In CSDF
In CSDF
Laboratory Manual
Institute’s Vision:
Institute’s Mission:
Department’s Vision:
Department’s Mission:
Certificate
Place:
Date:
2. Problem analysis: Identify and analyse well-defined engineering problems using codified
standard methods.
4. Engineering Tools, Experimentation and Testing: Apply modern engineering tools and
appropriate technique to conduct standard tests and measurements.
7. Life-long learning: Ability to analyse individual needs and engage in updating in the
context of technological changes in field of engineering.
Practical Outcome - Course Outcome matrix
Course Outcomes (COs):
CO1: Gain knowledge of information security, including Cryptography and hashing techniques.
CO2: Explain the different types of network and system security techniques and threats.
CO3: Understand the different types cybercrimes and Analyse cybercrime.
CO4: Implement ethical hacking methodologies using Kali Linux, including vulnerability analysis.
CO5: Explain how digital forensics methodologies use for investigate cybercrimes
S. Practical Outcome/Title of experiment CO1 CO2 CO3 CO4 CO5
No
1 a) Implement Private key Cryptography algorithm √ - - - -
DES in python.
(Install des package using pip)
b) Implement Message digest 5 and Secure Hash
Function using python.
2 Implement the RSA Public key Cryptography √ - - - -
algorithm in Python using RSA library.
3 Demonstrate intrusion detection system (ids) using - √ - - -
any tool.(snort or any other s/w)
4 Install Tor browser and perform proxy tunnelling. - √ - - -
(2 or 3 skills)
Practical 1
Aim: a. Implement private key cryptography algorithm DES in python.
(Install DES package using PiP)
b. Implement Message digest 5 and Secure Hash Function using python.
A. Objective:
To apply the knowledge of private key cryptography to implement DES algorithm in
Python
To achieve data integrity by implementing MD5 and Hash function using Python
Examine the symmetric key cryptography and hashing concept and their applications
G. Prerequisite Theory:
226120316072 Page 1
Cyber Security and Digital Forensics (4361601)
H. Resources/Equipment Required
226120316072 Page 2
Cyber Security and Digital Forensics (4361601)
Step 3: Perform encryption using key and provide message for encryption and print
encrypted message.
Step 5: Convert and print digest of plain text message into md5 using hashlib library
Step 6: Convert and print digest of plain text message into sha256 using hashlib library
226120316072 Page 3
Cyber Security and Digital Forensics (4361601)
Below we can see that MD5 gives 128-bit output digest and SHA256 gives 256 bits
output. Generally, the longer the output, the more secure the hash function, as it reduces
the chances of collisions
MD5
SHA256
226120316072 Page 4
Cyber Security and Digital Forensics (4361601)
6. What do you mean by an authentication? How to achieve using public key cryptography?
https://www.youtube.com/watch?v=j53iXhTSi_s
https://www.youtube.com/watch?v=r6GlzIWiMD0
N. Assessment-Rubrics
Sign
Date: ……………
226120316072 Page 5
Cyber Security and Digital Forensics (4361601)
Practical 11
Aim: a. Installation and configuration of Wireshark.
b. Perform Password sniffing using Wireshark. (Analyse GET/POST
Request)
A. Objective:
To apply the knowledge of open-source components for monitoring, analyzing and
documenting the network traffic are present.
To achieve data by network monitoring on almost all types of network standards (ethernet,
wlan, Bluetooth etc)
B. Expected Program Outcomes (POs)
PO1,PO2 PO3 PO4 and PO7
C. Expected Skills to be developed based on competency:
CO5: Explain how digital forensics methodologies use for investigate cybercrimes.
E. Practical Outcome (PRo)
Understand how protocols work and also help you debug applications or network issues.
Understand how the complete control on packet capturing and What to capture and view.
OSI stands for Open Systems Interconnection. It is 7-layer architecture with each layer
having specific functionality to perform.
TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of
communication protocols used to interconnect network devices on the internet.
226120316072 Page 61
Cyber Security and Digital Forensics (4361601)
H. Resources/Equipment Required
Instrument/Equipment
Sr. No Specification Quantity
/Components/Trainer kit
Computer System Operating System:
(Desktop/Laptop) Any Linux OS or Windows 7 or later version
1 1
RAM: 4 GB , HDD: 250 GB.
Active Internet connection.
1. Equipment handling and proper connection: Connect network devices, cables, and
connectors with care to prevent improper connection. Ensure proper grounding of devices
to prevent electrical issues.
2. Testing in a controlled environment: Perform the practical test in a controlled environment
that is separate from a live production network. This ensures that any changes or issues
encountered during testing do not impact critical network operations.
J. Procedure to be followed:
a. Installation and configuration of Wireshark.
Step 1: Visit the official Wireshark website using any web browser.
Step 2: Click on Download, a new webpage will open with different installers of Wireshark.
Step 3: Downloading of the executable file will start shortly.
Step 4: Now check for the executable file in downloads in your system and run it.
Step 5: It will prompt confirmation to make changes to your system. Click on Yes.
Step 6: Setup screen will appear, click on Next.
Step 7: The next screen will be of License Agreement, click on Noted.
Step 8: This screen is for choosing components, all components are already marked so don’t
change anything just click on the Next button.
Step 9: This screen is of choosing shortcuts like start menu or desktop icon along with file
extensions which can be intercepted by Wireshark, tick all boxes and click on Next button.
226120316072 Page 62
Cyber Security and Digital Forensics (4361601)
Step 10: The next screen will be of installing location so choose the drive which will have
sufficient memory space for installation. It needed only a memory space of 223.4 MB.
Step 11: Next screen has an option to install Npcap which is used with Wireshark to capture
packets pcap means packet capture so the install option is already checked don’t change
anything and click the next button.
Step 12: Next screen is about USB network capturing so it is one’s choice to use it or not,
click on Install.
Step 13: After this installation process will start.
Step 14: This installation will prompt for Npcap installation as already checked so the
license agreement of Npcap will appear to click on the I Agree button.
Step 15: Next screen is about different installing options of npcap, don’t do anything click
on Install.
226120316072 Page 63
Cyber Security and Digital Forensics (4361601)
Step 16: After this installation process will start which will take only a minute.
Step 17: After this installation process will complete click on the Next button.
Step 20: Click on Finish after the installation process of Wireshark is complete.
Wireshark is successfully installed on the system and an icon is created on the desktop as
shownbelow:
226120316072 Page 64
Cyber Security and Digital Forensics (4361601)
Step 3: Now after completing the login credential we will go and capture the password in
Wireshark. for that we have to use some filter that helps to find the login credential
through the packet capturing.
Step 4: Wireshark has captured some packets but we specifically looking for HTTP
packets. so in the display filter bar we use some command to find all the captured
HTTP packets.
226120316072 Page 65
Cyber Security and Digital Forensics (4361601)
Step 5: So there are some HTTP packets are captured but we specifically looking for form
data that the user submitted to the website. for that, we have a separate filter As we
know that there are main two methods used for submitting form data from web pages
like login forms to the server. the methods are- GET & POST
Step 6: So firstly for knowing the credential we use the first method and apply the filter for
the GET methods as you can see below.
http.request.method == "GET"
As you can see in the image there are two packets where the login page was requested
with a GET request as well, but there is no form data submitted with a GET request.
Step 7: Now after checking the GET method if we didn’t find the form data, then we will try
226120316072 Page 66
Cyber Security and Digital Forensics (4361601)
the POST method for that we will apply the filter on Wireshark as you can see.
http.request.method == "POST"
As you can see we have a packet with form data click on the packet with user info and the
application URL encoded.
Click on the down- HTML form URL Encoded where the login credential is found. login
credential as it is the same that we filed on the website in step 2.
Form item: "uname" = "Tonystark_44"
Form item: "pass" = "tony@1234"
As you can see in the another example in below image the green bar where we apply the filter.
226120316072 Page 67
Cyber Security and Digital Forensics (4361601)
https://www.youtube.com/watch?v=Y-JNp_DDQ9w
https://www.youtube.com/watch?v=wVLcxqXwQPw
https://www.youtube.com/watch?v=bEXEEfbNADs
M. Assessment-Rubrics
Total 100 25
Sign
Date: ……………
226120316072 Page 68