ENS Lab Activity 1
ENS Lab Activity 1
Marks -8
If you have already got access to Kali Linux, please start Kali Linux then Kindly skip to step no 4
Double click the downloaded file and proceed with default steps.
Step 2 − Download the Kali Linux package from its official and configure it in VirtualBox by selecting
pre built Virtual machines as shown below.
Kali: https://www.kali.org/downloads/
Step3 − Download Extract the setup file Double click on kali-linux-2022.3-virtualbox-amd64.
The following files will be extracted and double click the virtual machine definition file.
It will open the Kali image in virtual box. As below.
Step 04: Please enter the following Login credentials in Login page
ID – kali
Password – kali
Step :05
In Kali Linux desktop click Application icon( top left) then type terminal in search box then select
terminal emulator.
Step 06: type your name, date, email id using echo command as below
Step 08: Create a file called hello.txt with contents “cyber security”
Symmetric Encryption
Step 09: Follow the below steps to encrypt hello.txt using AES algorithm- Symmetric Encryption.
Output file name is hello.enc and key is cyber
Step 10: Follow the below steps to decrypt hello.enc using AES algorithm- Symmetric Encryption.
Output file name is hello.dec and key is cyber
Step 11: Please encrypt the file hello.txt with AES-128-CBC with key value “security” and output file
name: hello128.enc. Then decrypt the file hello128.enc with key value “security” and output file
name:hello128.dec. Please display contents of hello128.dec.
ASymmetric Encryption ( Alice sends a message to Bob and Bob sends a message to Alice)
Step 12: Please generate a key pair(private key & public key) for Alice using RSA algorithm. Output
file name is alice_private.pem
Step 13: Please extract Alice public key from the key(alice_private.pem) that was created in Step 12.
Step 14: Let us assume Bob wants to send the file hello.txt to Alice using RSA algorithm. Output file
name is Bob_message.enc
Step 15: Let us read the message by decrypting Bob_message.enc with Alice private key. Output file
name is Bob_message.dec and display the contents of the file.
Step 16: Let us assume Alice wants to send a message “Received” to Bob in encrypted format using
RSA, Please carryout the required steps and captured screen shots.
Hashing
Step 17: Please find hash value of hello.txt by using SHA-256 algorithm as per given steps below.
Step 18: Please repeat step 17 with SHA-512 algorithm and capture the results.
Firewall rules
Step 19 ping www.google.com using below command. Use control + c to stop the output.
Step 20: Run iptables tables with sudo privileges to list Firewall rules. Sudo password is kali
Step 21: Block ping command usage by writing iptables rules to drop ICMP packets. Also list Firewall
rules.
Step 22: ping www.google.com and capture the results.
Step 23: Insert a Firewall rule to allow ICMP traffic as below and list firewall rules