NS Practical Assignment Arin Bisht
NS Practical Assignment Arin Bisht
Step 4 : Result
2. Wireshark - Network Packet Analyzer
Purpose: Wireshark captures and analyzes network traffic in detail.
Step 1 : Install Wireshark on Linux
Step 2: Demonstration
Write command Ping google.com
And this is how the screen will look like
Output :
Substitution Cipher : The Substitution Cipher is a more advanced cipher where each letter in
the plaintext is replaced by another letter based on a secret key. Instead of shifting, a fixed
random mapping is used.
Program :
Output :
Ques 4) WAP to implement Public Key cryptographic systems. (RSA)
Ans ) Program :
Output :
Ques 5) WAP to implement Deffie Hellman key exchange Algorithm.
Ans ) The Diffie-Hellman Key Exchange is a method for two parties to securely share a secret key
over a public channel.
Program :
Output :
Ques 6) What the steps involved in configuring Windows Firewall and to implement for
user management.
Ans ) 1. Configuring Windows Firewall
Step 1: Open Windows Firewall
Press Win + R, type firewall.cpl, and press Enter.
This opens the Windows Defender Firewall settings.
(Inbound Rules)
o Click Outbound Rules → "New Rule" to manage outgoing traffic.
(Outbound Rules)
Choose between Program, Port, Predefined, or Custom Rule.
Select Allow, Block, or Prompt for action based on requirements.
Click "Next" → "Finish" to save the rule.
Step 4: Enable or Disable Windows Firewall
In the main Windows Defender Firewall window, click "Turn Windows Defender Firewall
on or off."
Select:
o Turn on (recommended for security).
o Turn off (not recommended, unless troubleshooting).
Click OK to apply the settings.
Ques 7 ) Demonstrate any one honeypot tools for preventing intrusion detection.
Ans ) A honeypot is a decoy system designed to attract attackers, study their behavior, and
protect real systems. Cowrie is a popular honeypot tool that simulates a fake SSH and Telnet
server to log malicious activities.
Step 1) Install cowrie
(Setting up fake SSH (Secured Shell) port to 2222 real port is 22 so it cannot be used as it
might be in use by other real SSH server.)
Step 5) Start Cowrie
(Logs)