Cyber Security and Digital Forensics Lab Manual 4361601
Cyber Security and Digital Forensics Lab Manual 4361601
(4361601)
Institute’s Vision:
• To be a leading technical institute that provides transformative education to learners
for achieving competency as per the needs of industry and society, thus contributing
to nation building.
Institute’s Mission:
Department’s Vision:
Department’s Mission:
Date: ………………….
2. Problem analysis: Identify and analyse well-defined engineering problems using codified
standard methods.
4. Engineering Tools, Experimentation and Testing: Apply modern engineering tools and
appropriate technique to conduct standard tests and measurements.
7. Life-long learning: Ability to analyse individual needs and engage in updating in the
context of technological changes in field of engineering.
The following industry relevant skills are expected to be developed in the students by
performance of experiments of this course.
(2 or 3 skills)
Apply knowledge to real−world situations while investigate cyber crime using digital
forensics. And ethical hacking
Name:
Sr. No Marks
Practical Outcome/Title of experiment Page Date Sign
(25)
a) Implement Private key
Cryptography algorithm DES in
1 python.
(Install des package using pip)
b) Implement Message digest 5 and Secure
Hash Function using python.
Implement the RSA Public key Cryptography
2
algorithm in Python using RSA library.
Demonstrate intrusion detection system (ids)
3
using any tool.(snort or any other s/w)
Install Tor browser and perform proxy tunnelling.
4
Perform data hiding using Steganography tool
5
Openstego (use AES encryption algorithm).
Create malicious script for generating multiple folders
6
using python.
Prepare a case study report on 3 different types of
7 cyber-crimes. ( https://gujaratcybercrime.org)
(https://cybercrime.gov.in)
Study Open-source intelligence (OSINT) framework
and perform Information gathering
8
using Username, Email address , Domain name and
IP address.
a) Installation and configuration of Kali Linux
9 in Virtual box/VMware.
b) Perform basic commands in Kali Linux.
10 Perform port scanning using NMAP.
a) Installation and configuration of Wireshark.
11 b) Perform Password sniffing using Wireshark.
(Analyse GET/POST Request)
Perform Memory forensic using Memoryze tool.
12
(https://fireeye.market/apps/211368)
Perform web Artifact analysis and registry analysis
13 using Autopsy.
(https://www.sleuthkit.org/autopsy/)
Create forensic images of entire local hard drives
using FTK IMAGER tool.
14
(https://go.exterro.com/l/43312/2023-05-
03/fc4b78)
PRACTICAL – 1
SOLUTION:
DES is a symmetric encryption algorithm that uses a 64−bit key (8 bytes) to
securely encrypt and decrypt data. DES is widely used in network security,
data protection, and cryptographic research, making it an excellent choice for
learning symmetric encryption in Python.
Python Implementation
Output :
python. SOLUTION:
Output
PRACTICAL – 2
AIM: Implement the RSA Public key Cryptography algorithm in Python using
RSA library.
SOLUTION:
Output
PRACTICAL – 3
SOLUTION:
Run Snort
Open Command Prompt as Administrator.
Test the Snort configuration:
PRACTICAL – 4
SOLUTION:
For Chrome: Chrome doesn’t have a built-in proxy settings UI, but we
can launch it with the following command:
google-chrome --proxy-server="socks5://185.220.101.1"
PRACTICAL – 5
AIM: Perform data hiding using Steganography tool Openstego (use AES
encryption algorithm).
SOLUTION:
AES encryption is commonly done using a strong key. For this, you can
use various encryption tools or Python scripts.
Output
PRACTICAL – 6
AIM: Create malicious script for generating multiple folders using python.
SOLUTION:
Output
PRACTICAL – 7
CASE STUDY:
1. Financial Fraud
Fraudsters often exploit online marketplaces to deceive buyers. They create counterfeit
accounts on platforms like OLX, showcasing high-value items at attractive prices. After
gaining the buyer's trust, they request advance payments. Once the payment is made, the
goods are never delivered. Victims are left with financial losses and no recourse. Such scams
highlight the importance of verifying sellers and using secure payment methods when
shopping online.
3. Data Theft
A company experienced a significant data breach when hackers infiltrated their network
using malware. The malware, which included viruses and trojans, was designed to operate
undetected, allowing the attackers to steal sensitive information such as customer data and
financial records. The breach resulted in substantial financial losses and reputational
damage. This incident underscores the critical need for robust cybersecurity measures,
including regular system updates, employee training, and advanced threat detection systems.
Preventive Measures