Network Security Manual
Network Security Manual
{0,14 Suppose h(x) =x xmod 5 mod 16, x in (0, 255] ‘The collision in h occurs for. (@Q,17) {b) (2, 16) (©) G, 16) @@217 4. The Merkle-Damgard Transform is mainly useful for (a) Converting any fixed-length collision resistant hash function to an resistant hash function ; (b) Converting arbitrary length hash function to a fixed length hash function (©) Constructing hash function from random function (a) None arbitrary length collision 5. Understand HMAC scheme and finda break it using availble source code 2 6. Understand Merkel-Damgard transform and Explain how we are using it for HMAC’ 1. ‘Understand and explain analogy between ‘SHA! and our dummy HMAC function is : ” 8, Explain why HMAC is secure and on what assumptions this secun'y is based? B MANUAL HK eB ah SITRC, NAS) Scanned with CamScanner‘Scanned with CamScannerSANDIP INSTITUTE OF TECHNOLOGY & RESEARCH CENTRE Pew, Timbok Rood fot 8 Det Ne Sijed 30 HMAC do fonttead the marke - Domagard hash Functien. nme apotiec t+ i> jberatisn processing the Message in Dieck tnw aye a compresrien Functions embining tne jnjermidiate nash Puoctians ‘ t Jodenstancd and explain _araleyy bet? fy. — Bn analegy phetpeen 4ripy and Hear Tis ted 4H 15 ke 9 Study not ahile co Secre & boy, Scanned with CamScannerScanned with CamScanner3 Sandip Foundation’s Sandip Institute of Technology & Research Centre, Nashik NAAC Accredited ‘A’ Grade, 9001:2008 ISO Certified Institute Department of Electronics & Telecommunication Engineering ‘SUBJECT: Network Security Lab (304198) EXPERIMENT NO.: 10 | TITLE OF EXPERIMENT: Demonstrate process to ensure Security of web browser | (Mozilla Firefox/Google Chrome). |DATE OF PERFORMANCE: 9 4-03 - 23 | [DATE OF SUBMISSION: \2 -°S - 29 Scanned with CamScannerdip Foundation’s Sandip rg Research Centre, Nas eof ‘Technolo 2008 180 Ce ‘es & Telecommun! rank Security Lab 304198) Date: / 120 eourity of web browser (Mozilla Se i XPERIMENT: Demonstrate process to ensure ms Firefox/Google Chrome) sciow and web browser security through implemertation of eat = vat various eneryption standards. i 2, To understand the role of network security a5 @ tool for protection of different network entities. students wll be able to assimilate various aspects of Web security. OUTCOME: The: Pre-lab Requisite: 1) Which are different web browsers to ensure web security ? =G — i al a 2) What are features of Web browsers? defined hamepaoge . Back an putlosal lagi ae aS Beeta the previous or the next Page Fhe. Y Ware of SITRC, NASHIK ori NS LAB MANUAL. Scanned with CamScannerSandi i be a of Technology & Research Centre, Nashik Dipn 3 redited ‘A’ Grade, 9001:2008 ISO Cert ied : nent of Electronics & Telecomm: | Subject: Network Security Lab (3 jon Engineering 198) EXPERIMENT Ni Date: / /20 AIM OF EXPERIMENT: D : Demonstrate process t ity of web bro Pee sue, Security of web browser (Mozilla EQUIPMENTS: Personal Computer, Web browser, THEORY: - ‘Today, web browsers such as Microsoft Internet Explorer, Mozi installed on almost all computers. Because web browsers are used so frequ. configure them securely. Oft web browser that comes with an operating up in a secure default configuration, Not securing your web browser can lead « y ‘of computer problems caused by anything from spyware being installed without your knowledge to intruders taking control of your computer. Ideally, computer users should evaluate the risks from the software they use. Many comput ‘are sold with software already loaded. Whether installed by a computer manufacturer, 0 system maker, Internet service provider, or by a retail store, t step in ass Vulnerability of your computer is to find out what software is inst rerect with each other. Unfortunately, itis not practical for most people to perform this leysi of is. re increasing threat from software attacks that take advantage of vulnerable we> browsers. We have observed new software vulnerablit being exploited and directed at web browsers through use of compromised or malicious websites. This problem is made worse by a factors, including the fo ae ope pst serve a tendency to click on links without considering the risks of their actions. «Web page addresses can be disguised or take you to ‘an unexpected site. + Many web browsers are configured (0 provide inereased functionality atthe cost of decreased eourity. : at security vulnerabilities ae often discovered afer the software is configured the manufacturer. packaged by the indled with additional software, which ‘d software packages may be bu bilities that may be attacked, have a mechanism for recei + Computer systems an increases the number of vulneral «Third-party software may not ites require that users enable certain Features or 8 NS LAB MANUAL + Many webs! s1TRC, NASHIK Scanned with CamScannerattack other comput information, destroy 0" - alities in web browsers. An attacker can retod atacker’s we 1 capt Race ie pyware tat will tal 30 malicious web page that will install Trojan § "rlnerable systems, @ maliciou sae ham aavely argeing and aac ee TS HTML docu ay ise systems as the site is yisited. A malicious locument al figs: oa e these cases, the act of opening the email or attachment can c the system. es i i browser features and associated risks are briefly described below Understanding what different features do will help you understand how they affect your web browser's functionality and the security of your computer, ‘ActiveX is a technology used by Microsoft Internet Explorer on Microsoft Windows systems ActiveX allows applications or parts of applications to be utilized by the web browser. A we) page cme A Som ce syst a me c so a4 a downloadable object. This gives extra functiona browsing, y ee more severe vulnerabilities if not properly imple: les, and use YO" SITRC, NASHIK a NG, NS LAB MANUAL Scanned with CamScannerMt Created th ‘cooki cookies will remai can be used to u He. Session cookies are cleared whee the on the computer until the specified iely ident tors of a website, which atacker ait Uses cookies for ion, then an ea t cookies pose e S to that site by obtaining the cookie. ee po Sk than session cookies because thereon on the computer aca Pr. ie a Jeowa &s ECMAScript, isa scripting language that is used to make websites ‘eractive. There are specifications in the JavaScript standard that restrict certain fea Such as accessing local files, ° 1. Configure your browser’s security and Privacy settings Review your browser’s privacy and. securtty settings to make sure you're comfortable with what’s checked or unchecked. For example, look to sce st ‘Your browser is blocking third-party cookies, which can enable advertisers to track your online activities, * For specific browser security and privacy settings, read the recommendations and steps outlined in the Department of, Homeland Security's “Securing Your Web Browec explains browser features and their associated risks, such as ActiveX. Java, conait plug-ins, cookies, and JavaScript. ur browser updated a : browser updates are released to plug recently discovered security holes. So it’s important to always keep any browsers you use updated. 3. Sign up for alerts feretin i aohetacieay eam a tts stay current issues. If you use Internet Explorer, for example, create a Google Ale: Internet Explorer security, or something si fou can opt to receiv alerts whenever news articles or other content relevant to that topic hits ly emerging security ing the keywords daily or weekly |. Be cautious when installing ph Pde ins and extensions can sometimes put you at risk. For ins discovered that some Chrome extensions can change service or owi " NS LAB MANUAL. SITRC, NASHIK Scanned with CamScannerging this June to keep . for esenions is chan jn nature,” according ty install any sort of softwa, ‘and you might never ever dis one of the best ways .,)'* some can help bolster j,, ons for added security search engine” which Scanned with CamScannerPROCEDURE. sing extension ide for blocking sites, ipedia.org you wish to block enter the URL ing URL agents 7. Now, the site has been, blocked eal For words/phrases: 1. Select the option to block by words, 2. Add the phrase you when wish to block. 3. Add the item & refresh. Webpage. ‘Steps to ensure browser security by selecting Cookies options. 1. Go to Chrome browser ion, 2. Go to privacy and securit 3. Click cookies and other 4 In general settings, options like allow cookies and block cookies can be enabled. 5. Also, on web browser, right “Lock Icon” and click the “cookies and site data” option to know the site cookies and third party cookies. block from accessing the CONCLUSION: sere perform G implemen te ol _urlng Secure — Chrome extendions block ol +e 1” NS LAB MANUAL, SITRC, NASHIK Scanned with CamScanner414d > o ourPUT: SITRC, NASHIK spouser—tl your baou P ale_anre qeleuredt to _£ 1 aleo scover setuaity holes. ——— up Pox the clerts= ution» hen tossed DuckDuckGo NS LAB MANUAL Scanned with CamScannera 8 ee ee ee pen el 5 f owes | e fare LY SpornSITRC, NASHIK 82 ‘Scanned with CamScanner