Security Lab Manual - Copy (1)
Security Lab Manual - Copy (1)
To implement a program for encrypting a plain text and decrypting a cipher text
using Caesar Cipher (shift cipher) substitution technique.
ALGORITHM DESCRIPTION
Dn (x)=(x - n) mod26
RESULT
Thus the program for implementation of Caesar cipher was executed and verified
successfully.
***************************************************************
b) PLAYFAIR CIPHER
***************************************************************
AIM
To implement a program to encrypt a plain text and decrypt a cipher text using play
fair Cipher substitution technique.
ALGORITHM DESCRIPTION
***************************************************************
AIM
To implement a program to encrypt and decrypt using the Hill cipher substitution
technique
ALGORITHM DESCRIPTION
RESULT
Thus the program for implementation of Hill cipher was executed and verified
successfully.
***************************************************************
a)DES ALGORITHM
***************************************************************
AIM
ALGORITHM DESCRIPTION
RESULT
Thus the program for implementation of DES Algorithm was executed and
verified successfully.
***************************************************************
b )RSA ALGORITHM
***************************************************************
AIM
ALGORITHM DESCRIPTION
a. The pair of numbers (n, e) form the RSA public key and is made
public.
b. Interestingly, though n is part of the public key, difficulty in
factorizing a large prime number ensures that attacker cannot find in
finite time the two primes (p & q) used to obtain n. This is strength of
RSA.
6. Generate the private key
a. Private Key d is calculated from p, q, and e. For given n and e, there is
unique number d.
b. Number d is the inverse of e modulo (p - 1)(q – 1). This means that d is
the number less than (p - 1)(q - 1) such that when multiplied by e, it is
equal to 1 modulo (p - 1)(q - 1).
7. This relationship is written mathematically as follows ed = 1 mod (p − 1)(q −
1)
8. The Extended Euclidean Algorithm takes p, q, and e as input and gives d as
output.
RESULT
Thus the program for implementation of RSA Algorithm was executed and verified
successfully.
***************************************************************
***************************************************************
AIM
ALGORITHM DESCRIPTION
RESULT
Thus the program for implementation Diffiee Hellman Algorithm was executed and
verified successfully.
***************************************************************
IMPLEMENT THE SIGNATURE SCHEME –
DIGITAL SIGNATURE STANDARD
***************************************************************
AIM
ALGORITHM
RESULT
Thus the program for implementation Digital Signature scheme was executed and
verified successfully.
***************************************************************
DEMONSTRATE HOW TO PROVIDE SECURE DATA STORAGE,
SECURE DATA TRANSMISSION AND FOR CREATING DIGITAL
SIGNATURES (GnuPG)
***************************************************************
AIM
To demonstrate how to provide secure data storage, secure data transmission and for
creating digital signatures (GnuPG).
RESULT
Thus the program for installation of GnuPG was executed and verified successfully.
***************************************************************
SETUP A HONEY POT AND MONITOR THE HONEY POT ON
NETWORK (KF SENSOR)
***************************************************************
AIM
To setup a honey pot and monitor the honey pot on network (KF sensor)
DESCRIPTION
Honey Pot is a device placed on Computer Network specifically designed to capture
malicious network traffic. KF Sensor is the tool to setup as honey pot when KF Sensor is
running it places a siren icon in the windows system tray in the bottom right of the screen. If
there are no alerts then green icon is displayed.
STEPS
1. Install winpcap library (mandatory for kfsensor)
2. Download kfsensor and install.
3. Then restart your pc. Configure properly no change needs to do now go to setting
option and configure according to your attack.
4. Now go to your home screen of kf sensor
5. You will get some logs about clients. And it will start working
KFSensor
Windows based honey pot known as KF Sensor
It detects an incoming attack or port scanning and reports it to you
A machine running KFSensor can be treated as just another server on the
network, without the need to make complex changes to routers and firewalls.
Sim Server
Sim server is short for simulated server.
It is a definition of how KFSensor should emulate real server software.
There is no limit to the number of Sim Servers that can be defined.
There are two types of Sim Server available; the Sim Banner and the Sim
Standard Server.
Setting Up a HoneyPot
You can get educational License from Keyfocus.
Install WinPCap
– A industry standard network packet capturing library
Install KFSensor
KFSensor Monitor
TerminologyVisitor
A visitor is an entity that connects to KFSensor.
• Visitors could be hackers, worms, viruses or even legitimate users that have
stumbled onto KFSensor by mistake.
• Visitors can also be referred to as the clients of the services provided by
KFSensor.
Event
• An event is a record of an incident detected by the KFSensor Service.
• For example if a visitor attempts to connect to the simulated web server then
an event detailing the connection is generated.
• Events are recorded in the log file and displayed in the KFSensor monitor.
Editing Scenario
Terminology-Rules
KFSensor is rules based.
All of the data that was produced was the result of KFSensor detecting certain types
of activity and then using a rule to determine what type of action should be taken.
We can easily modify the existing rules or add your own.
Adding a rule
Click the Add button and you will see the Add Listen dialog box.
– `The first thing that this dialog box asks for is a name. This is just a
name for the rule.
– Pick something descriptive though, because the name that you enter is
what will show up in the logs whenever the rule is triggered.
Installing KFSensor
1. Download and install winpcap
2.Download and install KFSensor
3. Enable Telnet client, server, Internet Information server in
Control Panel-> Programs-> Turn windows features on/off
Check Telnet client, Telnet server, IIS-> FTP (both options),
FTP Emulation
1. Open command prompt
2. Type
FTP IP address
Enter user name anonymous
Enter any password
Get any file name with path
3. Monitor this ftp access in KFSensor monitor
4. Right click KFSensor entry, select Event details, see the details captured by the
server
5. Create visitor rule by right clicking the FTP entry and check either ignore / close
under actions in the dialog box that opened.
6. Now redo the above said operations at the command prompt and see how the
emulation behaves.
7. You can see/ modify the created rules in Scenario->edit active visitor rules.
SMTP Emulation
1. open command prompt
2. Type
telnet ipaddress 25
Helo
Mail from:<mail-id>
Rcpt to:<mail-id>
Data
type contents of mail end that with . in new line
3. Check the kfsensor for the captured information.
IIS emulation
1. Create an index.html, store it in c:\keyfocus\kfsensor\files\iis7\wwwroot
2. Select scenario->edit simserver
1. Choose iis and edit
2. Make sure index.html is in first place in the listed htm files in the dialog box.
3. Check the kfsensor for the captured information.
DOS attack
1. Settings-> DOS attack settings modify (reduce) values in general tab, ICMP and
other tabs. Press ok.
2. Open command prompt and type
Ping ipaddress –t
or
Ping –l 65000 ipaddress –t
1. Check the kfsensor for the DOS attack alerts, open event details in right click
menu for further details.
RESULT
Thus the program for installation of KF Sensor to monitor the honeypot was
executed and verified successfully.
***************************************************************
PERFORM WIRELESS AUDIT ON AN ACCESS POINT OR A
ROUTER AND DECRYPT WEP AND WPA ( NET STUMBLER)
***************************************************************
AIM
To perform wireless audit on an access point or a router and decrypt WEP and
WPA( Net Stumbler).
DESCRIPTION
NetStumbler (also known as Network Stumbler) aircrack on ubuntu is a tool for
windows that facilitates detection of Wireless LANs using the 802.11b, 802.11a and
802.11g WLAN standards. It is one of the Wi-Fi hacking tool which only compatible with
windows; this tool also a freeware. With this program, we can search for wireless network
which open and infiltrate the network. It’s having some compatibility and network adapter
issues.
RESULT
Thus the program for installation of Net-Stumbler was executed and
verified successfully.