0% found this document useful (0 votes)
19 views11 pages

ENS Lab Activity 1

Uploaded by

itzsarathy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views11 pages

ENS Lab Activity 1

Uploaded by

itzsarathy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Lab activity 1- Embedded Network Security

Marks -8

If you have already got access to Kali Linux, please start Kali Linux then Kindly skip to step no 4

Step 01: Install VirtualBox

Go to https://www.virtualbox.org/wiki/Downloads. Depending on your operating system, select the


right package and install. In this case, it’s windows operating system.

Double click the downloaded file and proceed with default steps.

Shortcut will be created in desktop

Step 02 Install Kali Linux

Step 2 − Download the Kali Linux package from its official and configure it in VirtualBox by selecting
pre built Virtual machines as shown below.

Kali: https://www.kali.org/downloads/
Step3 − Download  Extract the setup file Double click on kali-linux-2022.3-virtualbox-amd64.

The following files will be extracted and double click the virtual machine definition file.
It will open the Kali image in virtual box. As below.

Step 04: Please enter the following Login credentials in Login page

ID – kali

Password – kali
Step :05

In Kali Linux desktop click Application icon( top left) then type terminal in search box then select
terminal emulator.
Step 06: type your name, date, email id using echo command as below

Step 07: Create a directory lab01 as below

Step 08: Create a file called hello.txt with contents “cyber security”
Symmetric Encryption

Step 09: Follow the below steps to encrypt hello.txt using AES algorithm- Symmetric Encryption.
Output file name is hello.enc and key is cyber

Step 10: Follow the below steps to decrypt hello.enc using AES algorithm- Symmetric Encryption.
Output file name is hello.dec and key is cyber
Step 11: Please encrypt the file hello.txt with AES-128-CBC with key value “security” and output file
name: hello128.enc. Then decrypt the file hello128.enc with key value “security” and output file
name:hello128.dec. Please display contents of hello128.dec.

ASymmetric Encryption ( Alice sends a message to Bob and Bob sends a message to Alice)

Step 12: Please generate a key pair(private key & public key) for Alice using RSA algorithm. Output
file name is alice_private.pem

Step 13: Please extract Alice public key from the key(alice_private.pem) that was created in Step 12.

Step 14: Let us assume Bob wants to send the file hello.txt to Alice using RSA algorithm. Output file
name is Bob_message.enc
Step 15: Let us read the message by decrypting Bob_message.enc with Alice private key. Output file
name is Bob_message.dec and display the contents of the file.

Step 16: Let us assume Alice wants to send a message “Received” to Bob in encrypted format using
RSA, Please carryout the required steps and captured screen shots.

Hashing

Step 17: Please find hash value of hello.txt by using SHA-256 algorithm as per given steps below.

Step 18: Please repeat step 17 with SHA-512 algorithm and capture the results.

Firewall rules

Step 19 ping www.google.com using below command. Use control + c to stop the output.
Step 20: Run iptables tables with sudo privileges to list Firewall rules. Sudo password is kali

Step 21: Block ping command usage by writing iptables rules to drop ICMP packets. Also list Firewall
rules.
Step 22: ping www.google.com and capture the results.

Step 23: Insert a Firewall rule to allow ICMP traffic as below and list firewall rules

Step 24: ping www.google.com and capture the result


Step 25: Delete all rules from Firewall and display .

You might also like