Skip to content

N-y-c-t-o/Ransomware-Simulation-All-Files

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🔐 Crypto Ransomware Simulation

This project is a Crypto Ransomware Simulation developed for the course:

CST-7413 – Ethical Hacking and Penetration Testing
Faculty of Computer System and Technologies
University of Information Technology
Academic Year: 2025–2026

The project demonstrates a complete ransomware attack lifecycle in a controlled laboratory environment, including phishing delivery, payload execution, file encryption, command-and-control communication, and recovery.

⚠️ Important:
This project was created strictly for educational and cybersecurity research purposes.
All experiments were conducted in an isolated lab environment.


🎯 Project Objectives

The objectives of this simulation include:

  • Demonstrating how ransomware attacks are delivered through phishing campaigns
  • Understanding encryption techniques used by ransomware
  • Studying command-and-control communication
  • Practicing incident response and recovery
  • Improving cybersecurity awareness and defensive strategies

🧠 Attack Simulation Overview

The ransomware simulation replicates a typical ransomware attack workflow:

  1. Phishing Email Campaign
  2. Malicious Website Hosting
  3. Payload Delivery
  4. File Encryption
  5. Command & Control Communication
  6. Recovery Process

This allows cybersecurity students to observe how ransomware attacks operate and how defenders can respond.


🛠 Technologies Used

Operating Systems

  • Kali Linux
  • Windows 10 / Windows 11

Programming

  • Python 3

Libraries

  • PyCryptodome

Tools

  • Kali Linux penetration testing tools
  • PyInstaller
  • Apache Web Server
  • Netlify (website hosting)
  • Gmail SMTP (email delivery)

💻 System Architecture

Attacker Machine (Kali Linux)

├── Phishing Email Script

├── Malicious Website

├── Ransomware Builder

└── Command & Control Server

▼ Victim Machine (Windows)

├── Downloads payload

├── Executes ransomware

└── Files encrypted

▼ Encryption key sent to attacker server

│ ▼ Recovery tool provided to decrypt files


🔐 Encryption Method

The ransomware simulation uses:

  • AES-256 encryption
  • CBC encryption mode
  • Random key generation
  • Secure initialization vectors (IV)

This reflects techniques used by modern ransomware families.


🧪 Testing Procedure

The simulation was tested using the following steps:

  1. Deploy malicious website
  2. Send phishing email to victim machine
  3. Victim downloads executable payload
  4. Ransomware encrypts files
  5. Encryption key transmitted to attacker server
  6. Recovery tool sent to victim for decryption

The experiment demonstrates the full attack chain from initial compromise to recovery.


⚠️ Ethical Disclaimer

This project was created for educational purposes only.

The techniques demonstrated in this repository are intended to help students and security professionals:

  • Understand ransomware behavior
  • Improve detection and prevention methods
  • Train in cybersecurity incident response

Do not use this code for malicious activities.

The author is not responsible for any misuse of this project.


🚧 Future Improvements

Possible future enhancements include:

  • Polymorphic ransomware simulation
  • Lateral movement simulation
  • Machine learning–based ransomware detection
  • Network anomaly monitoring
  • Security awareness training modules

👥 Authors

Thaw Htet Swann — 4CSEC-1601
Kyaw Min Wai — 4CSEC-1919

Faculty of Computer System and Technologies
University of Information Technology


📚 References


📌 Note

All experiments described in this project were conducted in a controlled laboratory environment with proper authorization.

This project aims to improve cybersecurity education and ransomware defense research.

About

A Python-based ransomware simulation project designed for cybersecurity education and research to demonstrate how ransomware encrypts files and how recovery mechanisms work in a controlled environment.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors