Presentation 1
Presentation 1
2.Apply brute force attack on a website using burpsuite, and infer the results.
1.Experiment with different image formats (JPEG, PNG,
BMP) and observe how Xiao steganography behaves with
each format. Document any variations in effectiveness.
2. Apply brute force attack on a website using burpsuite, and infer the
results.
1 a)Use Wireshark to capture DNS traffic and analyze how DNS
resolution works.
• (b) Apply filter to exclude traffic from a specific IP address in
Wireshark .