Вы находитесь на странице: 1из 14

Course Project

College of Engineering and Information Sciences


DeVry University

Course Number: NETW200


Module 1: Import Kali Virtualized Appliance to VMware Player
Deliverable Due: End of Week 2

Objectives

 Perform a complete inventory of the equipment and software required to complete the
project.
 Download the Kali virtualized appliance or open virtual appliance (OVA).
 Configure the VMware Workstation Player environment to add the Kali virtualized
appliance. Test connectivity between the existing Ubuntu VM and newly added Kali VM.

Deliverables for Module 1


Submit the PowerPoint project deliverable template with the following content.
1. A screenshot of the VMware Player environment with both Ubuntu and Kali VMs.
2. A screenshot of the Kali Terminal window with the correct IPv4 address from Travel Router
3. A screenshot of the Ubuntu Terminal window with the correct IPv4 address from Travel
Router.
4. A screenshot of the ping connectivity test between the Kali and Ubuntu VMs.
5. Answers to two questions:
a. Question 1: How do you know that the two VMs can communicate with each other?
b. Question 2: What’s the purpose of bridging the Kali Linux Network Adapter?
Project Background Information
This session will culminate with a signature assignment, a series of activities performed each
week. This project is a continuation of the NETW190 project where you created a LAN network
with one host Virtual Machine (VM), one Ubuntu VM, and one travel router. The figures below
identify the various components used in the NETW190 and NETW200 Course Projects.

Figure 1: NETW190 Course Project Diagram

Below is the network diagram of the NETW200 Project. Note the difference in number of VMs
and travel routers.

Figure 2: NETW200 Course Project Diagram


Project Scenario
In this Course Project, you are implementing a small network that supports both IPv4 and IPv6.
The network is made up of two travel routers, one Host Machine, and three Guest VMs. The
Host Machine and Guest VMs will dynamically obtain their IP addresses from the travel routers.

In order for the VMs to obtain dynamic IP addresses, you will perform configuration steps on
two travel routers to enable the Dynamic Host Configuration Protocol (DHCP). To facilitate
communication between the endpoint devices or VMs, you will also configure static routing and
other functions on the travel routers.

The successful completion of NETW190 is a prerequisite to this project. As a result, you are
expected to have already set up a VMware Player environment and installed an Ubuntu VM.

At the end of Module 1, you will enhance your knowledge of virtualization technology by
adding a second virtualized appliance to the VMware Player environment. The final VMware
environment will have one Host Machine and two Guest VMs. Successful completion of Module
1 requires full network connectivity between the Host and Guest VMs, between Host Machine
and Travel Router, and between Guest VMs and Travel Router.

In Module 2, you are required to logically segment the network to support multiple subnets. In
brief, you will design an IP addressing scheme to support additional LAN and WAN segments in
future modules.

In Module 3, you will perform a vulnerability assessment scan against a Linux Server, by using
the well-known Open Vulnerability Assessment System (OpenVAS) tool. Note that Security
Analysts and Administrators use tools such as OpenVAS to assess the security posture of their
networks. The vulnerability scan report will inform us of the best way to remedy the identified
vulnerabilities in order to reduce security risks to an acceptable level.

In Module 4, you will focus on password management. To access computing resources, all
entities must present a credential set. In most cases, the credential set is in the form of a
username and password. Because the use of the credential set gives an entity some level of
access to computing resources, it makes sense for network administrators to enforce the use of
strong passwords. It protects against password attacks including dictionary, rainbow table, and
brute-force attacks. You will use John the Ripper, one of the most used password cracking tools
in IT security, to assess the strength of passwords in your system.

In Module 5, you will monitor the health of a network. Today's networks must do more than
simply providing connectivity from source to destination endpoints. End users often use real-
time, transaction-based, and non-real-time applications. Each category of applications requires
a different level of services. It is important for network engineers to monitor the network
activities to ensure that the network meets the organization needs. Some of the key
requirements in modern networks include performance, reliability, scalability, adaptability,
security, manageability, and so forth. You will use tools such as Monitorix, Wireshark, and
Etherape to monitor the health of a network.

Today's end users expect to access computing resources from anywhere, at anytime, and on
any device. Being confined to a desk behind a personal computer is no longer an option for
enterprise users. In Module 6, to meet enterprise business needs, you will set up a wireless
local area network (WLAN) with enhanced security services. You will expand the current WLAN
to cover a wider area via wireless bridging. You will also add new LAN subnets to simulate
growth in the current network. You will configure routing to ensure full connectivity between
endpoints in the network.

By the end of the project, you would have investigated an array of enterprise-level technologies
including Virtualization, WLANs, network monitoring, Virtual Switching (vSwitch), Routing, and
Vulnerability Management. All these technologies work seamlessly to support an organization's
business needs.

Let's get started.

Required Resources

 One GL-AR750-424 travel router


 One GL-MT300N-V2 travel router
 UbiGear Cable Kit
 VMware Workstation Player
 Ubuntu 18.04.2 LTS
 Kali Linux OVA
 Linux Server OVA
 Student laptop or equivalent PC
Below are the pictures of the devices used in this project.

Note: There are two travel routers in the above pictures—one yellow and one white. The two
pictures of each router represent different angles.

Below is a high-level view of the various technical components covered in the Course Project.
Prerequisite
This Course Project assumes the following:

 You have already configured the Ubuntu VM in bridged mode from the NETW190 Course
Project.

 The Ubuntu VM and Host Machine are able to obtain dynamic IP addresses from Travel
Router.
Equipment and Software Needed in Module 1

 GL-MT300N-V2 Travel Router


 One USB cable to power the Travel Router
 One UTP cable to connect the Host Computer to the Travel Router
 The Kali VM Appliance (OVA extension)
Procedure
To import the Kali VM into the VMware environment, perform the steps below from the
VMware Player management window.

1. Download the Kali-disk (zip file) from the Module 1 Project page of your course shell into
the Downloads folder. It requires a relatively fast and stable Internet connection.
2. Right click on the download file, select Extract All… to unzip the file into a folder.
3. Launch the VMware Workstation Player.
4. Click on the Open Virtual Machine button.

5. Navigate to the location of the virtual machine appliance file in the Downloads folder and
click Open. It is NOT the zipped file. It is the Virtual Machine Disk Format file in the unzipped
file folder from Step 2.
6. In the Import Virtual Machine dialog that follows, click the Import button to install the Kali
VM appliance. Note that this action can take a few minutes to complete.
7. Once the import finishes, you will see the Kali VM in the VMware Player window. Highlight
the Kali VM and select the Edit Virtual Machine Settings option on the right.

8. Select the Hardware tab and click on Network Adapter. On the right-hand side, check the
Bridged: Connected directly to the physical network option. Click on the Configure
Adapters button, and check Realtek PCIe GbE Family Controller. Click OK twice to go back
to the VMware Player window.

Note: you need to bridge the Kali VM's network adapter interface the same way you
bridged the network adapter of the Ubuntu VM in NETW190. Otherwise, the Kali VM will be
on a different subnet from the Ubuntu VM and Host Machine.
9. Take a screen capture similar to the one below, and add it to the Module 1 PPT template.
Click on Play Virtual Machine to load the Kali VM.
10. At the Login prompt enter root as the username and toor as the password. After logging
into the Kali VM, click on the Terminal icon on the taskbar to open a terminal window. Type
ifconfig or ip addr at the CLI prompt to verify it dynamic IPv4 address leased from the Travel
Router. Take a screen capture of the terminal window with the IPv4 address, and add it to
the Module 1 PPT template.
11. Launch a second instance of VMware Workstation Plyer. Highlight the Ubuntu VM and click
on Play virtual machine on the right side.

12. Right click on Ubuntu desktop, select Open Terminal, and open a terminal window.
13. Type ip addr or ifconfig to view the assigned IPv4 address. Take a screen capture of the
terminal window with the IPv4 address, and add it to the Module 1 PPT template.

14. Write down the IPv4 addresses of the Kali and Ubuntu VMs. Use the ping utility to conduct a
connectivity test between them. Remember to press CTRL+C to stop the continuous ping in
Linux. Take a screen capture of the ping result similar to the one below, and add it to the
Module 1 PPT template.

Kali VM My IP Address:

Ubuntu VM My IP Address:
Question 1: How do you know that the two VMs can communicate with each other?
Question 2: What’s the purpose of bridging the Kali Linux Network Adapter?

Congratulations! You are done with Module 1.

Вам также может понравиться