0% found this document useful (0 votes)
83 views81 pages

7115 Cns Manual

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
83 views81 pages

7115 Cns Manual

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 81
Practical 2 jous security experiments, (attach all sereen AIM: Configure a system for va at the end of practical with steps and procedure) on/off firewall tall antivirus o configure firewall rules o configure user accounts with passwords 1. Turn ON/OFF Firewall 1. Open the Control Panel (icons view), and click on the Windows Firewall icon. 2. Click on the Turn Windows Firewall on or off link on the left side. © change tiation stings © fmndens Genter © fete detasts © sennces ngs Not connected connected shots Select (dot) Turn on Windows Firewall for each network profile you want, and click/tap on OK. (see screenshot below) Customize settings for each type of network ‘You can motify the Firewall settings for exch type of networkthat you use. Private neterk settings @ Tum on Viindows Defender Firewall [DiBiock allincoming connections, including those inthe ist of allowed apps Notify me when Windows Defender Firewall blocks @ new app. (Y_ Otumet windows Deender rena (et recommenses Public netwerk sett Q _Drumon windows DeenderFrewat [stock attincoming connectcns including thezein thelist ef allowed apps [Notify me when Windows Defender Firewall locks a new app GY Oumot vindone Dlede Freel net rcommended) 2.To INSTALL Anit-Virus 1, If you downloaded the antivirus program on the Internet, find the downloaded file on your computer. Look for a file named setup.exe, install.exe, or something similar, then double- click that file. The installation process should start, with a window opening to help guide you through the install process. 2. In the installation process window, follow the steps provided to install the antivirus program. 3. When installation process is complete, close out of install window. 4, The AntiVirus program is now installed and ready to use. 3.To Configure Firewall Rules: Open Control Panel, and click on the Windows Firewalll icon and then click “Advanced Settings on left side. © tenrseonecwntrcintnatt reed @ caardomeconussrnesni oe | manocroetensen \ |] | © mnntermcceoaerne asene sett | & caenoweraensracenaes eed 2. Now open Inbound Rules And Outbound Rules. You can add new rules by clicking New Rule button on right side panel Rule Type Senco ype of mate te rea l= Name One Givens, 2058) BRIE © Graton (Tes cance! 4. You can even delete rules by right clicking on them and tapping Delete Button. 4.To Configure User Accounts with Passwords 1. Open Control Panel and open User Account. ene ey ee eae Make changes to your user account ‘Manage your credentials. aaa ‘Make changes to my account in PC sexings Manage your file encryption certificates © Configure edvanced user Frofilepropenies © Changeyoureccount type Change my envicnmént © Menage snctherscesunt variables © Change User Account Control setings 2. Ifyou want to change your account name then open Change Your Account Name. 3. Ifyou want to create new account then open Manage Another Account, 4. tfyou want to change your account type then click on Change Your Account Type. ————. Practical 3 AIM: Configure Web brows r security settings. (attach sereen shots at the end of ractical with steps and procedure) To clear cookie nd history v 1 2. To clear temp folder 3. To modify set ternet explorer regarding securi 1. To clear Cookie and History 1. Open your Browser and go to Settings, then Click Privacy and Security. 2, Then click on Ciear Browsing Data. 3. If want to clear cookies and history check the box and press Clear Now. | 2. To clear temp Folders 1. Press WINDOWS + R key. \ 2. Then type ‘%temp%’ and press ENTER. 3. Thena folder will open with all temp files/folders, you can delete them by selecting them and pressing DEL button. | 3. To modify Settings in Internet Explorer Regarding —__ Security |—_ ee | 2. Open internet Explorer and goto Settings | 2. Then go to Internet option and click on Security. \ Generel Security Pnvacy Content Connections Programs Advanced Select a zone to view or change searrity settings. | @ & ¥ 8 \ | Internet Local intrenet Trusted stes Restricted | ates Internet \ \ @ This zone is for Internet webstes, excent those sted in trusted and restricted rones. Security level for this zone Alowed levels for this zone: Medum to High Medium-high = Appropnate for most yebstes mma Prompts before dovnloadeg potenboty uncafe content i SCinsigned ActiveX controls wnat be downloaded ienable Protected Mode (requres restarting Internet Explorer) ‘Custom level. Qefeutlevel Reset al zones to defouit level 3. Now you can change/modify security settings as you need. General Security Privacy ; Content Connections Programs Advanced Select a zone to view or change security settings. | @ oe YY Intemet —Localintranet Trustedsites Restricted | \ | sites | Internet | | @ This zone is for Internet websites, \ except those ited in trusted and | ee | | { { i Security level for this zone Allowed levels for this zone: Medium to High | Medium-high - Appropriate for most websites = -Prompts before downloading potentially unsafe, content - Unsigned ActiveX controls will not be downloaded Enable Protected Mode (requires restarting Internet Explorer) Practical 4 Practical 4 AIM: Draw Diagram of DoS, backdoors, trapdoors. Also explain each of them. — #8 20s chach i at atachmert ty shut-down a ruachhie A yetwerk making it 4s accessible by it interded. — Ds atach accrnpelish Pais by holding Phe target ath trafic os serhyg +t bayermatier that triggers. > fackdewts :— [Yee ka _—_] I # Lackelots ts a acess fe cornputer prrogsan7 that by parses seantty mechatisms. — WR pegeUnmers ray gone ts stall a. backers 5¢ Phat the perogkom cat be accesse) ye ts pralle-shatirg a other purpose. —» Prades :— Sees Use A THAHIAO*TSFAHO HRM HAD ’ a ae iz 2 > és ‘ad 066006 46 ob did aad ale d mes — Tsapclets 8 a ra0thce) off gaits aces te wane part of a asysters a then ther ly the vehverk —,raluce- | — Like gairting access artheat having. tv Hfyly Qi prassade 20. Practical 5 Practical 5 AIM: Draw diagrams of sniffing, spoofing, man in the middle & replay attacks. Also explain each of them. — Si ffieg — [West L ~-~--[fiteh — Luffirg ts the proces of motitriay & capturtiy all the packets passing thacugh & giver ~rehacrk ushrg s-riffirg heals. — + is a yarn of “Keeping rete aghives’ & get te kid abcat the awersabern. — i che calle) wirsedapgenng apelie) ty computer ryekactks. [ swtting cov be either achve cs peassive ia Ca tLe I> Le Lek come aHachy: LEAVES is & RC Tevhmeal tia Alma _ Compt nd Ne Come Cone 388000 —f Pats cach ot aviother sets packets otthirg cemect source ad! r0h5. — wher this haypors Pee caceves werh-rourg | worl) ver) yeackets lack +e this yaget Pus. b> Replay wHtach :— aHachin — serly athack is a yor of ~retwcth attack fet hich @ vali) data Pataminsicr 4s méliccably os ngeate) A delayer. — 7 replay chach 1 also hrady ws playback atack. —> Pray ny fhe middie ctlack »— vichiny atackés TEE Fecha nts Amato co — > We may ty bt middle ctack frterapts @ comruniadticr belwar tbY syste. — ubiag Sif ferer? techrvelegy the attackty Splits thee crigimal 1P correche1s tty 2 10 ariectr ote bekseer the chert aid He chert aid the ataken & auther betoun the atlack» 3 the sewer as Ahadr fiqurt. © Tabaval ae Able Practical 6 Practical 6 AIM: Draw diagram for Confidentiality, Integrity & Availability, Also explain each of them. availtill y) fy Feige: ity —> Cerfedertialy :— —confidertialy meats phat cily Phe authertee Pidvidluals systems cat yitw) Seithie classified rhfamaticr The ta being serd ever the rtekice chee) et be accener) acussee) by w-rasthcrizt) Jtdiiduals. The Hacks may Jay tw capture te cake Ulan differen tyols available ot the ictervet & giver gaiy access fo Yous itfermation. W phimary Way fv aes) this Ls ty use the orcryehor techrigte fy sadeguar) yar chta vo that ever ip, the atachts GUI13 Geers th yah data, che etl! ot be able fe ery dt. > rtegpity »— — The text fhigg te Falk abeut & fortegaity. — The ea ts hear making sure tat data has vot beer marhified. | . ~ etsuyeher of Gata is eilurg te rna-rtaim the date Htegathy. — % check i car Sata has been melyjed ce make we of a hash ~furchior. 2 Avaiti lity ,— — This. meats frat the rehserk should! be asawily availotle te FHS. MBAs. — this applies Ww systera aid Ww. data. — 7% ersure auaililty te aetacrh adratris tration heal! wabydaim, bvardisan, raake regulate. upghailes, hart a [elt fo fail over ard prevert totlle eck iat 2 crehoceh. — toch each such % Dos Ddos may sere a ~yelock uquvelelle as the Atsrrces of te cyehork gets ac hausted . ant wens whe Athy of fhe cretwerk Guisrers tals: a — Thus, perpen measiirts chetl! Ce taken fe prevert such attack . — Fhe srapact may be Sg ficatt to the compar SI*®MMMFM®IMMABHMARHRHEOD ODA . re at NN 2 Practical 7 Compt and Networking Seerty Cane AIM: Write Ceaser’s simple rule; sh becomes D. B becomes "wrap around". W becomes Practical 7 ipher algorithm & Solve various examples based on rerypl a message with a Caesar ci Sift by th r Each letter is replaced by the leter three | etter: nd so on. For the last letters, we € an think oft X bevo back. each letter is replaced by the one three before it, EXAMPLE: Encryption: Step t Ste 2 step 3 ute 4 step = STG E Stee Ww Y ek : Steet Get plant text ay) iz0 Repeat phncigh step uh plain cigs =aall Grebe I= Cpka's 0174-37 mee Pata? Giphta GF iarcpemnert 0 with I, exd Crd) null at etl of CD WO techoca snas Ababa ‘Ga Sats Course Coe 3380704 ng enn nat YFtr Vaid 1b ITHe “Sec bh ET a © SHRYR way wud ow yuo u u wwg Ho uy BaRGN i} c u & L> c1= Cpt + Reyrrceht ote 3s 456 eH aH em A B © D € Few2zgygkem bee be CLC edig ttle yen DeErat toK Lmao PERS TY VOX Exaqnaelt +— plain text : Ceasle cipher) Rey: 67 = CR7 they) modee C7 = Ce+3.> medee = Cata) mnedab = cx) mev26 = 6.7 = Ge4ay megeb = C443) mofab => C4) meee CT = cata) mog/eb= Cots) melee - 3) med/2é oT C543) medlee = CIE) gped/ag = (a1) med/26 C7 = (043) ynq/26 = C443) gnca/eg = 64) md 26 7 = Cr43) yredleb = C143) neglag = (29) 900/26 1 = Ce+s) mes = C2) medias » (5) mi 26 ct = Ci#3) rnedeé = (43) medieg = Cl) mel 26 c-1 = (p43) medee = (1543) modes - WD melee od = Ch43) madee = (443) wddaé = C0) rey 26 e meget = mbes = CH red Ye cd €é+3) CAt3) es = (20) “ coy Gna) deb « citt3) MARE = OM WATE Cipher Text :~ ALS KH FH QVHU Re Decryption Klgcrithrn :— 2 vdoot | ep | lutez 2: | vtep3 + | ute + | uteps > JStEp& ER? 2 Decrypter Citra Teoct = EMDUMU PLSIKHU key =3 platy text = Co-7- key) nce C7 PT PT PT | pq PT PT RT PT PT Pq PT CF-3) CH-3) CD-D cv-3) CH-3) cu-3) CF-3) Cb-3) €5-3) cK-3) CH-) cu-3) Ceaser Get cipher Test at I=0. fupeat Thycagh ster wrt ptciy = Cercig thet) moval perat RICE rucsemert 2 atth |. érd (Add Mul at ed of PT). methed? - mnie 26 yee 26 ned) 26 mney 26 raed 26 raed 26 med 26 raed 26 rnd) 2 vag) 26 med 26 ma) 26 Platt Text:- cipher I chyzher Cig! ral = C5-3) vnvdeb =@) rna26= 2 =e = C¥-3) mog26 = ca mnayee 4 E = (3-3) ral26 = Wo) mo2s=0 ~ A = C2l-3) modal = 19 yee e168 = 5 C4-3) raed/e6 =64) mepre- 4 =F Cav-3) red 26 = CH) meee= 1% = R Cs-3) modab= 2° € wu " = Cil-3) mae = & =F = Cls.3) med 26 = 'S =P = Cw-3) ma/eg == H = (9-3) medeb FAH E = Cj) deb HIt=R Practical 8 Course Code 3350701 Computer and Neti Secu Practical 8 AIM: Write, test and debug Ceaser cipher algorithm in C/C++/Java/Python/Matlab. Code: Enerypi # fyclude Latudiv hv byclude score. AS uri! Ercnypeties Ceharcd, to; wil Seaypetor Ccharcy, tat); Chan p+ C309, C+ C30T; wit main cd € Abr 9 ; , Pitrht Certer pelea tect:"); deanf CVrs", P+); eranyrter CPt3); Decayehon Cce#,3) getch c2; ward Euhry eter Cohas ect, rat hex g yt i=0; Gaile CPHCI 1 ="\o'd ce c+ Oy = P+ Cizt they; a, if CP+CITt = ROBE PACS <= ZO _ if Cot cior Oo L cecigs ocry —'z/ ¢ AKI. a? . . if ©P 4cips='G'8R PtCIZK<= '2/D Uf Ce#erd 29 ; ‘ +Cig=crciy -'z"t'a HC tes tts Comat and Newark Sect en Decryption: c# y= "\o', Paint Cf ciyehes Text? +5", CF; vei! Deenypeticr Cohan c+ C4, tt hey D it joo, awhile Ce#cit = \\o'S ptcig= CHOY- hey; if Co+cias ='A' BB CH CIL= '2f) if CPt Cig 4'AD pecig = P4cig t°X- REN; J if Cot case ha "Bg ciclsa = s2'9 a if CP1 CI 4 a3; saftal tl; pecia= PHClZ + F itt; ptcrgs > \e', poriett CtN platy tect: 0s", P+?; ounbor Grter yelara Text + Zebra cirher text > chew)? pelaig téoct 3s zehaa BC Teal Ive Amalia Practical 9 yew wwwwvwrwwwewewwuwwwvwwewuvuwuwuwewwwewwvuee ~§~ Practical 9 AIM: Write algorithm/steps for Shift Cipher & solve various examples on it. —> He te crcaypet -— ) covert jettles te ~turibes +7 ader starting yor call ft x. (2) caleulafe > c1= cx thoy) mol 26 Y civet arden "1 ct pate leHe ro order of aljzhalets . Fo exarnzles — | Pe pia tect : shift ciyeher is sherpteot phen eo 56 565 6 F FF FOS (e123 1024 F +13 20 F BBD mode xy maky hoT4 mg @ Cipher Teck :— Cxmraky h~umge D tes te deenypd = Dccwert, ciehorlect IeHen fate varabo, 9-4 tts eden slartirig frera oa, call St %- 2) calatlate : PT Cr- key) med2b a) awert aearaben in PT be letter alyzhabe ts 4 cde of ae Graryz — Cyechen Text: - ky basing? fey xmamak yh tw m g 5 5 5§ &§ SS § s s & 3S eT Cee © Fi 2 e BF 4 IH) sh iqte ight é 2 platy Text :— shift chizeher ae ew eee Practical 10 Compute an Practical 10 AIM: Write algorithm/steps for Hill Cipher and solve examples on it. & mataie rubipleator Mill cipher Uses rrIatn/o¢ Eucaypetion algenrithy takes jelary Text od a thers iy ewe of matric by tabhig (etna antler. Thor pt. tA aplitte? +4 blocks of AIZL of key matrise Goth matarc lec ant rau ltipelie? ther. I> eayetirs :— rw SECRET PT GOT RAR Key: "G Pa) (BFS) (E J) "Ee Pa E #2) (5 (TE Cipher Text = Yag Jar z — Decayphion :— To deny? fyverse of key matatoc 6 aford. & Hey raultilied cith cipher ratrirc- (t dtemrinart of hep mate is wt qthern Aywese cay fe feud. Cipher teed — Yak Jar Key :— (s = wo 2 © af el i > gprs Y es w gor at G)e fare a an raed 26 a a atom oF 16 = [3r2 ree | mole = a = é FOA 2 c Fo 5 ww q QI r 2! 6 medlab 2 12 z m ! = Qae - [ZF reales) -& € ee 4 7 Plaig Jesct — SECRET a & al Bry te 74 Re as —— eta Ct w Cesta Ita, Almada Practical 11 AIM: Write algorithm/steps for play ipher and solve examples on it. “ployfais uses sxe rmatstc which ts used by she tht keyed. + Exter beyloard iy raqhafoc 400d ese ,dige duel cate feller. fil) aernatiiag space att abt of ahehelels. phat wen “we a part of keyword. samtiye zg aid g iy samt call. We must spelt Platy text pydy eeaths of Jetfers. > hes Rules :-~ if pate certain, sare letters turce thay irsert ‘x te Gelert. td both |eHes are ty seme rad ther uplace cath by eter tramedaitely Aight Ae it, (f Goth letters are Pr sore aus, Hey ssplac cach ly (eter frmedaitely falas of t+. id perms rectargle fer which letter art cyzpesibe caren of ructargle of Aorre was. Mai-rlaiy the. crder of leters fy platrtect ate the ciyzhatece as eel. comma) aye jos key = Security P= cayphe gagyehy. I é c 4 i +t yaitb Sf 4 4g AR loom a o f[? Gq vw “x « 7 = oe yp ty ge ap hy a boob vb ok uy by am ke bo 9% ciehr Tad :-— ursbramke bu ge 2 Decsypetion — key = Security Ct s cayrkgnagehy CT Us ba am ke Ue ga bb bbe cA ye ke 9h ap Ay feats tect : cnyrebo gasyehy Tee ects ss Aneto Practical 12 Practical 12 AIM: Write algorithm/steps for Verman Cipher & solve various examples on it. > Maaithra— y reat each Pt alehabets as stumble, 7 Micheastr1g SCqUetce. 2) Jv some fer each character of Pract cipthenteot @: YAW cach rurale, ceressperding fy P7. calphalee © €. fe certss pordiag — ciehentext alehabet E if the Hus jercduced & greeter phar 26 tet 6. 8 Fea aan & substract 26 from tt a th hk D trarslede cach amb of some back ; Le ie fc cerresspordrng ahchale?. his gives a te calles Exernyele. - q PT g- Verntam 5 cite - Hime: pad t— ciyzher 6 & Vv e a“ cal ™m pee ee sai © e c i ph € & 2 se is 4 4 (F & ry 23 12 204 eDdadad 2 P p—> Decayetiorr :— oT xm gued OP cigher yelait Text — Vee am xX m g us @ J 23 (2 6 go 4 3 c o pp A eC 2 ec Ww FF 4 IF eer? Py ee ed 4 ae ets) Practical 13 Practical 13 AIM : Write algorithm/steps for Vignere Cipher & solve various examples on it. late mos Pia SESE la! We OM Kk De an vixia mina Ait IMN] Oe] efile a) Ba BE ie Sieh sie | isfetarads Teloh uly a ; feared vies x] yt ofelrta: inl PEE) cictoialete|2 7-7 fez inis eta 4 BC Tech Inaias, Asta ars | th a relyalhabehic meats mere Piet | ahehabet is Avcergrize) frorr sityle character. This uses Sdferert cipher based ct eters of hey boars. St arsists of alphabets ctsifter 26 Himes tm tis, each shifter) oye ically ty left. to fii! cizeher , fird ther platy eter ov legt wide ai! take cosrespori1g yelaia text ari key- we) eral) fe cersiclere). p— Etcayptor :— PT = Vigyere tystream ~~ cou”dt co CT - *%¥ @ AA x48 —» descaysetict *— CT - KWAFA xX TS hey sts earg - cCovwm7tco PI-V2zZaWERE Practical 14 2 a vy Practical 14 AIM: Write algorithm/steps for one time pad & solve various examples on in, > Alyaithra — D Meat each platy tect alphabet as ~umber the Prucreast1g = SEU EICE de vame fr each character of Ryeut C-T. fe) cach pt alphabet fo arrespecwiag ineut CT alehtet pur Ler if Thus pruduel te gererate that 26 ter Jubstrat 26 fiom at. Trarslate each ~wmber of Acme tack ty erresectding alehabet. This gives cuteut cyzher tent. ne CT. = 0.7. PLS a emp — age ted Ciizher Jeoct --— OUR PLUK BC Teta site AhmeaN aoe {Compote and Neti Ses > Decr ypebior OURP wh on = Bab) (pe ClGt Oo VR Pw 14 20 mt is 22 a IF Pelaiy teat TE halon rans Abmeifad Practical 15 Practical 15 AIM: Draw diagram of Public Key Infrastructure. A | L\ [7 Oo NX mao a | — B— |_| — pee soils Jor public hey ttf res truchire. —pke ts a set poles , policies , hardiart, Software aid peucedure ryeded oA aagte, mariage, fistrt lated , une, RAR ate AM” hey Sgital « hae anf manage cneKy pret. Practical 16 Compote and Neekin Scat Course Cake HOME Practical 16 AIM: Draw diagram of Centralized/Decentralized Infrastructure, —- conteall ea) (np frasbrctarr i — coho! autharing creates single peotrb of falure. — Big jelracy trsuts. — sean backup & jrwfersirial malytaranrce — shiage of large amaryy df data. . — ybraclachor of ~varrbertyg systems. ‘Computer and Network Seen Course Ce 3390704 —> Deceertrslized) Prd sesturchiae >— - data — Wes — Last — Jrze —. P20 — card are, sex cart Pol private bey te ceryrt data. gmat cars! problem. peollern . pero blem. td reestrt cPLAL exper slut fe build. Practical 17 y Owes 4. He Lit us a type of security valyesa Lility Practical 17 C—O typically for ty ase appelreahiris- xss attacks — erabrles hr _ er cheth~ @ side seripts ierto adel rages attoeut vieJel @| ly other USess. a xss uuleralility may be used by attacktrs | te ly pass access cottpola such ay Sart @ crigicn pro lin. a ay viel waits Poasteo Hausted aJSebsiteS® website ard rgita ex malicious Acriith @ A: | alvichimn's Levelsen executes Hx malicious my oe exit & ubrcatedgby a fermataed desiree) infermatit dj hacks. hachus tgects pasted elsites aith . rnalictous Script Practical 18 Practical 18 AIM: Draw various Security Topologies. — Security Rotts The first aspect of security ts lapered defJerce. — The aattermest layer, providing basic poovtectin & trier mest faye, yrruureinng hig heat exotectiots. ime lca eee -omz stats fear dee rilater‘ze) ote —@ om ib a computer cehork 4s ue iy the same amy, j+ acts as a luffer zner Letoeer interred , ashes 10 cerhol exists & tee tree secure yekocrk, abhet ay Sgarizatiot has specify peolioy Pay (2lieg « eich eieieiiet ee ee fa ot oe ne duuded Mywke we arte L) s~) Sat fan ; — | oles pedl ome som tnuste fire foarte =o id ado PP enero > Lerterret >— —J+ 2 auld cide correction 2B tt used bw Pprarsjest e-mails dinarcial . pLerXh , varote acces: — The torterrret is wot a Alirigle medescrh , but a series of iter correct) yetaak that fellas putes te gptrate ty erate data flas acu H. Lhe term cud is fprequertly usa) AYrqotyrl- cushy fy reperesett Whe Setteract , lat tee www 4s actualy gust ote aed of ernie availalle ia tertenctet- of tefeacrks , files, 4 Ziterach— — drteract is a term use) Ww descrite @ rretarceh fret has the same furchiorality as the ttterict gon users but Ires cornpeletelyy Pysile the fruste) arte a nyetark 8 th urder te security certrd| of Ayotert B cpessh aWmiey'shraks. Practical 19 Gpestenanttnvenes Hasan tbty YF sateeernes il HU RARE ISI sty Dem teeing EIN dere NATURAL RO FO Artsc0e Leng thet 8 5 ee ERS | Han Sea tester) SAME! renee 20 yeral sta nc ff Pee bloat Practical : 20 Pr: 0) AIM : Demostrate Sniffing using packet (ool : SNORT —y» SMORT :— ope1 Source etaork [np sPALLsIO1 — pf 4 at . att. detection Systern Créaps) created bf ™ te packet sryidfen that mari ters ciehaek traffic t4 real Hae. ~ by LUi¢ SNORT dy wakh your yehicnks , 404 cat punfam cotter? searhl 9 & oes aaa every packet Prat Praverses PUaguy’ yee ongerizaler ard delet a myst) of ctack & hostile Praffic oll +4 Atal Here. ey yee) at least wee te ty SORT. a Steps te istel/ sar D wwe) & achat srt full fem sled welsites . 2) Gere irradalliag Sort, make gle yet fave package of Wibeap 6 Npree- ID verify the soot /pstellahir « 4) create Aaquined cotfiguration. file, sull file and lag Shacks. SS) Execute sat: Pa DPX »a»xmx wana we- 4 — Svat as packet logger :— - Yar car test sherds swrtts loggits abilities with 1 Cleg switch by typbrg Ps - CH\ssyont Whe 1 e:\ syoot log-ll ptss ctalto w Ato. iting @ testg Siort ate wtfiguraker B Aules- Ci NS Seyost—? —befere usity sorort, maitgate tte es \artot \ by, Yo test: deravt -i |-¢ 0: \ siost\ ete\ actoat. atf-I To sure srt i [-< 08 \ est \ete \ Arrest. cery-A. arco! To shyt: cholec a hyardy your ~rehoch atth srt: - Tyee follat1g command iy emd': c:\ sost \ bins Ht -O Practical: 21 4023 “onfigure your e-mail account agai spoofing ete. | YD) Apooing and phishing — ry ay emath asprooft1y case, a cyles camiral Various threats. ie. spam attack, 222 APDABA Jews a usee ay email preterolag ty be e emecie tee Use her1e0dS. a pehiatrg 3 aby ai dargers metho) eee) is by the ober calrrinals te tw! users get * sewilive tate such as batk acants ~ © Aoclal sealrity clamber. oe Gecause s/700f1G ad rhshizg an nef © the commer care ler catminads use ty % cHach , users must Riad Hee ath -phrahing © Wluchirr agaist thik kind of gases: ss 2) Eenatl securty Gey . + Le ryecessary fy deta) ambuer causn) & by the proidas rmisaitighrakers dt email # ' JOnutces « an the vulrerabiliie, Sscovere) ta email services - System, Aeveliig infennatirr aad making — & have corssauerces of trfillrattag the far Gt system, apvelttg tafermate1 att ynahfes ee Aystem traccesile athey atacks clause es Vu hyena bilities. a We teen or} 3 3) Rat SornecIenl = ome acryte gets idlected a program rust pare) Iyer all data Secnypte. fo Pols Sere, it 4s vecessary te ttghter fhe ematl gervices ard wait Yor the arahsig services Hv Jetect art prevett? tee syeccific fehavietr’ for sater7etart, a Malicious ples: wher rialicias cettert ia the email atachment Atachis tw te 4be, St way take ohdle computer Aystert atl creteerk. fer successful antht- pebrshieg yoludiot , these Fle rust Lt aiamse) utth shesadurt cas : at tivinus Jefterare & fehavtows artahpis ACWICEK © client aide attack — The attack vectAs fr forterrvet users the frtcreast1y — dary- by- Jar. A Jak cottaictity malicizus cottert cas le ercugh te caper cormnpreter ti seeeeshy mrt a computer alete- The email Aervices comporerts Secttstty rnils Le streyhterd, cecessar/ anh -pehishiqg — syeterg rast be cerdacted agahrst thnects. Practical 22 rm art Neon Seey Gaure Practical 22 AIM: Draw diagram Host-based Intrusion Detection System. > PPP aPsPe Pde ec Hest fase) dds ts Cayable of meirtatag aw aralyzirig fe trterrals of 4 computer, system as asell as Tee creteacrk rackets ot 4s qehok trterdace , stmilan ty He aay a -yeteacrh frase) tsbutclion delech oy Aystert — epeerater. i Practical 23 Practical 23 AIM: Draw diagram Network-based Intrusion Detection System. ear nenver systern / \ | vOredred’e | feck oT ALTOS ' | ' t pee Mass] ae aplicaticrs TN afefe Bender acces cotta Aerver +t ts easy fs délay & cost effective sre a single device Le capable cas dee ending ctetaterek or atleast +5 certal+ segmert as eampare) fy best base) Aysters. the systems ane easily alalle. : ‘ f lace. at N 4 a @ penotectiot ayatem = fy jelac es tho an evtraice of Ma powtecte) vtehankal ubich gxres combin@) jrrotecto1 fy the Aefleretin types hats (1 o@ go. rg Practical 24 Practical 24 AIM: Demonstration of SQL-Injection. Sih taygectot ts 0 cde bajectos techrique that ritght destroy Your dctalare- pt th ore ot the most commeat asel fechiqe- She tagechor ts Fat placerne-++ of malicdcees yrogé tory, ‘ coe it sa Shectemerts , via web ; pagectiot Gased Gi = aluats Tule. User dd = 110 oR j=l : ak stactemer?5 licks like hia: 1 4 hackings ‘ ‘ SL — select * feorq users ashere userdd =los oR Wl; the san alwe is valid & will Actwry all ns ford The ‘users’ able, atree i=l is ahsayts trt- | the hack, migit get access ty user eyes ai! parsscierds 4 Jatabare by stmjely f13€n Her "oR" ot ple beatae ok parsed. eR Ia ° Ut 8a" [2A GIAO : Ya" va” a = —» (Result i oul Select « fsorn users athere Mamen” “or '= AOD parser) =-"" oe “=". So, abort Sah way wu @ valid) & wilh Actus all roars fror7 ‘users’ Fable, ota a “=" by always Aut: I Practical 25 4 Myce Lt : We Priclue Lecriorhy AIM: Demons! wd maire) é Prt, 9%, 9, 4,9, 0,91 - Prd gel, BEI, KIEL, Ko clascr 0 ; perittf Cletter value of n:"), earl Crd", 1): fr Ciao, (koxp fet dD AG; AO AKT, fer Cleo, fay 3 144) Br Bg; B= BI; VO Geo 7 ke, tld kK, KB; eat or C4, 20, 9, 4%; ut 4D Kg = Kg * 135 Ko=2kopy ; 1 if C2 zKed . . peird{ C “ayanmetll Rif As gy gether te OUEEUT— — gyter value of 9:23 e1ter Valul of a,x, ¥ ae a pu as Velie v ms ts ic key is ©g aint! Cette, vyaluc of «7 ,Xx,¥:"), Were Od ad 2d*, a5, BX, BY), pent C"yaluce of Ki tS +d GKe ts 40", 4d Ke): D4 y aid 3 Ke rate Peintf Cralue of A&B & 4d ad 10% #,B), 7 Ky) KeD: 7 » » ?IYD r2D DPDPAD 2 PRDPIPIPIIPIADAIDD

You might also like