Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
83 views
81 pages
7115 Cns Manual
Uploaded by
Balveer Singh Bhatia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save 7115 Cns Manual For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
83 views
81 pages
7115 Cns Manual
Uploaded by
Balveer Singh Bhatia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save 7115 Cns Manual For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save 7115 Cns Manual For Later
You are on page 1
/ 81
Search
Fullscreen
Practical 2jous security experiments, (attach all sereen AIM: Configure a system for va at the end of practical with steps and procedure) on/off firewall tall antivirus o configure firewall rules o configure user accounts with passwords 1. Turn ON/OFF Firewall 1. Open the Control Panel (icons view), and click on the Windows Firewall icon. 2. Click on the Turn Windows Firewall on or off link on the left side. © change tiation stings © fmndens Genter © fete detasts © sennces ngs Not connected connected shots Select (dot) Turn on Windows Firewall for each network profile you want, and click/tap on OK. (see screenshot below) Customize settings for each type of network ‘You can motify the Firewall settings for exch type of networkthat you use. Private neterk settings @ Tum on Viindows Defender Firewall [DiBiock allincoming connections, including those inthe ist of allowed apps Notify me when Windows Defender Firewall blocks @ new app. (Y_ Otumet windows Deender rena (et recommenses Public netwerk sett Q _Drumon windows DeenderFrewat [stock attincoming connectcns including thezein thelist ef allowed apps [Notify me when Windows Defender Firewall locks a new app GY Oumot vindone Dlede Freel net rcommended)2.To INSTALL Anit-Virus 1, If you downloaded the antivirus program on the Internet, find the downloaded file on your computer. Look for a file named setup.exe, install.exe, or something similar, then double- click that file. The installation process should start, with a window opening to help guide you through the install process. 2. In the installation process window, follow the steps provided to install the antivirus program. 3. When installation process is complete, close out of install window. 4, The AntiVirus program is now installed and ready to use. 3.To Configure Firewall Rules: Open Control Panel, and click on the Windows Firewalll icon and then click “Advanced Settings on left side. © tenrseonecwntrcintnatt reed @ caardomeconussrnesni oe | manocroetensen \ |] | © mnntermcceoaerne asene sett | & caenoweraensracenaes eed 2. Now open Inbound Rules And Outbound Rules. You can add new rules by clicking New Rule button on right side panelRule Type Senco ype of mate te rea l= Name One Givens, 2058) BRIE © Graton (Tes cance! 4. You can even delete rules by right clicking on them and tapping Delete Button. 4.To Configure User Accounts with Passwords 1. Open Control Panel and open User Account. ene ey ee eae Make changes to your user account ‘Manage your credentials. aaa ‘Make changes to my account in PC sexings Manage your file encryption certificates © Configure edvanced user Frofilepropenies © Changeyoureccount type Change my envicnmént © Menage snctherscesunt variables © Change User Account Control setings 2. Ifyou want to change your account name then open Change Your Account Name. 3. Ifyou want to create new account then open Manage Another Account, 4. tfyou want to change your account type then click on Change Your Account Type. ————.Practical 3AIM: Configure Web brows r security settings. (attach sereen shots at the end of ractical with steps and procedure) To clear cookie nd history v 1 2. To clear temp folder 3. To modify set ternet explorer regarding securi 1. To clear Cookie and History 1. Open your Browser and go to Settings, then Click Privacy and Security. 2, Then click on Ciear Browsing Data. 3. If want to clear cookies and history check the box and press Clear Now. | 2. To clear temp Folders 1. Press WINDOWS + R key. \ 2. Then type ‘%temp%’ and press ENTER. 3. Thena folder will open with all temp files/folders, you can delete them by selecting them and pressing DEL button. | 3. To modify Settings in Internet Explorer Regarding —__ Security |—_ ee | 2. Open internet Explorer and goto Settings | 2. Then go to Internet option and click on Security.\ Generel Security Pnvacy Content Connections Programs Advanced Select a zone to view or change searrity settings. | @ & ¥ 8 \ | Internet Local intrenet Trusted stes Restricted | ates Internet \ \ @ This zone is for Internet webstes, excent those sted in trusted and restricted rones. Security level for this zone Alowed levels for this zone: Medum to High Medium-high = Appropnate for most yebstes mma Prompts before dovnloadeg potenboty uncafe content i SCinsigned ActiveX controls wnat be downloaded ienable Protected Mode (requres restarting Internet Explorer) ‘Custom level. Qefeutlevel Reset al zones to defouit level 3. Now you can change/modify security settings as you need.General Security Privacy ; Content Connections Programs Advanced Select a zone to view or change security settings. | @ oe YY Intemet —Localintranet Trustedsites Restricted | \ | sites | Internet | | @ This zone is for Internet websites, \ except those ited in trusted and | ee | | { { i Security level for this zone Allowed levels for this zone: Medium to High | Medium-high - Appropriate for most websites = -Prompts before downloading potentially unsafe, content - Unsigned ActiveX controls will not be downloaded Enable Protected Mode (requires restarting Internet Explorer)Practical 4Practical 4 AIM: Draw Diagram of DoS, backdoors, trapdoors. Also explain each of them. — #8 20s chach i at atachmert ty shut-down a ruachhie A yetwerk making it 4s accessible by it interded. — Ds atach accrnpelish Pais by holding Phe target ath trafic os serhyg +t bayermatier that triggers. > fackdewts :— [Yee ka _—_] I # Lackelots ts a acess fe cornputer prrogsan7 that by parses seantty mechatisms. — WR pegeUnmers ray gone ts stall a. backers 5¢ Phat the perogkom cat be accesse) ye ts pralle-shatirg a other purpose. —» Prades :— Sees Use A THAHIAO*TSFAHO HRM HAD ’ a ae iz 2 > és ‘ad 066006 46 ob did aad ale d mes— Tsapclets 8 a ra0thce) off gaits aces te wane part of a asysters a then ther ly the vehverk —,raluce- | — Like gairting access artheat having. tv Hfyly Qi prassade 20.Practical 5Practical 5 AIM: Draw diagrams of sniffing, spoofing, man in the middle & replay attacks. Also explain each of them. — Si ffieg — [West L ~-~--[fiteh — Luffirg ts the proces of motitriay & capturtiy all the packets passing thacugh & giver ~rehacrk ushrg s-riffirg heals. — + is a yarn of “Keeping rete aghives’ & get te kid abcat the awersabern. — i che calle) wirsedapgenng apelie) ty computer ryekactks. [ swtting cov be either achve cs peassive ia Ca tLe I> Le Lek come aHachy: LEAVES is & RC Tevhmeal tia Alma _Compt nd Ne Come Cone 388000 —f Pats cach ot aviother sets packets otthirg cemect source ad! r0h5. — wher this haypors Pee caceves werh-rourg | worl) ver) yeackets lack +e this yaget Pus. b> Replay wHtach :— aHachin — serly athack is a yor of ~retwcth attack fet hich @ vali) data Pataminsicr 4s méliccably os ngeate) A delayer. — 7 replay chach 1 also hrady ws playback atack. —> Pray ny fhe middie ctlack »— vichiny atackés TEE Fecha nts Amatoco — > We may ty bt middle ctack frterapts @ comruniadticr belwar tbY syste. — ubiag Sif ferer? techrvelegy the attackty Splits thee crigimal 1P correche1s tty 2 10 ariectr ote bekseer the chert aid He chert aid the ataken & auther betoun the atlack» 3 the sewer as Ahadr fiqurt. © Tabaval ae AblePractical 6Practical 6 AIM: Draw diagram for Confidentiality, Integrity & Availability, Also explain each of them. availtill y) fy Feige: ity —> Cerfedertialy :— —confidertialy meats phat cily Phe authertee Pidvidluals systems cat yitw) Seithie classified rhfamaticr The ta being serd ever the rtekice chee) et be accener) acussee) by w-rasthcrizt) Jtdiiduals. The Hacks may Jay tw capture te cake Ulan differen tyols available ot the ictervet & giver gaiy access fo Yous itfermation. W phimary Way fv aes) this Ls ty use the orcryehor techrigte fy sadeguar) yar chta vo that ever ip, the atachts GUI13 Geers th yah data, che etl! ot be able fe ery dt.> rtegpity »— — The text fhigg te Falk abeut & fortegaity. — The ea ts hear making sure tat data has vot beer marhified. | . ~ etsuyeher of Gata is eilurg te rna-rtaim the date Htegathy. — % check i car Sata has been melyjed ce make we of a hash ~furchior. 2 Avaiti lity ,— — This. meats frat the rehserk should! be asawily availotle te FHS. MBAs. — this applies Ww systera aid Ww. data. — 7% ersure auaililty te aetacrh adratris tration heal! wabydaim, bvardisan, raake regulate. upghailes, hart a [elt fo fail over ard prevert totlle eck iat 2 crehoceh. — toch each such % Dos Ddos may sere a ~yelock uquvelelle as the Atsrrces of te cyehork gets ac hausted . ant wens whe Athy of fhe cretwerk Guisrers tals: a — Thus, perpen measiirts chetl! Ce taken fe prevert such attack . — Fhe srapact may be Sg ficatt to the compar SI*®MMMFM®IMMABHMARHRHEOD ODA . re at NN 2Practical 7Compt and Networking Seerty Cane AIM: Write Ceaser’s simple rule; sh becomes D. B becomes "wrap around". W becomes Practical 7 ipher algorithm & Solve various examples based on rerypl a message with a Caesar ci Sift by th r Each letter is replaced by the leter three | etter: nd so on. For the last letters, we € an think oft X bevo back. each letter is replaced by the one three before it, EXAMPLE: Encryption: Step t Ste 2 step 3 ute 4 step = STG E Stee Ww Y ek : Steet Get plant text ay) iz0 Repeat phncigh step uh plain cigs =aall Grebe I= Cpka's 0174-37 mee Pata? Giphta GF iarcpemnert 0 with I, exd Crd) null at etl of CD WO techoca snas Ababa ‘Ga SatsCourse Coe 3380704 ng enn nat YFtr Vaid 1b ITHe “Sec bh ET a © SHRYR way wud ow yuo u u wwg Ho uy BaRGN i} c u & L> c1= Cpt + Reyrrceht ote 3s 456 eH aH em A B © D € Few2zgygkem bee be CLC edig ttle yen DeErat toK Lmao PERS TY VOX Exaqnaelt +— plain text : Ceasle cipher) Rey: 67 = CR7 they) modee C7 = Ce+3.> medee = Cata) mnedab = cx) mev26 = 6.7 = Ge4ay megeb = C443) mofab => C4) meee CT = cata) mog/eb= Cots) melee - 3) med/2é oT C543) medlee = CIE) gped/ag = (a1) med/26 C7 = (043) ynq/26 = C443) gnca/eg = 64) md 26 7 = Cr43) yredleb = C143) neglag = (29) 900/26 1 = Ce+s) mes = C2) medias » (5) mi 26 ct = Ci#3) rnedeé = (43) medieg = Cl) mel 26 c-1 = (p43) medee = (1543) modes - WD melee od = Ch43) madee = (443) wddaé = C0) rey 26 e meget = mbes = CH red Ye cd €é+3) CAt3) es = (20) “ coy Gna) deb « citt3) MARE = OM WATE Cipher Text :~ ALS KH FH QVHU ReDecryption Klgcrithrn :— 2 vdoot | ep | lutez 2: | vtep3 + | ute + | uteps > JStEp& ER? 2 Decrypter Citra Teoct = EMDUMU PLSIKHU key =3 platy text = Co-7- key) nce C7 PT PT PT | pq PT PT RT PT PT Pq PT CF-3) CH-3) CD-D cv-3) CH-3) cu-3) CF-3) Cb-3) €5-3) cK-3) CH-) cu-3) Ceaser Get cipher Test at I=0. fupeat Thycagh ster wrt ptciy = Cercig thet) moval perat RICE rucsemert 2 atth |. érd (Add Mul at ed of PT). methed? - mnie 26 yee 26 ned) 26 mney 26 raed 26 raed 26 med 26 raed 26 rnd) 2 vag) 26 med 26 ma) 26 Platt Text:- cipher I chyzher Cig! ral = C5-3) vnvdeb =@) rna26= 2 =e = C¥-3) mog26 = ca mnayee 4 E = (3-3) ral26 = Wo) mo2s=0 ~ A = C2l-3) modal = 19 yee e168 = 5 C4-3) raed/e6 =64) mepre- 4 =F Cav-3) red 26 = CH) meee= 1% = R Cs-3) modab= 2° € wu " = Cil-3) mae = & =F = Cls.3) med 26 = 'S =P = Cw-3) ma/eg == H = (9-3) medeb FAH E = Cj) deb HIt=RPractical 8Course Code 3350701 Computer and Neti Secu Practical 8 AIM: Write, test and debug Ceaser cipher algorithm in C/C++/Java/Python/Matlab. Code: Enerypi # fyclude Latudiv hv byclude score. AS uri! Ercnypeties Ceharcd, to; wil Seaypetor Ccharcy, tat); Chan p+ C309, C+ C30T; wit main cd € Abr 9 ; , Pitrht Certer pelea tect:"); deanf CVrs", P+); eranyrter CPt3); Decayehon Cce#,3) getch c2; ward Euhry eter Cohas ect, rat hex g yt i=0; Gaile CPHCI 1 ="\o'd ce c+ Oy = P+ Cizt they; a, if CP+CITt = ROBE PACS <= ZO _ if Cot cior Oo L cecigs ocry —'z/ ¢ AKI. a? . . if ©P 4cips='G'8R PtCIZK<= '2/D Uf Ce#erd 29 ; ‘ +Cig=crciy -'z"t'a HC tes ttsComat and Newark Sect en Decryption: c# y= "\o', Paint Cf ciyehes Text? +5", CF; vei! Deenypeticr Cohan c+ C4, tt hey D it joo, awhile Ce#cit = \\o'S ptcig= CHOY- hey; if Co+cias ='A' BB CH CIL= '2f) if CPt Cig 4'AD pecig = P4cig t°X- REN; J if Cot case ha "Bg ciclsa = s2'9 a if CP1 CI 4 a3; saftal tl; pecia= PHClZ + F itt; ptcrgs > \e', poriett CtN platy tect: 0s", P+?; ounbor Grter yelara Text + Zebra cirher text > chew)? pelaig téoct 3s zehaa BC Teal Ive AmaliaPractical 9yew wwwwvwrwwwewewwuwwwvwwewuvuwuwuwewwwewwvuee ~§~ Practical 9 AIM: Write algorithm/steps for Shift Cipher & solve various examples on it. —> He te crcaypet -— ) covert jettles te ~turibes +7 ader starting yor call ft x. (2) caleulafe > c1= cx thoy) mol 26 Y civet arden "1 ct pate leHe ro order of aljzhalets . Fo exarnzles — | Pe pia tect : shift ciyeher is sherpteot phen eo 56 565 6 F FF FOS (e123 1024 F +13 20 F BBD mode xy maky hoT4 mg @ Cipher Teck :— Cxmraky h~umge Dtes te deenypd = Dccwert, ciehorlect IeHen fate varabo, 9-4 tts eden slartirig frera oa, call St %- 2) calatlate : PT Cr- key) med2b a) awert aearaben in PT be letter alyzhabe ts 4 cde of ae Graryz — Cyechen Text: - ky basing? fey xmamak yh tw m g 5 5 5§ &§ SS § s s & 3S eT Cee © Fi 2 e BF 4 IH) sh iqte ight é 2 platy Text :— shift chizeher ae ew eeePractical 10Compute an Practical 10 AIM: Write algorithm/steps for Hill Cipher and solve examples on it. & mataie rubipleator Mill cipher Uses rrIatn/o¢ Eucaypetion algenrithy takes jelary Text od a thers iy ewe of matric by tabhig (etna antler. Thor pt. tA aplitte? +4 blocks of AIZL of key matrise Goth matarc lec ant rau ltipelie? ther. I> eayetirs :— rw SECRET PT GOT RAR Key: "G Pa) (BFS) (E J) "Ee Pa E #2) (5 (TE Cipher Text = Yag Jar z— Decayphion :— To deny? fyverse of key matatoc 6 aford. & Hey raultilied cith cipher ratrirc- (t dtemrinart of hep mate is wt qthern Aywese cay fe feud. Cipher teed — Yak Jar Key :— (s = wo 2 © af el i > gprs Y es w gor at G)e fare a an raed 26 a a atom oF 16 = [3r2 ree | mole = a = é FOA 2 c Fo 5 ww q QI r 2! 6 medlab 2 12 z m ! = Qae - [ZF reales) -& € ee 4 7 Plaig Jesct — SECRET a & al Bry te 74 Re as —— eta Ct w Cesta Ita, AlmadaPractical 11AIM: Write algorithm/steps for play ipher and solve examples on it. “ployfais uses sxe rmatstc which ts used by she tht keyed. + Exter beyloard iy raqhafoc 400d ese ,dige duel cate feller. fil) aernatiiag space att abt of ahehelels. phat wen “we a part of keyword. samtiye zg aid g iy samt call. We must spelt Platy text pydy eeaths of Jetfers. > hes Rules :-~ if pate certain, sare letters turce thay irsert ‘x te Gelert. td both |eHes are ty seme rad ther uplace cath by eter tramedaitely Aight Ae it, (f Goth letters are Pr sore aus, Hey ssplac cach ly (eter frmedaitely falas of t+. id perms rectargle fer which letter art cyzpesibe caren of ructargle of Aorre was. Mai-rlaiy the. crder of leters fy platrtect ate the ciyzhatece as eel.comma) aye jos key = Security P= cayphe gagyehy. I é c 4 i +t yaitb Sf 4 4g AR loom a o f[? Gq vw “x « 7 = oe yp ty ge ap hy a boob vb ok uy by am ke bo 9% ciehr Tad :-— ursbramke bu ge 2 Decsypetion — key = Security Ct s cayrkgnagehy CT Us ba am ke Ue ga bb bbe cA ye ke 9h ap Ay feats tect : cnyrebo gasyehy Tee ects ss AnetoPractical 12Practical 12 AIM: Write algorithm/steps for Verman Cipher & solve various examples on it. > Maaithra— y reat each Pt alehabets as stumble, 7 Micheastr1g SCqUetce. 2) Jv some fer each character of Pract cipthenteot @: YAW cach rurale, ceressperding fy P7. calphalee © €. fe certss pordiag — ciehentext alehabet E if the Hus jercduced & greeter phar 26 tet 6. 8 Fea aan & substract 26 from tt a th hk D trarslede cach amb of some back ; Le ie fc cerresspordrng ahchale?. his gives a te calles Exernyele. - q PT g- Verntam 5 cite - Hime: pad t— ciyzher 6 & Vv e a“ cal ™m pee ee sai © e c i ph € & 2 se is 4 4 (F & ry 23 12 204 eDdadad 2 Pp—> Decayetiorr :— oT xm gued OP cigher yelait Text — Vee am xX m g us @ J 23 (2 6 go 4 3 c o pp A eC 2 ec Ww FF 4 IF eer? Py ee ed 4 ae ets)Practical 13Practical 13 AIM : Write algorithm/steps for Vignere Cipher & solve various examples on it. late mos Pia SESE la! We OM Kk De an vixia mina Ait IMN] Oe] efile a) Ba BE ie Sieh sie | isfetarads Teloh uly a ; feared vies x] yt ofelrta: inl PEE) cictoialete|2 7-7 fez inis eta 4 BC Tech Inaias, Asta ars| th a relyalhabehic meats mere Piet | ahehabet is Avcergrize) frorr sityle character. This uses Sdferert cipher based ct eters of hey boars. St arsists of alphabets ctsifter 26 Himes tm tis, each shifter) oye ically ty left. to fii! cizeher , fird ther platy eter ov legt wide ai! take cosrespori1g yelaia text ari key- we) eral) fe cersiclere). p— Etcayptor :— PT = Vigyere tystream ~~ cou”dt co CT - *%¥ @ AA x48 —» descaysetict *— CT - KWAFA xX TS hey sts earg - cCovwm7tco PI-V2zZaWEREPractical 142 a vy Practical 14 AIM: Write algorithm/steps for one time pad & solve various examples on in, > Alyaithra — D Meat each platy tect alphabet as ~umber the Prucreast1g = SEU EICE de vame fr each character of Ryeut C-T. fe) cach pt alphabet fo arrespecwiag ineut CT alehtet pur Ler if Thus pruduel te gererate that 26 ter Jubstrat 26 fiom at. Trarslate each ~wmber of Acme tack ty erresectding alehabet. This gives cuteut cyzher tent. ne CT. = 0.7. PLS a emp — age ted Ciizher Jeoct --— OUR PLUK BC Teta site AhmeaN aoe{Compote and Neti Ses > Decr ypebior OURP wh on = Bab) (pe ClGt Oo VR Pw 14 20 mt is 22 a IF Pelaiy teat TE halon rans AbmeifadPractical 15Practical 15 AIM: Draw diagram of Public Key Infrastructure. A | L\ [7 Oo NX mao a | — B— |_| — pee soils Jor public hey ttf res truchire. —pke ts a set poles , policies , hardiart, Software aid peucedure ryeded oA aagte, mariage, fistrt lated , une, RAR ate AM” hey Sgital « hae anf manage cneKy pret.Practical 16Compote and Neekin Scat Course Cake HOME Practical 16 AIM: Draw diagram of Centralized/Decentralized Infrastructure, —- conteall ea) (np frasbrctarr i — coho! autharing creates single peotrb of falure. — Big jelracy trsuts. — sean backup & jrwfersirial malytaranrce — shiage of large amaryy df data. . — ybraclachor of ~varrbertyg systems.‘Computer and Network Seen Course Ce 3390704 —> Deceertrslized) Prd sesturchiae >— - data — Wes — Last — Jrze —. P20 — card are, sex cart Pol private bey te ceryrt data. gmat cars! problem. peollern . pero blem. td reestrt cPLAL exper slut fe build.Practical 17y Owes 4. He Lit us a type of security valyesa Lility Practical 17 C—O typically for ty ase appelreahiris- xss attacks — erabrles hr _ er cheth~ @ side seripts ierto adel rages attoeut vieJel @| ly other USess. a xss uuleralility may be used by attacktrs | te ly pass access cottpola such ay Sart @ crigicn pro lin. a ay viel waits Poasteo Hausted aJSebsiteS® website ard rgita ex malicious Acriith @ A: | alvichimn's Levelsen executes Hx malicious my oe exit & ubrcatedgby a fermataed desiree) infermatit dj hacks. hachus tgects pasted elsites aith . rnalictous ScriptPractical 18Practical 18 AIM: Draw various Security Topologies. — Security Rotts The first aspect of security ts lapered defJerce. — The aattermest layer, providing basic poovtectin & trier mest faye, yrruureinng hig heat exotectiots. ime lca eee -omz stats fear dee rilater‘ze) ote —@ om ib a computer cehork 4s ue iy the same amy, j+ acts as a luffer zner Letoeer interred , ashes 10 cerhol exists & tee tree secure yekocrk, abhet ay Sgarizatiot has specify peolioy Pay (2lieg « eich eieieiiet ee ee fa ot oe ne duuded Mywke we arte L) s~) Sat fan ; — | oles pedl ome som tnuste fire foarte =o id ado PPenero > Lerterret >— —J+ 2 auld cide correction 2B tt used bw Pprarsjest e-mails dinarcial . pLerXh , varote acces: — The torterrret is wot a Alirigle medescrh , but a series of iter correct) yetaak that fellas putes te gptrate ty erate data flas acu H. Lhe term cud is fprequertly usa) AYrqotyrl- cushy fy reperesett Whe Setteract , lat tee www 4s actualy gust ote aed of ernie availalle ia tertenctet- of tefeacrks , files, 4 Ziterach— — drteract is a term use) Ww descrite @ rretarceh fret has the same furchiorality as the ttterict gon users but Ires cornpeletelyy Pysile the fruste) arte a nyetark 8 th urder te security certrd| of Ayotert B cpessh aWmiey'shraks.Practical 19Gpestenanttnvenes Hasan tbtyYF sateeernes il HU RARE ISIsty Dem teeing EIN dereNATURAL RO FO Artsc0e Leng thet 8 5 eeERS| Han Sea tester) SAME! renee20 yeral sta nc ff Pee bloatPractical : 20Pr: 0) AIM : Demostrate Sniffing using packet (ool : SNORT —y» SMORT :— ope1 Source etaork [np sPALLsIO1 — pf 4 at . att. detection Systern Créaps) created bf ™ te packet sryidfen that mari ters ciehaek traffic t4 real Hae. ~ by LUi¢ SNORT dy wakh your yehicnks , 404 cat punfam cotter? searhl 9 & oes aaa every packet Prat Praverses PUaguy’ yee ongerizaler ard delet a myst) of ctack & hostile Praffic oll +4 Atal Here. ey yee) at least wee te ty SORT. a Steps te istel/ sar D wwe) & achat srt full fem sled welsites . 2) Gere irradalliag Sort, make gle yet fave package of Wibeap 6 Npree- ID verify the soot /pstellahir « 4) create Aaquined cotfiguration. file, sull file and lag Shacks. SS) Execute sat: Pa DPX »a»xmx wana we-4 — Svat as packet logger :— - Yar car test sherds swrtts loggits abilities with 1 Cleg switch by typbrg Ps - CH\ssyont Whe 1 e:\ syoot log-ll ptss ctalto w Ato. iting @ testg Siort ate wtfiguraker B Aules- Ci NS Seyost—? —befere usity sorort, maitgate tte es \artot \ by, Yo test: deravt -i |-¢ 0: \ siost\ ete\ actoat. atf-I To sure srt i [-< 08 \ est \ete \ Arrest. cery-A. arco! To shyt: cholec a hyardy your ~rehoch atth srt: - Tyee follat1g command iy emd': c:\ sost \ bins Ht -OPractical: 214023 “onfigure your e-mail account agai spoofing ete. | YD) Apooing and phishing — ry ay emath asprooft1y case, a cyles camiral Various threats. ie. spam attack, 222 APDABA Jews a usee ay email preterolag ty be e emecie tee Use her1e0dS. a pehiatrg 3 aby ai dargers metho) eee) is by the ober calrrinals te tw! users get * sewilive tate such as batk acants ~ © Aoclal sealrity clamber. oe Gecause s/700f1G ad rhshizg an nef © the commer care ler catminads use ty % cHach , users must Riad Hee ath -phrahing © Wluchirr agaist thik kind of gases: ss 2) Eenatl securty Gey . + Le ryecessary fy deta) ambuer causn) & by the proidas rmisaitighrakers dt email # ' JOnutces « an the vulrerabiliie, Sscovere) ta email services - System, Aeveliig infennatirr aad making — & have corssauerces of trfillrattag the far Gt system, apvelttg tafermate1 att ynahfes ee Aystem traccesile athey atacks clause es Vu hyena bilities. a We teen or} 33) Rat SornecIenl = ome acryte gets idlected a program rust pare) Iyer all data Secnypte. fo Pols Sere, it 4s vecessary te ttghter fhe ematl gervices ard wait Yor the arahsig services Hv Jetect art prevett? tee syeccific fehavietr’ for sater7etart, a Malicious ples: wher rialicias cettert ia the email atachment Atachis tw te 4be, St way take ohdle computer Aystert atl creteerk. fer successful antht- pebrshieg yoludiot , these Fle rust Lt aiamse) utth shesadurt cas : at tivinus Jefterare & fehavtows artahpis ACWICEK © client aide attack — The attack vectAs fr forterrvet users the frtcreast1y — dary- by- Jar. A Jak cottaictity malicizus cottert cas le ercugh te caper cormnpreter ti seeeeshy mrt a computer alete- The email Aervices comporerts Secttstty rnils Le streyhterd, cecessar/ anh -pehishiqg — syeterg rast be cerdacted agahrst thnects.Practical 22rm art Neon Seey Gaure Practical 22 AIM: Draw diagram Host-based Intrusion Detection System. > PPP aPsPe Pde ecHest fase) dds ts Cayable of meirtatag aw aralyzirig fe trterrals of 4 computer, system as asell as Tee creteacrk rackets ot 4s qehok trterdace , stmilan ty He aay a -yeteacrh frase) tsbutclion delech oy Aystert — epeerater. iPractical 23Practical 23 AIM: Draw diagram Network-based Intrusion Detection System. ear nenver systern / \ | vOredred’e | feck oT ALTOS ' | ' t pee Mass] ae aplicaticrs TN afefe Bender acces cotta Aerver +t ts easy fs délay & cost effective sre a single device Le capable cas dee ending ctetaterek or atleast +5 certal+ segmert as eampare) fy best base) Aysters. the systems ane easily alalle. : ‘ f lace. at N 4 a @ penotectiot ayatem = fy jelac es tho an evtraice of Ma powtecte) vtehankal ubich gxres combin@) jrrotecto1 fy the Aefleretin types hats (1 o@ go. rgPractical 24Practical 24 AIM: Demonstration of SQL-Injection. Sih taygectot ts 0 cde bajectos techrique that ritght destroy Your dctalare- pt th ore ot the most commeat asel fechiqe- She tagechor ts Fat placerne-++ of malicdcees yrogé tory, ‘ coe it sa Shectemerts , via web ; pagectiot Gased Gi = aluats Tule. User dd = 110 oR j=l : ak stactemer?5 licks like hia: 1 4 hackings ‘ ‘ SL — select * feorq users ashere userdd =los oR Wl; the san alwe is valid & will Actwry all ns ford The ‘users’ able, atree i=l is ahsayts trt- | the hack, migit get access ty user eyes ai! parsscierds 4 Jatabare by stmjely f13€n Her "oR" ot ple beatae ok parsed. eR Ia ° Ut 8a" [2A GIAO : Ya" va” a =—» (Result i oul Select « fsorn users athere Mamen” “or '= AOD parser) =-"" oe “=". So, abort Sah way wu @ valid) & wilh Actus all roars fror7 ‘users’ Fable, ota a “=" by always Aut: IPractical 254 Myce Lt : We Priclue Lecriorhy AIM: Demons! wd maire) é Prt, 9%, 9, 4,9, 0,91 - Prd gel, BEI, KIEL, Ko clascr 0 ; perittf Cletter value of n:"), earl Crd", 1): fr Ciao, (koxp fet dD AG; AO AKT, fer Cleo, fay 3 144) Br Bg; B= BI; VO Geo 7 ke, tld kK, KB; eat or C4, 20, 9, 4%; ut 4D Kg = Kg * 135 Ko=2kopy ; 1 if C2 zKed . . peird{ C “ayanmetll Rif As gy gether te OUEEUT— — gyter value of 9:23 e1ter Valul of a,x, ¥ ae a pu as Velie v ms ts ic key is ©g aint! Cette, vyaluc of «7 ,Xx,¥:"), Were Od ad 2d*, a5, BX, BY), pent C"yaluce of Ki tS +d GKe ts 40", 4d Ke): D4 y aid 3 Ke rate Peintf Cralue of A&B & 4d ad 10% #,B), 7 Ky) KeD: 7 » » ?IYD r2D DPDPAD 2 PRDPIPIPIIPIADAIDD
You might also like
NISC Information Security Handbook For Network Beginners
PDF
100% (2)
NISC Information Security Handbook For Network Beginners
36 pages
How To Secure Windows and Your Privacy
PDF
100% (26)
How To Secure Windows and Your Privacy
39 pages
1.4 Workbook Answers
PDF
100% (2)
1.4 Workbook Answers
13 pages
M-Cyber Security Notes
PDF
No ratings yet
M-Cyber Security Notes
24 pages
CF LAB Manual FINAL
PDF
No ratings yet
CF LAB Manual FINAL
66 pages
Security & Anti-Forensics PDF
PDF
100% (1)
Security & Anti-Forensics PDF
75 pages
Some Viruses
PDF
No ratings yet
Some Viruses
7 pages
Cyber Security Notes 1&2
PDF
No ratings yet
Cyber Security Notes 1&2
33 pages
Day 3
PDF
No ratings yet
Day 3
26 pages
Cyber Security Advice
PDF
No ratings yet
Cyber Security Advice
22 pages
Security Practices Assignment
PDF
No ratings yet
Security Practices Assignment
14 pages
Configuring Computer System and Network
PDF
No ratings yet
Configuring Computer System and Network
26 pages
Css 1st Chapter
PDF
No ratings yet
Css 1st Chapter
10 pages
Chapter 5
PDF
No ratings yet
Chapter 5
70 pages
LECTURE 1 B) TSecurity Methods
PDF
No ratings yet
LECTURE 1 B) TSecurity Methods
36 pages
Slip 1
PDF
No ratings yet
Slip 1
14 pages
Cyber Security Notes
PDF
No ratings yet
Cyber Security Notes
20 pages
Unit 5 Social Network Security
PDF
No ratings yet
Unit 5 Social Network Security
27 pages
Cyber Security Lab Solutions
PDF
No ratings yet
Cyber Security Lab Solutions
29 pages
Information Security Handbook 1 1
PDF
No ratings yet
Information Security Handbook 1 1
36 pages
Webroot SecureAnywhere User Guide - 101411
PDF
No ratings yet
Webroot SecureAnywhere User Guide - 101411
186 pages
10 Things You Can Do To Secure Your
PDF
No ratings yet
10 Things You Can Do To Secure Your
15 pages
SecurityClassNotes 5241 4761210968
PDF
No ratings yet
SecurityClassNotes 5241 4761210968
30 pages
Network Security
PDF
No ratings yet
Network Security
9 pages
Os Unit - 5
PDF
No ratings yet
Os Unit - 5
12 pages
Mta 98 367 Study Guide
PDF
100% (1)
Mta 98 367 Study Guide
5 pages
Infosec 31564746
PDF
No ratings yet
Infosec 31564746
44 pages
7020 Cns 13-8-21 Updated Final Manual
PDF
100% (1)
7020 Cns 13-8-21 Updated Final Manual
44 pages
Lecture 2
PDF
No ratings yet
Lecture 2
23 pages
Certified Information Security Expert (CISE Level 1 v2) Detailed Course Module
PDF
100% (1)
Certified Information Security Expert (CISE Level 1 v2) Detailed Course Module
18 pages
Intro To Comp Week-4
PDF
No ratings yet
Intro To Comp Week-4
16 pages
Cyber Security Assignment
PDF
No ratings yet
Cyber Security Assignment
10 pages
274 Kali-Linux Deep-Dive Study-Guide 1567788781
PDF
No ratings yet
274 Kali-Linux Deep-Dive Study-Guide 1567788781
35 pages
Cyber Security
PDF
No ratings yet
Cyber Security
19 pages
CS - Practical Report
PDF
No ratings yet
CS - Practical Report
44 pages
Network: Change The System ID: Devices Come With A Default System ID Called The SSID
PDF
No ratings yet
Network: Change The System ID: Devices Come With A Default System ID Called The SSID
8 pages
Ethical Hacking
PDF
No ratings yet
Ethical Hacking
70 pages
Iss Notes
PDF
No ratings yet
Iss Notes
16 pages
Hacking Secrets Revealed - Ebook
PDF
No ratings yet
Hacking Secrets Revealed - Ebook
77 pages
CSCU Modules
PDF
No ratings yet
CSCU Modules
13 pages
Network Threats and Security
PDF
No ratings yet
Network Threats and Security
3 pages
Basic Cyber Security
PDF
No ratings yet
Basic Cyber Security
23 pages
Network Security Concepts: Waleed Ejaz
PDF
No ratings yet
Network Security Concepts: Waleed Ejaz
47 pages
Itw Lab9#
PDF
No ratings yet
Itw Lab9#
9 pages
IGNOU-MSEI 025 Page 21-30
PDF
No ratings yet
IGNOU-MSEI 025 Page 21-30
10 pages
INS Assignment 1
PDF
No ratings yet
INS Assignment 1
14 pages
Activity 1.2.1 Firewalls and Malware On 2024-09-25 02-07-13
PDF
No ratings yet
Activity 1.2.1 Firewalls and Malware On 2024-09-25 02-07-13
3 pages
CND 4
PDF
No ratings yet
CND 4
8 pages
Lab Assignment 1 - Implementing Security-Firewall - Updated
PDF
No ratings yet
Lab Assignment 1 - Implementing Security-Firewall - Updated
12 pages
Cyber Security U3
PDF
No ratings yet
Cyber Security U3
18 pages
Lab
PDF
No ratings yet
Lab
6 pages
Ethical Hacking Workshop Report
PDF
No ratings yet
Ethical Hacking Workshop Report
21 pages
CIS 12 Computer Protection DOJ
PDF
No ratings yet
CIS 12 Computer Protection DOJ
4 pages
Internet Data Security
PDF
No ratings yet
Internet Data Security
6 pages
CSCU Course Outline
PDF
No ratings yet
CSCU Course Outline
13 pages
Cyber Security Note
PDF
No ratings yet
Cyber Security Note
20 pages
Certified Information Security Expert (CISE Level 1 v2) Detailed Course Module
PDF
No ratings yet
Certified Information Security Expert (CISE Level 1 v2) Detailed Course Module
18 pages
Network Security: Attacks, Tools and Techniques
PDF
No ratings yet
Network Security: Attacks, Tools and Techniques
3 pages