DF Lab Manual Sem 8
DF Lab Manual Sem 8
DIGITAL FORENSICS
INDEX
Sr No. Title
1 Static code analysis using open source tools like RATS, Flaw finder etc
2 Vulnerability scanning using Nessus, Nikto (Kali Linux).
3 Explore the website copier HTTrack
4 Explore web-application vulnerabilities using open source tools like Wapiti, browser
exploitation framework (BeEf)
5 Study &Detect SQL injection vulnerabilities in a website database using SQLMap
6 Performing a penetration testing using Metasploit (Kali Linux)
7 Exploring Router and VLAN security, setting up access lists using Cisco Packet
tracer(student edition)
8 Exploring VPN security using Cisco Packet tracer(student edition)
9 Exploring Authentication and access control using RADIUS, TACACS and
TACACS+
10 Install and use a security app on an Android mobile (e.g. Droidcrypt)
11 Use of steganographic tools like OpenStego, to detect data hiding or unauthorized file
copying
EXPERIMENT NO: 1
Title: Static code analysis using open-source tools like RATS, Flaw finder etc.
Description:
Static Code Analysis (also known as Source Code Analysis) is usually performed as part of a
Code Review (also known as white-box testing) and is carried out at the Implementation phase of
a Security Development Lifecycle (SDL). Static Code Analysis commonly refers to the running of
Static Code Analysis tools that attempt to highlight possible vulnerabilities within 'static' (non-
running) source code by using techniques such as Taint Analysis and Data Flow Analysis.
So, Static analysis, also called static code analysis, is a method of computer program debugging
that is done by examining the code without executing the program. The process provides an
understanding of the code structure, and can help to ensure that the code adheres to industry
standards. Automated tools can assist programmers and developers in carrying out static analysis.
The process of scrutinizing code by visual inspection alone (by looking at a printout, for example),
without the assistance of automated tools, is sometimes called program understanding or program
comprehension.
The Rough Auditing Tool for Security is an open-source tool developed by Secure Software
Engineers, originally developed by Secure Software Inc. It is a tool for scanning C, C++, Perl,
PHP, Python (and soon Ruby) source code and flagging common security related programming
errors such as buffer overflows and TOCTOU (Time of Check, Time of Use) race conditions. As
its name implies, the tool performs only a rough analysis of source code. It will not find every
error and will also find things that are not errors.
It is very fast and can easily be integrated into a building process without causing noticeable
overhead.
▪Typical errors found (C/C++):
▪ Buffer overflows
▪ TOCTOU race conditions
C/C++
▪ Typical errors not found (C/C++):
▪ Design flaws
▪ …
In Perl code, it will mostly raise a flag when finding calls to risky built-in
Perl
functions.
Unfortunately its utility is rather limited for PHP as it does not find Cross-
PHP
Site Scripting or SQL Injection vulnerabilities.
As far as python is concerned, RATS is fairly basic and will only check for
Python
risky built-in/library function calls.
Installation
Linux
wget http://downloads.sourceforge.net/project/expat/expat/2.0.1/expat-2.0.1.tar.gz
tar -xvf expat-2.0.1.tar.gz
cd expat-2.0.1
./configure && make && sudo make install
wget https://rough-auditing-tool-for-security.googlecode.com/files/rats-2.4.tgz
tar -xzvf rats-2.4.tgz
cd rats-2.4
./configure && make && sudo make install
./rats
Usage
Basic run
rats --resultsonly<path_to_source_directory>
Advanced config
rats --quiet--xml-w3<path_to_source_directory>
flaw finder, a simple program that examines C/C++ source code and reports possible security
weaknesses (“flaws”) sorted by risk level. It’s very useful for quickly finding and removing at
least some potential security problems before a program is widely released to the public. It is free
for anyone to use and is available as open-source software (OSS).
Flawfinder is specifically designed to be easy to install and use. You can install Python and use pip as
follows:
flawfinder directory_with_source_code
Roy Ben Yosef reports that the simplest way to run Flawfinder under windows is
using Python directly. Install Python 2 (version 2.7). and run the flawfinder script
(on the command line).
C:\Python27\Python.exe flawfinder –H --savehitlist=ReportFolder\hitReport.hit
C:\MySourcesFolder
In the above example you can inspect the results (hit file and html report) in the Report Folder.
Flaw finder is not a sophisticated tool. It is an intentionally simple tool, but people have found it useful. Flaw
finder works by using a built-in database of C/C++ functions with well-known problems, such as buffer
overflow risks (e.g., strcpy(), strcat(), gets(), sprintf(), and the scanf() family), format string problems
([v][f]printf(), [v]snprintf(), and syslog()), race conditions (such as access(), chown(), chgrp(), chmod(),
tmpfile(), tmpnam(), tempnam(), and mktemp()), potential shell metacharacter dangers (most of the exec()
family, system(), popen()), and poor random number acquisition (such as random()). The good thing is that you
don‘t have to create this database - it comes with the tool. flaw finder then takes the source code text, and
matches the source code text against those names, while ignoring text inside comments and strings (except for
flaw finder directives). Flaw finder also knows about gettext (a common library for internationalized programs),
and will treat constant strings passed through get text as though they were constant strings; this reduces the
number of false hits in internationalized programs.
Flaw find erproducesalist of―hits‖ (potential security flaws), sorted by risk; by default, the riskiest hits are shown
first. This risk level depends not only on the function, but on the values of the parameters of the function. For
example, constant strings are often less risky than fully variable strings in many contexts. In some cases, flaw
finder may be able to determine that the construct isn ‘t risky at all, reducing false positives.
Output:
FINAL RESULTS:
ANALYSIS SUMMARY:
Hits = 36
Lines analyzed = 118
Physical Source Lines of Code (SLOC) = 80
Hits@level=[0] 0[1] 9[2] 7[3] 3[4] 10[5] 7
Hits@level+=[0+] 36[1+] 36[2+] 27[3+] 20[4+] 17[5+] 7
Hits/KSLOC@level+ = [0+] 450 [1+] 450 [2+] 337.5 [3+] 250 [4+] 212.5 [5+]
87.5
Suppressed hits = 2 (use –never ignore to show them)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(http://www.dwheeler.com/secure-programs) for more information.
Conclusion: - Thus, we have studied the Static code analysis using open-source tools like RATS, Flaw finder
etc.
EXPERIMENT NO: 2
Description:
Nessus
Nessus is public domain software released under the GPL. Nessus is designed to
automate the testing and discovery of known security problems. Allowing system
administrators to correct problems before they are exploited. Historically, many in
the corporate world have frowned on such public domain software, instead
choosing "supported" products developed by established companies. Usually these
packages cost thousands of dollars and the license is based upon the number of IP
addresses scanned. However, many in the corporate world are now starting to
realize that public domain software, such as Nessus, NMap, Apache, and MySQL,
is often superior to similar commercial products.
This assessment involves three distinct phases.
Scanning
In this phase, Nessus probes a range of addresses on a network to determine which
hosts are alive. One type of probing sends ICMP echo requests to find active hosts,
but does not discount hosts that do not respond - they might be behind a firewall.
Port-scanning can determine which hosts are alive and what ports they have open.
This creates a target set of hosts for use in the next step.
Enumeration
In this phase, Nessus probes network services on each host to obtain banners that
contain software and OS version information. Depending on what is being
enumerated, username and password brute-forcing can also take place here.
Vulnerability Detection
Nessus probes remote services according to a list of known vulnerabilities such as
input validation, buffer-overflows, improper configuration, and many more.
Nessus is a proprietary comprehens, vulnerability scanner which is developed by
Tenable Network Security. It is free of charge for personal use in a non-enterprise
environment.
Installation Steps:
1. Download Nessus setup file
- Go towww.tenable.com-> products -> Nessus->download
- Download Nessus for ubuntu14.4
2. InstallNessus
· Open a Terminal and go to the download directory(cd)
· Run sudo dpkg -i Nessus*.deb. Enter rootpassword.
· Start it sudo /etc/init.d/nessusdstart
- Plug-in feedregistration
a) Go tohttp://www.nessus.org/register/for registration and activation code.
Register by entering user details and valid mail id. Activation code will be
sent to given mailid.
b) Activate using supplied activation code
c) Click on downloadplug-in
d) It will show following fetching plug-ins window
- Sign in for Nessus vulnerability scanner using login name andpassword
4. Create scan by clicking scan-> add scan -> provide scan details(scan name, type of scan,
target addretc)
5. Check vulnerability report inResults
Ref :https://docs.tenable.com/other/nessus/nessus_6.4_user_guide.pdf
Basic Network scanning
Advanced Scanning in General Search
Policies
Plugins
General Scanning
Port scanning
Conclusion:-
Thus we have studied theVulnerability scanning using Nessus, Nikto
EXPERIMENT NO: 3
Description:
HT Track is a free (GPL, libre/free software) and easy-to-use offline browser
utility. It allows you to download a World Wide Web site from the Internet to a
local directory, building recursively all directories, getting HTML, images, and
other files from the server to your computer. HTTrack arranges the original site's
relative link-structure. Simply open a page of the "mirrored" website in your
browser, and you can browse the site from link to link, as if you were viewing it
online. HT Track can also update an existing mirrored site, and resume interrupted
downloads. HTTrack is fully configurable, and has an integrated help system.
Win HTTrack is the Windows (from Windows 2000 to Windows 10 and above)
release of HTTrack, and Web HTTrack the Linux/Unix/BSD release.
Download from
https://www.httrack.com/page/2/en/index.html
Conclusion: - Thus we have studied the website copier HT Track.
EXPERIMENT NO: 4
Pre:
Open Web Application Security Project (OWASP),
https://www.owasp.org/index.php/Main_Page
Description:
Wapiti allows you to audit the security of your websites or web applications.
It performs "black-box" scans (it does not study the source code) of the web
application by crawling the WebPages of the deployed webapp, looking for scripts
and forms where it can inject data. Once it gets the list of URLs, forms and their
inputs, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable.
Run :
Download and install wapiti then type following command
wapiti -u http://target/
Output :
Hello,
Here is a really fast tutorial on Wapiti and Wapiti-getcookie usage to show how to
login to a website to retrieve cookies
then use the generated cookie file to launch a Wapiti scan.
First, I use wapiti-getcookie to login in the restricted area and get the cookie in
cookies.json :
Enter a number : 1
It can also be done with wapiti-getcookie this way (if you have all necessary
informations about the form) :
wapiti-getcookie -u http://wackopicko/users/login.php -c cookies.json -d
"username=wanda&password=wanda"
Then, I scan the vulnerable website using the cookie and excluding the logout script :
Wapiti-3.0.0 (wapiti.sourceforge.net)
[*] Saving scan state, please wait...
Note
========
This scan has been saved in the file
/home/devloop/.wapiti/scans/wackopicko_folder_30e1d821.db
[*] Wapiti found 41 URLs and forms during the scan
[*] Loading modules:
mod_crlf, mod_exec, mod_file, mod_sql, mod_xss, mod_backup, mod_htaccess,
mod_blindsql, mod_permanentxss, mod_nikto, mod_delay, mod_buster, mod_shellshock
adminname=default&password=letmein
---
---
PHP evaluation in http://wackopicko/admin/index.php via injection in the parameter
page
Evil request:
POST
/users/WackoPicko/website/admin/index.php?page=data%3A%3Bbase64%2CPD9waHAgZWNobyAndzRw
MXQxJywnX2V2YWwnOyA%2FPg%3D%3D HTTP/1.1
Host: wackopicko
Referer: http://wackopicko/admin/index.php?page=login
Content-Type: application/x-www-form-urlencoded
adminname=default&password=letmein
---
adminname=default&password=letmein
---
adminname=default&password=letmein
---
adminname=default&password=letmein
---
Report
------
A report has been generated in the file /home/devloop/.wapiti/generated_report
Open /home/devloop/.wapiti/generated_report/wackopicko_12292017_1342.html with a
browser to see thisreport.
Conclusion: -
Thus, we have studied the web-application vulnerabilities using open-source tools
like Wapiti, browser exploitation framework (BeEf)
EXPERIMENT 5
Title: Detect SQL injection vulnerabilities in a website database using SQL Map
Description:
SQL injection (SQLi) refers to an injection attack wherein an attacker can execute malicious
SQL statements (also commonly referred to as a malicious payload) that control a web
application ‘s database server (also commonly referred to as a Relational Database Management
System – RDBMS). Since an SQL injection vulnerability could possibly affect any website or
web application that makes use of an SQL-based database, the vulnerability is one of the oldest,
most prevalent and most dangerous of web application vulnerabilities.
By leveraging SQL injection vulnerability, given the right circumstances, an attacker can use it
to bypass a web application ‘s authentication and authorization mechanisms and retrieve the
contents of an entire database. SQL injection can also be used to add, modify and delete records
in a database, affecting data integrity.
To such an extent, SQL injection can provide an attacker with unauthorized access to sensitive
data including, customer data, personally identifiable information (PII), trade secrets, intellectual
property and other sensitive information.
SQLMAP: sqlmap is an open-source penetration testing tool that automates the process of
detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a
powerful detection engine, many niche features for the ultimate penetration tester and a broad
range of switches lasting from database fingerprinting, over data fetching from the database, to
accessing the underlying file system and executing commands on the operating system via out-
of-band connections.
Step 1: Installation of sqlmap
To check access to a database, - - dbs option can be used. - - dbs lists all the available
databases.
It notifies vulnerability in parameter cat, various payloads executed, name of backend
database, its version and list of all available databases. Here, two databases: acuart and
information schema are listed.
$ sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1--dbs
Step 3: Listing tables present in Database
Each of the database can further explored to get tables information from them. Option -D
can be used to specify the name of the database we need to explore. If access to the
database is allowed, we can access the tables using --tables option along with name of
database. Here, acuart database is accessed and all available tables in that database are
listed as an output of the following command.
$ sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 -D acuart --tables
Step 4: List column information of a particular table
Columns of a particular table can be viewed by specifying -T option before table name
and --columns option to query the column names. Access to table and its column for table
"products" is displayed by following command.
Information from specific column can be retrieved and displayed using -C. Multiple
column can also be listed separated by a comma and the –dump query retrieves the data.
Flowing command shows all Domain values of column name from product table from
acuart database.
Thus, we have studied the SQL injection vulnerabilities in a website database using SQLMap.
EXPERIMENT 6
Description:
Metasploit was created by HD Moore in 2003 as a portable network tool using the Perl
programming language.
The basic steps for exploiting a system using the Framework include:
1. Choosing and configuring an exploit (code that enters a target system by taking
advantage of one of its bugs; about 900 different exploits for Windows, Unix/Linux
and Mac OS X systems are included);
2. Checking whether the intended target system is susceptible to the chosen exploit
(optional);
3. Choosing and configuring a payload (code that will be executed on the target system
upon successful entry; for instance, a remote shell or a VNCserver);
4. Choosing the encoding technique to encode the payload so that the intrusion-
prevention system (IPS) will not catch the encoded payload;
5. Executing the exploit.
This modular approach - allowing the combination of any exploit with any payload
- is the major advantage of the Framework. It facilitates the tasks of attackers, exploit writers,
and pay load writers.
Metasploit runs on Unix (including Linux and Mac OS X) and on Windows. It includes two
command-line interfaces, a web-based interface and a native GUI. The web interface is intended
to be run from the attacker's computer. The Metasploit Framework can be extended to use
external add-ons in multiple languages.
To choose an exploit and payload, some information about the target system is needed, such as
operating system version and installed network services. This information can be gleaned with
port scanning and OS fingerprinting tools such as Nmap. Vulnerability scanner such as
NexposeorNessusc and etect the target system vulnerabilities. Metasploit can import
vulnerability scan data and compare the identified vulnerabilities to existing
exploit modules for accurate exploitation.
Step 1. Opening msf console and finding exploits
Step 2. Finding information related to a particular exploit
Step 3. Select a particular exploit and see corresponding payloads
Step 4. Select the payload required and see for the options to be given while exploiting
Step 5. Exploit and see the options for checking
Title : Exploring Router and VLAN security, setting up access lists using Cisco
Packet tracer(student edition)
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R1
R1(config)#enable password cisco
R1(config)#enable secret student
R1(config)#service password-encryption
R1(config)#username mita privilege 15 password 0 cisco
Setting up VLANs
1. Configure two VLANs on each switch, VLAN 10 and VLAN20.
S1(config)#vlan 10
S1(config-vlan)#vlan 20
S2(config)#vlan 10
S2(config-vlan)#vlan 20
S3(config)#vlan 10
S3(config-vlan)#vlan 20
2. Use the show vlan and show vlan brief command to verify your VLANs.
Notice that all interfaces are in VLAN 1 bydefault
S1#sh vlan
S1#sh vlan brief
3. Configuring VLANInterfaces
S1(config)#interface vlan 10
S1(config-if)#ip address 10.10.10.1 255.255.255.0
S1(config-if)#interface vlan 20
S1(config-if)#ip address 20.20.20.1 255.255.255.0
● Access control lists (ACLs) can be used for two purposes on Cisco devices:
to filter traffic, and to identifytraffic.
● Access lists are a set of rules, organized in a rule table. Each rule or line in
an access-list provides a condition, either permit ordeny:
The first line allows the 172.18.x.x network access only to port 80 on the web
server.
The second line blocks 172.18.x.x from accessing anything else on the 172.16.x.x
network.
The third line allows 172.18.x.x access to anything else.
Conclusion: - Thus, we have studied the Exploring Router and VLAN security, setting up
access lists using Cisco Packet tracer.
EXPERIMENT 8
Title: Exploring VPN security using Cisco Packet tracer (student edition)
Refer to the diagram shown. Set up this topology using packet tracer. Then refer to
the step by step guidelines on configuration
PC0 PC1
network 192.168.1.0/24
network 192.168.2.0/24
network 1.0.0.0/8
network 2.0.0.0/8
STEP 1: Configuring the routers and PCs with IP addresses.
Router>enable
Router#config t
Router(config)#host r1
r1(config)#int fa0/0
r1(config-if)#ip add 192.168.1.1 255.255.255.0
r1(config-if)#no shut
r1(config-if)#exit
r1(config)#int fa0/1
r1(config-if)#ip address 1.0.0.1 255.0.0.0
r1(config-if)#no shut
Router>enable
Router#config t
Router(config)#host r2
r2(config)#int fa0/0
r2(config-if)#ip add 1.0.0.2 255.0.0.0
r2(config-if)#no shut
r2(config-if)#exit
r2(config)#int fa0/1
r2(config-if)#ip add 2.0.0.1 255.0.0.0
r2(config-if)#no shut
Router>enable
Router#config t
Router(config)#host r3
r3(config)#int fa0/0
r3(config-if)#ip add 2.0.0.2 255.0.0.0
r3(config-if)#no shut
r3(config-if)#exit
r3(config)#int fa0/1
r3(config-if)#ip add 192.168.2.1 255.255.255.0
r3(config-if)#no shut
First routerr1
r1#ping2.0.0.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2.0.0.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 26/28/33 ms
Now we go to router r3 and test network by pinging router r1 interface.
r3#ping 1.0.0.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 1.0.0.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 25/28/32 ms
r1#ping 172.16.1.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.1.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 30/32/36 ms
r1#
r3#ping 172.16.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.1.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 33/45/83 ms
STEP 6: Now Do routing for created VPN Tunnel on Both Router R1 and R3:
Hardware is Tunnel
If you want to check what path vpn tunnel is using just go to any of the PCs
and then ping another PC located in a different network. Then trace the path
using tracert.
Its result will show the path followed by VPN Tunnel created by you.
PC>ipconfig
FastEthernet0 Connection:(default port)
Link-localIPv6Address .......... :FE80::2E0:8FFF:FE0B:AEB2
IP Address ..................... :192.168.2.2
SubnetMask. .................... :255.255.255.0
DefaultGateway ................. :192.168.2.1
PC>ping 192.168.1.2
Pinging 192.168.1.2 with 32 bytes of data:
Replyfrom192.168.1.2:bytes=32time=61msTTL=126
Replyfrom192.168.1.2:bytes=32time=55msTTL=126
Replyfrom192.168.1.2:bytes=32time=55msTTL=126
Replyfrom192.168.1.2:bytes=32time=57msTTL=126
Ping statistics for 192.168.1.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 55ms, Maximum = 61ms, Average = 57ms
PC>tracert 192.168.1.2
Tracing route to 192.168.1.2 over a maximum of 30 hops:
1 3 ms 0 ms 18 ms 192.168.2.1
2 35 ms 30 ms 30 ms 172.16.1.1
3 65 ms 59 ms 60 ms 192.168.1.2
Trace complete.
PC>
Conclusion: - Thus, we have studied the exploring VPN security using Cisco Packet tracer
EXPERIMENT 9
Title: Exploring Authentication and access control using RADIUS, TACACS and
TACACS+
Description:
TACACS+
Terminal Access Controller Access Control System (TACACS+) is Cisco
proprietary protocol which is used for the communication of the Cisco client and
Cisco ACS server. It uses TCP port number 49 which makes it reliable.
RADIUS –
Remote Access Dial In User Service (RADIUS) is an open standard protocol used
for the communication between any vendor AAA client and ACS server. If one of
the client or server is from any other vendor (other than Cisco) then we have to use
RADIUS. It uses port number 1812 for authentication and authorization and 1813
for accounting.
Similarities –
The process is start by Network Access Device (NAD – client of TACACS+ or
RADIUS). NAD contacts the TACACS+ or RADIUS server and transmit the
request for authentication (username and password) to the server. First, NAD
obtain username prompt and transmit the username to the server and then again the
server is contact by NAD to obtain password prompt and then the password is send
to theserver.
The server replies with access-accept message if the credentials are valid otherwise
send an access-reject message to the client. Further authorization and accounting is
different in both protocols as authentication and authorization is combined in
RADIUS.
Differences –
TACACS+ RADIUS
Ciscoproprietaryprotocol open standardprotocol
It uses TCP astransmissionprotocol It uses UDP as transmission protocol
It uses TCP portnumber49. It uses UDP port number 1812for
authentication and authorization and
1813 for accounting.
As it is open standard therefore RADIUS can be used with other vendors device
while because TACACS+ is Cisco proprietary, it can be used with Cisco devices
only.
It has more extensive accounting support than TACACS+.
How to Configure AAA (TACACS+) on Packet Tracer for User
Authentication
Authentication configuration
Note: this is a username and password setup on the switch‘s local database. You
need to configure username and password on the AAA as well, which can be
different than the local username andpassword.
Note: when TACACS server becomes unreachable, you use switch‘s localdatabase
forauthentication.
Note: the key string ‗mykey‘ will be used to encrypt the session the key ‗mykey‘
should only be known to the server and the switch.
Switch(config-if)# exit
On the packet tracer, you need to add a generic server to the switch and set the IP
to 10.1.1.10. Next click on the server icon and click on service and then click on
AAAtab.Makesureservicestateis selectedas‗on‘asshownbelowscreenshot.
AAA server configuration on Packet Tracer
Under the network section, type the client name, which will be the name of your
switch? Next set the client IP. Here your switch is the client to the AAA server.
The IP of VLAN1 is the client IP. Finally, select the server type as tacacs and click
on addbutton.
In the user setup section, type a username and password and click on add.
Remember that when you telnet or SSH to the switch, use this username and
password, which will be verified by the AAA server.
Authorization configuration
This configuration will define what you can do once you get onto the switch after a
successful authentication. When you configure authorization in cisco switch, it
always queries the AAA server (RADIUS or TACACS+ server)
After defining the authorization, you need to apply the authorization to a line so
that the users get authorized to specific task by the AAA sever every time they
logon to the switch using that specific line. But the packet tracer 7 does not have
any option to apply authorization to a specific line. So, you can use the following
command to allow the switch to use AAA authorization for alllines.
Conclusion: - Thus, we have studied the exploring Authentication and access control using
RADIUS, TACACS.
EXPERIMENT 10
Title: Install and use a security app on an Android mobile (e.g. Droidcrypt)
Description:
Key features:
* Recursive, fast and efficient en-/decryption of entire folders or individual files
using AES
* En-/Decryption of files on internal/externalSD
* Encrypts images / photos, videos, music, PDFs, documents or anycontent
* Viewing contents of encrypted files as usual through standard apps, while
DroidCrypt mediate between viewer app and encrypted file - the file remains
encrypted afterwards, ifdesired
* Receiving multiple tasks via external file manager or other applications such as
Gallery by"Sent-to"
* Resistance against data recovery tools by wipe of unencryptedfiles
* Identification of relevant encrypted files based on chosen password, so any
parent folders can beselected
* Encryption in combination to a compression (optional) in order to save your
memory
* Automated securing that encrypted and not encrypted data are never present at
once (and viceversa)
* Orientation-based generation of a path as an additional alternative topasswords
Instruction for installing Droid Crypt (Trial) app apk on Android devices
Step 1: Download Droid Crypt (Trial) app apk on this page, save
it to easy-to-find location.
Step 2: Make sure that third-party applications are allowed on
your device. Go to Menu > Settings > Security and check Unknown
Sources to allow your device to install applications from
sources other than the Google PlayStore.
Step 2: Open Downloads on your device by going to My Files or
Files, tap the APK fileyou downloaded
(de.atm.android.security.encryption.free-v1.2.30.apk), tap
Install when prompted, this app will be installed on your
device.
Note:Detailedstepsmaybevarieswithdevice.This apkfileP
canalsobeinstalledonotherdeviceslikeWindows, C,Mac,
Blackberry, ... Feel free to contact us if you have any
questions.
App Permissions
Droid Crypt (Trial) app apk 1.2.30 apk requires following permissions:
Conclusion: - Thus, we have studied the Install and use a security app on an Android mobile.
EXPERIMENT 11
Description :
OpenStego, the free steganography solution. OpenStego provides two main
functionalities:
● Data Hiding: It can hide any data within a cover file (e.g.images).
● Watermarking (beta): Watermarking files (e.g. images) with an invisible signature. It
can be used to detect unauthorized filecopying.
Using OpenStego
Using OpenStego is pretty straightforward. There are two modes of operation -
data hiding andwatermarking.
Data Hiding
In this mode, you can either hide the data (file) inside an image or extract the data
from the image. Check screenshots below to see how it can be done:
Hide data
Extract data
Watermarking (beta)
In this mode, you can watermark / verify images with your signature. First you need to generate
signature file, and then it can be used to watermark images or verify the same later. Check
screenshots below to see how it can be done:
Generate signature
Embed watermark
Verify watermark
Conclusion: - Thus, we have studied the Use of steganographic tools like Open Stego, to detect data hiding or
unauthorized file copying.
Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC