2.1.9 Packet Tracer Explore File and Date Encryption Answer Key
2.1.9 Packet Tracer Explore File and Date Encryption Answer Key
Objectives
Part 1: Discover the FTP Account Credentials for Mary
Part 2: Upload Confidential Data using FTP
Part 3: Discover the FTP Account Credentials for Bob
Part 4: Download Confidential Data using FTP
Part 5: Decrypt the Contents of a Sensitive File
Background
In this Packet Tracer activity, you will access the encrypted content of multiple files and transfer a file to an
FTP server. Then, in the role of another user, you will download the file from the FTP server and decrypt the
file contents. The IP addressing, network configuration, and service configurations are already complete. You
will use the client devices to transfer a file with encrypted data to another device.
To decrypt text and files in this activity, you will use OpenSSL. OpenSSL is an open-source project that
provides a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and
Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library.
Note: While OpenSSL is the de facto cryptography library today, the use presented in this activity is NOT
recommended for robust protection. Below are two security problems with this activity:
o The method described in this activity uses a weak key derivation function. The ONLY security is
introduced by a very strong password.
o The method described in this activity does not guarantee the integrity of the text file.
This activity should be used as a learning tool only. The methods presented here should NOT be used to
secure truly sensitive data.
Resources
The CSE-LABVM installed in VirtualBox
Note: It is recommended that you use the CSE-LABVM for the decryption tasks in this activity. The CSE-
LABVM was installed during the Lab - Install a Virtual Machine on a Personal Computer.
Instructions
© 2021 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 6
Packet Tracer – Exploring File and Data Encryption
If threat actors were to capture the file transfer, what would be in clear text?
Type your answers here.
© 2021 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 6
Packet Tracer – Exploring File and Data Encryption
If threat actors were to capture the file transfer crossing the internet, what would be in clear text?
Type your answers here.
© 2021 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 6
Packet Tracer – Exploring File and Data Encryption
What is the decryption key to access the confidential information in the clientinfo.enc file?
Type your answers here.
© 2021 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 6
Packet Tracer – Exploring File and Data Encryption
Answer Key
© 2021 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 5 of 6
Packet Tracer – Exploring File and Data Encryption
© 2021 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 6 of 6