Is Lab Manual1
Is Lab Manual1
Information Security
(3170720)
B.E. Semester 7
(Computer Engineering)
Institute logo
Institute Name
Certificate
This is to certify thatMr./Ms. ___________________________________
________ Enrollment No. _______________ of B.E. Semester
_____Computer Engineering of this Institute (GTU Code: _____ ) has
satisfactorily completed the Practical / Tutorial work for the subject
Information Security (3170720) for the academic year 2022-23.
Place: __________
Date: __________
Preface
Main motto of any laboratory/practical/field work is for enhancing required skills as well as
creating ability amongst students to solve real time problem by developing relevant
competencies in psychomotor domain.By keeping in view, GTU has designed competency
focused outcome-based curriculum for engineering degree programs where sufficient weightage
is given to practical work. It shows importance of enhancement of skills amongst the students
and it pays attention to utilize every second of time allotted for practical amongst students,
instructors and faculty members to achieve relevant outcomes by performing the experiments
rather than having merely study type experiments. It is must for effective implementation of
competency focused outcome-basedcurriculum that every practical is keenly designed to serve as
a tool to develop and enhance relevant competency required by the various industry among every
student. These psychomotor skills are very difficult to develop through traditional chalk and
board content delivery method in the classroom. Accordingly, this lab manual is designed to
focus on the industry defined relevant outcomes, rather than old practice of conducting practical
to prove concept and theory.
By using this lab manual students can go through the relevant theory and procedure in advance
before the actual performance which creates an interest and students can have basic idea prior to
performance. This in turn enhances pre-determined outcomes amongst students. Each
experiment in this manual begins with competency, industry relevant skills, course outcomes as
well as practical outcomes (objectives). The students will also achieve safety and necessary
precautions to be taken while performing practical.
This manual also provides guidelines to faculty members to facilitate student centric lab
activities through each experiment by arranging and managing necessary resources in order that
the students follow the procedures with required safety and necessary precautions to achieve the
outcomes. It also gives an idea that how students will be assessed by providing rubrics.
Information security is the subject that helps students to understand various aspects of data
security. It provides a way to know various kinds of breaches that happen with data and how to
eliminate them using various techniques. The student is also able to learn various methodologies
which used by current used by developers to achieve the security of information.
.
210180107028 Information Security (3170720)
The following industry relevant competency are expected to be developed in the student by
undertaking the practical work of this laboratory.
1. Able to think about information security scenario and make solution
2. Able to develop and algorithms which helps to secure data
Index
(Progressive Assessment Sheet)
Total
OBJECTIVES:
The student should be made to:
OUTCOMES:
At the end of the course, the student should be able to:
SOFTWARE REQUIREMENTS
HARDWARE REQUIREMENTS
➢ Standalone desktops
210180107028 Information Security (3170720)
Experiment No: 1
Implementation of caesar cipher
Date:
Relevant CO: Explore the basic principles of the symmetric cryptography and techniques with their
strengths and weaknesses from perspective of cryptanalysis
Example:
Algorithm:
8|Page
210180107028 Information Security (3170720)
Program:
package Caesercipher;
import java.util.Scanner;
Output:
Conclusion:
Quiz:
10 | P a g e
210180107028 Information Security (3170720)
Suggested Reference:
1. https://www.geeksforgeeks.org/caesar-cipher-in-cryptography/
1. https://www.geeksforgeeks.org/caesar-cipher-in-cryptography/
Rubrics 1 2 3 4 5 Total
Marks
11 | P a g e
210180107028 Information Security (3170720)
Experiment No: 2
Implementation of Playfair cipher
Date:
Relevant CO: Explore the basic principles of the symmetric cryptography and techniques with their
strengths and weaknesses from perspective of cryptanalysis
1. If both letters are the same (or only one letter is left), add an "X" after the first letter
2. If the letters appear on the same row of your table, replace them with the letters to
their immediate right respectively
3. If the letters appear on the same column of your table, replace them with the letters
immediately below respectively
If the letters are not on the same row or column, replace them with the letters on the same row
respectively but at the other pair of corners of the rectangle defined by the original pair.
Example:
12 | P a g e
210180107028 Information Security (3170720)
Algorithm:
Program:
package playfaircipher;
import java.awt.Point;
import java.util.Scanner;
public PlayfairCipher() {
// Prompt user for the key
System.out.print("Enter the key for playfair cipher: ");
Scanner sc = new Scanner(System.in);
String key = parseString(sc);
while (key.equals("")) {
System.out.print("Key cannot be empty. Enter again: ");
key = parseString(sc);
}
13 | P a g e
210180107028 Information Security (3170720)
while (input.equals("")) {
System.out.print("Plaintext cannot be empty. Enter again: ");
input = parseString(sc);
}
14 | P a g e
210180107028 Information Security (3170720)
}
}
}
}
return playfairTable;
}
return out.toString();
}
15 | P a g e
210180107028 Information Security (3170720)
if (r1 == r2) {
c1 = (c1 + 1) % 5;
c2 = (c2 + 1) % 5;
} else if (c1 == c2) {
r1 = (r1 + 1) % 5;
r2 = (r2 + 1) % 5;
} else {
int temp = c1;
c1 = c2;
c2 = temp;
}
if (r1 == r2) {
c1 = (c1 + 4) % 5;
c2 = (c2 + 4) % 5;
} else if (c1 == c2) {
r1 = (r1 + 4) % 5;
r2 = (r2 + 4) % 5;
} else {
int temp = c1;
c1 = c2;
c2 = temp;
}
decoded.append(table[r1][c1]).append(table[r2][c2]);
16 | P a g e
210180107028 Information Security (3170720)
return decoded.toString();
}
return pt;
}
System.out.println();
}
17 | P a g e
210180107028 Information Security (3170720)
Output:
G A U R V
B C D E F
H I K L M
N O P Q S
T W X Y Z
Conclusion:
Quiz:
True, Playfair cipher is harder to crack than keyword cipher because of it’s encryption of double pair
letters.
Suggested Reference:
1. https://www.geeksforgeeks.org/playfair-cipher-with-examples/
1. https://www.geeksforgeeks.org/playfair-cipher-with-examples/
Rubrics 1 2 3 4 5 Total
Marks
18 | P a g e
210180107028 Information Security (3170720)
Experiment No: 3
Implementation of Hill cipher
Date:
Relevant CO: Explore the basic principles of the symmetric cryptography and techniques with their
strengths and weaknesses from perspective of cryptanalysis
Algorithm:
STEP-1: Read the plain text and key from the user.
STEP-2: Split the plain text into groups of length three.
STEP-3: Arrange the keyword in a 3*3 matrix.
STEP-4: Multiply the two matrices to obtain the cipher text of length three.
STEP-5: Combine all these groups to get the complete cipher text.
Program:
import java.util.ArrayList;
import java.util.Scanner;
19 | P a g e
210180107028 Information Security (3170720)
// Method to check if the reverse key matrix is valid (matrix mod 26 = (1,0,0,1))
private static void isValidReverseMatrix(int[][] keyMatrix, int[][] reverseMatrix) {
int[][] product = new int[2][2];
// Find the product matrix of key matrix times reverse key matrix
product[0][0] = (keyMatrix[0][0] * reverseMatrix[0][0] + keyMatrix[0][1] * reverseMatrix[1][0]) % 26;
product[0][1] = (keyMatrix[0][0] * reverseMatrix[0][1] + keyMatrix[0][1] * reverseMatrix[1][1]) % 26;
product[1][0] = (keyMatrix[1][0] * reverseMatrix[0][0] + keyMatrix[1][1] * reverseMatrix[1][0]) % 26;
product[1][1] = (keyMatrix[1][0] * reverseMatrix[0][1] + keyMatrix[1][1] * reverseMatrix[1][1]) % 26;
// Calculate the reverse key matrix elements using the factor found
reverseMatrix[0][0] = keyMatrix[1][1] * factor % 26;
reverseMatrix[0][1] = (26 - keyMatrix[0][1]) * factor % 26;
reverseMatrix[1][0] = (26 - keyMatrix[1][0]) * factor % 26;
reverseMatrix[1][1] = keyMatrix[0][0] * factor % 26;
return reverseMatrix;
}
20 | P a g e
210180107028 Information Security (3170720)
System.out.println();
}
isValidMatrix(keyMatrix);
21 | P a g e
210180107028 Information Security (3170720)
phraseToNum.add(phrase.charAt(i) - (64 + adder));
}
// Main method
public static void main(String[] args) {
Scanner sc = new Scanner(System.in);
String opt, phrase;
switch (opt) {
case "1":
System.out.print("Enter phrase to encrypt: ");
phrase = sc.nextLine();
encrypt(phrase, true);
break;
case "2":
System.out.print("Enter phrase to decrypt: ");
phrase = sc.nextLine();
decrypt(phrase, true);
break;
case "3":
22 | P a g e
210180107028 Information Security (3170720)
Output:
Hill Cipher Implementation (2x2)
-------------------------
1. Encrypt text (A=0,B=1,...Z=25)
2. Decrypt text (A=0,B=1,...Z=25)
3. Encrypt text (A=1,B=2,...Z=26)
4. Decrypt text (A=1,B=2,...Z=26)
Type any other character to exit
Select your choice: 2
Enter phrase to decrypt: kill
Enter key matrix:
vedd
Decoded phrase: CS-LK
Conclusion:
By Performing Experiment 3, We understand the working fundamental of Hill Cipher to carry out
Implementation of Hill cipher encryption-decryption.
Quiz:
To understand the Hill cipher, We should have an elementary knowledge of matrices. The Hill
cipher is a type of block cipher that uses matrix multiplication to encrypt plaintext into
ciphertext.
The Hill cipher is a polygraphic substitution cipher and a block cipher that uses linear algebra
and matrix multiplication to encrypt and decrypt text.
Suggested Reference:
1. https://crypto.interactive-maths.com/hill-cipher.html
Rubrics 1 2 3 4 5 Total
Marks
23 | P a g e
210180107028 Information Security (3170720)
Experiment No: 4
Implementation of Vigenere cipher
Date:
Relevant CO: Explore the basic principles of the symmetric cryptography and techniques with their
strengths and weaknesses from perspective of cryptanalysis
Example:
24 | P a g e
210180107028 Information Security (3170720)
Algorithm:
Program:
package VengenceCipher;
import java.util.*;
//Main class
public class VigenereCipher {
@SuppressWarnings("resource")
public static void main(String[] args) {
Scanner sc = new Scanner(System.in);
System.out.print("Enter the plaintext: ");
String pt = sc.nextLine().toUpperCase();
System.out.print("Enter the keyword: ");
String keyword = sc.nextLine().toUpperCase();
25 | P a g e
210180107028 Information Security (3170720)
} else {
// If the character is not alphabetic, leave it unchanged
cipher.append(currentChar);
}
}
return cipher.toString();
}
Output:
Enter the plaintext: hello world
Enter the keyword: 1234
Conclusion:
Quiz:
Suggested Reference:
1. https://intellipaat.com/blog/vigenere-cipher/
26 | P a g e
210180107028 Information Security (3170720)
1. https://intellipaat.com/blog/vigenere-cipher/
Rubrics 1 2 3 4 5 Total
Marks
27 | P a g e
210180107028 Information Security (3170720)
Experiment No: 5
Implementation of Rail Fence Transposition
Date:
Relevant CO: Explore the basic principles of the symmetric cryptography and techniques with their
strengths and weaknesses from perspective of cryptanalysis
Example:
Algorithm:
STEP-5: Read the characters row wise or column wise in the former order to get thecipher
text.
28 | P a g e
210180107028 Information Security (3170720)
Program:
package RailFance;
import java.util.Arrays;
// Fill the rail matrix to distinguish filled spaces from blank ones
for (int i = 0; i < key; i++)
Arrays.fill(rail[i], '\n');
return result.toString();
}
// Fill the rail matrix to distinguish filled spaces from blank ones
for (int i = 0; i < key; i++)
Arrays.fill(rail[i], '\n');
29 | P a g e
210180107028 Information Security (3170720)
if (row == 0)
dirDown = true;
if (row == key - 1)
dirDown = false;
if (rail[row][col] != '*') {
result.append(rail[row][col++]);
}
return result.toString();
}
30 | P a g e
210180107028 Information Security (3170720)
System.out.println(decryptRailFence("GsGsekfrek eoe", 3));
System.out.println(decryptRailFence("dnhaweedtees alf tl", 3));
}
}
Output:
Encrypted Message:
atc toctaka ne
GsGsekfrek eoe
dnhaweedtees alf tl
Decrypted Message:
attack at once
GeeksforGeeks
defend the east wall
Conclusion:
Quiz:
2. Rail fence cipher is more secure than one time pad cipher? True/False
False Statement, the one-time pad cipher is more secure than the rail fence cipher.
Suggested Reference:
1. https://crypto.interactive-maths.com/rail-fence-cipher.html
Rubrics 1 2 3 4 5 Total
Marks
31 | P a g e
210180107028 Information Security (3170720)
Experiment No: 6
Implementation of Simple DES
Date:
Relevant CO: Implement and analyze various symmetric key cryptography algorithms
and their application in different context
32 | P a g e
210180107028 Information Security (3170720)
Example:
Algorithm:
STEP-5: Thus the encrypted 64-bit cipher text is obtained in this way. Repeat the same
process for the remaining plain text characters.
Program:
import javax.crypto.Cipher;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import javax.crypto.spec.SecretKeySpec;
import java.util.Base64;
import java.util.Scanner;
33 | P a g e
210180107028 Information Security (3170720)
Output:
Enter text to be encrypted: hello world
Encrypted Text: UNqgO83wnG5fHASFcyV8Sw==
Decrypted Text: hello world
Conclusion:
Quiz:
16 Rounds.
34 | P a g e
210180107028 Information Security (3170720)
Suggested Reference:
1. https://www.tutorialspoint.com/cryptography/data_encryption_standard.html
Rubrics 1 2 3 4 5 Total
Marks
35 | P a g e
210180107028 Information Security (3170720)
Experiment No: 7
Implementation of AES
Date:
Relevant CO: Implement and analyze various symmetric key cryptography algorithms
and their application in different context
Example:
Algorithm:
36 | P a g e
210180107028 Information Security (3170720)
STEP-2:Initialize the state array with the block data (plaintext).
STEP-3:Add the initial round key to the starting state array.
STEP-4:Perform nine rounds of state manipulation.
STEP-5:Perform the tenth and final round of state manipulation.
STEP-6:Copy the final state array out as the encrypted data (ciphertext).
Program:
package AesExample;
import javax.crypto.Cipher;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import java.util.Base64;
import java.util.Scanner;
@SuppressWarnings("resource")
public static void main(String[] args) throws Exception {
Scanner sc = new Scanner(System.in);
if (response.equalsIgnoreCase("yes")) {
// Decrypt the encrypted text
String decryptedText = decrypt(encryptedText, secretKey);
System.out.println("Decrypted Text: " + decryptedText);
} else {
37 | P a g e
210180107028 Information Security (3170720)
System.out.println("Exiting without decryption.");
}
}
}
Output:
Enter the text to be encrypted: hello sir
Encrypted Text: cwnPTay2l5ssYARI6wyjTg==
Do you want to decrypt the text? (yes/no): yes
Decrypted Text: hello sir
Conclusion:
Quiz:
12 Rounds.
Suggested Reference:
1. https://www.geeksforgeeks.org/advanced-encryption-standard-aes/
Rubrics 1 2 3 4 5 Total
Marks
38 | P a g e
210180107028 Information Security (3170720)
Experiment No: 8
Implementation of RSA Algorithm
Date:
Relevant CO: Compare public key cryptography with private key cryptography and
Implement various asymmetric key cryptography algorithms
(me)d = m (mod n)
The public key is represented by the integers n and e; and, the private key, by the integer d. m
represents the message. RSA involves a public key and a private key. The public key can be known
by everyone and is used for encrypting messages. The intention is that messages encrypted with the
public key can only be decrypted in a reasonable amount of time using the private key.
Example:
39 | P a g e
210180107028 Information Security (3170720)
Algorithm:
Program:
package RsaExample;
import java.math.BigInteger;
import java.security.SecureRandom;
import java.util.Scanner;
private BigInteger n, d, e;
private int bitlen = 1024; // Bit length for key generation
// Encryption method
public BigInteger encrypt(BigInteger message) {
return message.modPow(e, n);
}
// Decryption method
public BigInteger decrypt(BigInteger encryptedMessage) {
return encryptedMessage.modPow(d, n);
}
if (response.equalsIgnoreCase("yes")) {
// Decrypt the message
BigInteger decryptedMessage = rsa.decrypt(encryptedMessage);
String decryptedText = new String(decryptedMessage.toByteArray());
System.out.println("Decrypted Message: " + decryptedText);
} else {
System.out.println("Exiting without decryption.");
}
sc.close();
}
}
Output:
Enter the message (as a string) to encrypt: Hii dude
Encrypted Message:
8287552099262694309095305037918313455492694638364970321921861296902473672937319132917725
1950356172115195482651233522134341751502823808410152668206552891983095650528585596916107
4137485479033714421944020939645757053958651448644599496626859096078674831660175303467643
89595541518246393265192951701361337297867915
Do you want to decrypt the message? (yes/no): yes
Decrypted Message: Hii dude
Conclusion:
Quiz:
Suggested Reference:
1. https://www.cemc.uwaterloo.ca/resources/real-world/RSA.pdf
1. https://www.cemc.uwaterloo.ca/resources/real-world/RSA.pdf
41 | P a g e
210180107028 Information Security (3170720)
Rubrics 1 2 3 4 5 Total
Marks
42 | P a g e
210180107028 Information Security (3170720)
Experiment No: 9
Implementation of Diffie–Hellman Key Exchange
Date:
Relevant CO: Compare public key cryptography with private key cryptography and
Implement various asymmetric key cryptography algorithms
Example:
Algorithm:
STEP-1: Both Alice and Bob shares the same public keys g and p.
STEP-2: Alice selects a random public key a.
STEP-3: Alice computes his secret key A as ga mod p.
STEP-4: Then Alice sends A to Bob.
STEP-5: Similarly Bob also selects a public key b and computes his secret key as Band
sends the same back to Alice.
43 | P a g e
210180107028 Information Security (3170720)
STEP-6: Now both of them compute their common secret key as the other one’s secretkey
power of a mod p.
Program:
package DeffiHellman;
import java.math.BigInteger;
import java.util.Scanner;
sc.close();
}
}
Output:
44 | P a g e
210180107028 Information Security (3170720)
Conclusion:
Quiz:
1. Suppose that two parties A and B wish to set up a common secret key (D-H key) between
themselves using the Diffie Hellman key exchange technique. They agree on 7 as the modulus
and 3 as the primitive root. Party A chooses 2 and party B chooses 5 as their respective secrets.
Their D-H key is ?
Party A’s Secret key Will be 4 & Party B’s Secrect Key Will b.
Suggested Reference:
1. https://www.techtarget.com/searchsecurity/definition/Diffie-Hellman-key-exchange
1. https://www.techtarget.com/searchsecurity/definition/Diffie-Hellman-key-exchange
Rubrics 1 2 3 4 5 Total
Marks
45 | P a g e
210180107028 Information Security (3170720)
Experiment No: 10
Implementation of MD-5
Date:
Relevant CO: Explore the concept of hashing and implement various hashing
algorithms for message integrity
Example:
46 | P a g e
210180107028 Information Security (3170720)
Algorithm:
STEP-3: Compute the functions f, g, h and i with operations such as, rotations,
permutations, etc,.
STEP-4: The output of these functions are combined together as F and performed
circular shifting and then given to key round.
STEP-5: Finally, right shift of ‘s’ times are performed and the results are combinedtogether to
produce the final output.
Program:
package MD5;
import java.security.MessageDigest;
import java.security.NoSuchAlgorithmException;
import java.util.Scanner;
// Digest the input string and return the hash as a byte array
byte[] messageDigest = md.digest(input.getBytes());
} catch (NoSuchAlgorithmException e) {
throw new RuntimeException(e);
}
}
@SuppressWarnings("resource")
public static void main(String[] args) {
Scanner sc = new Scanner(System.in);
47 | P a g e
210180107028 Information Security (3170720)
// Output the MD5 hash
System.out.println("MD5 Hash of the input: " + hash);
}
}
Output:
Enter the string to hash using MD5:
Hello
MD5 Hash of the input: 8b1a9953c4611296a827abf8c47804d7
Conclusion:
Quiz:
The MD5 algorithm is a cryptographic hash function that produces a 128-bit (16-byte) hash value
from any given input.
Suggested Reference:
1. https://www.simplilearn.com/tutorials/cyber-security-tutorial/md5-algorithm
Rubrics 1 2 3 4 5 Total
Marks
48 | P a g e
210180107028 Information Security (3170720)
Experiment No: 11
Implementation of SHA-1
Date:
Relevant CO: Explore the concept of hashing and implement various hashing
algorithms for message integrity
Example:
Algorithm:
49 | P a g e
210180107028 Information Security (3170720)
STEP-5: The block A is shifted right by ‘s’ times and permuted with the result of step-4.
STEP-6: Then it is permuted with a weight value and then with some other key pair and
taken as the first block.
STEP-7: Block A is taken as the second block and the block B is shifted by ‘s’ times and
taken as the third block.
STEP-8: The blocks C and D are taken as the block D and E for the final output.
Program:
package SHA1;
import java.security.MessageDigest;
import java.security.NoSuchAlgorithmException;
import java.util.Scanner;
// Digest the input string and return the hash as a byte array
byte[] messageDigest = md.digest(input.getBytes());
} catch (NoSuchAlgorithmException e) {
throw new RuntimeException(e);
}
}
@SuppressWarnings("resource")
public static void main(String[] args) {
Scanner sc = new Scanner(System.in);
}
}
50 | P a g e
210180107028 Information Security (3170720)
Output:
Conclusion:
Quiz:
Suggested Reference:
1. https://www.geeksforgeeks.org/sha-1-hash-in-java/.
Rubrics 1 2 3 4 5 Total
Marks
51 | P a g e
210180107028 Information Security (3170720)
Experiment No: 12
Implementation of digital signature standard
Date:
Relevant CO: Explore and use the techniques and standards of digital signature, key
management and authentication
Example:
Algorithm:
52 | P a g e
210180107028 Information Security (3170720)
Program:
package DSS;
import java.security.*;
import java.util.Base64;
} catch (Exception e) {
e.printStackTrace();
}
}
}
Output:
Digital Signature:
MDwCHEmGR1RpI1mWUHsS6pNpj0Y1ycaeXdda+wMQu/wCHFOMmbw/Y3qv9aaHod4hmB0aZWGE481arCfc8xs=
Signature verification: true
Conclusion:
53 | P a g e
210180107028 Information Security (3170720)
Quiz:
Suggested Reference:
1. https://www.geeksforgeeks.org/digital-signature-standard-dss/
Rubrics 1 2 3 4 5 Total
Marks
54 | P a g e
210180107028 Information Security (3170720)
Experiment No: 13
Demonstrate how to work with CrypTool
Date:
Relevant CO: -----
Introduction:
The JCrypTool installation is very simple: download and extract the zip-archive, launch the
main program and get started.
Encryption
1. Open the Cryptool UI and the document that needs to be encrypted.
55 | P a g e
210180107028 Information Security (3170720)
3. Select Caesar mode and the “alphabet character” is “N.” That means that the text will have
characters replaced starting with N. So A >N, B>M, and so on. Click on “encrypt.”
4. The document is encrypted as per the configured policy. This is a very basic example of how
symmetric encryption works.
56 | P a g e
210180107028 Information Security (3170720)
Decryption process
Conclusion:
57 | P a g e
210180107028 Information Security (3170720)
Suggested Reference:
1. https://www.c-sharpcorner.com/article/encryption-decryption-using-cryptool/
58 | P a g e
210180107028 Information Security (3170720)
Experiment No: 14
Demonstrate Working of Wireshark
Date:
Relevant CO:
Introduction:
The Wireshark installation is very simple: download and extract the zip-archive, launch the main
program and get started.
Installation
Installing Wireshark on Windows: Follow the below steps to install Wireshark on Windows:
Step 1: Visit the official Wireshark website using any web browser.
Step 2: Click on Download, a new webpage will open with different installers of Wireshark.
59 | P a g e
210180107028 Information Security (3170720)
Step 3: Downloading of the executable file will start shortly. It is a small 73.69 MB file that will
take some time.
Step 4: Now check for the executable file in downloads in your system and run it.
Step 5: It will prompt confirmation to make changes to your system. Click on Yes.
60 | P a g e
210180107028 Information Security (3170720)
Step 6: Setup screen will appear, click on Next.
Step 8: This screen is for choosing components, all components are already marked so don’t change
anything just click on the Next button.
61 | P a g e
210180107028 Information Security (3170720)
Step 9: This screen is of choosing shortcuts like start menu or desktop icon along with file
extensions which can be intercepted by Wireshark, tick all boxes and click on Next button.
Step 10: The next screen will be of installing location so choose the drive which will have sufficient
memory space for installation. It needed only a memory space of 223.4 MB.
Step 11: Next screen has an option to install Npcap which is used with Wireshark to capture
packets pcap means packet capture so the install option is already checked don’t change anything
and click the next button.
62 | P a g e
210180107028 Information Security (3170720)
Step 12: Next screen is about USB network capturing so it is one’s choice to use it or not, click on
Install.
Step 14: This installation will prompt for Npcap installation as already checked so the license
agreement of Npcap will appear to click on the I Agree button.
63 | P a g e
210180107028 Information Security (3170720)
Step 15: Next screen is about different installing options of npcap, don’t do anything click on
Install.
Step 16: After this installation process will start which will take only a minute.
64 | P a g e
210180107028 Information Security (3170720)
Step 17: After this installation process will complete click on the Next button.
65 | P a g e
210180107028 Information Security (3170720)
Step 19: After this installation process of Wireshark will complete click on the Next button.
Step 20: Click on Finish after the installation process of Wireshark is complete.
Wireshark is successfully installed on the system and an icon is created on the desktop as shown
below:
66 | P a g e
210180107028 Information Security (3170720)
Now run the software and see the interface.
Now you can use wireshark for packet capturing and filtering
Conclusion:
Suggested Reference:
1. https://www.javatpoint.com/wireshark
2. https://www.comptia.org/content/articles/what-is-wireshark-and-how-to-use-
it#:~:text=What%20Is%20Wireshark%20Used%20For,identify%20bursts%20of%20network
%20traffic.
67 | P a g e