable one download it okay well are
downloaded we'll set up those two
install those two actually pu is don't
want to install because it's a portable
version yes I know noted go ahead you
can use the default setting which is
fine and it will install this while it's
installing this we can install tnet in
here what I'm going to do is installs
tnet sud sudo AP install tnet D I guess
password yes we want to install tet in a
Bund tet installed in the meantime we
need to agree for this one if you want
to verify you can do I think PSE sudo DP
kg minus L Grail net D yes that's the
one you can see the taet been installed
fine for us click next and finish the wi
shock setup and let's see what we can do
with this and I will try to run the puty
should be run yes it's working minimize
this this is our puty and Y shock is
installing click next and finish all
right what we are going to do now is we
are going to turn it from the Windows 10
PC to our Ubuntu machine at the same
time we are going to capture the wire
Shar packet capture and we are going to
capture some TCP packets and go through
that TCP packet and sniff the username
and password I think it's better before
we continue install the Oracle virtual
box tool then you can EAS easily see the
um wire shark captures so what I'm going
to do is install guest additional one
I'll pause video for while once it's
done I'll come back okay I'm back we
have now wi shock here as well as the py
right in here we need to figure out
which interface showing ethernet 2 I'm
I'm not sure we'll we'll double check
this one quickly yes ethernet 2 this is
our ubun 2 connection between ubun 2 and
this one uh we'll go ahead and select
that connection right and I will open
the put what we are going to do is tet
from Windows 10 to open to BM for that
we are going to use the puty you need to
enable the capture we already selected
the ethernet 2 adapter I will select the
tailet option input and add the 192
16850 100 which is our Ubuntu VM IP if
you're not sure you can go ahead and
double check it's there 192 16050 100
and we are going to turn it to that IP
and same time capture the packet click
open and it will give you the login
promt it's Bob virtual box yes and I
think it's Bob and password is password
I did a mistake password yes we are in
we are in the upun to machine who am I
yes Bob let's say who am I we in the
machine we going to machine we'll stop
the packet capture this is our main
target main goal we'll stop the packet
capture we can see the traffic TCP and
tet traffic over here we can fill the
Tet traffic taet enter you can see all
the captured data in here we can see the
TCP stream it is simple just right click
any of this and click follow and TCP
stream here you can see our login usern
name as well as the password this is
duplicated I don't know why but it
should be Bob not this b o and again
Double B but as you can see I did the
who am I we can see that one as well
which means tet is fully plain text
communication if someone sniff the
packets they can see all the things in
between that communication so this is
pure communication between our Windows
10 VM as well as the open 2 VM tet is
not secure this is a very good simple
example to show this if someone ask why
you should use SSH over the Tet so this
is the example this is you can show them
like this is the clue you can document
this project you can add this into
GitHub your portfolio anywhere very
simple and it's a good finding I think
especially everyone which is new to the
this world cyber security world and for
the technical things I hope you guys
learn something through this video and
if you want to connect with me you can
join to the Discord server if you have
any questions feel free to do a comment
in the comment section also I will write
down everything in the description all
the links you can download I think this
is it hope you learn something and we'll
catch up with the next video thank you
[Music]
guys
浏览更多相关视频
How to Install Windows Server 2019 in VirtualBox (Step By Step Guide)
CARA INSTALL UBUNTU 20.04.1 DI VIRTUALBOX || IT TUTORIAL
How to Install VMware vSphere Hypervisor ESXi 6.7 on VMware Workstation 15
Begini Cara Install Windows 10 Menggunakan VirtualBox | install windows 10 on virtualbox
WiFi Password Cracking in 6 Minutes and 4 Seconds
Raspberry Pi Travel Router - RaspAP (2024)
5.0 / 5 (0 votes)